Hide Forgot
A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 Reference and upstream patch: https://syzkaller.appspot.com/bug?id=2212474c958978ab86525fe6832ac8102c309ffc https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2070221]
This was fixed for Fedora with the 5.16.6 stable kernel updates.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:6003 https://access.redhat.com/errata/RHSA-2022:6003
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:6002 https://access.redhat.com/errata/RHSA-2022:6002
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:7444 https://access.redhat.com/errata/RHSA-2022:7444
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:7683 https://access.redhat.com/errata/RHSA-2022:7683
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-1055