Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-49345 |
CWE-ID | CWE-415 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU104731
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49345
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the xfrm4_protocol_init() function in net/ipv4/xfrm4_protocol.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 5.4 - 5.4.197
CPE2.3https://git.kernel.org/stable/c/2b253fbc9f7b5db18d716436bdcf8ecef09fd63d
https://git.kernel.org/stable/c/31f3c6a4dcd3260a386e62cef2d5b36e902600a1
https://git.kernel.org/stable/c/4a388f08d8784af48f352193d2b72aaf167a57a1
https://git.kernel.org/stable/c/85a055c03691e51499123194a14a0c249cf33227
https://git.kernel.org/stable/c/be3884d5cd04ccd58294b83a02d70b7c5fca19d3
https://git.kernel.org/stable/c/c58d82a1264813e69119c13e9804e2e60b664ad5
https://git.kernel.org/stable/c/e04d59cfe0c0129df7aba7ef7bb17b96be2a64f2
https://git.kernel.org/stable/c/e53cd3814504b2cadaba4d5a8a07eeea9ddacd03
https://git.kernel.org/stable/c/ef6d2354de238b065d8799c80da4be9a6af18e39
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.198
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.