A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-24401 | A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 |
![]() |
USN-5358-1 | Linux kernel vulnerabilities |
![]() |
USN-5358-2 | Linux kernel vulnerabilities |
![]() |
USN-5368-1 | Linux kernel vulnerabilities |
![]() |
USN-5377-1 | Linux kernel (BlueField) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-08-02T23:47:43.302Z
Reserved: 2022-03-22T00:00:00
Link: CVE-2022-1055

Updated: 2024-08-02T23:47:43.302Z

Status : Modified
Published: 2022-03-29T15:15:08.207
Modified: 2024-11-21T06:39:56.643
Link: CVE-2022-1055


No data.