There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges. The root cause is that del_timer() could not stop the timer handler that is running and the refcount of sock is not managed properly in rose protocol. The patch that have been applied to mainline Linux kernel is shown below. https://github.com/torvalds/linux/commit/9cc02ede696272c5271a401e4f27c262359bc2f6
There was no shipped kernel version that was seen affected by this problem. These files are not built in our source code.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-2318
*** Bug 2117258 has been marked as a duplicate of this bug. ***