CVE-2022-29800
Linux Debian vulnerability analysis and mitigation

Overview

A set of two privilege escalation vulnerabilities were discovered in the networkd-dispatcher daemon on Linux systems, identified as CVE-2022-29799 and CVE-2022-29800. The networkd-dispatcher is a daemon program for the network manager system service designed to dispatch network status changes. These vulnerabilities were discovered by Microsoft's 365 Defender Research Team and disclosed in April 2022 (Hacker News, Help Net Security).

Technical details

The vulnerabilities consist of a directory traversal bug (CVE-2022-29799) and a time-of-check-time-of-use (TOCTOU) race condition (CVE-2022-29800). The TOCTOU flaw exists in networkd-dispatcher and could allow an attacker to replace scripts that networkd-dispatcher believes to be owned by root with malicious ones. When combined with a symlink race condition, these vulnerabilities create a path for privilege escalation. Researchers demonstrated successful exploitation of the TOCTOU race condition in just three attempts (Help Net Security).

Impact

The vulnerabilities can be chained together to gain root privileges on Linux systems, enabling attackers to deploy payloads such as root backdoors and perform arbitrary root code execution. This access could be weaponized to deploy more sophisticated threats, including ransomware. The flaws affect several Linux distributions, including Linux Mint and Ubuntu-based systems where networkd-dispatcher is installed (Hacker News).

Mitigation and workarounds

The vulnerabilities have been fixed by Clayton Craft, the maintainer of networkd-dispatcher. Users are strongly recommended to update their instances to the latest version. Ubuntu has released security updates for affected versions: Ubuntu 22.04 (2.1-2ubuntu0.22.04.1), Ubuntu 21.10 (2.1-2ubuntu0.21.10.1), Ubuntu 20.04 (2.1-2~ubuntu20.04.2), and Ubuntu 18.04 (1.7-0ubuntu3.4) (Ubuntu Security).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61729HIGH7.5
  • DockerDocker
  • golang-1.19
NoYesDec 02, 2025
CVE-2025-64460HIGH7.5
  • Linux DebianLinux Debian
  • python-django
NoYesDec 02, 2025
CVE-2025-65187MEDIUM6.1
  • Linux DebianLinux Debian
  • civicrm
NoNoDec 02, 2025
CVE-2025-65105MEDIUM4.5
  • Linux DebianLinux Debian
  • github.com/apptainer/apptainer
NoYesDec 02, 2025
CVE-2025-13372MEDIUM4.3
  • Linux DebianLinux Debian
  • py3-django
NoYesDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management