Unrated severityCISA KEVNVD Advisory· Published Jan 26, 2022· Updated Oct 21, 2025
Double Free in net/packet/af_packet.c leading to priviledge escalation
CVE-2021-22600
Description
A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755
Affected products
1- Linux Kernel/Kernelv5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.debian.org/security/2022/dsa-5096mitrevendor-advisory
- lists.debian.org/debian-lts-announce/2022/03/msg00012.htmlmitremailing-list
- security.netapp.com/advisory/ntap-20230110-0002/mitre
News mentions
0No linked articles in our index yet.