First published: Wed Jan 26 2022(Updated: )
A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Red Hat Kernel-devel | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 | |
Linux Kernel | >=4.14.175<4.14.259 | |
Linux Kernel | >=4.19.114<4.19.222 | |
Linux Kernel | >=5.4.29<5.4.168 | |
Linux Kernel | >=5.5.14<5.10.88 | |
Linux Kernel | >=5.11<5.15.11 | |
Debian | =9.0 | |
Debian | =10.0 | |
All of | ||
NetApp H410C | ||
NetApp H410C Firmware | ||
All of | ||
NetApp H300S Firmware | ||
NetApp H300S Firmware | ||
All of | ||
NetApp H500e Firmware | ||
NetApp H500e Firmware | ||
All of | ||
NetApp H700S | ||
NetApp H700S | ||
All of | ||
NetApp H410S | ||
NetApp H410S Firmware | ||
NetApp H410C | ||
NetApp H410C Firmware | ||
NetApp H300S Firmware | ||
NetApp H300S Firmware | ||
NetApp H500e Firmware | ||
NetApp H500e Firmware | ||
NetApp H700S | ||
NetApp H700S | ||
NetApp H410S | ||
NetApp H410S Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22600 has a high severity rating as it allows local users to escalate privileges or cause denial of service.
To fix CVE-2021-22600, upgrade your kernel to a version later than those specifically affected or rebuild after commit ec6af094ea28f0f2dda1a6a33b14cd57e36a9755.
CVE-2021-22600 affects various Linux Kernel versions ranging from 4.14.175 to 4.14.259, 4.19.114 to 4.19.222, 5.4.29 to 5.4.168, 5.5.14 to 5.10.88, and 5.11 to 5.15.11, as well as Debian 9 and 10.
CVE-2021-22600 is categorized as a double free vulnerability in the kernel's packet_set_ring() function.
CVE-2021-22600 cannot be exploited remotely; it requires local user access for exploitation.