
CVE-2021-22600
- Reference to the description:
- Description:
- A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755
- Last updated date:
- 02/24/2025
Reports

ACTIVELY EXPLOITED
- Type:
- exploitation
- Confidence:
- HIGH
- Date of publishing:
- 03/07/2022
- Reference url to background
https://source.android.com/security/bulletin/pixel/2022-03-01
- Type:
- exploitation
- Confidence:
- HIGH
- Date of publishing:
- 04/11/2022
- Reference url to background
https://www.cisa.gov/known-exploited-vulnerabilities-catalog