Vulnerability Description
In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with "tc qdisc" and "tc class" commands. This affects qdisc_graft in net/sched/sch_api.c.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 6.1.6 |
| Debian | Debian Linux | 11.0 |
Related Weaknesses (CWE)
References
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.6Mailing ListPatchVendor Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96PatchVendor Advisory
- https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
- https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
- https://tldp.org/HOWTO/Traffic-Control-HOWTO/components.htmlThird Party Advisory
- https://www.debian.org/security/2023/dsa-5324Third Party Advisory
- https://www.spinics.net/lists/netdev/msg555705.htmlExploitMailing ListThird Party Advisory
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.6Mailing ListPatchVendor Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96PatchVendor Advisory
- https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
- https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
- https://tldp.org/HOWTO/Traffic-Control-HOWTO/components.htmlThird Party Advisory
- https://www.debian.org/security/2023/dsa-5324Third Party Advisory
- https://www.spinics.net/lists/netdev/msg555705.htmlExploitMailing ListThird Party Advisory
FAQ
What is CVE-2022-47929?
CVE-2022-47929 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic contro...
How severe is CVE-2022-47929?
CVE-2022-47929 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-47929?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux.