-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2023:1202-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2023:1202 Issue date: 2023-03-14 CVE Names: CVE-2022-3564 CVE-2022-4269 CVE-2022-4378 CVE-2022-4379 CVE-2023-0179 CVE-2023-0266 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat CodeReady Linux Builder EUS (v.9.0) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux AppStream EUS (v.9.0) - aarch64, noarch, ppc64le, s390x, x86_64 Red Hat Enterprise Linux BaseOS EUS (v.9.0) - aarch64, noarch, ppc64le, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564) * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378) * kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack (CVE-2022-4379) * kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan (CVE-2023-0179) * ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266) * kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * RHEL9:[P10] With Guest Secure Boot and lockdown enabled, DLPAR operations can't be done (Rainier) (BZ#2107480) * [RHEL 9.0] LTP Test failure and crash at fork14 on Sapphire Rapids Platinum 8280+ (BZ#2133084) * RHEL9.0 - boot: Add secure boot trailer (BZ#2151529) * 'date' command shows wrong time in nested KVM s390x guest (BZ#2158816) * Kernel FIPS-140-3 requirements - part 3 - AES-XTS (BZ#2160176) * RHEL 9.0.0 soft quota cannot exceed more the 5 warns which breaks timer functionality (BZ#2164263) * In FIPS mode, the kernel should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 (BZ#2165131) * [RHEL 9] FIPS: deadlock between PID 1 and "modprobe crypto-jitterentropy_rng" at boot, preventing system to boot. (BZ#2167762) Enhancement(s): * [Intel 9.2 FEAT] [SPR] CPU: AMX: Improve the init_fpstate setup code (BZ#2168383) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 2150272 - CVE-2022-4269 kernel: net: CPU soft lockup in TC mirred egress-to-ingress action 2150999 - CVE-2022-3564 kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c 2152548 - CVE-2022-4378 kernel: stack overflow in do_proc_dointvec and proc_skip_spaces 2152807 - CVE-2022-4379 kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack 2161713 - CVE-2023-0179 kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan 2163379 - CVE-2023-0266 ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF 6. Package List: Red Hat Enterprise Linux AppStream EUS (v.9.0): aarch64: bpftool-debuginfo-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-debug-debuginfo-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-debug-devel-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-debug-devel-matched-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-debuginfo-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-debuginfo-common-aarch64-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-devel-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-devel-matched-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-headers-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-tools-debuginfo-5.14.0-70.49.1.el9_0.aarch64.rpm perf-5.14.0-70.49.1.el9_0.aarch64.rpm perf-debuginfo-5.14.0-70.49.1.el9_0.aarch64.rpm python3-perf-debuginfo-5.14.0-70.49.1.el9_0.aarch64.rpm noarch: kernel-doc-5.14.0-70.49.1.el9_0.noarch.rpm ppc64le: bpftool-debuginfo-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-debug-debuginfo-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-debug-devel-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-debug-devel-matched-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-debuginfo-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-debuginfo-common-ppc64le-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-devel-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-devel-matched-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-headers-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-tools-debuginfo-5.14.0-70.49.1.el9_0.ppc64le.rpm perf-5.14.0-70.49.1.el9_0.ppc64le.rpm perf-debuginfo-5.14.0-70.49.1.el9_0.ppc64le.rpm python3-perf-debuginfo-5.14.0-70.49.1.el9_0.ppc64le.rpm s390x: bpftool-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm kernel-debug-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm kernel-debug-devel-5.14.0-70.49.1.el9_0.s390x.rpm kernel-debug-devel-matched-5.14.0-70.49.1.el9_0.s390x.rpm kernel-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm kernel-debuginfo-common-s390x-5.14.0-70.49.1.el9_0.s390x.rpm kernel-devel-5.14.0-70.49.1.el9_0.s390x.rpm kernel-devel-matched-5.14.0-70.49.1.el9_0.s390x.rpm kernel-headers-5.14.0-70.49.1.el9_0.s390x.rpm kernel-tools-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm kernel-zfcpdump-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm kernel-zfcpdump-devel-5.14.0-70.49.1.el9_0.s390x.rpm kernel-zfcpdump-devel-matched-5.14.0-70.49.1.el9_0.s390x.rpm perf-5.14.0-70.49.1.el9_0.s390x.rpm perf-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm python3-perf-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm x86_64: bpftool-debuginfo-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-debug-debuginfo-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-debug-devel-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-debug-devel-matched-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-debuginfo-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-debuginfo-common-x86_64-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-devel-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-devel-matched-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-headers-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-tools-debuginfo-5.14.0-70.49.1.el9_0.x86_64.rpm perf-5.14.0-70.49.1.el9_0.x86_64.rpm perf-debuginfo-5.14.0-70.49.1.el9_0.x86_64.rpm python3-perf-debuginfo-5.14.0-70.49.1.el9_0.x86_64.rpm Red Hat Enterprise Linux BaseOS EUS (v.9.0): Source: kernel-5.14.0-70.49.1.el9_0.src.rpm aarch64: bpftool-5.14.0-70.49.1.el9_0.aarch64.rpm bpftool-debuginfo-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-core-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-debug-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-debug-core-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-debug-debuginfo-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-debug-modules-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-debug-modules-extra-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-debuginfo-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-debuginfo-common-aarch64-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-modules-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-modules-extra-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-tools-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-tools-debuginfo-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-tools-libs-5.14.0-70.49.1.el9_0.aarch64.rpm perf-debuginfo-5.14.0-70.49.1.el9_0.aarch64.rpm python3-perf-5.14.0-70.49.1.el9_0.aarch64.rpm python3-perf-debuginfo-5.14.0-70.49.1.el9_0.aarch64.rpm noarch: kernel-abi-stablelists-5.14.0-70.49.1.el9_0.noarch.rpm ppc64le: bpftool-5.14.0-70.49.1.el9_0.ppc64le.rpm bpftool-debuginfo-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-core-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-debug-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-debug-core-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-debug-debuginfo-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-debug-modules-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-debug-modules-extra-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-debuginfo-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-debuginfo-common-ppc64le-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-modules-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-modules-extra-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-tools-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-tools-debuginfo-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-tools-libs-5.14.0-70.49.1.el9_0.ppc64le.rpm perf-debuginfo-5.14.0-70.49.1.el9_0.ppc64le.rpm python3-perf-5.14.0-70.49.1.el9_0.ppc64le.rpm python3-perf-debuginfo-5.14.0-70.49.1.el9_0.ppc64le.rpm s390x: bpftool-5.14.0-70.49.1.el9_0.s390x.rpm bpftool-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm kernel-5.14.0-70.49.1.el9_0.s390x.rpm kernel-core-5.14.0-70.49.1.el9_0.s390x.rpm kernel-debug-5.14.0-70.49.1.el9_0.s390x.rpm kernel-debug-core-5.14.0-70.49.1.el9_0.s390x.rpm kernel-debug-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm kernel-debug-modules-5.14.0-70.49.1.el9_0.s390x.rpm kernel-debug-modules-extra-5.14.0-70.49.1.el9_0.s390x.rpm kernel-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm kernel-debuginfo-common-s390x-5.14.0-70.49.1.el9_0.s390x.rpm kernel-modules-5.14.0-70.49.1.el9_0.s390x.rpm kernel-modules-extra-5.14.0-70.49.1.el9_0.s390x.rpm kernel-tools-5.14.0-70.49.1.el9_0.s390x.rpm kernel-tools-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm kernel-zfcpdump-5.14.0-70.49.1.el9_0.s390x.rpm kernel-zfcpdump-core-5.14.0-70.49.1.el9_0.s390x.rpm kernel-zfcpdump-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm kernel-zfcpdump-modules-5.14.0-70.49.1.el9_0.s390x.rpm kernel-zfcpdump-modules-extra-5.14.0-70.49.1.el9_0.s390x.rpm perf-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm python3-perf-5.14.0-70.49.1.el9_0.s390x.rpm python3-perf-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm x86_64: bpftool-5.14.0-70.49.1.el9_0.x86_64.rpm bpftool-debuginfo-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-core-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-debug-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-debug-core-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-debug-debuginfo-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-debug-modules-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-debug-modules-extra-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-debuginfo-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-debuginfo-common-x86_64-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-modules-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-modules-extra-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-tools-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-tools-debuginfo-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-tools-libs-5.14.0-70.49.1.el9_0.x86_64.rpm perf-debuginfo-5.14.0-70.49.1.el9_0.x86_64.rpm python3-perf-5.14.0-70.49.1.el9_0.x86_64.rpm python3-perf-debuginfo-5.14.0-70.49.1.el9_0.x86_64.rpm Red Hat CodeReady Linux Builder EUS (v.9.0): aarch64: bpftool-debuginfo-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-cross-headers-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-debug-debuginfo-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-debuginfo-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-debuginfo-common-aarch64-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-tools-debuginfo-5.14.0-70.49.1.el9_0.aarch64.rpm kernel-tools-libs-devel-5.14.0-70.49.1.el9_0.aarch64.rpm perf-debuginfo-5.14.0-70.49.1.el9_0.aarch64.rpm python3-perf-debuginfo-5.14.0-70.49.1.el9_0.aarch64.rpm ppc64le: bpftool-debuginfo-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-cross-headers-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-debug-debuginfo-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-debuginfo-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-debuginfo-common-ppc64le-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-tools-debuginfo-5.14.0-70.49.1.el9_0.ppc64le.rpm kernel-tools-libs-devel-5.14.0-70.49.1.el9_0.ppc64le.rpm perf-debuginfo-5.14.0-70.49.1.el9_0.ppc64le.rpm python3-perf-debuginfo-5.14.0-70.49.1.el9_0.ppc64le.rpm s390x: bpftool-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm kernel-cross-headers-5.14.0-70.49.1.el9_0.s390x.rpm kernel-debug-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm kernel-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm kernel-debuginfo-common-s390x-5.14.0-70.49.1.el9_0.s390x.rpm kernel-tools-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm kernel-zfcpdump-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm perf-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm python3-perf-debuginfo-5.14.0-70.49.1.el9_0.s390x.rpm x86_64: bpftool-debuginfo-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-cross-headers-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-debug-debuginfo-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-debuginfo-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-debuginfo-common-x86_64-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-tools-debuginfo-5.14.0-70.49.1.el9_0.x86_64.rpm kernel-tools-libs-devel-5.14.0-70.49.1.el9_0.x86_64.rpm perf-debuginfo-5.14.0-70.49.1.el9_0.x86_64.rpm python3-perf-debuginfo-5.14.0-70.49.1.el9_0.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-3564 https://access.redhat.com/security/cve/CVE-2022-4269 https://access.redhat.com/security/cve/CVE-2022-4378 https://access.redhat.com/security/cve/CVE-2022-4379 https://access.redhat.com/security/cve/CVE-2023-0179 https://access.redhat.com/security/cve/CVE-2023-0266 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZBCPddzjgjWX9erEAQiUYA//eHB1lFUQOziIVT+e7Eveh/CxB+oBYKQd qahqIC8RGCNzfhKszn/E76Pp9nCmuajBUWStb6f07R+vwQaGe/cQ2SS8Zfhj7Fo0 MS5bW3udIWqqSIoSD6zHKQn8rouFzsJ2PuP1nomV3w7C+/nWk8G2y7ulWvuRIQxw anWwsA2FI3m/ymDkqDhwF/zF4cfosOvd/XARC6PL0+uyJHigp4egLr6XBqlY9Gh6 P36zjfZdTyZ8MfqgFj7K4wEOr41HLaIPEeelPSmsOj+rx4IsXm+T5wu20oFoSVwr E9RX72wKxAblHUvVlCMBIGLeATbfO2XmqU1392+WUFysTjGTPib836+STh2PPK+p c6NA/rr90g59PFyTpdHCR54GZLjTrOPYNDiinvXDFiyTbkwWIZq5Qm1LoVOSUuUi DA+NpnB09Kglx1taqnknbt0o1G+0nkcblajZhC0LnqcqMBUfI1rQvedT7JOGlJhy a7W9JgIaFc5qTh1MR2dhBEbxAwbxVJaaFUmD3HASCfxJviED915IOdOM+SjkLKS1 RPW2SmxZ8lWk46GyQLN/xHIsAL4ucntjP9SMLhwM+KDTjDRYgEjqiVUvgMgYNn7o miFyM1PT3sALFo2EGb+AyqXHlW8MyI0dJtEv5EV2PMegCDCf54ISQiUlMY4EKcFJ IwHZx9iW7VY= =yYLi -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce