Lucene search

K
redhatRedHatRHSA-2022:5220
HistoryJun 28, 2022 - 7:27 a.m.

(RHSA-2022:5220) Important: kernel security and bug fix update

2022-06-2807:27:55
access.redhat.com
43
linux kernel
security fix
privilege escalation
information leak
buffer overflow
bug fix
memory leak
nfs processing deadlock

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

EPSS

0.002

Percentile

57.2%

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)

  • kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)

  • kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)

  • kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)

  • kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • slub corruption during LPM of hnv interface (BZ#2081252)

  • sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35 (BZ#2082090)

  • Backport request of “genirq: use rcu in kstat_irqs_usr()” (BZ#2083310)

  • kernel memory leak while freeing nested actions (BZ#2086604)

  • dm: sync rhel-8.6 with upstream 5.13 through 5.16 fixes and improvements (BZ#2088036)

  • NFS processing deadlock in low memory condition (BZ#2094459)

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

EPSS

0.002

Percentile

57.2%