Description
A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.
Solution(s)
redhat-upgrade-kernelredhat-upgrade-kpatch-patch-4_18_0-193_46_1redhat-upgrade-kpatch-patch-4_18_0-193_46_1-debuginforedhat-upgrade-kpatch-patch-4_18_0-193_46_1-debugsourceredhat-upgrade-kpatch-patch-4_18_0-193_47_1redhat-upgrade-kpatch-patch-4_18_0-193_47_1-debuginforedhat-upgrade-kpatch-patch-4_18_0-193_47_1-debugsourceredhat-upgrade-kpatch-patch-4_18_0-193_51_1redhat-upgrade-kpatch-patch-4_18_0-193_51_1-debuginforedhat-upgrade-kpatch-patch-4_18_0-193_51_1-debugsourceredhat-upgrade-kpatch-patch-4_18_0-193_56_1redhat-upgrade-kpatch-patch-4_18_0-193_56_1-debuginforedhat-upgrade-kpatch-patch-4_18_0-193_56_1-debugsourceredhat-upgrade-kpatch-patch-4_18_0-193_60_2redhat-upgrade-kpatch-patch-4_18_0-193_60_2-debuginforedhat-upgrade-kpatch-patch-4_18_0-193_60_2-debugsourceredhat-upgrade-kpatch-patch-4_18_0-193_64_1redhat-upgrade-kpatch-patch-4_18_0-193_64_1-debuginforedhat-upgrade-kpatch-patch-4_18_0-193_64_1-debugsourceredhat-upgrade-kpatch-patch-4_18_0-193_65_2redhat-upgrade-kpatch-patch-4_18_0-193_65_2-debuginforedhat-upgrade-kpatch-patch-4_18_0-193_65_2-debugsourceredhat-upgrade-kpatch-patch-4_18_0-193_68_1redhat-upgrade-kpatch-patch-4_18_0-193_68_1-debuginforedhat-upgrade-kpatch-patch-4_18_0-193_68_1-debugsourceredhat-upgrade-kpatch-patch-4_18_0-193_70_1redhat-upgrade-kpatch-patch-4_18_0-193_70_1-debuginforedhat-upgrade-kpatch-patch-4_18_0-193_70_1-debugsourceredhat-upgrade-kpatch-patch-4_18_0-193_71_1redhat-upgrade-kpatch-patch-4_18_0-193_71_1-debuginforedhat-upgrade-kpatch-patch-4_18_0-193_71_1-debugsource
ReferencesCVE-2021-4028RHSA-2022:0590RHSA-2022:0636