Lucene search

K
redhatRedHatRHSA-2023:1130
HistoryMar 07, 2023 - 1:25 p.m.

(RHSA-2023:1130) Important: kernel security and bug fix update

2023-03-0713:25:26
access.redhat.com
14

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

25.7%

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)

  • kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)

  • kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134587)

  • fix for “CoW after fork() issue” aka “vmsplice child -> parent attack” aka “GUP after fork bug” (BZ#2137546)

  • Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137593)

  • i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138206)

  • RHEL 8.7 - Outputs of lsmem, lparstat, numactl and /proc/meminfo show wrong value of memory when LMB size is set to 4GB. (BZ#2140091)

  • RHEL8.7: tcp sessions hanging after ibmvnic failover on Denali (BZ#2140958)

  • RHEL8: Practically limit “Dummy wait” workaround to old Intel systems (BZ#2142171)

  • RHEL:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for RHEL8.6 and need this patch in 8.6+ (BZ#2144584)

  • i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149746)

  • RHEL8.4 - boot: Add secure boot trailer (BZ#2151531)

  • error 524 from seccomp(2) when trying to load filter (BZ#2152139)

  • The “kernel BUG at mm/usercopy.c:103!” from BZ 2041529 is back on rhel-8.5 (BZ#2153231)

  • kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154461)

  • MSFT MANA NET Patch RHEL-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155438)

  • GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155798)

  • RHEL8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157923)

  • ‘date’ command shows wrong time in nested KVM s390x guest (BZ#2158814)

  • Kernel FIPS-140-3 requirements - part 3 - AES-XTS (BZ#2160173)

  • ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160183)

  • i40e/iavf: VF reset task fails “Never saw reset” with 5 second timeout per VF (BZ#2160461)

  • Mellanox: backport “net/mlx5e: TC NIC mode, fix tc chains miss table” (BZ#2161630)

  • Kernel panic observed during VxFS module unload (BZ#2162764)

  • iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163259)

  • In FIPS mode, the kernel should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 (BZ#2165133)

  • panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167604)

  • net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167641)

  • Update intel_idle for Eaglestream/Sapphire Rapids support (BZ#2168357)

  • GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168898)

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

25.7%