A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: Google
Published: 2022-03-29T15:05:13
Updated: 2024-08-02T23:47:43.302Z
Reserved: 2022-03-22T00:00:00
Link: CVE-2022-1055
Vulnrichment
Updated: 2024-08-02T23:47:43.302Z
NVD
Status : Modified
Published: 2022-03-29T15:15:08.207
Modified: 2024-11-21T06:39:56.643
Link: CVE-2022-1055
Redhat