CVE编号
CVE-2021-22600利用情况
暂无补丁情况
N/A披露时间
2022-01-26漏洞描述
A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=... | |
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html | |
https://www.debian.org/security/2022/dsa-5096 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | debian_10 | linux | * |
Up to (excluding) 4.19.232-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_11 | linux | * |
Up to (excluding) 5.10.92-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | linux | * |
Up to (excluding) 4.19.232-1~deb9u1 |
|||||
运行在以下环境 | |||||||||
系统 | linux | linux_kernel | * |
Up to (excluding) 5.4.168 |
|||||
运行在以下环境 | |||||||||
系统 | linux | linux_kernel | * |
From (including) 5.10 |
Up to (excluding) 5.10.88 |
||||
运行在以下环境 | |||||||||
系统 | linux | linux_kernel | * |
From (including) 5.15 |
Up to (excluding) 5.15.11 |
||||
运行在以下环境 | |||||||||
系统 | linux | linux_kernel | 5.16 | - | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.3 | linux | * |
Up to (excluding) 5.3.18-150300.38.40.4 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.4 | linux | * |
Up to (excluding) 5.3.18-150300.59.49.1 |
|||||
- 攻击路径 本地
- 攻击复杂度 低
- 权限要求 低
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
还没有评论,来说两句吧...