A double free bug in packetsetring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-22600.json"
[
{
"events": [
{
"introduced": "4.14.175"
},
{
"fixed": "4.14.259"
}
]
},
{
"events": [
{
"introduced": "4.19.114"
},
{
"fixed": "4.19.222"
}
]
},
{
"events": [
{
"introduced": "5.4.29"
},
{
"fixed": "5.4.168"
}
]
},
{
"events": [
{
"introduced": "5.5.14"
},
{
"fixed": "5.10.88"
}
]
},
{
"events": [
{
"introduced": "5.11"
},
{
"fixed": "5.15.11"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0"
}
]
}
]