Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-49975 |
CWE-ID | CWE-20 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU112125
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49975
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the __dev_queue_xmit() function in net/core/dev.c, within the convert___skb_to_skb() function in net/bpf/test_run.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's repository.
Vulnerable software versionsLinux kernel: 5.4 - 6.0 rc4
CPE2.3https://git.kernel.org/stable/c/6204bf78b2a903b96ba43afff6abc0b04d6e0462
https://git.kernel.org/stable/c/72f2dc8993f10262092745a88cb2dd0fef094f23
https://git.kernel.org/stable/c/8b68e53d56697a59b5c53893b53f508bbdf272a0
https://git.kernel.org/stable/c/a75987714bd2d8e59840667a28e15c1fa5c47554
https://git.kernel.org/stable/c/fd1894224407c484f652ad456e1ce423e89bb3eb
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.141
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.65
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.7
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.212
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.