[ALSA-2022:1988] Important: kernel security, bug fix, and enhancement update
Type:
security
Severity:
important
Release date:
2022-05-10
Description:
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083) * kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404) * kernel: speculation on incompletely validated data on IBM Power9 (CVE-2020-4788) * kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974) * kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941) * kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612) * kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669) * kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743) * kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744) * kernel: possible use-after-free in bluetooth module (CVE-2021-3752) * kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759) * kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764) * kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772) * kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773) * kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002) * kernel: security regression for CVE-2018-13405 (CVE-2021-4037) * kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157) * kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197) * kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203) * kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322) * kernel: arm: SIGPAGE information disclosure vulnerability (CVE-2021-21781) * hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401) * kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154) * kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159) * kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864) * kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739) * kernel: ppc: kvm: allows a malicious KVM guest to crash the host (CVE-2021-43056) * kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389) * kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976) * kernel: use-after-free in the TEE subsystem (CVE-2021-44733) * kernel: information leak in the IPv6 implementation (CVE-2021-45485) * kernel: information leak in the IPv4 implementation (CVE-2021-45486) * hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001) * hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002) * kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286) * kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322) * kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011) * kernel: use-after-free in nouveau kernel module (CVE-2020-27820) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 kernel-debug-modules-4.18.0-372.9.1.el8.aarch64.rpm 1e10aa65c8d8156b9b24f13b2542dcf6ce6df2cc74a8c3f7a8f55181ebecbf07
aarch64 kernel-modules-extra-4.18.0-372.9.1.el8.aarch64.rpm 2a7adb3e537c1eb13a20009ca95367786de24490e10cbdb187d73086999a7388
aarch64 kernel-tools-4.18.0-372.9.1.el8.aarch64.rpm 48150e917e4b23d6ab8b66f9a795b118ed5f5864a4a3ed3abe72dd7671c0d99b
aarch64 kernel-debug-core-4.18.0-372.9.1.el8.aarch64.rpm 557583adc1e3fb4ef9ec858d3bf82e2bc21bb744bf8a26235ba7fbf091988878
aarch64 bpftool-4.18.0-372.9.1.el8.aarch64.rpm 8200f19f207587d4169c7f5ea8a86da7f3836ca5bf7b8e9f8272de9b4d3ad975
aarch64 kernel-core-4.18.0-372.9.1.el8.aarch64.rpm 905f19fa2e6741077424ee997e8952432164dd4819a1bb2f839a8445f43aac79
aarch64 kernel-debug-4.18.0-372.9.1.el8.aarch64.rpm 992690c119a50175aced87a81381909dc31e596a2595fb716a465e9c06681f5c
aarch64 kernel-tools-libs-4.18.0-372.9.1.el8.aarch64.rpm acd4366608133deb1ee17c462e49f009c963a8e3d42df68bd41b03e2d8f4784b
aarch64 kernel-debug-devel-4.18.0-372.9.1.el8.aarch64.rpm d2bcb7a87b78f68cc28d6ebeb8cc4942c5353bcb12123d2b619d1080cb81fbe6
aarch64 kernel-modules-4.18.0-372.9.1.el8.aarch64.rpm d7cf2a7b16657392de282a4aa17e9c70a1725f1c053b5aa7e9a074ed3246e14f
aarch64 kernel-cross-headers-4.18.0-372.9.1.el8.aarch64.rpm d9838a8678db02e09c7936af4f012a9520b5e34c754aabcba6e2818e1753dda5
aarch64 perf-4.18.0-372.9.1.el8.aarch64.rpm da4329334aceb42167f1d0c4fbc41a8949a72bcad8aa5a69b2171afd619d954f
aarch64 python3-perf-4.18.0-372.9.1.el8.aarch64.rpm db7211119e4d25036a9b1456a0222ded00795b79319735aee6a94d2d09448f49
aarch64 kernel-4.18.0-372.9.1.el8.aarch64.rpm e5ea5e0042203c1529d3bacacaf88fad31911029ea396ac9c0170c14cf78ffac
aarch64 kernel-devel-4.18.0-372.9.1.el8.aarch64.rpm e764e689ae432358ad641f2e791f0de9356ec64820fb2db216c7a731be34f80b
aarch64 kernel-tools-libs-devel-4.18.0-372.9.1.el8.aarch64.rpm ed91d2682f63e26ee0ce8f82885850aa7fbe4a1060c141a16c97595979a0fbb1
aarch64 kernel-headers-4.18.0-372.9.1.el8.aarch64.rpm ef5a323f6c5d48c19edc9fe7c39070853032f9a70e13c2af97aedd98a2fe241c
aarch64 kernel-debug-modules-extra-4.18.0-372.9.1.el8.aarch64.rpm ffae3e364146d25b82a0ee958e8d99f374479a4d3c0c9ad68dfc095da054c8d3
noarch kernel-doc-4.18.0-372.9.1.el8.noarch.rpm 3eb91c883f9916aabbec3ef5703831775532cc30c68345847843b3f563e30923
noarch kernel-abi-stablelists-4.18.0-372.9.1.el8.noarch.rpm 8520180d4e4b9d6d83d3ff4e863c4b61b7a716f9d15653e3e594c2e640383ba2
ppc64le kernel-debug-core-4.18.0-372.9.1.el8.ppc64le.rpm 005b36177161b497bb2b65d4fe15e1ed3e9d103f11277b0e5e37b838e91f39e4
ppc64le kernel-debug-modules-4.18.0-372.9.1.el8.ppc64le.rpm 239d1926b7d9c3028bb8b61dee678c2e26edbe933faf082f5e3dd4060addc59e
ppc64le kernel-tools-libs-devel-4.18.0-372.9.1.el8.ppc64le.rpm 292e9f03f714f84cba8c67e07e1603364c247f8eab82ac64715c1bc5a063bb39
ppc64le kernel-cross-headers-4.18.0-372.9.1.el8.ppc64le.rpm 2b4a131d3114d3cbf066b68226dd636e79364a82421d1dde46d736b6bb1416bd
ppc64le kernel-debug-modules-extra-4.18.0-372.9.1.el8.ppc64le.rpm 2ffd1837713f6c3f222296409a92b7765c4abfb146089b004f266dae9a3df835
ppc64le python3-perf-4.18.0-372.9.1.el8.ppc64le.rpm 36c93d7e7288a0470cc20845d498bcda40a1e91f708fabe1bd18668874cb274b
ppc64le kernel-tools-4.18.0-372.9.1.el8.ppc64le.rpm 54cb5e914970290d636ae04cfe5887abba80f4422efc234093872fee71432ba2
ppc64le kernel-core-4.18.0-372.9.1.el8.ppc64le.rpm 6f2de82e8be604730fd2407e933b4789fb88dd2e37b3aa5372930e69aac724bd
ppc64le perf-4.18.0-372.9.1.el8.ppc64le.rpm 844312a92c1f6112a2982887ae4c6faceb8f6ecd0f3c2e4af935964ee6ad7b8e
ppc64le kernel-debug-devel-4.18.0-372.9.1.el8.ppc64le.rpm 8c399c99e134b6a9c5f577ab0ab9f1f23d459fa181b0b3c62bdb4ad18c46af05
ppc64le kernel-tools-libs-4.18.0-372.9.1.el8.ppc64le.rpm 8cefb9d306331467d7b0fb7b8c81e5485450dbe84a05e2037fb1f39ccd1d35ae
ppc64le kernel-modules-extra-4.18.0-372.9.1.el8.ppc64le.rpm 9c55000e55ee3a8bd12aafc84a0ead94a97ce236a244123c6ead20007825f455
ppc64le kernel-modules-4.18.0-372.9.1.el8.ppc64le.rpm 9c71ea8fc090c3878b624f296adac86b96fe85d35a1e8c58561f7c8a2871b195
ppc64le kernel-devel-4.18.0-372.9.1.el8.ppc64le.rpm a88d49129379a92c69611a1df1bf107bfdb0d37289e21e4c5dda282067895619
ppc64le kernel-debug-4.18.0-372.9.1.el8.ppc64le.rpm cd14bd5f612a90850d8c88e69eeeaec581be1cc740c4a3ee2a41a1d096ba62d3
ppc64le kernel-headers-4.18.0-372.9.1.el8.ppc64le.rpm d989c9dbd915775a68eefca5b4b46d76a147ae0f8839d229626c0fb48b7317b4
ppc64le kernel-4.18.0-372.9.1.el8.ppc64le.rpm e67df87a0b591f28de0ec3b42b1fdaafba0a22453e2c31981f9748ae4fb0f330
ppc64le bpftool-4.18.0-372.9.1.el8.ppc64le.rpm fef0712f53a159e74054724486b422fb49d7dd3c873a45eea50d0c424c670283
x86_64 bpftool-4.18.0-372.9.1.el8.x86_64.rpm 0aca5f3ef3d983e23efeecae1527db4f73578c36477cc6593e5e9202876d03a8
x86_64 kernel-debug-4.18.0-372.9.1.el8.x86_64.rpm 4951671dd6b9a2ee4a9476f8436ceea904d494ac1e178e61f3362727918d2f6d
x86_64 python3-perf-4.18.0-372.9.1.el8.x86_64.rpm 4dd6246491369c130b296f95b6713597df8665a6473489f6d6c51f321f993888
x86_64 kernel-debug-core-4.18.0-372.9.1.el8.x86_64.rpm 6f4c4e074050d005cfac0aa309fc69e91c3c6bd0199f581427aabf55a15ec957
x86_64 perf-4.18.0-372.9.1.el8.x86_64.rpm 71a82d8bb0bf592645c356d4d80b9d0ad52853b0d2147d3187fb114fed0fbea0
x86_64 kernel-tools-libs-4.18.0-372.9.1.el8.x86_64.rpm 797da51318869cd998bc161769a61de94d18205282074c54723d3dce4d475e5d
x86_64 kernel-tools-libs-devel-4.18.0-372.9.1.el8.x86_64.rpm 7ecc98f69156ec21bd5a3429d8546a5e4fd81a487d37e7600ad24b5cd138e07d
x86_64 kernel-core-4.18.0-372.9.1.el8.x86_64.rpm 96260a787d887e658acb0aab67b230ca40d905184284961596971c24c8f2457e
x86_64 kernel-debug-devel-4.18.0-372.9.1.el8.x86_64.rpm 978a2bfdee3aa57c4e16451d70df4af66f71d0e9f37f1e8dd7e51e041f67cc01
x86_64 kernel-tools-4.18.0-372.9.1.el8.x86_64.rpm b494260f9f8e9c472ad7546bdae588112104666b991fd86fb18154f420386234
x86_64 kernel-headers-4.18.0-372.9.1.el8.x86_64.rpm b7d2f5978878301bca34bb575ea43afc6a033b6894d196efd28b762682f2960e
x86_64 kernel-modules-extra-4.18.0-372.9.1.el8.x86_64.rpm d2b371f608ebe6aad5a275af96202e9d26bf45fefa807cff9fcdd406cf65b38d
x86_64 kernel-4.18.0-372.9.1.el8.x86_64.rpm e09991b0b2b7ecd0b9a613fc8ceddbd4e7a171aa524fec9d11fd41cae03e774a
x86_64 kernel-debug-modules-4.18.0-372.9.1.el8.x86_64.rpm ea96dce797caa03254d34feb4c6782a58bfb06b9f5347b134f714e5e3ea3769f
x86_64 kernel-cross-headers-4.18.0-372.9.1.el8.x86_64.rpm f75af0a840e84ae5abecb658fed63fc720a16042eb3f181dfa15171d42fa358f
x86_64 kernel-debug-modules-extra-4.18.0-372.9.1.el8.x86_64.rpm faa5a001c459aa941f27947b1fdcade1275c2d2903424fdd1359f6149a4364ee
x86_64 kernel-devel-4.18.0-372.9.1.el8.x86_64.rpm fcecc508d20dcda296ad5869d7892797a0ca1f9318ab7133ccbc2c4edd06812d
x86_64 kernel-modules-4.18.0-372.9.1.el8.x86_64.rpm fe62316b1c0bae61ac51a909080b6c5ee789e119aaa728854bbe3096ff43474a
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.