A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755
Metrics
Affected Vendors & Products
References
History
Wed, 29 Jan 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|
Wed, 14 Aug 2024 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-01-29T20:48:11.896Z
Reserved: 2021-01-05T00:00:00.000Z
Link: CVE-2021-22600

Updated: 2024-08-03T18:44:13.906Z

Status : Modified
Published: 2022-01-26T14:15:08.123
Modified: 2024-11-21T05:50:21.440
Link: CVE-2021-22600
