A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755
| Software | From | Fixed in |
|---|---|---|
| debian / debian_linux | 9.0 | 9.0.x |
| debian / debian_linux | 10.0 | 10.0.x |
| linux / linux_kernel | 5.11 | 5.15.11 |
| linux / linux_kernel | 4.14.175 | 4.14.259 |
| linux / linux_kernel | 4.19.114 | 4.19.222 |
| linux / linux_kernel | 5.5.14 | 5.10.88 |
| linux / linux_kernel | 5.4.29 | 5.4.168 |