Synopsis:          Important: kpatch-patch security update
Advisory ID:       SLSA-2021:3181-1
Issue Date:        2021-08-17
CVE Numbers:       CVE-2021-22543
                   CVE-2021-32399
                   CVE-2021-22555
--

Security Fix(es):

* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO
checks (CVE-2021-22543)

* kernel: out-of-bounds write in xt_compat_target_from_user() in
net/netfilter/x_tables.c (CVE-2021-22555)

* kernel: race condition for removal of the HCI controller
(CVE-2021-32399)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
--

- Scientific Linux Development Team

SciLinux: SLSA-2021-3181-1 Important: kpatch-patch on

kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543) * kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tabl...

Summary

Important: kpatch-patch security update



Security Fixes

* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)
* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)
* kernel: race condition for removal of the HCI controller (CVE-2021-32399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE
- Scientific Linux Development Team

Severity
Advisory ID: SLSA-2021:3181-1
Issued Date: : 2021-08-17
CVE Numbers: CVE-2021-22543
CVE-2021-32399
CVE-2021-22555

Related News