Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-49903 |
CWE-ID | CWE-667 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU108302
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49903
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ip_vs_app_net_init() function in net/netfilter/ipvs/ip_vs_app.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 4.19 - 4.19.264
CPE2.3https://git.kernel.org/stable/c/080589287127838046077904f34d5054ea0f895c
https://git.kernel.org/stable/c/0ed71af4d017d2bd2cbb8f7254f613a4914def26
https://git.kernel.org/stable/c/381453770f731f0f43616a1cd4c759b7807a1517
https://git.kernel.org/stable/c/5dbb47ee89762da433cd8458788d7640c85f1a07
https://git.kernel.org/stable/c/768b3c745fe5789f2430bdab02f35a9ad1148d97
https://git.kernel.org/stable/c/83fbf246ced54dadd7b9adc2a16efeff30ba944d
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.265
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.