Lucene search

K
redhatRedHatRHSA-2022:0592
HistoryFeb 22, 2022 - 8:36 a.m.

(RHSA-2022:0592) Important: kpatch-patch security update

2022-02-2208:36:04
access.redhat.com
40

0.001 Low

EPSS

Percentile

31.3%

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)

  • kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)

  • kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)

  • kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)

  • kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.