Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-49637 |
CWE-ID | CWE-366 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU104833
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49637
CWE-ID:
CWE-366 - Race Condition within a Thread
Exploit availability: No
DescriptionThe vulnerability allows a local user to corrupt data.
The vulnerability exists due to a data race within the tnode_free() function in net/ipv4/fib_trie.c. A local user can corrupt data.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 5.15 - 5.15.55
CPE2.3https://git.kernel.org/stable/c/190cd4ff128373271e065afb20f1d2247b3f10c3
https://git.kernel.org/stable/c/418b191d5f223a8cb6cab09eae1f72c04ba6adf2
https://git.kernel.org/stable/c/73318c4b7dbd0e781aaababff17376b2894745c0
https://git.kernel.org/stable/c/7c1acd98fb221dc0d847451b9ab86319f8b9916c
https://git.kernel.org/stable/c/9be8aac91960ea32fd0e874758c9afee665c57d2
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.56
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.