fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.
4.4.0-177.2074.4.0-1105.1164.15.0-1065.69~16.04.14.15.0-1077.824.15.0-1060.644.15.0-96.97~16.04.14.10.0-14.16~16.04.14.10.0-19.21~16.04.14.10.0-20.22~16.04.14.10.0-21.23~16.04.14.10.0-22.24~16.04.14.10.0-24.28~16.04.14.10.0-26.30~16.04.14.11.0-13.19~16.04.14.11.0-14.20~16.04.14.13.0-16.19~16.04.3+13 more4.4.0-1069.764.15.0-1037.41~16.04.14.4.0-1131.140Exploitability
AV:LAC:LPR:LUI:NScope
S:UImpact
C:HI:NA:HCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H