A use-after-free exists in the Linux Kernel in tcnewtfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-1055.json"
[
{
"events": [
{
"introduced": "5.1"
},
{
"fixed": "5.17"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.17-NA"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.17-rc1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.17-rc2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "35"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "20.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "21.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "22.04"
}
]
}
]