[RHSA-2022:7683-01] Moderate: kernel security, bug fix, and enhancement update

Security announcements for all Red Hat products and services. rhsa-announce at redhat.com
Tue Nov 8 12:56:54 UTC 2022


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: kernel security, bug fix, and enhancement update
Advisory ID:       RHSA-2022:7683-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:7683
Issue date:        2022-11-08
CVE Names:         CVE-2020-36516 CVE-2020-36558 CVE-2021-3640 
                   CVE-2021-30002 CVE-2022-0168 CVE-2022-0617 
                   CVE-2022-0854 CVE-2022-1016 CVE-2022-1048 
                   CVE-2022-1055 CVE-2022-1184 CVE-2022-1852 
                   CVE-2022-2078 CVE-2022-2586 CVE-2022-2639 
                   CVE-2022-2938 CVE-2022-20368 CVE-2022-21499 
                   CVE-2022-23960 CVE-2022-24448 CVE-2022-26373 
                   CVE-2022-27950 CVE-2022-28390 CVE-2022-28893 
                   CVE-2022-29581 CVE-2022-36946 
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, x86_64
Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* off-path attacker may inject data or terminate victim's TCP session
(CVE-2020-36516)

* race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL
leading to NULL pointer dereference (CVE-2020-36558)

* use-after-free vulnerability in function sco_sock_sendmsg()
(CVE-2021-3640)

* memory leak for large arguments in video_usercopy function in
drivers/media/v4l2-core/v4l2-ioctl.c (CVE-2021-30002)

* smb2_ioctl_query_info NULL Pointer Dereference (CVE-2022-0168)

* NULL pointer dereference in udf_expand_file_adinicbdue() during writeback
(CVE-2022-0617)

* swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854)

* uninitialized registers on stack in nft_do_chain can cause kernel pointer
leakage to UM (CVE-2022-1016)

* race condition in snd_pcm_hw_free leading to use-after-free
(CVE-2022-1048)

* use-after-free in tc_new_tfilter() in net/sched/cls_api.c (CVE-2022-1055)

* use-after-free and memory errors in ext4 when mounting and operating on a
corrupted image (CVE-2022-1184)

* NULL pointer dereference in x86_emulate_insn may lead to DoS
(CVE-2022-1852)

* buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078)

* nf_tables cross-table potential use-after-free may lead to local
privilege escalation (CVE-2022-2586)

* openvswitch: integer underflow leads to out-of-bounds write in
reserve_sfa_size() (CVE-2022-2639)

* use-after-free when psi trigger is destroyed while being polled
(CVE-2022-2938)

* net/packet: slab-out-of-bounds access in packet_recvmsg()
(CVE-2022-20368)

* possible to use the debugger to write zero into a location of choice
(CVE-2022-21499)

* Spectre-BHB (CVE-2022-23960)

* Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)

* memory leak in drivers/hid/hid-elo.c (CVE-2022-27950)

* double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c
(CVE-2022-28390)

* use after free in SUNRPC subsystem (CVE-2022-28893)

* use-after-free due to improper update of reference count in
net/sched/cls_u32.c (CVE-2022-29581)

* DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946)

* nfs_atomic_open() returns uninitialized data instead of ENOTDIR
(CVE-2022-24448)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.7 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1946279 - CVE-2021-30002 kernel: memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c
1948442 - [Hyper-V][RHEL8.4]On Hyper-V Host set gen1 MAX resolution > 3840x4320, GUI start failed, sometimes get kernel panic
1977993 - Add basic support for DPCD backlight control for Nouveau
1978539 - Add HMM and vm kselftests to CI
1980646 - CVE-2021-3640 kernel: use-after-free vulnerability in function sco_sock_sendmsg()
2004037 - Percpu counter usage is gradually getting increasing during podman container recreation.
2019942 - Touchpad on Fujitsu Lifebook T725 not detected
2037386 - CVE-2022-0168 kernel: smb2_ioctl_query_info NULL pointer dereference
2042424 - kernel-tools does not perform a daemon reload when installed/upgraded
2044837 - [Marvell 8.7 FEAT] update qedi driver to latest upstream
2051444 - CVE-2022-24448 kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR
2053632 - CVE-2022-0617 kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback
2056383 - System freezes with callstack in dmesg: ret_from_fork
2058369 - WARNING due to invalid error code from smb2_get_enc_key, followed by crash
2058395 - CVE-2022-0854 kernel: swiotlb information leak with DMA_FROM_DEVICE
2059928 - CVE-2020-36516 kernel: off-path attacker may inject data or terminate victim's TCP session
2062284 - CVE-2022-23960 hw: cpu: arm64: Spectre-BHB
2062780 - Make possible to get information about network interface over rtnetlink using alternative interface name
2066614 - CVE-2022-1016 kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM
2066706 - CVE-2022-1048 kernel: race condition in snd_pcm_hw_free leading to use-after-free
2066976 - AF_PACKET SOCK_RAW drops GSO tagged packets.
2069408 - CVE-2022-27950 kernel: memory leak in drivers/hid/hid-elo.c
2069472 - block: update with v5.17 wrt. fixes
2070205 - CVE-2022-1184 kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image
2070220 - CVE-2022-1055 kernel: use-after-free in tc_new_tfilter() in net/sched/cls_api.c
2072552 - XFS: sync to upstream v5.13
2073064 - CVE-2022-28390 kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c
2074208 - CVE-2022-28893 kernel: use after free in SUNRPC subsystem
2074317 - genirq/affinity: Consider that CPUs on nodes can be unbalanced
2080095 - [ESXi][RHEL8.7]Bring VMCI up to date with upstream
2084183 - CVE-2022-21499 kernel: possible to use the debugger to write zero into a location of choice
2084479 - CVE-2022-2639 kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
2088021 - CVE-2022-29581 kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c
2089815 - CVE-2022-1852 kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS
2090940 - block layer:  dependency for fixing device mapper io accouting
2091539 - kernel panics if iwlwifi firmware can not be loaded
2096178 - CVE-2022-2078 kernel: buffer overflow in nft_set_desc_concat_parse()
2100259 - backport audit_log_kern_module memleak fix from v5.19-rc3
2107594 - backport vsock commits for RHEL-8.7
2109327 - [bonding] bugfix update from v5.19
2112693 - CVE-2020-36558 kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference
2114577 - Regression in setting nfs mount options
2114878 - CVE-2022-2586 kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation
2115065 - CVE-2022-26373 hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions
2115278 - CVE-2022-36946 kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c
2120175 - CVE-2022-2938 kernel: use-after-free when psi trigger is destroyed while being polled
2123695 - CVE-2022-20368 kernel: net/packet: slab-out-of-bounds access in packet_recvmsg()

6. Package List:

Red Hat Enterprise Linux BaseOS (v. 8):

Source:
kernel-4.18.0-425.3.1.el8.src.rpm

aarch64:
bpftool-4.18.0-425.3.1.el8.aarch64.rpm
bpftool-debuginfo-4.18.0-425.3.1.el8.aarch64.rpm
kernel-4.18.0-425.3.1.el8.aarch64.rpm
kernel-core-4.18.0-425.3.1.el8.aarch64.rpm
kernel-cross-headers-4.18.0-425.3.1.el8.aarch64.rpm
kernel-debug-4.18.0-425.3.1.el8.aarch64.rpm
kernel-debug-core-4.18.0-425.3.1.el8.aarch64.rpm
kernel-debug-debuginfo-4.18.0-425.3.1.el8.aarch64.rpm
kernel-debug-devel-4.18.0-425.3.1.el8.aarch64.rpm
kernel-debug-modules-4.18.0-425.3.1.el8.aarch64.rpm
kernel-debug-modules-extra-4.18.0-425.3.1.el8.aarch64.rpm
kernel-debuginfo-4.18.0-425.3.1.el8.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-425.3.1.el8.aarch64.rpm
kernel-devel-4.18.0-425.3.1.el8.aarch64.rpm
kernel-headers-4.18.0-425.3.1.el8.aarch64.rpm
kernel-modules-4.18.0-425.3.1.el8.aarch64.rpm
kernel-modules-extra-4.18.0-425.3.1.el8.aarch64.rpm
kernel-tools-4.18.0-425.3.1.el8.aarch64.rpm
kernel-tools-debuginfo-4.18.0-425.3.1.el8.aarch64.rpm
kernel-tools-libs-4.18.0-425.3.1.el8.aarch64.rpm
perf-4.18.0-425.3.1.el8.aarch64.rpm
perf-debuginfo-4.18.0-425.3.1.el8.aarch64.rpm
python3-perf-4.18.0-425.3.1.el8.aarch64.rpm
python3-perf-debuginfo-4.18.0-425.3.1.el8.aarch64.rpm

noarch:
kernel-abi-stablelists-4.18.0-425.3.1.el8.noarch.rpm
kernel-doc-4.18.0-425.3.1.el8.noarch.rpm

ppc64le:
bpftool-4.18.0-425.3.1.el8.ppc64le.rpm
bpftool-debuginfo-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-core-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-cross-headers-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-debug-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-debug-core-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-debug-devel-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-debug-modules-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-debug-modules-extra-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-debuginfo-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-devel-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-headers-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-modules-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-modules-extra-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-tools-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-tools-libs-4.18.0-425.3.1.el8.ppc64le.rpm
perf-4.18.0-425.3.1.el8.ppc64le.rpm
perf-debuginfo-4.18.0-425.3.1.el8.ppc64le.rpm
python3-perf-4.18.0-425.3.1.el8.ppc64le.rpm
python3-perf-debuginfo-4.18.0-425.3.1.el8.ppc64le.rpm

s390x:
bpftool-4.18.0-425.3.1.el8.s390x.rpm
bpftool-debuginfo-4.18.0-425.3.1.el8.s390x.rpm
kernel-4.18.0-425.3.1.el8.s390x.rpm
kernel-core-4.18.0-425.3.1.el8.s390x.rpm
kernel-cross-headers-4.18.0-425.3.1.el8.s390x.rpm
kernel-debug-4.18.0-425.3.1.el8.s390x.rpm
kernel-debug-core-4.18.0-425.3.1.el8.s390x.rpm
kernel-debug-debuginfo-4.18.0-425.3.1.el8.s390x.rpm
kernel-debug-devel-4.18.0-425.3.1.el8.s390x.rpm
kernel-debug-modules-4.18.0-425.3.1.el8.s390x.rpm
kernel-debug-modules-extra-4.18.0-425.3.1.el8.s390x.rpm
kernel-debuginfo-4.18.0-425.3.1.el8.s390x.rpm
kernel-debuginfo-common-s390x-4.18.0-425.3.1.el8.s390x.rpm
kernel-devel-4.18.0-425.3.1.el8.s390x.rpm
kernel-headers-4.18.0-425.3.1.el8.s390x.rpm
kernel-modules-4.18.0-425.3.1.el8.s390x.rpm
kernel-modules-extra-4.18.0-425.3.1.el8.s390x.rpm
kernel-tools-4.18.0-425.3.1.el8.s390x.rpm
kernel-tools-debuginfo-4.18.0-425.3.1.el8.s390x.rpm
kernel-zfcpdump-4.18.0-425.3.1.el8.s390x.rpm
kernel-zfcpdump-core-4.18.0-425.3.1.el8.s390x.rpm
kernel-zfcpdump-debuginfo-4.18.0-425.3.1.el8.s390x.rpm
kernel-zfcpdump-devel-4.18.0-425.3.1.el8.s390x.rpm
kernel-zfcpdump-modules-4.18.0-425.3.1.el8.s390x.rpm
kernel-zfcpdump-modules-extra-4.18.0-425.3.1.el8.s390x.rpm
perf-4.18.0-425.3.1.el8.s390x.rpm
perf-debuginfo-4.18.0-425.3.1.el8.s390x.rpm
python3-perf-4.18.0-425.3.1.el8.s390x.rpm
python3-perf-debuginfo-4.18.0-425.3.1.el8.s390x.rpm

x86_64:
bpftool-4.18.0-425.3.1.el8.x86_64.rpm
bpftool-debuginfo-4.18.0-425.3.1.el8.x86_64.rpm
kernel-4.18.0-425.3.1.el8.x86_64.rpm
kernel-core-4.18.0-425.3.1.el8.x86_64.rpm
kernel-cross-headers-4.18.0-425.3.1.el8.x86_64.rpm
kernel-debug-4.18.0-425.3.1.el8.x86_64.rpm
kernel-debug-core-4.18.0-425.3.1.el8.x86_64.rpm
kernel-debug-debuginfo-4.18.0-425.3.1.el8.x86_64.rpm
kernel-debug-devel-4.18.0-425.3.1.el8.x86_64.rpm
kernel-debug-modules-4.18.0-425.3.1.el8.x86_64.rpm
kernel-debug-modules-extra-4.18.0-425.3.1.el8.x86_64.rpm
kernel-debuginfo-4.18.0-425.3.1.el8.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64.rpm
kernel-devel-4.18.0-425.3.1.el8.x86_64.rpm
kernel-headers-4.18.0-425.3.1.el8.x86_64.rpm
kernel-modules-4.18.0-425.3.1.el8.x86_64.rpm
kernel-modules-extra-4.18.0-425.3.1.el8.x86_64.rpm
kernel-tools-4.18.0-425.3.1.el8.x86_64.rpm
kernel-tools-debuginfo-4.18.0-425.3.1.el8.x86_64.rpm
kernel-tools-libs-4.18.0-425.3.1.el8.x86_64.rpm
perf-4.18.0-425.3.1.el8.x86_64.rpm
perf-debuginfo-4.18.0-425.3.1.el8.x86_64.rpm
python3-perf-4.18.0-425.3.1.el8.x86_64.rpm
python3-perf-debuginfo-4.18.0-425.3.1.el8.x86_64.rpm

Red Hat CodeReady Linux Builder (v. 8):

aarch64:
bpftool-debuginfo-4.18.0-425.3.1.el8.aarch64.rpm
kernel-debug-debuginfo-4.18.0-425.3.1.el8.aarch64.rpm
kernel-debuginfo-4.18.0-425.3.1.el8.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-425.3.1.el8.aarch64.rpm
kernel-tools-debuginfo-4.18.0-425.3.1.el8.aarch64.rpm
kernel-tools-libs-devel-4.18.0-425.3.1.el8.aarch64.rpm
perf-debuginfo-4.18.0-425.3.1.el8.aarch64.rpm
python3-perf-debuginfo-4.18.0-425.3.1.el8.aarch64.rpm

ppc64le:
bpftool-debuginfo-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-debuginfo-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-425.3.1.el8.ppc64le.rpm
kernel-tools-libs-devel-4.18.0-425.3.1.el8.ppc64le.rpm
perf-debuginfo-4.18.0-425.3.1.el8.ppc64le.rpm
python3-perf-debuginfo-4.18.0-425.3.1.el8.ppc64le.rpm

x86_64:
bpftool-debuginfo-4.18.0-425.3.1.el8.x86_64.rpm
kernel-debug-debuginfo-4.18.0-425.3.1.el8.x86_64.rpm
kernel-debuginfo-4.18.0-425.3.1.el8.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64.rpm
kernel-tools-debuginfo-4.18.0-425.3.1.el8.x86_64.rpm
kernel-tools-libs-devel-4.18.0-425.3.1.el8.x86_64.rpm
perf-debuginfo-4.18.0-425.3.1.el8.x86_64.rpm
python3-perf-debuginfo-4.18.0-425.3.1.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-36516
https://access.redhat.com/security/cve/CVE-2020-36558
https://access.redhat.com/security/cve/CVE-2021-3640
https://access.redhat.com/security/cve/CVE-2021-30002
https://access.redhat.com/security/cve/CVE-2022-0168
https://access.redhat.com/security/cve/CVE-2022-0617
https://access.redhat.com/security/cve/CVE-2022-0854
https://access.redhat.com/security/cve/CVE-2022-1016
https://access.redhat.com/security/cve/CVE-2022-1048
https://access.redhat.com/security/cve/CVE-2022-1055
https://access.redhat.com/security/cve/CVE-2022-1184
https://access.redhat.com/security/cve/CVE-2022-1852
https://access.redhat.com/security/cve/CVE-2022-2078
https://access.redhat.com/security/cve/CVE-2022-2586
https://access.redhat.com/security/cve/CVE-2022-2639
https://access.redhat.com/security/cve/CVE-2022-2938
https://access.redhat.com/security/cve/CVE-2022-20368
https://access.redhat.com/security/cve/CVE-2022-21499
https://access.redhat.com/security/cve/CVE-2022-23960
https://access.redhat.com/security/cve/CVE-2022-24448
https://access.redhat.com/security/cve/CVE-2022-26373
https://access.redhat.com/security/cve/CVE-2022-27950
https://access.redhat.com/security/cve/CVE-2022-28390
https://access.redhat.com/security/cve/CVE-2022-28893
https://access.redhat.com/security/cve/CVE-2022-29581
https://access.redhat.com/security/cve/CVE-2022-36946
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index
https://access.redhat.com/solutions/6971358

8. Contact:

The Red Hat security contact is <secalert at redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=YmtF
-----END PGP SIGNATURE-----


More information about the RHSA-announce mailing list