A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755
References
Link | Resource |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=ec6af094ea28f0f2dda1a6a33b14cd57e36a9755 | Mailing List Patch |
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20230110-0002/ | Third Party Advisory |
https://www.debian.org/security/2022/dsa-5096 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Google
Published: 2022-01-26T00:00:00
Updated: 2023-01-10T00:00:00
Reserved: 2021-01-05T00:00:00
Link: CVE-2021-22600
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-01-26T14:15:08.123
Modified: 2023-06-26T18:59:36.163
Link: CVE-2021-22600
JSON object: View
Redhat Information
No data.
CWE