RHSA-2022:0592-01 -- Redhat kpatch-patchID: oval:org.secpod.oval:def:506704 | Date: (C)2022-03-16 (M)2024-05-22 |
Class: PATCH | Family: unix |
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Security Fix: * kernel: use after free in eventpoll.c may lead to escalation of privilege * kernel: Use After Free in unix_gc which could result in a local privilege escalation * kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL * kernel: possible privileges escalation due to missing TLB flush * kernel: failing usercopy allows for use-after-free exploitation For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.
Platform: |
Red Hat Enterprise Linux 7 |