Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-49904 |
CWE-ID | CWE-476 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU108266
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49904
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the rose_transmit_clear_request() function in net/rose/rose_link.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 4.14 - 6.1 rc7
CPE2.3https://git.kernel.org/stable/c/0d38b4ca6679e72860ff8730e79bb99d0e9fa3b0
https://git.kernel.org/stable/c/1c89642e7f2b7ecc9635610653f5c2f0276c0051
https://git.kernel.org/stable/c/2b45d6d0c41cb9593868e476681efb1aae5078a1
https://git.kernel.org/stable/c/a99a8ec4c62180c889482a2ff6465033e0743458
https://git.kernel.org/stable/c/b49f6b2f21f543d4dc88fb7b1ec2adccb822f27c
https://git.kernel.org/stable/c/b736592de2aa53aee2d48d6b129bc0c892007bbe
https://git.kernel.org/stable/c/f8017317cb0b279b8ab98b0f3901a2e0ac880dad
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.299
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.265
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.154
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.78
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.224
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.8
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.