#VU66397 Double Free in Linux kernel - CVE-2022-2588
Published: August 11, 2022 / Updated: March 20, 2024
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The
vulnerability exists due to a double free error within the network packet scheduler implementation
in the route4_change() function in Linux kernel when removing all references to a route filter
before freeing it. A local user can run a specially crafted program to
crash the kernel or execute arbitrary code.