Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-49763 |
CWE-ID | CWE-416 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU108232
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49763
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ntfs_read_inode_mount() function in fs/ntfs/inode.c. A local user can escalate privileges on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 4.14 - 4.14.299
CPE2.3https://git.kernel.org/stable/c/266bd5306286316758e6246ea0345133427b0f62
https://git.kernel.org/stable/c/4863f815463034f588a035cfd99cdca97a4f1069
https://git.kernel.org/stable/c/5330c423b86263ac7883fef0260b9e2229cb531e
https://git.kernel.org/stable/c/79f3ac7dcd12c05b7539239a4c6fa229a50d786c
https://git.kernel.org/stable/c/b825bfbbaafbe8da2037e3a778ad660c59f9e054
https://git.kernel.org/stable/c/d0006d739738a658a9c29b438444259d9f71dfa0
https://git.kernel.org/stable/c/d85a1bec8e8d552ab13163ca1874dcd82f3d1550
https://git.kernel.org/stable/c/fb2004bafd1932e08d21ca604ee5844f2b7f212d
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.300
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.