CVE-2021-22600

Published Jan 26, 2022

Last updated a year ago

Overview

Description
A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755
Source
cve-coordination@google.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
7
Impact score
5.9
Exploitability score
1
Vector string
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
7.2
Impact score
10
Exploitability score
3.9
Vector string
AV:L/AC:L/Au:N/C:C/I:C/A:C

Known exploits

Data from CISA

Vulnerability name
Linux Kernel Privilege Escalation Vulnerability
Exploit added on
Apr 11, 2022
Exploit action due
May 2, 2022
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-415
cve-coordination@google.com
CWE-415

Social media

Hype score
Not currently trending

Configurations