Vulnerability identifier: #VU104801
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49044
CWE-ID:
CWE-119
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the kvmalloc_array() function in drivers/md/dm-integrity.c. A local user can escalate privileges on the system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/08c1af8f1c13bbf210f1760132f4df24d0ed46d6
https://git.kernel.org/stable/c/4d485cf9b609709e45d5113e6e2b1b01254b2fe9
https://git.kernel.org/stable/c/6a95d91c0b315c965198f6ab7dec7c94129e17e0
https://git.kernel.org/stable/c/6b4bf97587ef6c1927a78934b700204920655123
https://git.kernel.org/stable/c/7f84c937222944c03f4615ca4742df6bed0e5adf
https://git.kernel.org/stable/c/cd02b2687d66f0a8e716384de4b9a0671331f1dc
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.