Synopsis:          Important: kernel security and bug fix update
Advisory ID:       SLSA-2022:0620-1
Issue Date:        2022-02-23
CVE Numbers:       CVE-2020-0465
                   CVE-2020-0466
                   CVE-2021-3564
                   CVE-2021-3573
                   CVE-2021-3752
                   CVE-2021-0920
                   CVE-2021-4155
                   CVE-2022-0330
                   CVE-2022-22942
--

Security Fix(es):

* kernel: use after free in eventpoll.c may lead to escalation of
privilege  (CVE-2020-0466)

* kernel: Use After Free in unix_gc() which could result in a local
privilege escalation (CVE-2021-0920)

* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL
(CVE-2021-4155)

* kernel: possible privileges escalation due to missing TLB flush
(CVE-2022-0330)

* kernel: failing usercopy allows for use-after-free exploitation
(CVE-2022-22942)

* kernel: out of bounds write in hid-multitouch.c may lead to escalation
of  privilege (CVE-2020-0465)

* kernel: double free in bluetooth subsystem when the HCI device
initialization fails (CVE-2021-3564)

* kernel: use-after-free in function hci_sock_bound_ioctl()
(CVE-2021-3573)

* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE

Bug Fix(es):

* Kernel with enabled BERT does not decode CPU fatal events correctly

* SL 7.9 - Call trace seen during controller random reset on IB config

* Infinite loop in blk_set_queue_dying() from blk_queue_for_each_rl() when
another CPU races and modifies the queue's blkg_list

* NFS client kernel crash in NFS4 backchannel transmit path -
ftrace_raw_event_rpc_task_queued called from rpc_run_bc_task

* SELinux is preventing / from mount access on the filesystem /proc
--

SL7
  x86_64
    bpftool-3.10.0-1160.59.1.el7.x86_64.rpm
    bpftool-debuginfo-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-debug-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-debug-debuginfo-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-debug-devel-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-debuginfo-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-debuginfo-common-x86_64-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-devel-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-headers-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-tools-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-tools-debuginfo-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-tools-libs-3.10.0-1160.59.1.el7.x86_64.rpm
    perf-3.10.0-1160.59.1.el7.x86_64.rpm
    perf-debuginfo-3.10.0-1160.59.1.el7.x86_64.rpm
    python-perf-3.10.0-1160.59.1.el7.x86_64.rpm
    python-perf-debuginfo-3.10.0-1160.59.1.el7.x86_64.rpm
    kernel-tools-libs-devel-3.10.0-1160.59.1.el7.x86_64.rpm
  noarch
    kernel-abi-whitelists-3.10.0-1160.59.1.el7.noarch.rpm
    kernel-doc-3.10.0-1160.59.1.el7.noarch.rpm

- Scientific Linux Development Team

SciLinux: SLSA-2022-0620-1 Important: kernel on SL7.x x86_64

kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466) * kernel: Use After Free in unix_gc() which could result in a local privilege escalation (...

Summary

Important: kernel security and bug fix update



Security Fixes

* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)
* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)
* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)
* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)
* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)
* kernel: out of bounds write in hid-multitouch.c may lead to escalation of privilege (CVE-2020-0465)
* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)
* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)
* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE

Severity
Advisory ID: SLSA-2022:0620-1
Issued Date: : 2022-02-23
CVE Numbers: CVE-2020-0465
CVE-2020-0466
CVE-2021-3564

Related News