A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3404-1 | linux-5.10 security update |
EUVD |
EUVD-2022-51494 | A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service. |
Ubuntu USN |
USN-6025-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6027-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6040-1 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-6057-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6079-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6091-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6093-1 | Linux kernel (BlueField) vulnerabilities |
Ubuntu USN |
USN-6096-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6134-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6222-1 | Linux kernel (Xilinx ZynqMP) vulnerabilities |
Ubuntu USN |
USN-6256-1 | Linux kernel (IoT) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 14 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-04-14T18:09:26.247Z
Reserved: 2022-11-23T00:00:00.000Z
Link: CVE-2022-4129
Updated: 2024-08-03T01:27:54.543Z
Status : Modified
Published: 2022-11-28T22:15:11.180
Modified: 2025-04-14T18:15:24.593
Link: CVE-2022-4129
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN