A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755
The product calls free() twice on the same memory address.
Link | Tags |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=ec6af094ea28f0f2dda1a6a33b14cd57e36a9755 | mailing list patch |
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html | third party advisory mailing list |
https://www.debian.org/security/2022/dsa-5096 | third party advisory vendor advisory |
https://security.netapp.com/advisory/ntap-20230110-0002/ | third party advisory |