Executive Summary

Informations
Name CVE-2022-49757 First vendor Publication 2025-03-27
Vendor Cve Last vendor Modification 2025-04-15

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

EDAC/highbank: Fix memory leak in highbank_mc_probe()

When devres_open_group() fails, it returns -ENOMEM without freeing memory allocated by edac_mc_alloc().

Call edac_mc_free() on the error handling path to avoid a memory leak.

[ bp: Massage commit message. ]

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49757

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory Leak')

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3576

Sources (Detail)

https://git.kernel.org/stable/c/0db40e23b56d217eebd385bebb64057ef764b2c7
https://git.kernel.org/stable/c/329fbd260352a7b9a83781d8b8bd96f95844a51f
https://git.kernel.org/stable/c/8d23f5d25264beb223ee79cdb530b88c237719fc
https://git.kernel.org/stable/c/b7863ef8a8f0fee96b4eb41211f4918c0e047253
https://git.kernel.org/stable/c/caffa7fed1397d1395052272c93900176de86557
https://git.kernel.org/stable/c/e7a293658c20a7945014570e1921bf7d25d68a36
https://git.kernel.org/stable/c/f1b3e23ed8df87d779ee86ac37f379e79a24169a
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2025-06-26 02:10:19
  • Multiple Updates
2025-06-25 12:23:08
  • Multiple Updates
2025-06-24 02:14:56
  • Multiple Updates
2025-05-27 13:23:56
  • Multiple Updates
2025-05-27 02:11:55
  • Multiple Updates
2025-03-31 17:20:33
  • Multiple Updates
2025-03-27 21:20:36
  • First insertion