First published: Mon Jul 11 2022(Updated: )
A NULL pointer dereference issue was discovered in the Linux kernel in the MPTCP protocol when traversing the subflow list at disconnect time. A local user could use this flaw to potentially crash the system causing a denial of service.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:5.14.0-284.11.1.el9_2 | 0:5.14.0-284.11.1.el9_2 |
redhat/kernel-rt | <0:5.14.0-284.11.1.rt14.296.el9_2 | 0:5.14.0-284.11.1.rt14.296.el9_2 |
Linux Mptcp Protocol | <5.19 | |
redhat/kernel | <5.19 | 5.19 |
<5.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4128 has been classified with a severity level of high due to its potential to cause a denial of service.
To remediate CVE-2022-4128, upgrade to kernel version 0:5.14.0-284.11.1.el9_2 or higher.
CVE-2022-4128 affects local users on systems running vulnerable versions of the Linux kernel with MPTCP protocol.
The impact of CVE-2022-4128 is that it could allow a local user to crash the system, resulting in a denial of service.
CVE-2022-4128 is a local vulnerability, as it requires access to the affected system to exploit.