A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
4.13.0-16.196.5.0-9.95.3.0-18.195.3.0-24.265.4.0-100.1135.4.0-104.1185.4.0-105.1195.4.0-18.225.4.0-21.255.4.0-24.285.4.0-25.295.4.0-26.30+44 more5.4.0-107.1216.11.0-8.84.2.0-16.194.2.0-17.214.2.0-19.234.3.0-1.104.3.0-2.114.3.0-5.164.3.0-6.174.3.0-7.184.4.0-2.165.13.0-19.195.15.0-17.175.15.0-18.185.15.0-22.225.15.0-23.233.11.0-12.195.3.0-1003.35.3.0-1008.95.3.0-1009.105.3.0-1010.115.4.0-1005.55.4.0-1007.75.4.0-1008.85.4.0-1009.95.4.0-1011.115.4.0-1015.15+37 more5.4.0-1071.764.4.0-1001.105.13.0-1005.65.15.0-1002.45.15.0-1003.5Exploitability
AV:LAC:HAT:NPR:LUI:NVulnerable System
VC:HVI:HVA:NSubsequent System
SC:HSI:HSA:NCVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N