A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-24401 | A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 |
Ubuntu USN |
USN-5358-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5358-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5368-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5377-1 | Linux kernel (BlueField) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-08-02T23:47:43.302Z
Reserved: 2022-03-22T00:00:00
Link: CVE-2022-1055
Updated: 2024-08-02T23:47:43.302Z
Status : Modified
Published: 2022-03-29T15:15:08.207
Modified: 2024-11-21T06:39:56.643
Link: CVE-2022-1055
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN