-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: kernel security, bug fix, and enhancement update
Advisory ID:       RHSA-2023:2458-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:2458
Issue date:        2023-05-09
CVE Names:         CVE-2021-26341 CVE-2021-33655 CVE-2022-1462 
                   CVE-2022-1789 CVE-2022-1882 CVE-2022-2196 
                   CVE-2022-2663 CVE-2022-3028 CVE-2022-3435 
                   CVE-2022-3522 CVE-2022-3524 CVE-2022-3566 
                   CVE-2022-3567 CVE-2022-3619 CVE-2022-3623 
                   CVE-2022-3625 CVE-2022-3628 CVE-2022-3640 
                   CVE-2022-3707 CVE-2022-4128 CVE-2022-4129 
                   CVE-2022-20141 CVE-2022-21505 CVE-2022-28388 
                   CVE-2022-33743 CVE-2022-39188 CVE-2022-39189 
                   CVE-2022-41674 CVE-2022-42703 CVE-2022-42720 
                   CVE-2022-42721 CVE-2022-42722 CVE-2022-42896 
                   CVE-2022-43750 CVE-2022-47929 CVE-2023-0394 
                   CVE-2023-0461 CVE-2023-0590 CVE-2023-1195 
                   CVE-2023-1382 
====================================================================
1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 9) - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat Enterprise Linux BaseOS (v. 9) - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat Enterprise Linux CRB (v. 9) - aarch64, ppc64le, s390x, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* use-after-free in l2cap_connect and l2cap_le_connect_req in
net/bluetooth/l2cap_core.c (CVE-2022-42896)

* net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)

* cpu: AMD CPUs may transiently execute beyond unconditional direct branch
(CVE-2021-26341)

* malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory
(CVE-2021-33655)

* possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462)

* KVM: NULL pointer dereference in kvm_mmu_invpcid_gva (CVE-2022-1789)

* use-after-free in free_pipe_info() could lead to privilege escalation
(CVE-2022-1882)

* KVM: nVMX: missing IBPB when exiting from nested guest can lead to
Spectre v2 attacks (CVE-2022-2196)

* netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663)

* race condition in xfrm_probe_algs can lead to OOB read/write
(CVE-2022-3028)

* out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c
(CVE-2022-3435)

* race condition in hugetlb_no_page() in mm/hugetlb.c (CVE-2022-3522)

* memory leak in ipv6_renew_options() (CVE-2022-3524)

* data races around icsk->icsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566)

* data races around sk->sk_prot (CVE-2022-3567)

* memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c
(CVE-2022-3619)

* denial of service in follow_page_pte in mm/gup.c due to poisoned pte
entry (CVE-2022-3623)

* use-after-free after failed devlink reload in devlink_param_get
(CVE-2022-3625)

* USB-accessible buffer overflow in brcmfmac (CVE-2022-3628)

* use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c
(CVE-2022-3640)

* Double-free in split_2MB_gtt_entry when function
intel_gvt_dma_map_guest_page failed (CVE-2022-3707)

* mptcp: NULL pointer dereference in subflow traversal at disconnect time
(CVE-2022-4128)

* l2tp: missing lock when clearing sk_user_data can lead to NULL pointer
dereference (CVE-2022-4129)

* igmp: use-after-free in ip_check_mc_rcu when opening and closing inet
sockets (CVE-2022-20141)

* lockdown bypass using IMA (CVE-2022-21505)

* double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c
(CVE-2022-28388)

* network backend may cause Linux netfront to use freed SKBs (XSA-405)
(CVE-2022-33743)

* unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to
stale TLB entry (CVE-2022-39188)

* TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading
to guest malfunctioning (CVE-2022-39189)

* u8 overflow problem in cfg80211_update_notlisted_nontrans()
(CVE-2022-41674)

* use-after-free related to leaf anon_vma double reuse (CVE-2022-42703)

* use-after-free in bss_ref_get in net/wireless/scan.c (CVE-2022-42720)

* BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c
(CVE-2022-42721)

* Denial of service in beacon protection for P2P-device (CVE-2022-42722)

* memory corruption in usbmon driver (CVE-2022-43750)

* NULL pointer dereference in traffic control subsystem (CVE-2022-47929)

* NULL pointer dereference in rawv6_push_pending_frames (CVE-2023-0394)

* use-after-free due to race condition in qdisc_graft() (CVE-2023-0590)

* use-after-free caused by invalid pointer hostname in fs/cifs/connect.c
(CVE-2023-1195)

* denial of service in tipc_conn_close (CVE-2023-1382)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 9.2 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1946801 - Support cpuset.sched_load_balance by changing default CPUset directory structure
1997177 - ARK-ELN: WARNING: CPU: 2 PID: 516060 at fs/nfsd/nfs4state.c:5884 nfs4_preprocess_stateid_op+0x515/0x540 [nfsd]
2004384 - [aarch64] kernel image signed by MOK key couldn't be loaded via kexec when lockdown is enabled
2061703 - CVE-2021-26341 hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch
2073091 - CVE-2022-28388 kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c
2078466 - CVE-2022-1462 kernel: possible race condition in drivers/tty/tty_buffers.c
2089701 - CVE-2022-1882 kernel: use-after-free in free_pipe_info() could lead to privilege escalation
2090723 - CVE-2022-1789 kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva
2104445 - RHEL9.1: in low memory conditions, page_frag_alloc may corrupt the memory.
2106830 - CVE-2022-21505 kernel: lockdown bypass using IMA
2107924 - CVE-2022-33743 kernel: network backend may cause Linux netfront to use freed SKBs (XSA-405)
2108691 - CVE-2021-33655 kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory
2114937 - CVE-2022-20141 kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets
2115631 - [bonding]bonding using link local ipv6 addr as ns_ip6_target can't up
2116442 - kernel: Backport vfork support for time namespaces
2119809 - mlx Fixes for vDPA control virtqueue
2122228 - CVE-2022-3028 kernel: race condition in xfrm_probe_algs can lead to OOB read/write
2123056 - CVE-2022-2663 kernel: netfilter: nf_conntrack_irc message handling issue
2123857 - Backport kernel audit enhancements and fixes up to upstream v6.1
2124788 - CVE-2022-39189 kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning
2130141 - CVE-2022-39188 kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry
2130487 - Backport latest fixes from upstream s390x KVM for the RHEL 9.2 kernel
2133483 - CVE-2022-42703 kernel: use-after-free related to leaf anon_vma double reuse
2133490 - CVE-2022-3435 kernel: out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c
2134377 - CVE-2022-41674 kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans()
2134380 - CVE-2022-4128 kernel: mptcp: NULL pointer dereference in subflow traversal at disconnect time
2134451 - CVE-2022-42720 kernel: use-after-free in bss_ref_get in net/wireless/scan.c
2134506 - CVE-2022-42721 kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c
2134517 - CVE-2022-42722 kernel: Denial of service in beacon protection for P2P-device
2134528 - CVE-2022-4129 kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference
2137979 - CVE-2022-3707 kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed
2138321 - [Regression] The NFS v4 server won't return failure when failing to set ACLs
2138605 - [Regression] kernel BUG at lib/list_debug.c:26!  RIP: 0010:__list_add_valid.cold+0x3a/0x3c
2138866 - NFS server umount a filesystem fails with EBUSY after it's exported and a subdirectory is mounted via NFSv4.0
2139610 - CVE-2022-3640 kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c
2142657 - [RHEL9] fuse readdir cache sometimes corrupted
2143893 - CVE-2022-3566 kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt
2143943 - CVE-2022-3567 kernel: data races around sk->sk_prot
2144720 - CVE-2022-3625 kernel: use-after-free after failed devlink reload in devlink_param_get
2147364 - CVE-2022-42896 kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c
2149448 - Link to bridge documentation is broken in kernel source
2149790 - [PATCH] block: Do not reread partition table on exclusively open device
2150947 - CVE-2022-3524 kernel: memory leak in ipv6_renew_options()
2150960 - CVE-2022-3628 kernel: USB-accessible buffer overflow in brcmfmac
2150979 - CVE-2022-3522 kernel: race condition in hugetlb_no_page() in mm/hugetlb.c
2151270 - CVE-2022-43750 kernel: memory corruption in usbmon driver
2152131 - In FIPS mode, the kernel should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16
2154171 - CVE-2023-1195 kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c
2154235 - CVE-2022-3619 kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c
2154879 - [RHEL-9.2] NFS fixes rollup through kernel-v6.2
2160023 - CVE-2022-2196 kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks
2160028 - backport vsock patches for RHEL-9.2
2160443 - [RHEL 9][NFS] Crash in file_has_perm() when dereferencing a NULL file->f_security
2162120 - CVE-2023-0394 kernel: NULL pointer dereference in rawv6_push_pending_frames
2165721 - CVE-2022-3623 kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry
2165741 - CVE-2023-0590 kernel: use-after-free due to race condition in qdisc_graft()
2166658 - slow NFSD performance
2168246 - CVE-2022-47929 kernel: NULL pointer dereference in traffic control subsystem
2168599 - bnxt_en: revert 778c3af371b3 ("ethernet: Remove vf rate limit check for drivers")
2169017 - [nfsd] kernel BUG at mm/slub.c:385!
2176192 - CVE-2023-0461 kernel: net/ulp: use-after-free in listening ULP sockets
2177371 - CVE-2023-1382 kernel: denial of service in tipc_conn_close
2179342 - kernel: general protection fault, probably for non-canonical address PREEMPT SMP PT

6. JIRA issues fixed (https://issues.redhat.com/):

RHEL-186 - add support for Jira issues in the kernel changelog

7. Package List:

Red Hat Enterprise Linux AppStream (v. 9):

aarch64:
bpftool-debuginfo-7.0.0-284.11.1.el9_2.aarch64.rpm
kernel-64k-debug-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-64k-debug-devel-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-64k-debug-devel-matched-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-64k-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-64k-devel-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-64k-devel-matched-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-debug-devel-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-debuginfo-common-aarch64-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-devel-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-devel-matched-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-headers-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
perf-5.14.0-284.11.1.el9_2.aarch64.rpm
perf-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
python3-perf-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
rtla-5.14.0-284.11.1.el9_2.aarch64.rpm

noarch:
kernel-doc-5.14.0-284.11.1.el9_2.noarch.rpm

ppc64le:
bpftool-debuginfo-7.0.0-284.11.1.el9_2.ppc64le.rpm
kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-debug-devel-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-debuginfo-common-ppc64le-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-devel-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-devel-matched-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-headers-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm
perf-5.14.0-284.11.1.el9_2.ppc64le.rpm
perf-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm
python3-perf-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm
rtla-5.14.0-284.11.1.el9_2.ppc64le.rpm

s390x:
bpftool-debuginfo-7.0.0-284.11.1.el9_2.s390x.rpm
kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-debug-devel-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-debuginfo-common-s390x-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-devel-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-devel-matched-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-headers-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-zfcpdump-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-zfcpdump-devel-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-zfcpdump-devel-matched-5.14.0-284.11.1.el9_2.s390x.rpm
perf-5.14.0-284.11.1.el9_2.s390x.rpm
perf-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm
python3-perf-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm
rtla-5.14.0-284.11.1.el9_2.s390x.rpm

x86_64:
bpftool-debuginfo-7.0.0-284.11.1.el9_2.x86_64.rpm
kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-debug-devel-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-debuginfo-common-x86_64-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-devel-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-devel-matched-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-headers-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm
perf-5.14.0-284.11.1.el9_2.x86_64.rpm
perf-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm
python3-perf-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm
rtla-5.14.0-284.11.1.el9_2.x86_64.rpm

Red Hat Enterprise Linux BaseOS (v. 9):

Source:
kernel-5.14.0-284.11.1.el9_2.src.rpm

aarch64:
bpftool-7.0.0-284.11.1.el9_2.aarch64.rpm
bpftool-debuginfo-7.0.0-284.11.1.el9_2.aarch64.rpm
kernel-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-64k-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-64k-core-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-64k-debug-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-64k-debug-core-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-64k-debug-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-core-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-extra-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-64k-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-64k-modules-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-64k-modules-core-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-64k-modules-extra-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-core-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-debug-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-debug-core-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-debug-modules-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-debug-modules-core-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-debuginfo-common-aarch64-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-modules-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-modules-core-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-modules-extra-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-tools-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-tools-libs-5.14.0-284.11.1.el9_2.aarch64.rpm
perf-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
python3-perf-5.14.0-284.11.1.el9_2.aarch64.rpm
python3-perf-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm

noarch:
kernel-abi-stablelists-5.14.0-284.11.1.el9_2.noarch.rpm

ppc64le:
bpftool-7.0.0-284.11.1.el9_2.ppc64le.rpm
bpftool-debuginfo-7.0.0-284.11.1.el9_2.ppc64le.rpm
kernel-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-core-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-debug-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-debug-core-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-debug-modules-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-debug-modules-core-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-debuginfo-common-ppc64le-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-modules-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-modules-core-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-modules-extra-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-tools-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-tools-libs-5.14.0-284.11.1.el9_2.ppc64le.rpm
perf-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm
python3-perf-5.14.0-284.11.1.el9_2.ppc64le.rpm
python3-perf-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm

s390x:
bpftool-7.0.0-284.11.1.el9_2.s390x.rpm
bpftool-debuginfo-7.0.0-284.11.1.el9_2.s390x.rpm
kernel-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-core-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-debug-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-debug-core-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-debug-modules-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-debug-modules-core-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-debuginfo-common-s390x-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-modules-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-modules-core-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-modules-extra-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-tools-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-zfcpdump-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-zfcpdump-core-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-zfcpdump-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-core-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-extra-5.14.0-284.11.1.el9_2.s390x.rpm
perf-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm
python3-perf-5.14.0-284.11.1.el9_2.s390x.rpm
python3-perf-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm

x86_64:
bpftool-7.0.0-284.11.1.el9_2.x86_64.rpm
bpftool-debuginfo-7.0.0-284.11.1.el9_2.x86_64.rpm
kernel-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-core-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-debug-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-debug-core-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-debug-modules-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-debug-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-debuginfo-common-x86_64-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-modules-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-tools-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-tools-libs-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm
perf-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm
python3-perf-5.14.0-284.11.1.el9_2.x86_64.rpm
python3-perf-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm

Red Hat Enterprise Linux CRB (v. 9):

aarch64:
bpftool-debuginfo-7.0.0-284.11.1.el9_2.aarch64.rpm
kernel-64k-debug-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-64k-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-cross-headers-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-debuginfo-common-aarch64-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.aarch64.rpm
perf-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
python3-perf-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm

ppc64le:
bpftool-debuginfo-7.0.0-284.11.1.el9_2.ppc64le.rpm
kernel-cross-headers-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-debuginfo-common-ppc64le-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm
kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.ppc64le.rpm
perf-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm
python3-perf-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm

s390x:
bpftool-debuginfo-7.0.0-284.11.1.el9_2.s390x.rpm
kernel-cross-headers-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-debuginfo-common-s390x-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm
kernel-zfcpdump-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm
perf-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm
python3-perf-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm

x86_64:
bpftool-debuginfo-7.0.0-284.11.1.el9_2.x86_64.rpm
kernel-cross-headers-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-debuginfo-common-x86_64-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm
kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.x86_64.rpm
perf-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm
python3-perf-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

8. References:

https://access.redhat.com/security/cve/CVE-2021-26341
https://access.redhat.com/security/cve/CVE-2021-33655
https://access.redhat.com/security/cve/CVE-2022-1462
https://access.redhat.com/security/cve/CVE-2022-1789
https://access.redhat.com/security/cve/CVE-2022-1882
https://access.redhat.com/security/cve/CVE-2022-2196
https://access.redhat.com/security/cve/CVE-2022-2663
https://access.redhat.com/security/cve/CVE-2022-3028
https://access.redhat.com/security/cve/CVE-2022-3435
https://access.redhat.com/security/cve/CVE-2022-3522
https://access.redhat.com/security/cve/CVE-2022-3524
https://access.redhat.com/security/cve/CVE-2022-3566
https://access.redhat.com/security/cve/CVE-2022-3567
https://access.redhat.com/security/cve/CVE-2022-3619
https://access.redhat.com/security/cve/CVE-2022-3623
https://access.redhat.com/security/cve/CVE-2022-3625
https://access.redhat.com/security/cve/CVE-2022-3628
https://access.redhat.com/security/cve/CVE-2022-3640
https://access.redhat.com/security/cve/CVE-2022-3707
https://access.redhat.com/security/cve/CVE-2022-4128
https://access.redhat.com/security/cve/CVE-2022-4129
https://access.redhat.com/security/cve/CVE-2022-20141
https://access.redhat.com/security/cve/CVE-2022-21505
https://access.redhat.com/security/cve/CVE-2022-28388
https://access.redhat.com/security/cve/CVE-2022-33743
https://access.redhat.com/security/cve/CVE-2022-39188
https://access.redhat.com/security/cve/CVE-2022-39189
https://access.redhat.com/security/cve/CVE-2022-41674
https://access.redhat.com/security/cve/CVE-2022-42703
https://access.redhat.com/security/cve/CVE-2022-42720
https://access.redhat.com/security/cve/CVE-2022-42721
https://access.redhat.com/security/cve/CVE-2022-42722
https://access.redhat.com/security/cve/CVE-2022-42896
https://access.redhat.com/security/cve/CVE-2022-43750
https://access.redhat.com/security/cve/CVE-2022-47929
https://access.redhat.com/security/cve/CVE-2023-0394
https://access.redhat.com/security/cve/CVE-2023-0461
https://access.redhat.com/security/cve/CVE-2023-0590
https://access.redhat.com/security/cve/CVE-2023-1195
https://access.redhat.com/security/cve/CVE-2023-1382
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index

9. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBZFo0e9zjgjWX9erEAQhgfg//a2mcvSym1kVahqs6+vzGLA8xCTn6eOJJ
ZOlB0kHOVhXV96iYIJnwweKCEoX3njtsQgDgHfSWI6i4yNHHsBN393pDGQXmiDnE
AjwiU9JKqRYrXBMVS092ZzKWsBwwyOC1z3sjsE0uV/1/Ru6/Gw1hgLMdXik0qbWt
9szcxmx/fcpFAmACbMCWxsY3dziMC5gOVGZITU5n0T/D392kkawr2lV180rEIlMY
JcgFgrCH1NjTwMfeNdjmcNeyPEQF/wQrSu346z9SLC3r047PqaHL/KwzWDwyKVyY
7KQEtnhZlX4JpvkVExKaBjakV51+7OKx4Xn7V23hv5WkQHl6gqH/e9vM8tK55ghk
oOo44GzcReVHt1Vi483IillzOZoXHL+DbJgaefWFjCByFkP3CmsIp0B69HAnryWN
R/vX/ZVOKCN/5bUkp2EfLZsgAXv6p8Yfm9CDlEZe3tvnDls8pMUSPDAoIyALsJjk
DhXn/zPK7I2YvUrR1sNYwoGFjSpnGchjqPmjSk8KJ9XNLemmGHUJGnFFM9jrN2M8
mgt77fmFvgBOj5BeASGCOwizy0knEi5URg9w78/Huxmw6RniXL3FytC+jmVDZxqf
lZActga4fi66bD/sU322YHgiaZDn966Rh17n2djhTUPMJF0LR9t+UoROCFBBcY8R
822PXs8r/cA=6Ehj
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-2458:01 Important: kernel security, bug fix,

An update for kernel is now available for Red Hat Enterprise Linux 9

Summary

The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896)
* net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)
* cpu: AMD CPUs may transiently execute beyond unconditional direct branch (CVE-2021-26341)
* malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory (CVE-2021-33655)
* possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462)
* KVM: NULL pointer dereference in kvm_mmu_invpcid_gva (CVE-2022-1789)
* use-after-free in free_pipe_info() could lead to privilege escalation (CVE-2022-1882)
* KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks (CVE-2022-2196)
* netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663)
* race condition in xfrm_probe_algs can lead to OOB read/write (CVE-2022-3028)
* out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c (CVE-2022-3435)
* race condition in hugetlb_no_page() in mm/hugetlb.c (CVE-2022-3522)
* memory leak in ipv6_renew_options() (CVE-2022-3524)
* data races around icsk->icsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566)
* data races around sk->sk_prot (CVE-2022-3567)
* memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (CVE-2022-3619)
* denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry (CVE-2022-3623)
* use-after-free after failed devlink reload in devlink_param_get (CVE-2022-3625)
* USB-accessible buffer overflow in brcmfmac (CVE-2022-3628)
* use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c (CVE-2022-3640)
* Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed (CVE-2022-3707)
* mptcp: NULL pointer dereference in subflow traversal at disconnect time (CVE-2022-4128)
* l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference (CVE-2022-4129)
* igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets (CVE-2022-20141)
* lockdown bypass using IMA (CVE-2022-21505)
* double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c (CVE-2022-28388)
* network backend may cause Linux netfront to use freed SKBs (XSA-405) (CVE-2022-33743)
* unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry (CVE-2022-39188)
* TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning (CVE-2022-39189)
* u8 overflow problem in cfg80211_update_notlisted_nontrans() (CVE-2022-41674)
* use-after-free related to leaf anon_vma double reuse (CVE-2022-42703)
* use-after-free in bss_ref_get in net/wireless/scan.c (CVE-2022-42720)
* BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c (CVE-2022-42721)
* Denial of service in beacon protection for P2P-device (CVE-2022-42722)
* memory corruption in usbmon driver (CVE-2022-43750)
* NULL pointer dereference in traffic control subsystem (CVE-2022-47929)
* NULL pointer dereference in rawv6_push_pending_frames (CVE-2023-0394)
* use-after-free due to race condition in qdisc_graft() (CVE-2023-0590)
* use-after-free caused by invalid pointer hostname in fs/cifs/connect.c (CVE-2023-1195)
* denial of service in tipc_conn_close (CVE-2023-1382)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.

References

https://access.redhat.com/security/cve/CVE-2021-26341 https://access.redhat.com/security/cve/CVE-2021-33655 https://access.redhat.com/security/cve/CVE-2022-1462 https://access.redhat.com/security/cve/CVE-2022-1789 https://access.redhat.com/security/cve/CVE-2022-1882 https://access.redhat.com/security/cve/CVE-2022-2196 https://access.redhat.com/security/cve/CVE-2022-2663 https://access.redhat.com/security/cve/CVE-2022-3028 https://access.redhat.com/security/cve/CVE-2022-3435 https://access.redhat.com/security/cve/CVE-2022-3522 https://access.redhat.com/security/cve/CVE-2022-3524 https://access.redhat.com/security/cve/CVE-2022-3566 https://access.redhat.com/security/cve/CVE-2022-3567 https://access.redhat.com/security/cve/CVE-2022-3619 https://access.redhat.com/security/cve/CVE-2022-3623 https://access.redhat.com/security/cve/CVE-2022-3625 https://access.redhat.com/security/cve/CVE-2022-3628 https://access.redhat.com/security/cve/CVE-2022-3640 https://access.redhat.com/security/cve/CVE-2022-3707 https://access.redhat.com/security/cve/CVE-2022-4128 https://access.redhat.com/security/cve/CVE-2022-4129 https://access.redhat.com/security/cve/CVE-2022-20141 https://access.redhat.com/security/cve/CVE-2022-21505 https://access.redhat.com/security/cve/CVE-2022-28388 https://access.redhat.com/security/cve/CVE-2022-33743 https://access.redhat.com/security/cve/CVE-2022-39188 https://access.redhat.com/security/cve/CVE-2022-39189 https://access.redhat.com/security/cve/CVE-2022-41674 https://access.redhat.com/security/cve/CVE-2022-42703 https://access.redhat.com/security/cve/CVE-2022-42720 https://access.redhat.com/security/cve/CVE-2022-42721 https://access.redhat.com/security/cve/CVE-2022-42722 https://access.redhat.com/security/cve/CVE-2022-42896 https://access.redhat.com/security/cve/CVE-2022-43750 https://access.redhat.com/security/cve/CVE-2022-47929 https://access.redhat.com/security/cve/CVE-2023-0394 https://access.redhat.com/security/cve/CVE-2023-0461 https://access.redhat.com/security/cve/CVE-2023-0590 https://access.redhat.com/security/cve/CVE-2023-1195 https://access.redhat.com/security/cve/CVE-2023-1382 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index

Package List

Red Hat Enterprise Linux AppStream (v. 9):
aarch64: bpftool-debuginfo-7.0.0-284.11.1.el9_2.aarch64.rpm kernel-64k-debug-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-64k-debug-devel-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-64k-debug-devel-matched-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-64k-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-64k-devel-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-64k-devel-matched-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-debug-devel-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-debuginfo-common-aarch64-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-devel-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-devel-matched-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-headers-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm perf-5.14.0-284.11.1.el9_2.aarch64.rpm perf-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm python3-perf-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm rtla-5.14.0-284.11.1.el9_2.aarch64.rpm
noarch: kernel-doc-5.14.0-284.11.1.el9_2.noarch.rpm
ppc64le: bpftool-debuginfo-7.0.0-284.11.1.el9_2.ppc64le.rpm kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-debug-devel-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-debuginfo-common-ppc64le-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-devel-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-devel-matched-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-headers-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm perf-5.14.0-284.11.1.el9_2.ppc64le.rpm perf-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm python3-perf-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm rtla-5.14.0-284.11.1.el9_2.ppc64le.rpm
s390x: bpftool-debuginfo-7.0.0-284.11.1.el9_2.s390x.rpm kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm kernel-debug-devel-5.14.0-284.11.1.el9_2.s390x.rpm kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.s390x.rpm kernel-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm kernel-debuginfo-common-s390x-5.14.0-284.11.1.el9_2.s390x.rpm kernel-devel-5.14.0-284.11.1.el9_2.s390x.rpm kernel-devel-matched-5.14.0-284.11.1.el9_2.s390x.rpm kernel-headers-5.14.0-284.11.1.el9_2.s390x.rpm kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm kernel-zfcpdump-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm kernel-zfcpdump-devel-5.14.0-284.11.1.el9_2.s390x.rpm kernel-zfcpdump-devel-matched-5.14.0-284.11.1.el9_2.s390x.rpm perf-5.14.0-284.11.1.el9_2.s390x.rpm perf-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm python3-perf-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm rtla-5.14.0-284.11.1.el9_2.s390x.rpm
x86_64: bpftool-debuginfo-7.0.0-284.11.1.el9_2.x86_64.rpm kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-debug-devel-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-debuginfo-common-x86_64-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-devel-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-devel-matched-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-headers-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm perf-5.14.0-284.11.1.el9_2.x86_64.rpm perf-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm python3-perf-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm rtla-5.14.0-284.11.1.el9_2.x86_64.rpm
Red Hat Enterprise Linux BaseOS (v. 9):
Source: kernel-5.14.0-284.11.1.el9_2.src.rpm
aarch64: bpftool-7.0.0-284.11.1.el9_2.aarch64.rpm bpftool-debuginfo-7.0.0-284.11.1.el9_2.aarch64.rpm kernel-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-64k-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-64k-core-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-64k-debug-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-64k-debug-core-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-64k-debug-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-64k-debug-modules-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-64k-debug-modules-core-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-64k-debug-modules-extra-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-64k-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-64k-modules-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-64k-modules-core-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-64k-modules-extra-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-core-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-debug-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-debug-core-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-debug-modules-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-debug-modules-core-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-debuginfo-common-aarch64-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-modules-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-modules-core-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-modules-extra-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-tools-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-tools-libs-5.14.0-284.11.1.el9_2.aarch64.rpm perf-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm python3-perf-5.14.0-284.11.1.el9_2.aarch64.rpm python3-perf-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
noarch: kernel-abi-stablelists-5.14.0-284.11.1.el9_2.noarch.rpm
ppc64le: bpftool-7.0.0-284.11.1.el9_2.ppc64le.rpm bpftool-debuginfo-7.0.0-284.11.1.el9_2.ppc64le.rpm kernel-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-core-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-debug-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-debug-core-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-debug-modules-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-debug-modules-core-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-debuginfo-common-ppc64le-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-modules-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-modules-core-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-modules-extra-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-tools-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-tools-libs-5.14.0-284.11.1.el9_2.ppc64le.rpm perf-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm python3-perf-5.14.0-284.11.1.el9_2.ppc64le.rpm python3-perf-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm
s390x: bpftool-7.0.0-284.11.1.el9_2.s390x.rpm bpftool-debuginfo-7.0.0-284.11.1.el9_2.s390x.rpm kernel-5.14.0-284.11.1.el9_2.s390x.rpm kernel-core-5.14.0-284.11.1.el9_2.s390x.rpm kernel-debug-5.14.0-284.11.1.el9_2.s390x.rpm kernel-debug-core-5.14.0-284.11.1.el9_2.s390x.rpm kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm kernel-debug-modules-5.14.0-284.11.1.el9_2.s390x.rpm kernel-debug-modules-core-5.14.0-284.11.1.el9_2.s390x.rpm kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.s390x.rpm kernel-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm kernel-debuginfo-common-s390x-5.14.0-284.11.1.el9_2.s390x.rpm kernel-modules-5.14.0-284.11.1.el9_2.s390x.rpm kernel-modules-core-5.14.0-284.11.1.el9_2.s390x.rpm kernel-modules-extra-5.14.0-284.11.1.el9_2.s390x.rpm kernel-tools-5.14.0-284.11.1.el9_2.s390x.rpm kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm kernel-zfcpdump-5.14.0-284.11.1.el9_2.s390x.rpm kernel-zfcpdump-core-5.14.0-284.11.1.el9_2.s390x.rpm kernel-zfcpdump-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm kernel-zfcpdump-modules-5.14.0-284.11.1.el9_2.s390x.rpm kernel-zfcpdump-modules-core-5.14.0-284.11.1.el9_2.s390x.rpm kernel-zfcpdump-modules-extra-5.14.0-284.11.1.el9_2.s390x.rpm perf-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm python3-perf-5.14.0-284.11.1.el9_2.s390x.rpm python3-perf-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm
x86_64: bpftool-7.0.0-284.11.1.el9_2.x86_64.rpm bpftool-debuginfo-7.0.0-284.11.1.el9_2.x86_64.rpm kernel-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-core-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-debug-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-debug-core-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-debug-modules-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-debug-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-debuginfo-common-x86_64-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-modules-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-tools-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-tools-libs-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm perf-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm python3-perf-5.14.0-284.11.1.el9_2.x86_64.rpm python3-perf-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm
Red Hat Enterprise Linux CRB (v. 9):
aarch64: bpftool-debuginfo-7.0.0-284.11.1.el9_2.aarch64.rpm kernel-64k-debug-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-64k-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-cross-headers-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-debuginfo-common-aarch64-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.aarch64.rpm perf-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm python3-perf-debuginfo-5.14.0-284.11.1.el9_2.aarch64.rpm
ppc64le: bpftool-debuginfo-7.0.0-284.11.1.el9_2.ppc64le.rpm kernel-cross-headers-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-debuginfo-common-ppc64le-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.ppc64le.rpm perf-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm python3-perf-debuginfo-5.14.0-284.11.1.el9_2.ppc64le.rpm
s390x: bpftool-debuginfo-7.0.0-284.11.1.el9_2.s390x.rpm kernel-cross-headers-5.14.0-284.11.1.el9_2.s390x.rpm kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm kernel-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm kernel-debuginfo-common-s390x-5.14.0-284.11.1.el9_2.s390x.rpm kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm kernel-zfcpdump-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm perf-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm python3-perf-debuginfo-5.14.0-284.11.1.el9_2.s390x.rpm
x86_64: bpftool-debuginfo-7.0.0-284.11.1.el9_2.x86_64.rpm kernel-cross-headers-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-debug-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-debuginfo-common-x86_64-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-tools-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.x86_64.rpm perf-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm python3-perf-debuginfo-5.14.0-284.11.1.el9_2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2023:2458-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:2458
Issued Date: : 2023-05-09
CVE Names: CVE-2021-26341 CVE-2021-33655 CVE-2022-1462 CVE-2022-1789 CVE-2022-1882 CVE-2022-2196 CVE-2022-2663 CVE-2022-3028 CVE-2022-3435 CVE-2022-3522 CVE-2022-3524 CVE-2022-3566 CVE-2022-3567 CVE-2022-3619 CVE-2022-3623 CVE-2022-3625 CVE-2022-3628 CVE-2022-3640 CVE-2022-3707 CVE-2022-4128 CVE-2022-4129 CVE-2022-20141 CVE-2022-21505 CVE-2022-28388 CVE-2022-33743 CVE-2022-39188 CVE-2022-39189 CVE-2022-41674 CVE-2022-42703 CVE-2022-42720 CVE-2022-42721 CVE-2022-42722 CVE-2022-42896 CVE-2022-43750 CVE-2022-47929 CVE-2023-0394 CVE-2023-0461 CVE-2023-0590 CVE-2023-1195 CVE-2023-1382

Topic

An update for kernel is now available for Red Hat Enterprise Linux 9.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AppStream (v. 9) - aarch64, noarch, ppc64le, s390x, x86_64

Red Hat Enterprise Linux BaseOS (v. 9) - aarch64, noarch, ppc64le, s390x, x86_64

Red Hat Enterprise Linux CRB (v. 9) - aarch64, ppc64le, s390x, x86_64


Bugs Fixed

1946801 - Support cpuset.sched_load_balance by changing default CPUset directory structure

1997177 - ARK-ELN: WARNING: CPU: 2 PID: 516060 at fs/nfsd/nfs4state.c:5884 nfs4_preprocess_stateid_op+0x515/0x540 [nfsd]

2004384 - [aarch64] kernel image signed by MOK key couldn't be loaded via kexec when lockdown is enabled

2061703 - CVE-2021-26341 hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch

2073091 - CVE-2022-28388 kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c

2078466 - CVE-2022-1462 kernel: possible race condition in drivers/tty/tty_buffers.c

2089701 - CVE-2022-1882 kernel: use-after-free in free_pipe_info() could lead to privilege escalation

2090723 - CVE-2022-1789 kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva

2104445 - RHEL9.1: in low memory conditions, page_frag_alloc may corrupt the memory.

2106830 - CVE-2022-21505 kernel: lockdown bypass using IMA

2107924 - CVE-2022-33743 kernel: network backend may cause Linux netfront to use freed SKBs (XSA-405)

2108691 - CVE-2021-33655 kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory

2114937 - CVE-2022-20141 kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets

2115631 - [bonding]bonding using link local ipv6 addr as ns_ip6_target can't up

2116442 - kernel: Backport vfork support for time namespaces

2119809 - mlx Fixes for vDPA control virtqueue

2122228 - CVE-2022-3028 kernel: race condition in xfrm_probe_algs can lead to OOB read/write

2123056 - CVE-2022-2663 kernel: netfilter: nf_conntrack_irc message handling issue

2123857 - Backport kernel audit enhancements and fixes up to upstream v6.1

2124788 - CVE-2022-39189 kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning

2130141 - CVE-2022-39188 kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry

2130487 - Backport latest fixes from upstream s390x KVM for the RHEL 9.2 kernel

2133483 - CVE-2022-42703 kernel: use-after-free related to leaf anon_vma double reuse

2133490 - CVE-2022-3435 kernel: out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c

2134377 - CVE-2022-41674 kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans()

2134380 - CVE-2022-4128 kernel: mptcp: NULL pointer dereference in subflow traversal at disconnect time

2134451 - CVE-2022-42720 kernel: use-after-free in bss_ref_get in net/wireless/scan.c

2134506 - CVE-2022-42721 kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c

2134517 - CVE-2022-42722 kernel: Denial of service in beacon protection for P2P-device

2134528 - CVE-2022-4129 kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference

2137979 - CVE-2022-3707 kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed

2138321 - [Regression] The NFS v4 server won't return failure when failing to set ACLs

2138605 - [Regression] kernel BUG at lib/list_debug.c:26! RIP: 0010:__list_add_valid.cold+0x3a/0x3c

2138866 - NFS server umount a filesystem fails with EBUSY after it's exported and a subdirectory is mounted via NFSv4.0

2139610 - CVE-2022-3640 kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c

2142657 - [RHEL9] fuse readdir cache sometimes corrupted

2143893 - CVE-2022-3566 kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt

2143943 - CVE-2022-3567 kernel: data races around sk->sk_prot

2144720 - CVE-2022-3625 kernel: use-after-free after failed devlink reload in devlink_param_get

2147364 - CVE-2022-42896 kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c

2149448 - Link to bridge documentation is broken in kernel source

2149790 - [PATCH] block: Do not reread partition table on exclusively open device

2150947 - CVE-2022-3524 kernel: memory leak in ipv6_renew_options()

2150960 - CVE-2022-3628 kernel: USB-accessible buffer overflow in brcmfmac

2150979 - CVE-2022-3522 kernel: race condition in hugetlb_no_page() in mm/hugetlb.c

2151270 - CVE-2022-43750 kernel: memory corruption in usbmon driver

2152131 - In FIPS mode, the kernel should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16

2154171 - CVE-2023-1195 kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c

2154235 - CVE-2022-3619 kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c

2154879 - [RHEL-9.2] NFS fixes rollup through kernel-v6.2

2160023 - CVE-2022-2196 kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks

2160028 - backport vsock patches for RHEL-9.2

2160443 - [RHEL 9][NFS] Crash in file_has_perm() when dereferencing a NULL file->f_security

2162120 - CVE-2023-0394 kernel: NULL pointer dereference in rawv6_push_pending_frames

2165721 - CVE-2022-3623 kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry

2165741 - CVE-2023-0590 kernel: use-after-free due to race condition in qdisc_graft()

2166658 - slow NFSD performance

2168246 - CVE-2022-47929 kernel: NULL pointer dereference in traffic control subsystem

2168599 - bnxt_en: revert 778c3af371b3 ("ethernet: Remove vf rate limit check for drivers")

2169017 - [nfsd] kernel BUG at mm/slub.c:385!

2176192 - CVE-2023-0461 kernel: net/ulp: use-after-free in listening ULP sockets

2177371 - CVE-2023-1382 kernel: denial of service in tipc_conn_close

2179342 - kernel: general protection fault, probably for non-canonical address PREEMPT SMP PT

6. JIRA issues fixed (https://issues.redhat.com/):

RHEL-186 - add support for Jira issues in the kernel changelog


Related News