Описание
Important: kernel security, bug fix, and enhancement update
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
conntrack entries linger around after test (BZ#2066356)
-
Any process performing I/O doesn't fail on degraded LVM RAID and IO process hangs (BZ#2075075)
-
fix data corruption caused by dm-integrity (BZ#2082184)
-
Backport request of "genirq: use rcu in kstat_irqs_usr()" (BZ#2083308)
-
SUT will flash once color screen during boot to OS. (BZ#2083384)
-
Kernel Support Fixes for UV5 platform (BZ#2084645)
-
i/o on initiator stuck when network is disrupted (4.18.0-372.9.1.el8.x86_64) (BZ#2091078)
-
glock deadlock (using the dct tool) (BZ#2092073)
-
Recursive locking in gfs2_fault (read/write + mmap) (BZ#2092074)
-
8.6.z backport of "vmxnet3: add support for 32 Tx/Rx queues" from BZ 2083561 (BZ#2094473)
-
System freezes with callstack in dmesg: ret_from_fork (BZ#2096305)
-
Need some changes in Rocky Linux8.x kernels. (BZ#2096931)
-
Bad length in dpctl/dump-flows (BZ#2097796)
Enhancement(s):
- Elkhart Graphics - remove force_probe flag (BZ#2075567)
Затронутые продукты
Rocky Linux 8
Связанные CVE
Исправления
- Red Hat - 2086753
Связанные уязвимости
A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
A race condition was found the Linux kernel in perf_event_open() which ...
ELSA-2022-9413: Unbreakable Enterprise kernel-container security update (IMPORTANT)