First published: Mon Apr 25 2022(Updated: )
A possible race condition vulnerability in drivers/tty/tty_buffers.c
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-477.10.1.rt7.274.el8_8 | 0:4.18.0-477.10.1.rt7.274.el8_8 |
redhat/kernel | <0:4.18.0-477.10.1.el8_8 | 0:4.18.0-477.10.1.el8_8 |
redhat/kernel | <0:5.14.0-284.11.1.el9_2 | 0:5.14.0-284.11.1.el9_2 |
redhat/kernel-rt | <0:5.14.0-284.11.1.rt14.296.el9_2 | 0:5.14.0-284.11.1.rt14.296.el9_2 |
redhat/kernel | <5.5 | 5.5 |
Linux Kernel | ||
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Debian Linux | =10.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.22-1 6.12.25-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-1462 is considered a high-severity vulnerability due to the potential for user-triggered race conditions leading to memory leakage.
To fix CVE-2022-1462, update your Linux kernel to the appropriate patched version as specified for your distribution.
CVE-2022-1462 affects specific versions of the Linux kernel, particularly prior to 4.18.0-477.10.1 and certain 5.x series versions.
Yes, CVE-2022-1462 is present in versions of Red Hat Enterprise Linux 8 and 9 before the patched versions were released.
CVE-2022-1462 is an out-of-bounds read vulnerability resulting from a race condition in the Linux kernel's TeleTYpe subsystem.