#VU104701 Improper locking in Linux kernel - CVE-2022-49089


Vulnerability identifier: #VU104701

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49089

CWE-ID: CWE-667

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the spin_lock_irqsave() function in drivers/infiniband/sw/rdmavt/qp.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/43c2d7890ecabe527448a6c391fb2d9a5e6bbfe0
https://git.kernel.org/stable/c/4d809f69695d4e7d1378b3a072fa9aef23123018
https://git.kernel.org/stable/c/57800cc36e55db0547461c49acf5cd84c0f502b0
https://git.kernel.org/stable/c/77ffb2495a41098f9d6a14f8aefde3188da75944
https://git.kernel.org/stable/c/8a50937227c385a477177c9ffa122b4230e40666
https://git.kernel.org/stable/c/92f1947c0d26060e978b3a9f21f32ce7c8c9cca3


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability