A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
Reference and upstream patch:
Created kernel tracking bugs for this issue:
Affects: fedora-all [bug 2070221]
This was fixed for Fedora with the 5.16.6 stable kernel updates.