alsa-2022:5316
Vulnerability from osv_almalinux
Published
2022-06-30 00:00
Modified
2022-07-21 17:53
Summary
Important: kernel security and bug fix update
Details

The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666) * kernel: out-of-bounds read in fbcon_get_font function (CVE-2020-28915) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * weird port mapping with asymmetric traffic (BZ#2065266) * HBR3 is malfunction via MST HUB against Intel ADL-HX CPU (BZ#2066644) * openvswitch connection tracking sends incorrect flow key for some upcalls (BZ#2068476) * sctp connection abort unexpected. (BZ#2070959) * soft quota cannot exceed more the 5 warns which breaks timer functionality (BZ#2071713) * VirtIO Throughput for VM on host with OVS HW-Offload is very low (BZ#2074221) * SR-IOV performance > 50% degradation (BZ#2074829) * Call trace with parallel rules insertion and deletion (BZ#2075553) * Enable nested virtualization (BZ#2079069) * iscsi_ttx (iSERT) completions hung while waiting for mlx5_ib_drain_sq (BZ#2079433) * WARNING: CPU: 2 PID: 969 at kernel/locking/lockdep.c:895 register_lock_class+0x234/0x1640 (BZ#2079856) * mlx5: Some rule are not offloaded to HW in OVN K8s Pod 2 External use case (BZ#2079918) * OCP node kernel crash due to ceph_fsync - unsafe_request_wait+0x143 (BZ#2080071) * TCP doesn't retransmit if in reorder state and waits for RTO (BZ#2080972) * pnfs NFSv4.1 IO causes a soft lockup (after a server reboot) and an unresponsive client (BZ#2080998) * BlueField2: DPU can't switch to switchdev mode (BZ#2081011) * Important ice bug fixes (BZ#2081794) * For isolated CPUs (with nohz_full enabled for isolated CPUs) CPU utilization statistics are not getting reflected continuously (BZ#2084138) * Host is getting crash/abrupt reboot while the guest has been assigned with more than 128 GB RAM while it is using NVIDIA proprietary module. (BZ#2085572) * s_pf0vf2: hw csum failure for mlx5 (BZ#2086549) * kernel memory leak while freeing nested actions (BZ#2086590) * Regression: Bluetooth will not activate after 8.5 update (BZ#2087641) * mlx5,Internal port - traffic not offloaded on tunnel interface rules on chain > 0 when internal port is the vtep device. (BZ#2088610) * rule not offloaded on server side with syndrome(0x389e56) when direction is in (BZ#2088611) * TTL decrease only on the first packet (BZ#2088638) * TC HWOL of inbound traffic over geneve with ovs bridge as VTEP is not working (BZ#2088639) * Audio No Function on Orchid Bay(Mini Config) (BZ#2090423)


{
  "affected": [
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "bpftool"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-372.13.1.el8_6"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-372.13.1.el8_6"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-abi-stablelists"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-372.13.1.el8_6"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-372.13.1.el8_6"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-cross-headers"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-372.13.1.el8_6"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-debug"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-372.13.1.el8_6"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-debug-core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-372.13.1.el8_6"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-debug-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-372.13.1.el8_6"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-debug-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-372.13.1.el8_6"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-debug-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-372.13.1.el8_6"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-372.13.1.el8_6"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-doc"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-372.13.1.el8_6"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-modules"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-372.13.1.el8_6"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-modules-extra"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-372.13.1.el8_6"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-tools"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-372.13.1.el8_6"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-tools-libs"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-372.13.1.el8_6"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "kernel-tools-libs-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-372.13.1.el8_6"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "perf"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-372.13.1.el8_6"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:8",
        "name": "python3-perf"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.18.0-372.13.1.el8_6"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "details": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\nSecurity Fix(es):\n* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)\n* kernel: out-of-bounds read in fbcon_get_font function (CVE-2020-28915)\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\nBug Fix(es):\n* weird port mapping with asymmetric traffic (BZ#2065266)\n* HBR3 is malfunction via MST HUB against Intel ADL-HX CPU (BZ#2066644)\n* openvswitch connection tracking sends incorrect flow key for some upcalls (BZ#2068476)\n* sctp connection abort unexpected. (BZ#2070959)\n* soft quota cannot exceed more the 5 warns which breaks timer functionality (BZ#2071713)\n* VirtIO Throughput for VM on host with OVS HW-Offload is very low (BZ#2074221)\n* SR-IOV performance \u003e 50% degradation (BZ#2074829)\n* Call trace with parallel rules insertion and deletion (BZ#2075553)\n* Enable nested virtualization (BZ#2079069)\n* iscsi_ttx (iSERT) completions hung while waiting for mlx5_ib_drain_sq (BZ#2079433)\n* WARNING: CPU: 2 PID: 969 at kernel/locking/lockdep.c:895 register_lock_class+0x234/0x1640 (BZ#2079856)\n* mlx5: Some rule are not offloaded to HW in OVN K8s Pod 2 External use case (BZ#2079918)\n* OCP node kernel crash due to ceph_fsync - unsafe_request_wait+0x143 (BZ#2080071)\n* TCP doesn\u0027t retransmit if in reorder state and waits for RTO (BZ#2080972)\n* pnfs NFSv4.1 IO causes a soft lockup (after a server reboot) and an unresponsive client (BZ#2080998)\n* BlueField2:  DPU can\u0027t switch to switchdev mode (BZ#2081011)\n* Important ice bug fixes (BZ#2081794)\n* For isolated CPUs (with nohz_full enabled for isolated CPUs) CPU utilization statistics are not getting reflected continuously (BZ#2084138)\n* Host is getting crash/abrupt reboot while  the guest has been assigned with more than 128 GB RAM while it is using NVIDIA proprietary module. (BZ#2085572)\n* s_pf0vf2: hw csum failure for mlx5 (BZ#2086549)\n* kernel memory leak while freeing nested actions (BZ#2086590)\n* Regression: Bluetooth will not activate after 8.5 update (BZ#2087641)\n* mlx5,Internal port - traffic not offloaded on tunnel interface rules on chain \u003e 0 when internal port is the vtep device. (BZ#2088610)\n* rule not offloaded on server side with syndrome(0x389e56) when direction is in (BZ#2088611)\n* TTL decrease only on the first packet (BZ#2088638)\n* TC HWOL of inbound traffic over geneve with ovs bridge as VTEP is not working (BZ#2088639)\n* Audio No Function on Orchid Bay(Mini Config) (BZ#2090423)",
  "id": "ALSA-2022:5316",
  "modified": "2022-07-21T17:53:42Z",
  "published": "2022-06-30T00:00:00Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://access.redhat.com/errata/RHSA-2022:5316"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2020-28915"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2022-27666"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/1899177"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2061633"
    },
    {
      "type": "ADVISORY",
      "url": "https://errata.almalinux.org/8/ALSA-2022-5316.html"
    }
  ],
  "related": [
    "CVE-2022-27666",
    "CVE-2020-28915"
  ],
  "summary": "Important: kernel security and bug fix update"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…