Vulnerability Description
A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.1, < 5.17 |
| Redhat | Enterprise Linux | 8.0 |
| Fedoraproject | Fedora | 35 |
| Canonical | Ubuntu Linux | 16.04 |
| Netapp | H300S Firmware | - |
| Netapp | H300S | - |
| Netapp | H500S Firmware | - |
| Netapp | H500S | - |
| Netapp | H700S Firmware | - |
| Netapp | H700S | - |
| Netapp | H300E Firmware | - |
| Netapp | H300E | - |
| Netapp | H500E Firmware | - |
| Netapp | H500E | - |
| Netapp | H700E Firmware | - |
| Netapp | H700E | - |
| Netapp | H410S Firmware | - |
| Netapp | H410S | - |
| Netapp | H410C Firmware | - |
| Netapp | H410C | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSThird Party AdvisoryVDB Entry
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04PatchVendor Advisory
- https://kernel.dance/#04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5ExploitPatchThird Party Advisory
- https://security.netapp.com/advisory/ntap-20220506-0007/Third Party Advisory
- https://syzkaller.appspot.com/bug?id=2212474c958978ab86525fe6832ac8102c309ffcExploitPatchThird Party Advisory
- http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSThird Party AdvisoryVDB Entry
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04PatchVendor Advisory
- https://kernel.dance/#04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5ExploitPatchThird Party Advisory
- https://security.netapp.com/advisory/ntap-20220506-0007/Third Party Advisory
- https://syzkaller.appspot.com/bug?id=2212474c958978ab86525fe6832ac8102c309ffcExploitPatchThird Party Advisory
FAQ
What is CVE-2022-1055?
CVE-2022-1055 is a vulnerability with a CVSS score of 7.8 (HIGH). A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading ...
How severe is CVE-2022-1055?
CVE-2022-1055 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-1055?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Redhat Enterprise Linux, Fedoraproject Fedora, Canonical Ubuntu Linux, Netapp H300S Firmware.