CVE-2022-47929
low-risk
Published 2023-01-17
In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with "tc qdisc" and "tc class" commands. This affects qdisc_graft in net/sched/sch_api.c.
Do I need to act?
-
0.03% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.5/10
Medium
LOCAL
/ LOW complexity
Affected Products (2)
References (14)
Third Party Advisory
https://tldp.org/HOWTO/Traffic-Control-HOWTO/components.html
Third Party Advisory
https://www.debian.org/security/2023/dsa-5324
Third Party Advisory
https://tldp.org/HOWTO/Traffic-Control-HOWTO/components.html
Third Party Advisory
https://www.debian.org/security/2023/dsa-5324
25
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
7/34 · Low