Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2022:5564

Опубликовано: 13 июл. 2022
Источник: rocky
Оценка: Important

Описание

Important: kernel security, bug fix, and enhancement update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • conntrack entries linger around after test (BZ#2066356)

  • Any process performing I/O doesn't fail on degraded LVM RAID and IO process hangs (BZ#2075075)

  • fix data corruption caused by dm-integrity (BZ#2082184)

  • Backport request of "genirq: use rcu in kstat_irqs_usr()" (BZ#2083308)

  • SUT will flash once color screen during boot to OS. (BZ#2083384)

  • Kernel Support Fixes for UV5 platform (BZ#2084645)

  • i/o on initiator stuck when network is disrupted (4.18.0-372.9.1.el8.x86_64) (BZ#2091078)

  • glock deadlock (using the dct tool) (BZ#2092073)

  • Recursive locking in gfs2_fault (read/write + mmap) (BZ#2092074)

  • 8.6.z backport of "vmxnet3: add support for 32 Tx/Rx queues" from BZ 2083561 (BZ#2094473)

  • System freezes with callstack in dmesg: ret_from_fork (BZ#2096305)

  • Need some changes in Rocky Linux8.x kernels. (BZ#2096931)

  • Bad length in dpctl/dump-flows (BZ#2097796)

Enhancement(s):

  • Elkhart Graphics - remove force_probe flag (BZ#2075567)

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
bpftoolx86_64372.16.1.el8_6.0.1bpftool-4.18.0-372.16.1.el8_6.0.1.x86_64.rpm
kernelx86_64372.16.1.el8_6.0.1kernel-4.18.0-372.16.1.el8_6.0.1.x86_64.rpm
kernel-abi-stablelistsnoarch372.16.1.el8_6.0.1kernel-abi-stablelists-4.18.0-372.16.1.el8_6.0.1.noarch.rpm
kernel-corex86_64372.16.1.el8_6.0.1kernel-core-4.18.0-372.16.1.el8_6.0.1.x86_64.rpm
kernel-cross-headersx86_64372.16.1.el8_6.0.1kernel-cross-headers-4.18.0-372.16.1.el8_6.0.1.x86_64.rpm
kernel-debugx86_64372.16.1.el8_6.0.1kernel-debug-4.18.0-372.16.1.el8_6.0.1.x86_64.rpm
kernel-debug-corex86_64372.16.1.el8_6.0.1kernel-debug-core-4.18.0-372.16.1.el8_6.0.1.x86_64.rpm
kernel-debug-develx86_64372.16.1.el8_6.0.1kernel-debug-devel-4.18.0-372.16.1.el8_6.0.1.x86_64.rpm
kernel-debug-modulesx86_64372.16.1.el8_6.0.1kernel-debug-modules-4.18.0-372.16.1.el8_6.0.1.x86_64.rpm
kernel-debug-modules-extrax86_64372.16.1.el8_6.0.1kernel-debug-modules-extra-4.18.0-372.16.1.el8_6.0.1.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 7
ubuntu
больше 3 лет назад

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

CVSS3: 7.4
redhat
больше 3 лет назад

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

CVSS3: 7
nvd
больше 3 лет назад

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

CVSS3: 7
debian
больше 3 лет назад

A race condition was found the Linux kernel in perf_event_open() which ...

oracle-oval
больше 3 лет назад

ELSA-2022-9413: Unbreakable Enterprise kernel-container security update (IMPORTANT)