A double free bug in packet_set_ring() in net/packet/af_packet.c can be
exploited by a local user through crafted syscalls to escalate privileges or
Reference & upstream patch:
Created kernel tracking bugs for this issue:
Affects: fedora-all [bug 2050248]
This was fixed for Fedora with the 5.15.11 stable kernel updates.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):