Vulnerability identifier: #VU99098
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49023
CWE-ID:
CWE-119
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the cfg80211_gen_new_ie() function in net/wireless/scan.c. A local user can escalate privileges on the system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/f5c2ec288a865dbe3706b09bed12302e9f6d696b
https://git.kernel.org/stable/c/9e6b79a3cd17620d467311b30d56f2648f6880aa
https://git.kernel.org/stable/c/88a6fe3707888bd1893e9741157a7035c4159ab6
https://git.kernel.org/stable/c/391cb872553627bdcf236c03ee7d5adb275e37e1
https://git.kernel.org/stable/c/9f16b5c82a025cd4c864737409234ddc44fb166a
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.