Security Vulnerabilities fixed in kernel RHSA-2022:7318

description-logoDescription

The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): posix cpu timer use-after-free may lead to local privilege escalation (CVE-2022-2585) Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594) posix cpu timer use-after-free may lead to local privilege escalation (CVE-2022-2585) Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): kernel crash after reboot of T14/G2 AMD laptop (mt7921e module) (BZ#2095653) execve exit tracepoint not called (BZ#2106661) Matrox black screen on VGA output on some systems. (BZ#2112017) The kernel needs to offer a way to reseed the Crypto DRBG and atomically extract random numbers from it (BZ#2121129) watchdog BUG: soft lockup - CPU#30 stuck for 34s! [swapper/30:0] (BZ#2127857) Update cifs to 5.16 (BZ#2127858) Bad page state in process qemu-kvm pfn:68a74600 (BZ#2127859) vfio zero page mappings fail after 2M instances (BZ#2128791) The kernel needs to offer a way to reseed the Crypto DRBG and atomically extract random numbers from it (part 2) (BZ#2128970) kernel crash after reboot of T14/G2 AMD laptop (mt7921e module) (BZ#2095653) execve exit tracepoint not called (BZ#2106661) Matrox black screen on VGA output on some systems. (BZ#2112017) The kernel needs to offer a way to reseed the Crypto DRBG and atomically extract random numbers from it (BZ#2121129) watchdog BUG: soft lockup - CPU#30 stuck for 34s! [swapper/30:0] (BZ#2127857) Update cifs to 5.16 (BZ#2127858) Bad page state in process qemu-kvm pfn:68a74600 (BZ#2127859) vfio zero page mappings fail after 2M instances (BZ#2128791) The kernel needs to offer a way to reseed the Crypto DRBG and atomically extract random numbers from it (part 2) (BZ#2128970) Enhancement(s): Need to enable hpilo to support new HPE RL300 Gen11 for ARM (aarch64) (BZ#2129453) SolutionFor details on how to apply this update, which includes the changes described in this advisory, refer to:https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect.

affected-products-logoAffected Applications

kernel

CVE References

CVE-2022-2585 CVE-2022-30594