Lucene search

K
osvGoogleOSV:RLSA-2023:1566
HistoryApr 06, 2023 - 3:52 p.m.

Important: kernel security, bug fix, and enhancement update

2023-04-0615:52:32
Google
osv.dev
8
kernel security update
bug fixes
linux kernel
cpu soft lockup
uaf prevention
privileges escalation
kernel panic
module bugs
connection issues
intel cpu enhancement
network improvement

7.9 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H

7.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.2%

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)

  • ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)

  • kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386)

  • kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • kernel panic on reboot due to a bug in mei_wdt module (BZ#2139770)

  • Rocky Linux8: Practically limit “Dummy wait” workaround to old Intel systems (BZ#2142170)

  • AMDSERVER 8.7: amdpstate driver incorrectly designed to load as default for Genoa (BZ#2151275)

  • Rocky Linux-8.8: Update RDMA core to Linux v6.0 (BZ#2161750)

  • Kernel panic observed during VxFS module unload (BZ#2162763)

  • Client not able to connect to rhel server: SYN is answered by chalange ACK and RST is ignored (BZ#2165587)

  • Rocky Linux8.4: s390/kexec: fix ipl report address for kdump (BZ#2166296)

  • kvm-unit-test reports unhandled exception on AMD (BZ#2166362)

  • Windows Server 2019 guest randomly pauses with “KVM: entry failed, hardware error 0x80000021” (BZ#2166368)

  • Unable to get QinQ working with ConnectX-4 Lx in SR-IOV scenario (BZ#2166665)

  • panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167602)

  • net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167640)

  • Rocky Linux 8.7: EEH injection failed to recover on Mellanox adapter. (BZ#2167645)

  • mlx5: lag and sriov fixes (BZ#2167647)

  • Rocky Linux8.4: dasd: fix no record found for raw_track_access (BZ#2167776)

  • GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168896)

  • Azure Rocky Linux8 scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM (BZ#2170228)

  • fast_isolate_freepages scans out of target zone (BZ#2170576)

  • Backport Request for locking/rwsem commits (BZ#2170939)

  • ipv6 traffic stop when an sriov vf have ipv6 address (BZ#2172550)

  • Hyper-V Rocky Linux8.8: Update MANA driver (BZ#2173103)

Enhancement(s):

  • Intel 8.8 FEAT SPR CPU: AMX: Improve the init_fpstate setup code (BZ#2168384)

7.9 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H

7.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.2%