{"id":"ALSA-2022:1988","summary":"Important: kernel security, bug fix, and enhancement update","details":"The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)\n\n* kernel: speculation on incompletely validated data on IBM Power9 (CVE-2020-4788)\n\n* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)\n\n* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)\n\n* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)\n\n* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)\n\n* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)\n\n* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)\n\n* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)\n\n* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)\n\n* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)\n\n* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)\n\n* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)\n\n* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)\n\n* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)\n\n* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)\n\n* kernel: arm: SIGPAGE information disclosure vulnerability (CVE-2021-21781)\n\n* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)\n\n* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)\n\n* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)\n\n* kernel: ppc: kvm: allows a malicious KVM guest to crash the host (CVE-2021-43056)\n\n* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)\n\n* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)\n\n* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)\n\n* kernel: information leak in the IPv6 implementation (CVE-2021-45485)\n\n* kernel: information leak in the IPv4 implementation (CVE-2021-45486)\n\n* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)\n\n* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)\n\n* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)\n\n* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)\n\n* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)\n\n* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.","modified":"2026-01-30T00:56:08.017977Z","published":"2022-05-10T08:11:36Z","related":["CVE-2017-5715","CVE-2018-13405","CVE-2020-0404","CVE-2020-13974","CVE-2020-27820","CVE-2020-4788","CVE-2021-0941","CVE-2021-20322","CVE-2021-21781","CVE-2021-26401","CVE-2021-29154","CVE-2021-3612","CVE-2021-3669","CVE-2021-37159","CVE-2021-3743","CVE-2021-3744","CVE-2021-3752","CVE-2021-3759","CVE-2021-3764","CVE-2021-3772","CVE-2021-3773","CVE-2021-4002","CVE-2021-4037","CVE-2021-4083","CVE-2021-4157","CVE-2021-41864","CVE-2021-4197","CVE-2021-4203","CVE-2021-42739","CVE-2021-43056","CVE-2021-43389","CVE-2021-43976","CVE-2021-44733","CVE-2021-45485","CVE-2021-45486","CVE-2022-0001","CVE-2022-0002","CVE-2022-0286","CVE-2022-0322","CVE-2022-1011"],"references":[{"type":"ADVISORY","url":"https://errata.almalinux.org/8/ALSA-2022-1988.html"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2020-0404"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2020-13974"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2020-27820"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2020-4788"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-0941"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-20322"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-21781"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-26401"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-29154"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-3612"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-3669"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-37159"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-3743"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-3744"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-3752"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-3759"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-3764"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-3772"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-3773"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-4002"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-4037"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-4083"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-4157"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-41864"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-4197"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-4203"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-42739"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-43056"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-43389"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-43976"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-44733"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-45485"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-45486"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-0001"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-0002"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-0286"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-0322"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2022-1011"}],"affected":[{"package":{"name":"bpftool","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/bpftool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:1988.json"}},{"package":{"name":"kernel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:1988.json"}},{"package":{"name":"kernel-abi-stablelists","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-abi-stablelists"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:1988.json"}},{"package":{"name":"kernel-core","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:1988.json"}},{"package":{"name":"kernel-cross-headers","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-cross-headers"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:1988.json"}},{"package":{"name":"kernel-debug","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-debug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:1988.json"}},{"package":{"name":"kernel-debug-core","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-debug-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:1988.json"}},{"package":{"name":"kernel-debug-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-debug-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:1988.json"}},{"package":{"name":"kernel-debug-modules","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-debug-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:1988.json"}},{"package":{"name":"kernel-debug-modules-extra","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-debug-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:1988.json"}},{"package":{"name":"kernel-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:1988.json"}},{"package":{"name":"kernel-doc","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:1988.json"}},{"package":{"name":"kernel-headers","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-headers"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:1988.json"}},{"package":{"name":"kernel-modules","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:1988.json"}},{"package":{"name":"kernel-modules-extra","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-modules-extra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:1988.json"}},{"package":{"name":"kernel-tools","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:1988.json"}},{"package":{"name":"kernel-tools-libs","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-tools-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:1988.json"}},{"package":{"name":"kernel-tools-libs-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/kernel-tools-libs-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:1988.json"}},{"package":{"name":"perf","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:1988.json"}},{"package":{"name":"python3-perf","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/python3-perf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.18.0-372.9.1.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2022:1988.json"}}],"schema_version":"1.7.3"}