#VU104763 Improper error handling in Linux kernel - CVE-2022-49066


Vulnerability identifier: #VU104763

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49066

CWE-ID: CWE-388

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the veth_xmit() function in drivers/net/veth.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/1ef0088e43af1de4e3b365218c4d3179d9a37eec
https://git.kernel.org/stable/c/2fd90b86dff413fbf8128780c04ea9c6849c16e2
https://git.kernel.org/stable/c/3de2a02b60a4ef0ab76263216f08c7d095fc7c42
https://git.kernel.org/stable/c/46bc359fec0c6d87b70d7a008bcd9a5e30dd6f27
https://git.kernel.org/stable/c/726e2c5929de841fdcef4e2bf995680688ae1b87
https://git.kernel.org/stable/c/93940fc4cb81840dc0fa202de48cccb949a0261d
https://git.kernel.org/stable/c/d417a859221f127e8edf09c14b76ab50f825e171
https://git.kernel.org/stable/c/d67c900f1947d64ba8a64f693504bcaab8d9000c


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability