Synopsis: Important: kernel security and bug fix update Advisory ID: SLSA-2022:5232-1 Issue Date: 2022-06-28 CVE Numbers: CVE-2022-1729 CVE-2022-1966 -- Security Fix(es): * kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729) * kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * XFS inode cluster corruption * sock: sock_dequeue_err_skb() needs hard irq safety * libceph: fix potential use-after-free on linger ping and resends -- SL7 x86_64 bpftool-3.10.0-1160.71.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm kernel-3.10.0-1160.71.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.71.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.71.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.71.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.71.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.71.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.71.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.71.1.el7.x86_64.rpm perf-3.10.0-1160.71.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm python-perf-3.10.0-1160.71.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.71.1.el7.x86_64.rpm noarch kernel-abi-whitelists-3.10.0-1160.71.1.el7.noarch.rpm kernel-doc-3.10.0-1160.71.1.el7.noarch.rpm - Scientific Linux Development Team