Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-24401 | A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 |
Ubuntu USN |
USN-5358-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5358-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5368-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5377-1 | Linux kernel (BlueField) vulnerabilities |
Tue, 24 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-08-02T23:47:43.302Z
Reserved: 2022-03-22T00:00:00.000Z
Link: CVE-2022-1055
Updated: 2024-08-02T23:47:43.302Z
Status : Modified
Published: 2022-03-29T15:15:08.207
Modified: 2024-11-21T06:39:56.643
Link: CVE-2022-1055
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN