Security Vulnerabilities fixed in kpatch-patch-5_14_0 RHSA-2023:1471

description-logoDescription

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Security Fix(es): kernel: tun: avoid double free in tun_free_netdev (CVE-2022-4744) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266) kernel: tun: avoid double free in tun_free_netdev (CVE-2022-4744) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. SolutionFor details on how to apply this update, which includes the changes described in this advisory, refer to:https://access.redhat.com/articles/11258

affected-products-logoAffected Applications

kpatch-patch-5_14_0

CVE References

CVE-2023-0266 CVE-2022-4744