alsa-2021:1093
Vulnerability from osv_almalinux
Published
2021-04-06 13:33
Modified
2021-08-11 08:54
Summary
Important: kernel security, bug fix, and enhancement update
Details

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)

  • kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)

  • kernel: Use after free via PI futex state (CVE-2021-3347)

  • kernel: race conditions caused by wrong locking in net/vmw_vsock/af_vsock.c (CVE-2021-26708)

  • kernel: out-of-bounds read in libiscsi module (CVE-2021-27364)

  • kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365)

  • Kernel: KVM: host stack overflow due to lazy update IOAPIC (CVE-2020-27152)

  • kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • race condition when creating child sockets from syncookies (BZ#1915529)

  • On System Z, a hash needs state randomized for entropy extraction (BZ#1915816)

  • scsi: target: core_tmr_abort_task() reporting multiple aborts for the same se_cmd->tag (BZ#1918354)

  • [mlx5] VF interface stats are not reflected in "ip -s link show" / "ifconfig " commands (BZ#1921060)

  • Win10 guest automatic reboot after migration in Win10 and WSL2 on Intel hosts (BZ#1923281)

  • [AlmaLinux 8.3] Repeated messages - Unable to burst-read optrom segment (BZ#1924222)

  • Backport bug fix RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz (BZ#1924691)

  • [Cisco 8.3] AlmaLinux/Cent 8.2 fNIC driver needs a patch fix that addresses crash (BZ#1925186)

  • AlmaLinux8.3 - The kernel misdetects zCX with z/VM (BZ#1925508)

  • Backport 22e4663e91 ("mm/slub: fix panic in slab_alloc_node()") (BZ#1925511)

  • SCTP "Address already in use" when no active endpoints from AlmaLinux 8.2 onwards (BZ#1927521)

  • lpfc: Fix initial FLOGI failure due to BBSCN not supported (BZ#1927921)

  • [mm] mm, oom: remove oom_lock from oom_reaper (BZ#1929738)

  • Unexpected thread movement with AMD Milan compared to Rome (BZ#1929740)

  • rpmbuild cannot build the userspace RPMs in the kernel package when the kernel itself is not built (BZ#1929910)

  • [Regression] AlmaLinux8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930168)

  • Configuring the system with non-RT kernel will hang the system (BZ#1930735)

  • Upstream Patch for Gracefully handle DMAR units with no supported address widthsx86/vt-d (BZ#1932199)

  • gfs2: Deadlock between gfs2_{create_inode,inode_lookup} and delete_work_func (BZ#1937109)

  • Failing on tsx-ctrl when the flag doesn't change anything (BZ#1939013)

Enhancement(s):

  • RFE: Backport all Audit enhancements and fixes up to version 5.10-rc1 (BZ#1907520)

  • AlmaLinux8.4: Update the target driver (BZ#1918363)

  • [Mellanox 8.4 FEAT] mlx5: Hairpin Support in Switch Mode (BZ#1924689)


{
  "affected": [
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-abi-whitelists"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-240.22.1.el8_3"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-tools-libs-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-240.22.1.el8_3"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "details": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466)\n\n* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: race conditions caused by wrong locking in net/vmw_vsock/af_vsock.c (CVE-2021-26708)\n\n* kernel: out-of-bounds read in libiscsi module (CVE-2021-27364)\n\n* kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365)\n\n* Kernel: KVM: host stack overflow due to lazy update IOAPIC (CVE-2020-27152)\n\n* kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* race condition when creating child sockets from syncookies (BZ#1915529)\n\n* On System Z, a hash needs state randomized for entropy extraction (BZ#1915816)\n\n* scsi: target: core_tmr_abort_task() reporting multiple aborts for the same se_cmd-\u003etag (BZ#1918354)\n\n* [mlx5] VF interface stats are not reflected in \"ip -s link show\" / \"ifconfig \u003cvf\u003e\" commands (BZ#1921060)\n\n* Win10 guest automatic reboot after migration in Win10 and WSL2 on Intel hosts (BZ#1923281)\n\n* [AlmaLinux 8.3] Repeated messages - Unable to burst-read optrom segment (BZ#1924222)\n\n* Backport bug fix RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz (BZ#1924691)\n\n* [Cisco 8.3] AlmaLinux/Cent 8.2 fNIC driver needs a patch fix that addresses crash (BZ#1925186)\n\n* AlmaLinux8.3 - The kernel misdetects zCX with z/VM (BZ#1925508)\n\n* Backport 22e4663e91 (\"mm/slub: fix panic in slab_alloc_node()\") (BZ#1925511)\n\n* SCTP \"Address already in use\" when no active endpoints from AlmaLinux 8.2 onwards (BZ#1927521)\n\n* lpfc: Fix initial FLOGI failure due to BBSCN not supported  (BZ#1927921)\n\n* [mm] mm, oom: remove oom_lock from oom_reaper (BZ#1929738)\n\n* Unexpected thread movement with AMD Milan compared to Rome (BZ#1929740)\n\n* rpmbuild cannot build the userspace RPMs in the kernel package when the kernel itself is not built (BZ#1929910)\n\n* [Regression] AlmaLinux8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930168)\n\n* Configuring the system with non-RT kernel will hang the system (BZ#1930735)\n\n* Upstream Patch for Gracefully handle DMAR units with no supported address widthsx86/vt-d (BZ#1932199)\n\n* gfs2: Deadlock between gfs2_{create_inode,inode_lookup} and delete_work_func (BZ#1937109)\n\n* Failing on tsx-ctrl when the flag doesn\u0027t change anything (BZ#1939013)\n\nEnhancement(s):\n\n* RFE: Backport all Audit enhancements and fixes up to version 5.10-rc1 (BZ#1907520)\n\n* AlmaLinux8.4: Update the target driver (BZ#1918363)\n\n* [Mellanox 8.4 FEAT] mlx5: Hairpin Support in Switch Mode (BZ#1924689)",
  "id": "ALSA-2021:1093",
  "modified": "2021-08-11T08:54:00Z",
  "published": "2021-04-06T13:33:17Z",
  "references": [
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-0466"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-27152"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2020-28374"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-26708"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-27363"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-27364"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-27365"
    },
    {
      "type": "REPORT",
      "url": "https://vulners.com/cve/CVE-2021-3347"
    }
  ],
  "related": [
    "CVE-2020-0466",
    "CVE-2020-28374",
    "CVE-2021-3347",
    "CVE-2021-26708",
    "CVE-2021-27364",
    "CVE-2021-27365",
    "CVE-2020-27152",
    "CVE-2021-27363"
  ],
  "summary": "Important: kernel security, bug fix, and enhancement update"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…