CVE-2022-47929NULL Pointer Dereference in Kernel

Severity
5.5MEDIUMNVD
OSV7.8OSV5.9OSV5.3OSV4.7
EPSS
0.0%
top 91.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 17
Latest updateFeb 13

Description

In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with "tc qdisc" and "tc class" commands. This affects qdisc_graft in net/sched/sch_api.c.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages7 packages

NVDlinux/linux_kernel< 6.1.6
Debianlinux/linux_kernel< 5.10.162-1+3
Ubuntulinux/linux_kernel< 4.15.0-208.220+3
debiandebian/linux< linux 6.1.7-1 (bookworm)

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

26
OSV
linux-oem-6.0 vulnerabilities2023-07-25
OSV
linux-oem-5.17 vulnerabilities2023-07-25
OSV
linux-intel-iotg-5.15 vulnerabilities2023-06-01
OSV
linux-intel-iotg vulnerabilities2023-05-05
OSV
linux-hwe-5.15 vulnerabilities2023-04-25

📋Vendor Advisories

30
CISA ICS
Siemens SCALANCE W7002025-02-13
Ubuntu
Linux kernel (OEM) vulnerabilities2023-07-25
Ubuntu
Linux kernel (OEM) vulnerabilities2023-07-25
CISA ICS
Siemens SIMATIC S7-1500 TM MFP Linux Kernel2023-06-15
Ubuntu
Linux kernel (Intel IoTG) vulnerabilities2023-06-01