Important: kernel security, bug fix, and enhancement update

Related Vulnerabilities: CVE-2022-4269   CVE-2022-4378   CVE-2023-0266   CVE-2023-0386  

Synopsis

Important: kernel security, bug fix, and enhancement update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)
  • ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)
  • kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386)
  • kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • kernel panic on reboot due to a bug in mei_wdt module (BZ#2139770)
  • RHEL8: Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142170)
  • AMDSERVER 8.7: amdpstate driver incorrectly designed to load as default for Genoa (BZ#2151275)
  • RHEL-8.8: Update RDMA core to Linux v6.0 (BZ#2161750)
  • Kernel panic observed during VxFS module unload (BZ#2162763)
  • Client not able to connect to rhel server: SYN is answered by chalange ACK and RST is ignored (BZ#2165587)
  • RHEL8.4: s390/kexec: fix ipl report address for kdump (BZ#2166296)
  • kvm-unit-test reports unhandled exception on AMD (BZ#2166362)
  • Windows Server 2019 guest randomly pauses with "KVM: entry failed, hardware error 0x80000021" (BZ#2166368)
  • Unable to get QinQ working with ConnectX-4 Lx in SR-IOV scenario (BZ#2166665)
  • panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167602)
  • net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167640)
  • RHEL 8.7: EEH injection failed to recover on Mellanox adapter. (BZ#2167645)
  • mlx5: lag and sriov fixes (BZ#2167647)
  • RHEL8.4: dasd: fix no record found for raw_track_access (BZ#2167776)
  • GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168896)
  • Azure RHEL8 scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM (BZ#2170228)
  • fast_isolate_freepages scans out of target zone (BZ#2170576)
  • Backport Request for locking/rwsem commits (BZ#2170939)
  • ipv6 traffic stop when an sriov vf have ipv6 address (BZ#2172550)
  • Hyper-V RHEL8.8: Update MANA driver (BZ#2173103)

Enhancement(s):

  • Intel 8.8 FEAT SPR CPU: AMX: Improve the init_fpstate setup code (BZ#2168384)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for ARM 64 8 aarch64
  • Red Hat CodeReady Linux Builder for x86_64 8 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 8 aarch64

Fixes

  • BZ - 2150272 - CVE-2022-4269 kernel: net: CPU soft lockup in TC mirred egress-to-ingress action
  • BZ - 2152548 - CVE-2022-4378 kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
  • BZ - 2159505 - CVE-2023-0386 kernel: FUSE filesystem low-privileged user privileges escalation
  • BZ - 2163379 - CVE-2023-0266 ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF