{"id":"CVE-2021-22600","details":"A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755","aliases":["A-213464034","ASB-A-213464034","PUB-A-213464034"],"modified":"2026-03-14T14:50:36.604360Z","published":"2022-01-26T14:15:08.123Z","related":["SUSE-SU-2022:0363-1","SUSE-SU-2022:0365-1","SUSE-SU-2022:0370-1","SUSE-SU-2022:0543-1","SUSE-SU-2022:0544-1","SUSE-SU-2022:0619-1","SUSE-SU-2022:0660-1","openSUSE-SU-2022:0363-1","openSUSE-SU-2022:0370-1"],"references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-22600"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230110-0002/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5096"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=ec6af094ea28f0f2dda1a6a33b14cd57e36a9755"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"4.14.175"},{"fixed":"4.14.259"}]},{"events":[{"introduced":"4.19.114"},{"fixed":"4.19.222"}]},{"events":[{"introduced":"5.4.29"},{"fixed":"5.4.168"}]},{"events":[{"introduced":"5.5.14"},{"fixed":"5.10.88"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.11"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-22600.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}