In the Linux kernel, the following vulnerability has been resolved: net/sched: taprio: always validate TCATAPRIOATTRPRIOMAP If one TCATAPRIOATTRPRIOMAP attribute has been provided, taprioparsemqprioopt() must validate it, or userspace can inject arbitrary data to the kernel, the second time tapriochange() is called. First call (with valid attributes) sets dev->numtc to a non zero value. Second call (with arbitrary mqprio attributes) returns early from taprioparsemqprioopt() and bad things can happen.