Risk | Low |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2021-4095 CVE-2021-4204 CVE-2022-1204 |
CWE-ID | CWE-476 CWE-125 CWE-416 |
Exploitation vector | Local |
Public exploit | Public exploit code for vulnerability #2 is available. |
Vulnerable software |
Fedora Operating systems & Components / Operating system kernel-tools Operating systems & Components / Operating system package or component kernel-headers Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | Fedoraproject |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU59895
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-4095
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the Linux kernel's KVM when dirty ring logging is enabled without an active vCPU context in kvm_dirty_ring_get() function in virt/kvm/dirty_ring.c. A local user can pass specially crafted input to the KVM_XEN_HVM_SET_ATTR IOCTL and perform a denial of service (DoS) attack.
Install updates from vendor's repository.
Vulnerable software versionsFedora: 35
kernel-tools: before 5.17.4-200.fc35
kernel-headers: before 5.17.4-200.fc35
kernel: before 5.17.4-200.fc35
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2022-8efcea6e67
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU86247
Risk: Low
CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2021-4204
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a boundary condition in Linux kernel eBPF. A local user trigger an out-of-bounds read error and read contents of memory on the system or crash the kernel.
Install updates from vendor's repository.
Vulnerable software versionsFedora: 35
kernel-tools: before 5.17.4-200.fc35
kernel-headers: before 5.17.4-200.fc35
kernel: before 5.17.4-200.fc35
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2022-8efcea6e67
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU63791
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-1204
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in the Linux kernel’s Amateur Radio AX.25 protocol functionality when user connects with the protocol. A local user can trigger use-after-free error to perform a denial of service attack or escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 35
kernel-tools: before 5.17.4-200.fc35
kernel-headers: before 5.17.4-200.fc35
kernel: before 5.17.4-200.fc35
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2022-8efcea6e67
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.