Linux kernel is vulnerable to Denial Of Service (DoS). The vulnerability exists due to the null pointer dereference bug in the traffic control subsystem, allowing an attacker to cause an application crash via a crafted traffic control configuration that is set up with “tc qdisc” and “tc class” commands. This affects qdisc_graft
function of sch_api.c
git://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2022-47929
cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.6
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407
lists.debian.org/debian-lts-announce/2023/03/msg00000.html
lists.debian.org/debian-lts-announce/2023/05/msg00006.html
tldp.org/HOWTO/Traffic-Control-HOWTO/components.html
www.debian.org/security/2023/dsa-5324
www.spinics.net/lists/netdev/msg555705.html