Description
A use-after-free flaw was found in the Linux kernel’s vmw_execbuf_copy_fence_user function in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c in vmwgfx. This flaw allows a local attacker with user privileges to cause a privilege escalation problem.
Solution(s)
redhat-upgrade-kernelredhat-upgrade-kernel-rtredhat-upgrade-kpatch-patch-3_10_0-1160_21_1redhat-upgrade-kpatch-patch-3_10_0-1160_21_1-debuginforedhat-upgrade-kpatch-patch-3_10_0-1160_24_1redhat-upgrade-kpatch-patch-3_10_0-1160_24_1-debuginforedhat-upgrade-kpatch-patch-3_10_0-1160_25_1redhat-upgrade-kpatch-patch-3_10_0-1160_25_1-debuginforedhat-upgrade-kpatch-patch-3_10_0-1160_31_1redhat-upgrade-kpatch-patch-3_10_0-1160_31_1-debuginforedhat-upgrade-kpatch-patch-3_10_0-1160_36_2redhat-upgrade-kpatch-patch-3_10_0-1160_36_2-debuginforedhat-upgrade-kpatch-patch-3_10_0-1160_41_1redhat-upgrade-kpatch-patch-3_10_0-1160_41_1-debuginforedhat-upgrade-kpatch-patch-3_10_0-1160_42_2redhat-upgrade-kpatch-patch-3_10_0-1160_42_2-debuginforedhat-upgrade-kpatch-patch-3_10_0-1160_45_1redhat-upgrade-kpatch-patch-3_10_0-1160_45_1-debuginforedhat-upgrade-kpatch-patch-3_10_0-1160_49_1redhat-upgrade-kpatch-patch-3_10_0-1160_49_1-debuginforedhat-upgrade-kpatch-patch-3_10_0-1160_53_1redhat-upgrade-kpatch-patch-3_10_0-1160_53_1-debuginfo
ReferencesCVE-2022-22942RHSA-2022:0592RHSA-2022:0620RHSA-2022:0622