pkey_group from module ib_core . (BZ#2038724) * Bus error with huge pages enabled (BZ#2039015) * RHEL8 - kvm: floating interrupts may get stuck (BZ#2040769) * Data corruption on small files served by httpd, which is backed by cifs-mount (BZ#2041529) * Add a net/mlx5 patch for Hardware Offload Fix (BZ#2042663) * Windows guest random Bsod when 'hv-tlbflush' enlightenment is enabled (BZ#2043237) * DNS lookup failures when run two times in a row (BZ#2043548) * net/sched: Fix ct zone matching for invalid conntrack state (BZ#2043550) * Kernel 4.18.0-348.2.1 secpath_cache memory leak involving strongswan tunnel (BZ#2047427) * OCP node XFS metadata corruption after numerous reboots (BZ#2049292) * Broadcom bnxt_re: RDMA stats are not incrementing (BZ#2049684) * ice: bug fix series for 8.6 (BZ#2051951) * panic while looking up a symlink due to NULL i_op->get_link (BZ#2052558) * ceph omnibus backport for RHEL-8.6.0 (BZ#2053725) * SCTP peel-off with SELinux and containers in OCP (BZ#2054112) * Selinux is not allowing SCTP connection setup between inter pod communication in enforcing mode (BZ#2054117) * dnf fails with fsync() over local repository present on CIFS mount point (BZ#2055824) "> OVAL Reference oval:com.redhat.rhsa:def:20220825 - CERT Civis.Net
Oval Definition:oval:com.redhat.rhsa:def:20220825
Revision Date:2022-03-10Version:642
Title:RHSA-2022:0825: kernel security, bug fix, and enhancement update (Important)
Description:The kernel packages contain the Linux kernel, the core of any Linux operating system.

  • The following packages have been upgraded to a later upstream version: kernel (4.18.0). (BZ#2036888)

    Security Fix(es):

  • kernel: improper initialization of the "flags" member of the new pipe_buffer (CVE-2022-0847)

  • kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)

  • kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout (CVE-2021-4154)

  • kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)

  • kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS (CVE-2022-0435)

  • kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)

  • kernel: missing check in ioctl allows kernel memory read/write (CVE-2022-0516)

  • kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)

    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

    Bug Fix(es):

  • Intel QAT Kernel power up fix (BZ#2016437)

  • RHEL8.4 seeing scsi_dma_map failed with mpt3sas driver and affecting performance (BZ#2018928)

  • [Lenovo 8.4 bug] audio_HDMI certification failed on RHEL 8.4GA (No hdmi out) (BZ#2027335)

  • [RHEL-8.5][4.18.0-323.el8.ppc64le][POWER8/9/10] security_flavor mode is not set back to zero post online migration (BZ#2027448)

  • iommu/amd: Fix unable to handle page fault due to AVIC (BZ#2030854)

  • [Lenovo 8.4 bug]The VGA display shows no signal (black screen) when install RHEL8.4(beta or rc1) in the legacy BIOS mode. (BZ#2034949)

  • Double free of kmalloc-64 cache struct ib_port->pkey_group from module ib_core . (BZ#2038724)

  • Bus error with huge pages enabled (BZ#2039015)

  • RHEL8 - kvm: floating interrupts may get stuck (BZ#2040769)

  • Data corruption on small files served by httpd, which is backed by cifs-mount (BZ#2041529)

  • Add a net/mlx5 patch for Hardware Offload Fix (BZ#2042663)

  • Windows guest random Bsod when 'hv-tlbflush' enlightenment is enabled (BZ#2043237)

  • DNS lookup failures when run two times in a row (BZ#2043548)

  • net/sched: Fix ct zone matching for invalid conntrack state (BZ#2043550)

  • Kernel 4.18.0-348.2.1 secpath_cache memory leak involving strongswan tunnel (BZ#2047427)

  • OCP node XFS metadata corruption after numerous reboots (BZ#2049292)

  • Broadcom bnxt_re: RDMA stats are not incrementing (BZ#2049684)

  • ice: bug fix series for 8.6 (BZ#2051951)

  • panic while looking up a symlink due to NULL i_op->get_link (BZ#2052558)

  • ceph omnibus backport for RHEL-8.6.0 (BZ#2053725)

  • SCTP peel-off with SELinux and containers in OCP (BZ#2054112)

  • Selinux is not allowing SCTP connection setup between inter pod communication in enforcing mode (BZ#2054117)

  • dnf fails with fsync() over local repository present on CIFS mount point (BZ#2055824)
  • Family:unixClass:patch
    Status:Reference(s):CVE-2021-0920
    CVE-2021-4154
    CVE-2022-0330
    CVE-2022-0435
    CVE-2022-0492
    CVE-2022-0516
    CVE-2022-0847
    CVE-2022-22942
    RHSA-2022:0825
    Platform(s):Red Hat Enterprise Linux 8
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 8 is installed
  • OR Red Hat CoreOS 4 is installed
  • AND
  • kernel earlier than 0:4.18.0-348.20.1.el8_5 is currently running
  • OR kernel earlier than 0:4.18.0-348.20.1.el8_5 is set to boot up on next boot
  • AND
  • bpftool is earlier than 0:4.18.0-348.20.1.el8_5
  • AND bpftool is signed with Red Hat redhatrelease2 key
  • kernel is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel is signed with Red Hat redhatrelease2 key
  • kernel-abi-stablelists is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel-abi-stablelists is signed with Red Hat redhatrelease2 key
  • kernel-core is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel-core is signed with Red Hat redhatrelease2 key
  • kernel-cross-headers is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel-cross-headers is signed with Red Hat redhatrelease2 key
  • kernel-debug is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel-debug is signed with Red Hat redhatrelease2 key
  • kernel-debug-core is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel-debug-core is signed with Red Hat redhatrelease2 key
  • kernel-debug-devel is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel-debug-devel is signed with Red Hat redhatrelease2 key
  • kernel-debug-modules is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel-debug-modules is signed with Red Hat redhatrelease2 key
  • kernel-debug-modules-extra is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel-debug-modules-extra is signed with Red Hat redhatrelease2 key
  • kernel-devel is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel-devel is signed with Red Hat redhatrelease2 key
  • kernel-doc is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel-doc is signed with Red Hat redhatrelease2 key
  • kernel-modules is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel-modules is signed with Red Hat redhatrelease2 key
  • kernel-modules-extra is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel-modules-extra is signed with Red Hat redhatrelease2 key
  • kernel-tools is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel-tools is signed with Red Hat redhatrelease2 key
  • kernel-tools-libs is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel-tools-libs is signed with Red Hat redhatrelease2 key
  • kernel-tools-libs-devel is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel-tools-libs-devel is signed with Red Hat redhatrelease2 key
  • kernel-zfcpdump is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel-zfcpdump is signed with Red Hat redhatrelease2 key
  • kernel-zfcpdump-core is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel-zfcpdump-core is signed with Red Hat redhatrelease2 key
  • kernel-zfcpdump-devel is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel-zfcpdump-devel is signed with Red Hat redhatrelease2 key
  • kernel-zfcpdump-modules is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel-zfcpdump-modules is signed with Red Hat redhatrelease2 key
  • kernel-zfcpdump-modules-extra is earlier than 0:4.18.0-348.20.1.el8_5
  • AND kernel-zfcpdump-modules-extra is signed with Red Hat redhatrelease2 key
  • perf is earlier than 0:4.18.0-348.20.1.el8_5
  • AND perf is signed with Red Hat redhatrelease2 key
  • python3-perf is earlier than 0:4.18.0-348.20.1.el8_5
  • AND python3-perf is signed with Red Hat redhatrelease2 key
  • BACK