AlmaLinux 2324 Published by

A kernel security, bug fix, and enhancement update has been released for AlmaLinux.



ALSA-2022:1988 Important: kernel security, bug fix, and enhancement update


Type:
security

Severity:
important

Release date:
2022-05-10

Description
Security Fix(es):
* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)
* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)
* kernel: speculation on incompletely validated data on IBM Power9 (CVE-2020-4788)
* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)
* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)
* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)
* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)
* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)
* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)
* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)
* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)
* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)
* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)
* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)
* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)
* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)
* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)
* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)
* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)
* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)
* kernel: arm: SIGPAGE information disclosure vulnerability (CVE-2021-21781)
* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)
* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)
* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)
* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)
* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)
* kernel: ppc: kvm: allows a malicious KVM guest to crash the host (CVE-2021-43056)
* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)
* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)
* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)
* kernel: information leak in the IPv6 implementation (CVE-2021-45485)
* kernel: information leak in the IPv4 implementation (CVE-2021-45486)
* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)
* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)
* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)
* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)
* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)
* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.

References:
CVE-2020-0404
CVE-2020-4788
CVE-2020-13974
CVE-2020-27820
CVE-2021-0941
CVE-2021-3612
CVE-2021-3669
CVE-2021-3743
CVE-2021-3744
CVE-2021-3752
CVE-2021-3759
CVE-2021-3764
CVE-2021-3772
CVE-2021-3773
CVE-2021-4002
CVE-2021-4037
CVE-2021-4083
CVE-2021-4157
CVE-2021-4197
CVE-2021-4203
CVE-2021-20322
CVE-2021-21781
CVE-2021-26401
CVE-2021-29154
CVE-2021-37159
CVE-2021-41864
CVE-2021-42739
CVE-2021-43056
CVE-2021-43389
CVE-2021-43976
CVE-2021-44733
CVE-2021-45485
CVE-2021-45486
CVE-2022-0001
CVE-2022-0002
CVE-2022-0286
CVE-2022-0322
CVE-2022-1011
ALSA-2022-1988

Updates packages:
bpftool-4.18.0-372.9.1.el8.x86_64.rpm
kernel-4.18.0-372.9.1.el8.x86_64.rpm
kernel-abi-stablelists-4.18.0-372.9.1.el8.noarch.rpm
kernel-core-4.18.0-372.9.1.el8.x86_64.rpm
kernel-cross-headers-4.18.0-372.9.1.el8.x86_64.rpm
kernel-debug-4.18.0-372.9.1.el8.x86_64.rpm
kernel-debug-core-4.18.0-372.9.1.el8.x86_64.rpm
kernel-debug-devel-4.18.0-372.9.1.el8.x86_64.rpm
kernel-debug-modules-4.18.0-372.9.1.el8.x86_64.rpm
kernel-debug-modules-extra-4.18.0-372.9.1.el8.x86_64.rpm
kernel-devel-4.18.0-372.9.1.el8.x86_64.rpm
kernel-doc-4.18.0-372.9.1.el8.noarch.rpm
kernel-headers-4.18.0-372.9.1.el8.x86_64.rpm
kernel-modules-4.18.0-372.9.1.el8.x86_64.rpm
kernel-modules-extra-4.18.0-372.9.1.el8.x86_64.rpm
kernel-tools-4.18.0-372.9.1.el8.x86_64.rpm
kernel-tools-libs-4.18.0-372.9.1.el8.x86_64.rpm
perf-4.18.0-372.9.1.el8.x86_64.rpm
python3-perf-4.18.0-372.9.1.el8.x86_64.rpm
bpftool-4.18.0-372.9.1.el8.aarch64.rpm
kernel-4.18.0-372.9.1.el8.aarch64.rpm
kernel-core-4.18.0-372.9.1.el8.aarch64.rpm
kernel-cross-headers-4.18.0-372.9.1.el8.aarch64.rpm
kernel-debug-4.18.0-372.9.1.el8.aarch64.rpm
kernel-debug-core-4.18.0-372.9.1.el8.aarch64.rpm
kernel-debug-devel-4.18.0-372.9.1.el8.aarch64.rpm
kernel-debug-modules-4.18.0-372.9.1.el8.aarch64.rpm
kernel-debug-modules-extra-4.18.0-372.9.1.el8.aarch64.rpm
kernel-devel-4.18.0-372.9.1.el8.aarch64.rpm
kernel-headers-4.18.0-372.9.1.el8.aarch64.rpm
kernel-modules-4.18.0-372.9.1.el8.aarch64.rpm
kernel-modules-extra-4.18.0-372.9.1.el8.aarch64.rpm
kernel-tools-4.18.0-372.9.1.el8.aarch64.rpm
kernel-tools-libs-4.18.0-372.9.1.el8.aarch64.rpm
perf-4.18.0-372.9.1.el8.aarch64.rpm
python3-perf-4.18.0-372.9.1.el8.aarch64.rpm
bpftool-4.18.0-372.9.1.el8.ppc64le.rpm
kernel-4.18.0-372.9.1.el8.ppc64le.rpm
kernel-core-4.18.0-372.9.1.el8.ppc64le.rpm
kernel-cross-headers-4.18.0-372.9.1.el8.ppc64le.rpm
kernel-debug-4.18.0-372.9.1.el8.ppc64le.rpm
kernel-debug-core-4.18.0-372.9.1.el8.ppc64le.rpm
kernel-debug-devel-4.18.0-372.9.1.el8.ppc64le.rpm
kernel-debug-modules-4.18.0-372.9.1.el8.ppc64le.rpm
kernel-debug-modules-extra-4.18.0-372.9.1.el8.ppc64le.rpm
kernel-devel-4.18.0-372.9.1.el8.ppc64le.rpm
kernel-headers-4.18.0-372.9.1.el8.ppc64le.rpm
kernel-modules-4.18.0-372.9.1.el8.ppc64le.rpm
kernel-modules-extra-4.18.0-372.9.1.el8.ppc64le.rpm
kernel-tools-4.18.0-372.9.1.el8.ppc64le.rpm
kernel-tools-libs-4.18.0-372.9.1.el8.ppc64le.rpm
perf-4.18.0-372.9.1.el8.ppc64le.rpm
python3-perf-4.18.0-372.9.1.el8.ppc64le.rpm

Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.

  ALSA-2022:1988 Important: kernel security, bug fix, and enhancement update