Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-22600

Опубликовано: 15 дек. 2021
Источник: redhat
CVSS3: 7
EPSS Низкий

Описание

A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755

A double-free flaw was found in the Linux kernel’s packet protocol subsystem in the way a user call triggers the packet_set_ring() function of the net/packet/af_packet.c. This flaw allows a local user to crash or escalate their privileges on the system.

Отчет

The Red Hat Enterprise Linux versions before 9 are not affected, because the commit that introduced the bug is not in currently supported versions of Red Hat Enterprise Linux. The commit that introduced this bug is: 61fad6816fc1 ("net/packet: tpacket_rcv: avoid a producer race condition").

Меры по смягчению последствий

Only users with access to the AF_PACKET socket can trigger this vulnerability. The mitigation would be to disable CAP_NET_RAW capability for the users that prevents access to AF_PACKET.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 9kernel-rtNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2047912kernel: double free in packet_set_ring() in net/packet/af_packet.c

EPSS

Процентиль: 10%
0.00037
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 6.6
ubuntu
больше 3 лет назад

A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755

CVSS3: 6.6
nvd
больше 3 лет назад

A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755

CVSS3: 7
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 6.6
debian
больше 3 лет назад

A double free bug in packet_set_ring() in net/packet/af_packet.c can b ...

CVSS3: 7.8
github
больше 3 лет назад

A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755

EPSS

Процентиль: 10%
0.00037
Низкий

7 High

CVSS3