#VU104748 Improper error handling in Linux kernel - CVE-2022-49520


Vulnerability identifier: #VU104748

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49520

CWE-ID: CWE-388

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the compat_arm_syscall() function in arch/arm64/kernel/sys_compat.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/095e975f8150ccd7f852eb578c1cdbdd2f517c7a
https://git.kernel.org/stable/c/3910ae71cb963fa2b68e684489d4fc3d105afda0
https://git.kernel.org/stable/c/3fed9e551417b84038b15117732ea4505eee386b
https://git.kernel.org/stable/c/621916afe8cd4f322eb12759b64a2f938d4e551d
https://git.kernel.org/stable/c/ad97425d23af3c3b8d4f6a2bb666cb485087c007
https://git.kernel.org/stable/c/efd183d988b416fcdf6f7c298a17ced4859ca77d


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability