A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755
https://www.tenable.com/cyber-exposure/tenable-2022-threat-landscape-report
https://www.debian.org/security/2022/dsa-5096
https://security.netapp.com/advisory/ntap-20230110-0002/
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html