
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-4129 is a vulnerability discovered in the Linux kernel's Layer 2 Tunneling Protocol (L2TP) implementation. The flaw involves a missing lock when clearing skuserdata, which can lead to a race condition and NULL pointer dereference. The vulnerability was disclosed on November 28, 2022, and affects Linux kernel versions prior to 6.0 (NVD).
The vulnerability stems from improper synchronization in the L2TP implementation where access to skuserdata was not properly protected by skcallbacklock. The issue occurs specifically when modifying the underlying tunnel socket fields. The vulnerability has been assigned a CVSS v3.1 Base Score of 5.5 (Medium) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
A local user could exploit this vulnerability to potentially crash the system, resulting in a denial of service condition. The flaw specifically affects the system's stability when handling L2TP connections (NVD).
The issue has been fixed in Linux kernel version 6.0.11 through patches that properly serialize access to skuserdata with skcallbacklock. Multiple distributions have released updates to address this vulnerability, including Fedora, Ubuntu, and Debian. Users are advised to update their systems to the patched versions (Kernel Patch, Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."