AlmaLinux 2237 Published by

A kernel security, bug fix, and enhancement update has been released for AlmaLinux 8.



ALSA-2023:2951 Important: kernel security, bug fix, and enhancement update


Type:
security

Severity:
important

Release date:
2023-05-19

Description
The following packages have been upgraded to a later upstream version: kernel (4.18.0). (BZ#2122230, BZ#2122267)
Security Fix(es):
* use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)
* net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)
* hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch (CVE-2021-26341)
* malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory (CVE-2021-33655)
* when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds (CVE-2021-33656)
* possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462)
* use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges (CVE-2022-1679)
* KVM: NULL pointer dereference in kvm_mmu_invpcid_gva (CVE-2022-1789)
* KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks (CVE-2022-2196)
* netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663)
* race condition in xfrm_probe_algs can lead to OOB read/write (CVE-2022-3028)
* media: em28xx: initialize refcount before kref_get (CVE-2022-3239)
* race condition in hugetlb_no_page() in mm/hugetlb.c (CVE-2022-3522)
* memory leak in ipv6_renew_options() (CVE-2022-3524)
* data races around icsk->icsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566)
* data races around sk->sk_prot (CVE-2022-3567)
* memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (CVE-2022-3619)
* denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry (CVE-2022-3623)
* use-after-free after failed devlink reload in devlink_param_get (CVE-2022-3625)
* USB-accessible buffer overflow in brcmfmac (CVE-2022-3628)
* Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed (CVE-2022-3707)
* l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference (CVE-2022-4129)
* igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets (CVE-2022-20141)
* Executable Space Protection Bypass (CVE-2022-25265)
* Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)
* unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry (CVE-2022-39188)
* TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning (CVE-2022-39189)
* Report vmalloc UAF in dvb-core/dmxdev (CVE-2022-41218)
* u8 overflow problem in cfg80211_update_notlisted_nontrans() (CVE-2022-41674)
* use-after-free related to leaf anon_vma double reuse (CVE-2022-42703)
* use-after-free in bss_ref_get in net/wireless/scan.c (CVE-2022-42720)
* BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c (CVE-2022-42721)
* Denial of service in beacon protection for P2P-device (CVE-2022-42722)
* memory corruption in usbmon driver (CVE-2022-43750)
* NULL pointer dereference in traffic control subsystem (CVE-2022-47929)
* NULL pointer dereference in rawv6_push_pending_frames (CVE-2023-0394)
* use-after-free caused by invalid pointer hostname in fs/cifs/connect.c (CVE-2023-1195)
* Soft lockup occurred during __page_mapcount (CVE-2023-1582)
* slab-out-of-bounds read vulnerabilities in cbq_classify (CVE-2023-23454)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.

References:
RHSA-2023:2951
CVE-2021-26341
CVE-2021-33655
CVE-2021-33656
CVE-2022-1462
CVE-2022-1679
CVE-2022-1789
CVE-2022-20141
CVE-2022-2196
CVE-2022-25265
CVE-2022-2663
CVE-2022-3028
CVE-2022-30594
CVE-2022-3239
CVE-2022-3522
CVE-2022-3524
CVE-2022-3564
CVE-2022-3566
CVE-2022-3567
CVE-2022-3619
CVE-2022-3623
CVE-2022-3625
CVE-2022-3628
CVE-2022-3707
CVE-2022-39188
CVE-2022-39189
CVE-2022-41218
CVE-2022-4129
CVE-2022-41674
CVE-2022-42703
CVE-2022-42720
CVE-2022-42721
CVE-2022-42722
CVE-2022-43750
CVE-2022-47929
CVE-2023-0394
CVE-2023-0461
CVE-2023-1195
CVE-2023-1582
CVE-2023-23454
ALSA-2023:2951

Updates packages:
kernel-doc-4.18.0-477.10.1.el8_8.noarch.rpm
kernel-abi-stablelists-4.18.0-477.10.1.el8_8.noarch.rpm
kernel-tools-libs-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-modules-4.18.0-477.10.1.el8_8.aarch64.rpm
perf-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-tools-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-debug-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-devel-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-modules-extra-4.18.0-477.10.1.el8_8.aarch64.rpm
bpftool-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-core-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-debug-devel-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-debug-modules-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-debug-core-4.18.0-477.10.1.el8_8.aarch64.rpm
python3-perf-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-cross-headers-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-debug-modules-extra-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-tools-libs-devel-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-modules-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-debug-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-devel-4.18.0-477.10.1.el8_8.x86_64.rpm
python3-perf-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-tools-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-cross-headers-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-debug-devel-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-core-4.18.0-477.10.1.el8_8.x86_64.rpm
bpftool-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-debug-core-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-tools-libs-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-debug-modules-extra-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-modules-extra-4.18.0-477.10.1.el8_8.x86_64.rpm
perf-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-debug-modules-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-4.18.0-477.10.1.el8_8.x86_64.rpm
kernel-tools-libs-devel-4.18.0-477.10.1.el8_8.aarch64.rpm
kernel-cross-headers-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-debug-modules-extra-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-devel-4.18.0-477.10.1.el8_8.ppc64le.rpm
python3-perf-4.18.0-477.10.1.el8_8.ppc64le.rpm
perf-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-tools-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-debug-modules-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-core-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-debug-devel-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-tools-libs-4.18.0-477.10.1.el8_8.ppc64le.rpm
bpftool-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-debug-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-modules-extra-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-modules-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-debug-core-4.18.0-477.10.1.el8_8.ppc64le.rpm
kernel-debug-modules-extra-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-modules-extra-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-modules-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-zfcpdump-core-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-zfcpdump-devel-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-zfcpdump-modules-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-debug-modules-4.18.0-477.10.1.el8_8.s390x.rpm
perf-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-devel-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-tools-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-debug-devel-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-zfcpdump-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-cross-headers-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-zfcpdump-modules-extra-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-debug-4.18.0-477.10.1.el8_8.s390x.rpm
bpftool-4.18.0-477.10.1.el8_8.s390x.rpm
python3-perf-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-debug-core-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-core-4.18.0-477.10.1.el8_8.s390x.rpm
kernel-tools-libs-devel-4.18.0-477.10.1.el8_8.ppc64le.rpm

Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.

  ALSA-2023:2951 Important: kernel security, bug fix, and enhancement update