Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2021-22600

Опубликовано: 05 фев. 2022
Источник: msrc
CVSS3: 7
EPSS Низкий

Описание

Описание отсутствует

Возможность эксплуатации

DOS

N/A

EPSS

Процентиль: 10%
0.00037
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 6.6
ubuntu
больше 3 лет назад

A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755

CVSS3: 7
redhat
больше 3 лет назад

A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755

CVSS3: 6.6
nvd
больше 3 лет назад

A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755

CVSS3: 6.6
debian
больше 3 лет назад

A double free bug in packet_set_ring() in net/packet/af_packet.c can b ...

CVSS3: 7.8
github
больше 3 лет назад

A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755

EPSS

Процентиль: 10%
0.00037
Низкий

7 High

CVSS3