- Kernel Update Version:
- Release Date:
- 2022-06-29 10:26:02
Use-after-free in the netfilter subsystem.The bug allows to initialize a non-stateful lookup expressions which points to a not properly detached set, which might lead to UAF. Potetntially it leads to privilege escalation.https://access.redhat.com/security/cve/CVE-2022-1966
CPU hotplug leads to a VM crash on AMD processors with PCID.
Potential privilege escalation when setting the release_agent.Setting release_agent could potentially lead to privilege escalation from unprivileged users inside a container to the container root. It couldn't be exploited to escape containers.https://access.redhat.com/security/cve/CVE-2022-0492
Potential use-after-free in the 'recv' operation of UNIX domain sockets.Race condition between the garbage collector and the 'recv' operation with MSG_PEEK flag was found in the implementation of UNIX domain sockets. It could result in use-after-free and could potentially allow a local attacker to escalate their privileges in the system.https://access.redhat.com/security/cve/CVE-2021-0920
Read-after-free in garbage collection for Unix domain socket file handlers.
Use-after-free in RDMA listen().