Vulnerability identifier: #VU104715
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49725
CWE-ID:
CWE-20
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the i40e_diag_test() function in drivers/net/ethernet/intel/i40e/i40e_ethtool.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/0a4e5a3dc5e41212870e6043895ae02455c93f63
https://git.kernel.org/stable/c/15950157e2c24865b696db1c9ccc72743ae0e967
https://git.kernel.org/stable/c/322271351b0e41565171e4cce70ea41854fac115
https://git.kernel.org/stable/c/5ba9956ca57e361fb13ea369bb753eb33177acc7
https://git.kernel.org/stable/c/814092927a215f5ca6c08249ec72a205e0b473cd
https://git.kernel.org/stable/c/fd5855e6b1358e816710afee68a1d2bc685176ca
https://git.kernel.org/stable/c/ff6e03fe84bc917bb0c907d02de668c2fe101712
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.