A use-after-free exists in the Linux Kernel in tcnewtfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
[
{
"target": {
"function": "tc_ctl_chain",
"file": "net/sched/cls_api.c"
},
"id": "CVE-2022-1055-0d272d7c",
"deprecated": false,
"digest": {
"length": 2735.0,
"function_hash": "208607899164322792714159143420444934249"
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5",
"signature_version": "v1"
},
{
"target": {
"function": "tc_new_tfilter",
"file": "net/sched/cls_api.c"
},
"id": "CVE-2022-1055-4b9ba439",
"deprecated": false,
"digest": {
"length": 4678.0,
"function_hash": "178796475389914911248992096641667054224"
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5",
"signature_version": "v1"
},
{
"target": {
"file": "net/sched/cls_api.c"
},
"id": "CVE-2022-1055-f3d860f4",
"deprecated": false,
"digest": {
"line_hashes": [
"114582208524191100068801051182375898900",
"245124090354377403517561226257590004580",
"324895983307023276992985636822394908697",
"205145797718397210712298326189860940709",
"294198230286196164234311107061426157146",
"106172002849105992604648227984231845222",
"198752099882769396723786598238265217616",
"196022374237816518951271989440211532509",
"92054165616269222931226788307148863512",
"196064591378318602289432638370281878786",
"314828004324629693525478658064701487492",
"209295838266991765155392726298227578793",
"15853571048400435140423496515432837328",
"125928847955747437316038484316831429802",
"167238410173122410235218670824863855745",
"242591876906919431162088062873375356706",
"240087994332958606119797311196520090639",
"272294750109687271921859446119060398342",
"314133306087273616449417108445832237115"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5",
"signature_version": "v1"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-1055.json"