Synopsis:          Important: kernel security and bug fix update
Advisory ID:       SLSA-2022:5232-1
Issue Date:        2022-06-28
CVE Numbers:       CVE-2022-1729
                   CVE-2022-1966
--

Security Fix(es):

* kernel: race condition in perf_event_open leads to privilege escalation
(CVE-2022-1729)

* kernel: a use-after-free write in the netfilter subsystem can lead to
privilege escalation to root (CVE-2022-1966)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE

Bug Fix(es):

* XFS inode cluster corruption

* sock: sock_dequeue_err_skb() needs hard irq safety

* libceph: fix potential use-after-free on linger ping and resends
--

SL7
  x86_64
    bpftool-3.10.0-1160.71.1.el7.x86_64.rpm
    bpftool-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm
    kernel-3.10.0-1160.71.1.el7.x86_64.rpm
    kernel-debug-3.10.0-1160.71.1.el7.x86_64.rpm
    kernel-debug-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm
    kernel-debug-devel-3.10.0-1160.71.1.el7.x86_64.rpm
    kernel-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm
    kernel-debuginfo-common-x86_64-3.10.0-1160.71.1.el7.x86_64.rpm
    kernel-devel-3.10.0-1160.71.1.el7.x86_64.rpm
    kernel-headers-3.10.0-1160.71.1.el7.x86_64.rpm
    kernel-tools-3.10.0-1160.71.1.el7.x86_64.rpm
    kernel-tools-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm
    kernel-tools-libs-3.10.0-1160.71.1.el7.x86_64.rpm
    perf-3.10.0-1160.71.1.el7.x86_64.rpm
    perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm
    python-perf-3.10.0-1160.71.1.el7.x86_64.rpm
    python-perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm
    kernel-tools-libs-devel-3.10.0-1160.71.1.el7.x86_64.rpm
  noarch
    kernel-abi-whitelists-3.10.0-1160.71.1.el7.noarch.rpm
    kernel-doc-3.10.0-1160.71.1.el7.noarch.rpm

- Scientific Linux Development Team

SciLinux: SLSA-2022-5232-1 Important: kernel on SL7.x x86_64

kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729) * kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation...

Summary

Important: kernel security and bug fix update



Security Fixes

* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)
* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE

Severity
Advisory ID: SLSA-2022:5232-1
Issued Date: : 2022-06-28
CVE Numbers: CVE-2022-1729
CVE-2022-1966

Related News