First published: Mon Jan 09 2023(Updated: )
A NULL pointer dereference flaw may occur in qdisc_graft in net/sched/sch_api.c in the Linux kernel. In this flaw a local unprivileged user mas trigger a denial of service if the alloc_workqueue function return is not validated in time of failure. This flaw could allow an attacker to crash the system or leak internal kernel information. Reference: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-477.10.1.rt7.274.el8_8 | 0:4.18.0-477.10.1.rt7.274.el8_8 |
redhat/kernel | <0:4.18.0-477.10.1.el8_8 | 0:4.18.0-477.10.1.el8_8 |
redhat/kernel | <0:5.14.0-284.11.1.el9_2 | 0:5.14.0-284.11.1.el9_2 |
redhat/kernel-rt | <0:5.14.0-284.11.1.rt14.296.el9_2 | 0:5.14.0-284.11.1.rt14.296.el9_2 |
redhat/kernel | <6.2 | 6.2 |
Linux Kernel | <6.1.6 | |
Debian Debian Linux | =11.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0: ``` # echo "user.max_user_namespaces=0" > /etc/sysctl.d/userns.conf # sysctl -p /etc/sysctl.d/userns.conf ```
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-47929 has a high severity rating due to its potential to cause a denial of service.
To fix CVE-2022-47929, update to the latest kernel version as specified in the remediation details for your operating system.
CVE-2022-47929 affects users of vulnerable versions of the Linux kernel, particularly those using the Red Hat and Debian distributions.
CVE-2022-47929 is a NULL pointer dereference vulnerability that can lead to a system crash.
While there is no public knowledge of an exploit specifically targeting CVE-2022-47929, the vulnerability does pose significant risk if left unpatched.