Vulnerability Details : CVE-2022-48698
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: fix memory leak when using debugfs_lookup()
When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time. Fix this up by properly
calling dput().
Products affected by CVE-2022-48698
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-48698
0.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 2 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-48698
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
1.8
|
3.4
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-10-30 |
CWE ids for CVE-2022-48698
-
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-48698
-
https://git.kernel.org/stable/c/58acd2ebae034db3bacf38708f508fbd12ae2e54
drm/amd/display: fix memory leak when using debugfs_lookup() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/cbfac7fa491651c57926c99edeb7495c6c1aeac2
drm/amd/display: fix memory leak when using debugfs_lookup() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/3a6279d243cb035eaaff1450980b40cf19748f05
drm/amd/display: fix memory leak when using debugfs_lookup() - kernel/git/stable/linux.git - Linux kernel stable treePatch
Jump to