Red Hat Alert
2748Warning Date
Severity Level
Warning Number
Target Sector
20 March, 2022
● High
2022-4541
All
Description:
Red Hat has released security updates to address several vulnerabilities in the following products:
- kpatch-patch-4_18_0-147_58_1
- kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)
- kernel: use-after-free in RDMA listen() (CVE-2021-4028)
- kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)
- kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)
- kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)
- kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)
- kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)
Threats:
An attacker could exploit these vulnerabilities by doing the following:
- Elevate privileges
Best practice and Recommendations:
The CERT team encourages users to review Red Hat security advisory and apply the necessary updates: