« List of all CVEs

CVE-2022-1055

Use after Free in tc_new_tfilter allowing for privilege escalation in Linux Kernel

Published: 3/29/2022 Last updated: 8/2/2024 Reserved: 3/22/2022

A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5

CNA assigner: Google (14ed7db2-1595-443d-9d34-6215bf890778) Requested by: n/a

Metrics

Version Score Severity Vector String
4.0 8.6 High CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N

Opam packages affected (27)

albatross cdrom conf-bpftool conf-libbpf conf-linux-libc-dev core core_unix hvsock mirage-block-unix mm ocaml-probes orun rawlink rawlink-eio rawlink-lwt shell solo5 solo5-bindings-hvt solo5-bindings-spt solo5-cross-aarch64 solo5-kernel-ukvm tracy-client tuntap uring vhd-format vhd-format-lwt xapi-stdext-unix

Products affected (1)

Product Vendor Version
Kernel Linux n/a

References (10)