Risk | High |
Patch available | YES |
Number of vulnerabilities | 37 |
CVE-ID | CVE-2022-0001 CVE-2022-0002 CVE-2022-0168 CVE-2022-0494 CVE-2022-0500 CVE-2022-0742 CVE-2022-0854 CVE-2022-0995 CVE-2022-1011 CVE-2022-1015 CVE-2022-1016 CVE-2022-1048 CVE-2022-1158 CVE-2022-1198 CVE-2022-1199 CVE-2022-1204 CVE-2022-1205 CVE-2022-1263 CVE-2022-1353 CVE-2022-1516 CVE-2022-23036 CVE-2022-23037 CVE-2022-23038 CVE-2022-23039 CVE-2022-23040 CVE-2022-23041 CVE-2022-23042 CVE-2022-23222 CVE-2022-23960 CVE-2022-24958 CVE-2022-26490 CVE-2022-27666 CVE-2022-28356 CVE-2022-28388 CVE-2022-28389 CVE-2022-28390 CVE-2022-29582 |
CWE-ID | CWE-200 CWE-476 CWE-787 CWE-401 CWE-416 CWE-362 CWE-617 CWE-264 CWE-1037 CWE-763 CWE-119 CWE-122 CWE-415 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #8 is available. Public exploit code for vulnerability #9 is available. Public exploit code for vulnerability #10 is available. Public exploit code for vulnerability #28 is available. Public exploit code for vulnerability #32 is available. |
Vulnerable software Subscribe |
Slackware Linux Operating systems & Components / Operating system linux-5.15.38/kernel-modules Operating systems & Components / Operating system package or component linux-5.15.38/kernel-huge Operating systems & Components / Operating system package or component linux-5.15.38/kernel-headers Operating systems & Components / Operating system package or component linux-5.15.38/kernel-generic Operating systems & Components / Operating system package or component |
Vendor | Slackware |
Security Bulletin
This security bulletin contains information about 37 vulnerabilities.
EUVDB-ID: #VU61198
Risk: Low
CVSSv3.1: 4.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-0001
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to non-transparent sharing of branch predictor selectors between contexts. A local user can gain unauthorized access to sensitive information on the system.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61199
Risk: Low
CVSSv3.1: 4.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-0002
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to non-transparent sharing of branch predictor within a context. A local user can gain unauthorized access to sensitive information on the system.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63789
Risk: Low
CVSSv3.1: 3.9 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-0168
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in the Linux kernel’s smb2_ioctl_query_info function in the fs/cifs/smb2ops.c Common Internet File System (CIFS). A privileged (CAP_SYS_ADMIN) attacker can perform a denial of service (DoS) attack.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64259
Risk: Low
CVSSv3.1: 3.9 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-0494
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output in the scsi_ioctl() function in drivers/scsi/scsi_ioctl.c in the Linux kernel. A local user with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) can gain unauthorized access to sensitive information on the system.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU65298
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-0500
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
Description The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in unrestricted eBPF usage by the BPF_BTF_LOAD in Linux kernel. A local user can trigger an out-of-bounds write error in BPF subsystem and execute arbitrary code with elevated privileges.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61392
Risk: High
CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-0742
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform DoS attack on the target system.
The vulnerability exists due memory leak within igmp6_event_query() and igmp6_event_report() functions in Linux kernel when handling ICMPv6 packets. A remote attacker can flood the system with ICMPv6 messages of type 130 and 131 to cause out-of-memory condition and perform a denial of service (DoS) attack.
Update the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63427
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-0854
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due memory leak in the Linux kernel’s DMA subsystem when processing DMA_FROM_DEVICE calls. A local user can trigger a memory leak error and read random memory from the kernel space.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61772
Risk: Low
CVSSv3.1: 7.2 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C]
CVE-ID: CVE-2022-0995
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: Yes
Description The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the Linux kernel’s watch_queue event notification subsystem. A local user can run a specially crafted program to trigger an out-of-bounds write and execute arbitrary code with elevated privileges.
Update the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.
EUVDB-ID: #VU63386
Risk: Low
CVSSv3.1: 7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2022-1011
CWE-ID:
CWE-416 - Use After Free
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in the write() function of FUSE filesystem. A local user can retireve (partial) /etc/shadow hashes and execute arbitrary code with elevated privileges.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU62027
Risk: Low
CVSSv3.1: 7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2022-1015
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: Yes
Description The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the nft_validate_register_store and nft_validate_register_load in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. A local user can escalate privileges on the system.
Update the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU62028
Risk: Low
CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1016
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a use-after-free error in net/netfilter/nf_tables_core.c:nft_do_chain in Linux kernel.. A local user can trigger a use-after-free error and gain access to sensitive information.
Update the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63428
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1048
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code with elevated privileges.
The vulnerability exists due to a use-after-free error in the Linux kernel’s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. A local user can execute arbitrary code with elevated privileges and perform a denial-of-service attack.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63166
Risk: Medium
CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1158
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
Description The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due the KVM implementation in Linux kernel does not properly perform guest page table updates in some situations. A remote user on the guest operating system can trigger memory corruption and perform a denial of service attack against the host OS.
Update the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63431
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1198
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service attack.
The vulnerability exists due to a use-after-free error in the drivers/net/hamradio/6pack.c. A local user can perform a denial of service (DoS) attack by simulating Amateur Radio.
Update the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63432
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1199
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a Null pointer dereference and use after free errors in the ax25_release() function. A local user can simulate Amateur Radio and perform a denial of service (DoS) attack.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63791
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1204
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in the Linux kernel’s Amateur Radio AX.25 protocol functionality when user connects with the protocol. A local user can trigger use-after-free error to perform a denial of service attack or escalate privileges on the system.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63433
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1205
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a null pointer dereference and use after free errors in the net/ax25/ax25_timer.c. A local user can simulate Amateur Radio and perform a denial of service (DoS) attack.
Update the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64074
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1263
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to kvm implementation in the Linux kernel does not handle releasing a virtual cpu properly. A local user can pass specially crafted data and perform a denial of service (DoS) attack.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63388
Risk: Low
CVSSv3.1: 6.2 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1353
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the pfkey_register function in net/key/af_key.c in the Linux kernel. A local user can gain unauthorized access to kernel memory, leading to a system crash or a leak of internal kernel information.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63158
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1516
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference error in the Linux kernel’s X.25 set of standardized network protocols functionality. A local user can terminate session using a simulated Ethernet card and perform a denial of service (DoS) attack.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63305
Risk: Low
CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23036
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to a race condition in the blkfront ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63306
Risk: Low
CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23037
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to a race condition in the netfront ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63307
Risk: Low
CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23038
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to a race condition in the scsifront ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63308
Risk: Low
CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23039
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to a race condition in the gntalloc ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63309
Risk: Low
CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23040
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to a race condition in the xenbus ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63310
Risk: Low
CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23041
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to a race condition in blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls ring buffers. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63311
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23042
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to reachable assertion in the netfront ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59896
Risk: Low
CVSSv3.1: 7 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2022-23222
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to availability of pointer arithmetic via certain *_OR_NULL pointer types in kernel/bpf/verifier.c in the Linux kernel. A local user can run a specially crafted program to execute arbitrary code with root privileges.
Update the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU65007
Risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23960
CWE-ID:
CWE-1037 - Processor optimization removal or modification of security-critical code
Exploit availability: No
DescriptionThe vulnerability allows a local user to obtain potentially sensitive information.
The vulnerability exists due to improper restrictions of cache speculation. A local user can leverage the shared branch history in the Branch History Buffer (BHB) to influence mispredicted branches and gain access to sensitive information.
The vulnerability was dubbed Spectre-BHB.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63315
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-24958
CWE-ID:
CWE-763 - Release of invalid pointer or reference
Exploit availability: No
DescriptionThe vulnerability allows remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to release of illegal memory vulnerability in the drivers/usb/gadget/legacy/inode.c. A remote attacker can send specially crafted data and perform a denial of service (DoS) attack.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62601
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-26490
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the st21nfca_connectivity_event_received() function in drivers/nfc/st21nfca/se.c in Linux kernel. A local user can run a specially crafted program to trigger buffer overflow and execute arbitrary code with elevated privileges.
Update the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61672
Risk: Low
CVSSv3.1: 6.3 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2022-27666
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c in Linux kernel. A local unprivileged user can pass specially crafted data to the system, trigger a heap-based buffer overflow and execute arbitrary code with elevated privileges.
Update the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU63390
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-28356
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform DoS attack on the target system.
The vulnerability exists due memory leak in net/llc/af_llc.c component. A remote attacker can force the system to leak memory and perform denial of service attack.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63160
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-28388
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code with elevated privileges.
The vulnerability exists due to boundary error in the usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c. A local user can pass specially crafted data to the application, trigger double free error and execute arbitrary code with elevated privileges.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63162
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-28389
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code with elevated privileges.
The vulnerability exists due to boundary error in mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c. A local user can pass specially crafted data to the application, trigger double free error and execute arbitrary code with elevated privileges.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63164
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-28390
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code with elevated privileges.
The vulnerability exists due to boundary error in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c. A local user can pass specially crafted data to the application, trigger double free error and execute arbitrary code with elevated privileges.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63792
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-29582
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in the io_uring timeouts() function in the Linux kernel. A local user can trigger a race condition between timeout flush and removal to cause a denial of service or escalate privileges on the system.
MitigationUpdate the affected package Slackware 15.0 kernel.
Vulnerable software versionsSlackware Linux: 15.0
linux-5.15.38/kernel-modules: before 5.15.38
linux-5.15.38/kernel-huge: before 5.15.38
linux-5.15.38/kernel-headers: before 5.15.38
linux-5.15.38/kernel-generic: before 5.15.38
CPE2.3 External linkshttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2022&m=slackware-security.831555
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.