kernel-4.18.0-372.13.1.el8_6

エラータID: AXSA:2022-3780:12

Release date: 
Thursday, September 1, 2022 - 06:30
Subject: 
kernel-4.18.0-372.13.1.el8_6
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating
system.

Security Fix(es):

* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)
* kernel: out-of-bounds read in fbcon_get_font function (CVE-2020-28915)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.

Bug Fix(es):

* weird port mapping with asymmetric traffic (BZ#2065266)
HBR3 is malfunction via MST HUB against Intel ADL-HX CPU (BZ#2066644)
openvswitch connection tracking sends incorrect flow key for some upcalls
(BZ#2068476)
* sctp connection abort unexpected. (BZ#2070959)
* soft quota cannot exceed more the 5 warns which breaks timer functionality
(BZ#2071713)
* VirtIO Throughput for VM on host with OVS HW-Offload is very low
(BZ#2074221)
* SR-IOV performance > 50% degradation (BZ#2074829)
* Call trace with parallel rules insertion and deletion (BZ#2075553)
* Enable nested virtualization (BZ#2079069)
* iscsi_ttx (iSERT) completions hung while waiting for mlx5_ib_drain_sq
(BZ#2079433)
* WARNING: CPU: 2 PID: 969 at kernel/locking/lockdep.c:895
register_lock_class+0x234/0x1640 (BZ#2079856)
* mlx5: Some rule are not offloaded to HW in OVN K8s Pod 2 External use case
(BZ#2079918)
* OCP node kernel crash due to ceph_fsync - unsafe_request_wait+0x143
(BZ#2080071)
* TCP doesn't retransmit if in reorder state and waits for RTO (BZ#2080972)
* pnfs NFSv4.1 IO causes a soft lockup (after a server reboot) and an
unresponsive client (BZ#2080998)
* BlueField2: DPU can't switch to switchdev mode (BZ#2081011)
* Important ice bug fixes (BZ#2081794)
* For isolated CPUs (with nohz_full enabled for isolated CPUs) CPU utilization
statistics are not getting reflected continuously (BZ#2084138)
* Host is getting crash/abrupt reboot while the guest has been assigned with
more than 128 GB RAM while it is using NVIDIA proprietary module. (BZ#2085572)
* s_pf0vf2: hw csum failure for mlx5 (BZ#2086549)
* kernel memory leak while freeing nested actions (BZ#2086590)
* Regression: Bluetooth will not activate after 8.5 update (BZ#2087641)
* mlx5,Internal port - traffic not offloaded on tunnel interface rules on
chain > 0 when internal port is the vtep device. (BZ#2088610)
* rule not offloaded on server side with syndrome(0x389e56) when direction is
in (BZ#2088611)
* TTL decrease only on the first packet (BZ#2088638)
* TC HWOL of inbound traffic over geneve with ovs bridge as VTEP is not
working (BZ#2088639)
* Audio No Function on Orchid Bay(Mini Config) (BZ#2090423)

CVE-2020-28915
A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux
kernel before 5.8.15 could be used by local attackers to read kernel memory, aka
CID-6735b4632def.
CVE-2022-27666
A heap buffer overflow flaw was found in IPsec ESP transformation code in
net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a
normal user privilege to overwrite kernel heap objects and may cause a local
privilege escalation threat.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-4.18.0-372.13.1.el8_6.src.rpm
    MD5: b57f3e4ef9cd85fb43be0a3ef712f1e1
    SHA-256: c26c1ec5871735ac6f356c22dc485732ba6432be424d323b54ee618717c9d148
    Size: 123.86 MB

Asianux Server 8 for x86_64
  1. bpftool-4.18.0-372.13.1.el8_6.x86_64.rpm
    MD5: 76e04cbda5b692a16b938b66fc0cd261
    SHA-256: 9f24d7f450b52afc2867772ec3b5426eaf708a8fc7e3e59940586a28099afb6e
    Size: 8.76 MB
  2. kernel-4.18.0-372.13.1.el8_6.x86_64.rpm
    MD5: 02a4bb83c343ede63a00ef5dfbddf0aa
    SHA-256: 5b6f4e3f5e461058f097ec78f1a02499d9d49f0a8818f89549e27d6b6b1f2cad
    Size: 8.04 MB
  3. kernel-abi-stablelists-4.18.0-372.13.1.el8_6.noarch.rpm
    MD5: 5cde7c08c5c45d54d11f141d8e498c8e
    SHA-256: ec6c6d40a5b9d479f2238d21cabc6644b4f9b50cf2ac57ab5cb3ad66690a96e3
    Size: 8.05 MB
  4. kernel-core-4.18.0-372.13.1.el8_6.x86_64.rpm
    MD5: 3c9e65ef94be6d8e97fad726165d480e
    SHA-256: 1ac8ebcdd5c709e9610f6ca6e575596496ebe25f82f811719df3c3b3fc4e29bd
    Size: 39.31 MB
  5. kernel-cross-headers-4.18.0-372.13.1.el8_6.x86_64.rpm
    MD5: ac17b16a7dc256f5ccabf6771d5d4686
    SHA-256: 30ae212e9e44d45742aa353d1167a7c57fddfa118eead560c2a557411ffe78aa
    Size: 13.19 MB
  6. kernel-debug-4.18.0-372.13.1.el8_6.x86_64.rpm
    MD5: 2a1297459dfb6a0ce97b13cc20d80976
    SHA-256: e93c5d1b32d4e43d118616aa5fd3f15494c351163fb5d5e137620180cbada4d3
    Size: 8.04 MB
  7. kernel-debug-core-4.18.0-372.13.1.el8_6.x86_64.rpm
    MD5: f8634e3325148038f8dc1d99fcc0f297
    SHA-256: 8086f715b9d85510259fa7c1c622b5a017f4351c0d9e66aa06194efb1430365d
    Size: 67.56 MB
  8. kernel-debug-devel-4.18.0-372.13.1.el8_6.x86_64.rpm
    MD5: 1668ac6c9778363ff5c17cecd9aed2dd
    SHA-256: 726ad3d1b094d9506ea6aaa33343c6253a8742d6f5c83579515c6feb24bae87a
    Size: 21.48 MB
  9. kernel-debug-modules-4.18.0-372.13.1.el8_6.x86_64.rpm
    MD5: de6cd232dfaeac581f8cb1aa27a0657f
    SHA-256: eff242dae9b6595a16edfc7675439c94ecaf2bac8d7c750c5191b7a978f13096
    Size: 59.03 MB
  10. kernel-debug-modules-extra-4.18.0-372.13.1.el8_6.x86_64.rpm
    MD5: ef8eb1395a8d6faa8cd642ae1670cf4b
    SHA-256: ea5f361a7013c64a5f247c1e0604a7e5f081dd957b036239d94a09ec15710e1a
    Size: 9.41 MB
  11. kernel-devel-4.18.0-372.13.1.el8_6.x86_64.rpm
    MD5: 7a845f792f6e5c02071da39bf5e2e46d
    SHA-256: 4e3b15c62cb919e6918d2c90573e136126104e76485fcd152ff22756189b12a5
    Size: 21.28 MB
  12. kernel-doc-4.18.0-372.13.1.el8_6.noarch.rpm
    MD5: 8ceafbfa7d8d351f1a906c213fd3d53a
    SHA-256: f7501a9f09a3d3c57ad7b2de534829e574cd0bb9075c167d088e1b453e9fc2bf
    Size: 25.53 MB
  13. kernel-headers-4.18.0-372.13.1.el8_6.x86_64.rpm
    MD5: 185cc43c199b60d4032445590d2f321c
    SHA-256: c5829c2f4477a3ee90fac3254bcfa779820891126eae8afd3b765367f94e6b4e
    Size: 9.34 MB
  14. kernel-modules-4.18.0-372.13.1.el8_6.x86_64.rpm
    MD5: 11f2c5e4dda3e12ffb48c6352aa817ab
    SHA-256: 5c41b41d3b4e98c76662d0b2d944857526d9c6c2858a8a2a5ed25a1c1594bb70
    Size: 31.73 MB
  15. kernel-modules-extra-4.18.0-372.13.1.el8_6.x86_64.rpm
    MD5: a627cfbd4d6e00659b395dfe5c5b5765
    SHA-256: feed490fd9aaed89b99cc5194cad096dd64d29e220e41d8b7802a8e1ceaeb80f
    Size: 8.71 MB
  16. kernel-tools-4.18.0-372.13.1.el8_6.x86_64.rpm
    MD5: 22bff6326a779f15aee53db8772cdbb2
    SHA-256: 5dbc6442f9b92768559c80800fbabba5e44106c9284db13a9cac9dca9d570eac
    Size: 8.24 MB
  17. kernel-tools-libs-4.18.0-372.13.1.el8_6.x86_64.rpm
    MD5: e7d3fbb64f60ef1cf60198006b45b387
    SHA-256: 45cfee72dd0b58386d8c4c50b93e85c97ad2156f95bb0c340473325015d5e9b9
    Size: 8.04 MB
  18. kernel-tools-libs-devel-4.18.0-372.13.1.el8_6.x86_64.rpm
    MD5: f3de21e360c2933f0b4d5cab641aefea
    SHA-256: dc00c317a4c473ef3790c07da700ed962cf658b03182c22c132e4e05c1115522
    Size: 8.04 MB
  19. perf-4.18.0-372.13.1.el8_6.x86_64.rpm
    MD5: 146ba87f9895cba633ce27d7bf96caae
    SHA-256: decd693cda3aafe20534cad9d08c3360c44a13d4ab8672e598b24f9aea9e569d
    Size: 10.37 MB
  20. python3-perf-4.18.0-372.13.1.el8_6.x86_64.rpm
    MD5: b6571b8fe22a2a983b709bfa234e8615
    SHA-256: 6574cd16ac8911e3846990e04850132d3da05f05fc4e86f289353d605e8864ba
    Size: 8.16 MB