- Kernel Update Version:
- Release Date:
- 2022-08-15 13:05:02
Potential ARP DoS for containers in host-routed network mode.
nfs: Excess dput in __put_nfs_open_context leads to a crash.There is double dput in nfs_prime_dcache(). Because of this excess dput we get a crash in __put_nfs_open_context().
Use-after-free in the netfilter subsystem.The bug allows to initialize a non-stateful lookup expressions which points to a not properly detached set, which might lead to UAF. Potetntially it leads to privilege escalation.https://access.redhat.com/security/cve/CVE-2022-1966
CPU hotplug leads to a VM crash on AMD processors with PCID.
Potential privilege escalation when setting the release_agent.Setting release_agent could potentially lead to privilege escalation from unprivileged users inside a container to the container root. It couldn't be exploited to escape containers.https://access.redhat.com/security/cve/CVE-2022-0492
Potential use-after-free in the 'recv' operation of UNIX domain sockets.Race condition between the garbage collector and the 'recv' operation with MSG_PEEK flag was found in the implementation of UNIX domain sockets. It could result in use-after-free and could potentially allow a local attacker to escalate their privileges in the system.https://access.redhat.com/security/cve/CVE-2021-0920
Read-after-free in garbage collection for Unix domain socket file handlers.
Use-after-free in RDMA listen().
A hole in vstorage FUSE synchronization protocol leading to unsynchronized chunks.
ms/xfrm: fix crash in XFRM_MSG_GETSA netlink handler