Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-48972 |
CWE-ID | CWE-399 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU99163
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48972
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ieee802154_if_add() function in net/mac802154/iface.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 4.9 - 6.1 rc7
CPE2.3https://git.kernel.org/stable/c/7410f4d1221bb182510b7778ab6eefa8b9b7102d
https://git.kernel.org/stable/c/9980a3ea20de40c83817877106c909cb032692d2
https://git.kernel.org/stable/c/f00c84fb1635c27ba24ec5df65d5bd7d7dc00008
https://git.kernel.org/stable/c/1831d4540406708e48239cf38fd9c3b7ea98e08f
https://git.kernel.org/stable/c/42c319635c0cf7eb36eccac6cda76532f47b61a3
https://git.kernel.org/stable/c/a110287ef4a423980309490df632e1c1e73b3dc9
https://git.kernel.org/stable/c/623918f40fa68e3bb21312a3fafb90f491bf5358
https://git.kernel.org/stable/c/b3d72d3135d2ef68296c1ee174436efd65386f04
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.302
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.269
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.336
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.159
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.83
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.227
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.13
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.