[ALSA-2022:5249] Important: kernel security and bug fix update
Type:
security
Severity:
important
Release date:
2022-07-21
Description:
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012) * kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729) * kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966) * kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * make SHA512_arch algos and CRYPTO_USER built-ins (BZ#2072643) * SR-IOV performance > 50% degradation (BZ#2074830) * fix data corruption caused by dm-integrity (BZ#2082187) * SCTP client-side peeloff issues [rhel-9] (BZ#2084044) * TCP connection fails in a asymmetric routing situation (BZ#2085480) * Fails to boot Multiple RT VMs each with multiple vCPUs (BZ#2086963) * spec: Fix separate tools build (BZ#2090852) * call traces related to eeh_pseries observed and vmcore is not captured, when kdump is triggered (BZ#2092255) * Mark ThunderX NIC driver as unmaintained (BZ#2092638)
Updated packages:
  • kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm
  • kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm
  • kernel-core-5.14.0-70.17.1.el9_0.aarch64.rpm
  • kernel-devel-5.14.0-70.17.1.el9_0.aarch64.rpm
  • kernel-debug-modules-5.14.0-70.17.1.el9_0.aarch64.rpm
  • kernel-cross-headers-5.14.0-70.17.1.el9_0.aarch64.rpm
  • kernel-tools-libs-5.14.0-70.17.1.el9_0.aarch64.rpm
  • perf-5.14.0-70.17.1.el9_0.aarch64.rpm
  • kernel-devel-matched-5.14.0-70.17.1.el9_0.aarch64.rpm
  • kernel-modules-5.14.0-70.17.1.el9_0.aarch64.rpm
  • kernel-modules-extra-5.14.0-70.17.1.el9_0.aarch64.rpm
  • kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.aarch64.rpm
  • kernel-debug-5.14.0-70.17.1.el9_0.aarch64.rpm
  • kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.aarch64.rpm
  • kernel-5.14.0-70.17.1.el9_0.aarch64.rpm
  • python3-perf-5.14.0-70.17.1.el9_0.aarch64.rpm
  • kernel-debug-devel-5.14.0-70.17.1.el9_0.aarch64.rpm
  • kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.aarch64.rpm
  • kernel-headers-5.14.0-70.17.1.el9_0.aarch64.rpm
  • bpftool-5.14.0-70.17.1.el9_0.aarch64.rpm
  • kernel-tools-5.14.0-70.17.1.el9_0.aarch64.rpm
  • kernel-debug-core-5.14.0-70.17.1.el9_0.aarch64.rpm
  • kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm
  • kernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm
  • kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm
  • kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm
  • kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpm
  • kernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpm
  • kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm
  • kernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm
  • kernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm
  • bpftool-5.14.0-70.17.1.el9_0.x86_64.rpm
  • kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm
  • kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm
  • kernel-5.14.0-70.17.1.el9_0.x86_64.rpm
  • kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm
  • perf-5.14.0-70.17.1.el9_0.x86_64.rpm
  • kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm
  • kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm
  • python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm
  • kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm
  • kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm
  • kernel-tools-libs-5.14.0-70.17.1.el9_0.ppc64le.rpm
  • kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.ppc64le.rpm
  • kernel-debug-devel-5.14.0-70.17.1.el9_0.ppc64le.rpm
  • kernel-modules-extra-5.14.0-70.17.1.el9_0.ppc64le.rpm
  • kernel-debug-modules-5.14.0-70.17.1.el9_0.ppc64le.rpm
  • kernel-devel-matched-5.14.0-70.17.1.el9_0.ppc64le.rpm
  • kernel-tools-5.14.0-70.17.1.el9_0.ppc64le.rpm
  • kernel-debug-core-5.14.0-70.17.1.el9_0.ppc64le.rpm
  • kernel-debug-5.14.0-70.17.1.el9_0.ppc64le.rpm
  • kernel-headers-5.14.0-70.17.1.el9_0.ppc64le.rpm
  • kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.ppc64le.rpm
  • kernel-cross-headers-5.14.0-70.17.1.el9_0.ppc64le.rpm
  • kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.ppc64le.rpm
  • bpftool-5.14.0-70.17.1.el9_0.ppc64le.rpm
  • perf-5.14.0-70.17.1.el9_0.ppc64le.rpm
  • kernel-core-5.14.0-70.17.1.el9_0.ppc64le.rpm
  • kernel-5.14.0-70.17.1.el9_0.ppc64le.rpm
  • kernel-modules-5.14.0-70.17.1.el9_0.ppc64le.rpm
  • kernel-devel-5.14.0-70.17.1.el9_0.ppc64le.rpm
  • python3-perf-5.14.0-70.17.1.el9_0.ppc64le.rpm
  • kernel-headers-5.14.0-70.17.1.el9_0.s390x.rpm
  • kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.s390x.rpm
  • kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.s390x.rpm
  • bpftool-5.14.0-70.17.1.el9_0.s390x.rpm
  • kernel-5.14.0-70.17.1.el9_0.s390x.rpm
  • kernel-zfcpdump-modules-5.14.0-70.17.1.el9_0.s390x.rpm
  • kernel-modules-extra-5.14.0-70.17.1.el9_0.s390x.rpm
  • kernel-zfcpdump-modules-extra-5.14.0-70.17.1.el9_0.s390x.rpm
  • kernel-devel-5.14.0-70.17.1.el9_0.s390x.rpm
  • kernel-zfcpdump-devel-5.14.0-70.17.1.el9_0.s390x.rpm
  • kernel-zfcpdump-core-5.14.0-70.17.1.el9_0.s390x.rpm
  • kernel-zfcpdump-devel-matched-5.14.0-70.17.1.el9_0.s390x.rpm
  • kernel-debug-5.14.0-70.17.1.el9_0.s390x.rpm
  • kernel-modules-5.14.0-70.17.1.el9_0.s390x.rpm
  • kernel-core-5.14.0-70.17.1.el9_0.s390x.rpm
  • kernel-debug-modules-5.14.0-70.17.1.el9_0.s390x.rpm
  • python3-perf-5.14.0-70.17.1.el9_0.s390x.rpm
  • kernel-devel-matched-5.14.0-70.17.1.el9_0.s390x.rpm
  • kernel-cross-headers-5.14.0-70.17.1.el9_0.s390x.rpm
  • perf-5.14.0-70.17.1.el9_0.s390x.rpm
  • kernel-debug-core-5.14.0-70.17.1.el9_0.s390x.rpm
  • kernel-debug-devel-5.14.0-70.17.1.el9_0.s390x.rpm
  • kernel-tools-5.14.0-70.17.1.el9_0.s390x.rpm
  • kernel-zfcpdump-5.14.0-70.17.1.el9_0.s390x.rpm
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.