Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-49520 |
CWE-ID | CWE-388 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU104748
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49520
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the compat_arm_syscall() function in arch/arm64/kernel/sys_compat.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 5.4 - 5.4.197
CPE2.3https://git.kernel.org/stable/c/095e975f8150ccd7f852eb578c1cdbdd2f517c7a
https://git.kernel.org/stable/c/3910ae71cb963fa2b68e684489d4fc3d105afda0
https://git.kernel.org/stable/c/3fed9e551417b84038b15117732ea4505eee386b
https://git.kernel.org/stable/c/621916afe8cd4f322eb12759b64a2f938d4e551d
https://git.kernel.org/stable/c/ad97425d23af3c3b8d4f6a2bb666cb485087c007
https://git.kernel.org/stable/c/efd183d988b416fcdf6f7c298a17ced4859ca77d
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.198
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.