kernel-3.10.0-1160.80.1.el7

エラータID: AXSA:2022-4024:16

Release date: 
Friday, November 11, 2022 - 07:09
Subject: 
kernel-3.10.0-1160.80.1.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* a use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588)
* RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900)
* Branch Type Confusion (non-retbleed) (CVE-2022-23825)
* Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)
* Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* lpfc panics in lpfc_els_free_iocb() during port recovery
* mlx5 reports error messages during shutdown then panic with mce
* Kernel panic due to hard lockup caused by deadlock between tasklist_lock and k_itimer->it_lock
* fix excess double put in nfs_prime_dcache

CVE-2022-23816
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2022-23825
Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.
CVE-2022-2588
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2022-26373
Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
CVE-2022-29900
Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.
CVE-2022-29901
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-3.10.0-1160.80.1.el7.src.rpm
    MD5: f68346d84032df99873215b4e4586578
    SHA-256: 563846b1af17f076e9e0b989635e0bc1ca599aeb5ba2f15a4764c46eaf088206
    Size: 98.79 MB

Asianux Server 7 for x86_64
  1. bpftool-3.10.0-1160.80.1.el7.x86_64.rpm
    MD5: 1e4937e0198b4b550d8a97c99e91aff5
    SHA-256: 57deacb1c40877b759184ad64e2fd3cb524e4bca5663b45c1c3d29016b28f0ad
    Size: 8.51 MB
  2. kernel-3.10.0-1160.80.1.el7.x86_64.rpm
    MD5: 040129f4eff78044da57315975689ce1
    SHA-256: 374291c668400c84aa98214bf98d785725de8facf5eed7a414aa2ee578cb788e
    Size: 51.67 MB
  3. kernel-debug-3.10.0-1160.80.1.el7.x86_64.rpm
    MD5: 3d692375693f368f6b0958c2d79b8a35
    SHA-256: 46250052ba0ee88c24a518f1ae19185d9dc997221a2529dbae381ef936a39fea
    Size: 53.99 MB
  4. kernel-debug-devel-3.10.0-1160.80.1.el7.x86_64.rpm
    MD5: 181651a01d7a850672fc140adfa634eb
    SHA-256: f6bb978fe99c43c9945328310835d9095ad2c4012bec088debfc2411116de055
    Size: 18.07 MB
  5. kernel-devel-3.10.0-1160.80.1.el7.x86_64.rpm
    MD5: 9eca2f59cb171c84c870a0ff33a0bbf8
    SHA-256: 8393c2132d2f0e02ae64708935986ffcb03dd4a8094d2faf112da8215b0b8b22
    Size: 18.00 MB
  6. kernel-doc-3.10.0-1160.80.1.el7.noarch.rpm
    MD5: 681e77a3280e40effb4cdc838ae2349f
    SHA-256: 6e8f1af2a14e9426c55313b78ec8324b34a796caaec0db46124f6f9117fd860e
    Size: 19.54 MB
  7. kernel-headers-3.10.0-1160.80.1.el7.x86_64.rpm
    MD5: df4daf08e73416593a2eda1aeb96bf05
    SHA-256: 7327610e9dea2b51e458a4f3b6f2aaab14742800e5104f1cd58851d747c849ef
    Size: 9.07 MB
  8. kernel-tools-3.10.0-1160.80.1.el7.x86_64.rpm
    MD5: 55040b10a41480b802631617a15eb8f4
    SHA-256: 11ff9aece36b28c0471a239299057134cb10b3bdcc3a7bf05703b0d76ea3f5c3
    Size: 8.18 MB
  9. kernel-tools-libs-3.10.0-1160.80.1.el7.x86_64.rpm
    MD5: 88ecc2deaeafbbc25d2e1cac63950511
    SHA-256: 833b0f30c8c2d954438cf113c96381512d75314e52e3a88e8e43fac70a8ec881
    Size: 8.07 MB
  10. perf-3.10.0-1160.80.1.el7.x86_64.rpm
    MD5: 98c23ec05da5142a341d6946a185ac23
    SHA-256: 67f530a450513ee5eb228f448d30bbd5e09fd627006cf53dd3316e3c233a6cb8
    Size: 9.72 MB
  11. python-perf-3.10.0-1160.80.1.el7.x86_64.rpm
    MD5: 5eb6788bacaa08bae0e50dd9b20dd97c
    SHA-256: 312a4f30f746ed4e0ae69a1bac73e320033a692098caa40fa46f34ba5aa578ba
    Size: 8.16 MB