kernel-4.18.0-372.32.1.el8_6

エラータID: AXSA:2022-3951:15

Release date: 
Monday, October 31, 2022 - 00:55
Subject: 
kernel-4.18.0-372.32.1.el8_6
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* A use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588)
* Information leak in scsi_ioctl() (CVE-2022-0494)
* A kernel-info-leak issue in pfkey_register (CVE-2022-1353)
* RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900)
* Branch Type Confusion (non-retbleed) (CVE-2022-23825)
* RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Add s390_iommu_aperture kernel parameter
* Blackscreen and hangup after resume from hibernate or S3 with DFGX WX3200
* Update NVME subsystem with bug fixes and minor changes
* Fix parsing of nw_proto for IPv6 fragments
* "vmcore failed, _exitcode:139" error observed while capturing vmcore during fadump after memory remove. incomplete vmcore is captured.
* 'disable_policy' is ignored for addresses configured on a down interface
* Backport request for new cpufreq.default_governor kernel command line parameter
* Panics in mpt3sas mpt3sas_halt_firmware() if mpt3sas_fwfault_debug=1 enabled when poweroff issued to server
* IOMMU/DMA update for 8.6
* Update Broadcom Emulex lpfc driver for MIRACLE LINUX 8.6 with bug fixes (14.0.0.13)
* Incorrect Socket(s) & "Core(s) per socket" reported by lscpu command.
* Panic in ch_release() due to NULL ch->device pointer, backport upstream fix
* pyverbs-tests fail over qede IW HCAs on "test_query_rc_qp" (tests.test_qp.QPTest)
* qedi shutdown handler hangs upon reboot
* cache link_info for ethtool
* Important iavf bug fixes
* Hibernate crash with Aquantia 2.5/5 Gb LAN card
* While using PTimekeeper the qede driver produces excessive log messages
* general protection fault handling rpc_xprt.timer
* Not enough device MSI-X vectors
* Atlantic driver panic on wakeup after hybernate
* Memory leak in vxlan_xmit_one
* Missing hybernate/resume fixes

Enhancement(s):

* Update smartpqi driver to latest upstream Second Set of Patches
* qed/qede/qedr - driver updates to latest upstream
* Update qedi driver to latest upstream
* Update qedf driver to latest upstream
* Include the support for new NVIDIA Mobile GFX GA103 on ADL Gen Laptops
* Need to enable hpilo to support new HPE RL300 Gen11 for ARM (aarch64)

CVE-2022-0494
A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.
CVE-2022-1353
A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.
CVE-2022-23816
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2022-23825
Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.
CVE-2022-2588
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2022-29900
Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.
CVE-2022-29901
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-4.18.0-372.32.1.el8_6.src.rpm
    MD5: b2c6a2da985cb6df484190be89d4b25f
    SHA-256: 7f23eaf8e5ce752f90f3a354574167b95fea0709470f57d3401844cc3ebbec12
    Size: 123.98 MB

Asianux Server 8 for x86_64
  1. bpftool-4.18.0-372.32.1.el8_6.x86_64.rpm
    MD5: 919c9cb83db2eb07659d4903ed4e875f
    SHA-256: 36a3e6cb4dfb202b38dab0d7d5ee45f331dc5017eb912bdcd93406158c436119
    Size: 8.82 MB
  2. kernel-4.18.0-372.32.1.el8_6.x86_64.rpm
    MD5: 387eb3e106415343d2fb219a1a2240fc
    SHA-256: 0ae74b3a11d3e78a33ae897ac6845fb2596e75ef0922d5a63de61e963a3c6135
    Size: 8.10 MB
  3. kernel-abi-stablelists-4.18.0-372.32.1.el8_6.noarch.rpm
    MD5: 6602e26925778b6e4a28a96661672f84
    SHA-256: 4063c519010b32efb5ea19a4f9e56a276308f8904563220ad2944494b5ba6b1b
    Size: 8.11 MB
  4. kernel-core-4.18.0-372.32.1.el8_6.x86_64.rpm
    MD5: 968bcb80837851196f4702990f735410
    SHA-256: d2fb55a5d08657615275b0d2106a00e96a98ae11df02ed69fb9928d85f9aac55
    Size: 39.75 MB
  5. kernel-cross-headers-4.18.0-372.32.1.el8_6.x86_64.rpm
    MD5: 30ddb15ab98211bb9661291175b1cac3
    SHA-256: 3c2802fe49a02f2bf4fd98b280885d1891b5ae8ae36512651bafa28af58214f9
    Size: 13.25 MB
  6. kernel-debug-4.18.0-372.32.1.el8_6.x86_64.rpm
    MD5: a66afe17612eb4b3439e8b204d3b7e7b
    SHA-256: 36dce7a941d18c9c66e96669c3e3b68628363e5c4c283f745bc461c7ff206cfc
    Size: 8.09 MB
  7. kernel-debug-core-4.18.0-372.32.1.el8_6.x86_64.rpm
    MD5: f5360e9c39c7addafb65236fdb52ed67
    SHA-256: 492cac184a5d964adaaac1a82756af9f27149ee70fc1f23fa7ea5134986c4e63
    Size: 68.02 MB
  8. kernel-debug-devel-4.18.0-372.32.1.el8_6.x86_64.rpm
    MD5: 9c5dcac6f2030ebdb83c2137610c48be
    SHA-256: 02f6e9b8a84bf4e7b91716ee6268109039d4e041c264907d369c0bd1842f5ae1
    Size: 21.54 MB
  9. kernel-debug-modules-4.18.0-372.32.1.el8_6.x86_64.rpm
    MD5: 1c3a8c34fd422f30263c3c97b8232f05
    SHA-256: cc1c1456a9fd0b0a5b1b0a7d73560493d750b597353962d72145f7936a97d397
    Size: 59.37 MB
  10. kernel-debug-modules-extra-4.18.0-372.32.1.el8_6.x86_64.rpm
    MD5: 2125924b464a8392882e3f08d7499e6d
    SHA-256: 7ab3c469098aecf5a83db7f2c5d16addfc1b06abdfddd8438d0a70594254638b
    Size: 9.47 MB
  11. kernel-devel-4.18.0-372.32.1.el8_6.x86_64.rpm
    MD5: ece1df2ec306bb2e8f393d197027ce8e
    SHA-256: 66853b4e3dabbb836ad7cf30f6735959a98bcc891e665f1d0e1f911fccbb7124
    Size: 21.35 MB
  12. kernel-doc-4.18.0-372.32.1.el8_6.noarch.rpm
    MD5: c86ed2070d9082729d4568fd74a3d609
    SHA-256: 95067ee071c7509ff8f0c9e2cf12072747474144f11574d62f339bc29b4d024a
    Size: 25.60 MB
  13. kernel-headers-4.18.0-372.32.1.el8_6.x86_64.rpm
    MD5: b82f9becd6eca2d9d557265d9a7dd510
    SHA-256: b1e73a2dfed243c9b52d20318a0515cef310c0db35677845c9a141cee9064d8f
    Size: 9.40 MB
  14. kernel-modules-4.18.0-372.32.1.el8_6.x86_64.rpm
    MD5: 66467bda98ae96dd0bfcc4e2fe564a8f
    SHA-256: 3b9a2b69af0cfae3ad733372784ea89b0d5e47fb6462feff0281ae2582a83f34
    Size: 32.07 MB
  15. kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64.rpm
    MD5: 284ae9ee2b29f944f40cb85f822097bd
    SHA-256: e5f61a5b6629eb239cf61d18870e64f1296fb0bda37dec228f8a38b93972c771
    Size: 8.77 MB
  16. kernel-tools-4.18.0-372.32.1.el8_6.x86_64.rpm
    MD5: 8e8e2dec807bf2ae02fa4f88779ad942
    SHA-256: 55d879f3ca67012b47224ce2d20d1b0a938ff8ef7dfcc623a133eac31d00f35c
    Size: 8.30 MB
  17. kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64.rpm
    MD5: a0852d1a5f66b9d677b568542aad5f6c
    SHA-256: 0a2f93af27d72dcc45873b275aa2e723ad49f0fd28403d1fe4a5a4cf4c5234eb
    Size: 8.10 MB
  18. kernel-tools-libs-devel-4.18.0-372.32.1.el8_6.x86_64.rpm
    MD5: 4975191e385b10542b868ea007cb28f3
    SHA-256: 114772f61b3aed3c7f3f31178a24eb54a24af2fcd97290cc655b9a67c764abc4
    Size: 8.10 MB
  19. perf-4.18.0-372.32.1.el8_6.x86_64.rpm
    MD5: c7aa386d07c977e857be83ce6df1bfb4
    SHA-256: 5bfee59b83963e96af27496b1cabfe7e0978db262157c3c75c3f270b350b8de9
    Size: 10.43 MB
  20. python3-perf-4.18.0-372.32.1.el8_6.x86_64.rpm
    MD5: 56ce2316bec59916e4f3ffcb46363141
    SHA-256: 7b9e2163a54877a9b70ba421048c05a29c1d4e35d96503f047fd5ae22888cd6b
    Size: 8.22 MB