Uploaded image for project: 'Lustre'
  1. Lustre
  2. LU-15587

kernel update [RHEL7.9 3.10.0-1160.59.1.el7]

    XMLWordPrintable

Details

    • Improvement
    • Resolution: Fixed
    • Minor
    • None
    • None
    • None
    • 9223372036854775807

    Description

      Security Fix(es):

      • kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)
      • kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)
      • kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)
      • kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)
      • kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)
      • kernel: out of bounds write in hid-multitouch.c may lead to escalation of privilege (CVE-2020-0465)
      • kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)
      • kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)
      • kernel: possible use-after-free in bluetooth module (CVE-2021-3752)

      Bug Fix(es):

      • Kernel with enabled BERT does not decode CPU fatal events correctly (BZ#1950302)
      • RHEL 7.9 - Call trace seen during controller random reset on IB config (BZ#1984070)
      • Infinite loop in blk_set_queue_dying() from blk_queue_for_each_rl() when another CPU races and modifies the queue's blkg_list (BZ#2029574)
      • NFS client kernel crash in NFS4 backchannel transmit path - ftrace_raw_event_rpc_task_queued called from rpc_run_bc_task (BZ#2039508)
      • SELinux is preventing / from mount access on the filesystem /proc (BZ#2040196)

      https://access.redhat.com/errata/RHSA-2022:0620?sc_cid=701600000006NHXAA2

      Attachments

        Issue Links

          Activity

            People

              yujian Jian Yu
              yujian Jian Yu
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: