Описание
A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.
A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | kernel | Not affected | ||
Red Hat Enterprise Linux 9 | kernel | Not affected | ||
Red Hat Enterprise Linux 7 | kernel-rt | Fixed | RHSA-2022:1199 | 05.04.2022 |
Red Hat Enterprise Linux 7 | kpatch-patch | Fixed | RHSA-2022:1185 | 05.04.2022 |
Red Hat Enterprise Linux 7 | kernel | Fixed | RHSA-2022:1198 | 05.04.2022 |
Red Hat Enterprise Linux 7.3 Advanced Update Support | kernel | Fixed | RHSA-2022:2189 | 11.05.2022 |
Red Hat Enterprise Linux 7.4 Advanced Update Support | kernel | Fixed | RHSA-2022:1104 | 29.03.2022 |
Red Hat Enterprise Linux 7.6 Advanced Update Support(Disable again in 2026 - SPRHEL-7118) | kernel | Fixed | RHSA-2022:1107 | 29.03.2022 |
Red Hat Enterprise Linux 7.6 Telco Extended Update Support | kernel | Fixed | RHSA-2022:1107 | 29.03.2022 |
Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions | kpatch-patch | Fixed | RHSA-2022:1103 | 29.03.2022 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.4 High
CVSS3
Связанные уязвимости
A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.
A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.
A read-after-free memory flaw was found in the Linux kernel's garbage ...
A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.
EPSS
7.4 High
CVSS3