"TITLE":"Double Free in net/packet/af_packet.c leading to priviledge escalation"
},
"affects":{
"vendor":{
"vendor_data":[
{
"product":{
"product_data":[
{
"product_name":"Kernel",
"version":{
"version_data":[
{
"version_affected":"<",
"version_value":"5.4.168"
},
{
"version_affected":"<",
"version_value":"5.10.88"
},
{
"version_affected":"<",
"version_value":"5.15.11"
},
{
"version_affected":"<",
"version_value":"5.16-rc6"
}
]
}
}
]
},
"vendor_name":"Linux Kernel"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
{
"lang":"eng",
"value":"A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755"