SCIENTIFIC-LINUX-ERRATA Archives

February 2022

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Farhan Ahmed <[log in to unmask]>
Reply To:
Date:
Wed, 23 Feb 2022 14:26:21 -0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (86 lines)
Synopsis:          Important: kernel security and bug fix update
Advisory ID:       SLSA-2022:0620-1
Issue Date:        2022-02-23
CVE Numbers:       CVE-2020-0465
                   CVE-2020-0466
                   CVE-2021-3564
                   CVE-2021-3573
                   CVE-2021-3752
                   CVE-2021-0920
                   CVE-2021-4155
                   CVE-2022-0330
                   CVE-2022-22942
--

Security Fix(es):

* kernel: use after free in eventpoll.c may lead to escalation of
privilege  (CVE-2020-0466)

* kernel: Use After Free in unix_gc() which could result in a local
privilege escalation (CVE-2021-0920)

* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL
(CVE-2021-4155)

* kernel: possible privileges escalation due to missing TLB flush
(CVE-2022-0330)

* kernel: failing usercopy allows for use-after-free exploitation
(CVE-2022-22942)

* kernel: out of bounds write in hid-multitouch.c may lead to escalation
of  privilege (CVE-2020-0465)

* kernel: double free in bluetooth subsystem when the HCI device
initialization fails (CVE-2021-3564)

* kernel: use-after-free in function hci_sock_bound_ioctl()
(CVE-2021-3573)

* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE

Bug Fix(es):

* Kernel with enabled BERT does not decode CPU fatal events correctly

* SL 7.9 - Call trace seen during controller random reset on IB config

* Infinite loop in blk_set_queue_dying() from blk_queue_for_each_rl() when
another CPU races and modifies the queue's blkg_list

* NFS client kernel crash in NFS4 backchannel transmit path -
ftrace_raw_event_rpc_task_queued called from rpc_run_bc_task

* SELinux is preventing / from mount access on the filesystem /proc
--

SL7
  x86_64
    bpftool-3.10.0-1160.59.1.el7.x86_64.rpm
    bpftool-debuginfo-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-debug-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-debug-debuginfo-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-debug-devel-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-debuginfo-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-debuginfo-common-x86_64-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-devel-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-headers-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-tools-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-tools-debuginfo-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-tools-libs-3.10.0-1160.59.1.el7.x86_64.rpm
    perf-3.10.0-1160.59.1.el7.x86_64.rpm
    perf-debuginfo-3.10.0-1160.59.1.el7.x86_64.rpm
    python-perf-3.10.0-1160.59.1.el7.x86_64.rpm
    python-perf-debuginfo-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-tools-libs-devel-3.10.0-1160.59.1.el7.x86_64.rpm
  noarch
    kernel-abi-whitelists-3.10.0-1160.59.1.el7.noarch.rpm
    kernel-doc-3.10.0-1160.59.1.el7.noarch.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2