-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.3914
             kernel security, bug fix, and enhancement update
                              10 August 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Linux kernel
Publisher:         Red Hat
Operating System:  Red Hat
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-1055 CVE-2022-0494 

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2022:6003

Comment: CVSS (Max):  6.3 CVE-2022-1055 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N)
         CVSS Source: Red Hat
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: kernel security, bug fix, and enhancement update
Advisory ID:       RHSA-2022:6003-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:6003
Issue date:        2022-08-09
CVE Names:         CVE-2022-0494 CVE-2022-1055 
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat CodeReady Linux Builder (v. 9) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux AppStream (v. 9) - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat Enterprise Linux BaseOS (v. 9) - aarch64, noarch, ppc64le, s390x, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* information leak in scsi_ioctl() (CVE-2022-0494)

* use-after-free in tc_new_tfilter() in net/sched/cls_api.c (CVE-2022-1055)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* Power9 - LPAR fails to boot in shared processing mode and call traces are
seen [Hash] (BZ#2092248)

* Hard lockups are observed while running stress-ng and LPAR hangs
(BZ#2092253)

* FIPS module identification via name and version (BZ#2093384)

* gfs2: File corruption with large writes when memory is tight (BZ#2097306)

* i/o on initiator stuck when network is disrupted
(4.18.0-372.9.1.el8.x86_64) (BZ#2098251)

* RHEL 9.1 doesn't support 3rd SATA (BZ#2099740)

* Guest call trace when reboot after postcopy migration with high stress
workload (BZ#2100903)

* Oops or general protection fault with RIP decode_attr_security_label at
decode_getfattr_attrs (BZ#2101854)

* Oops as BUG: unable to handle page fault as free of uninitialized
nfs4_label on nfs referral lookup (BZ#2101858)

* lpar crash with Oops: Kernel access of bad area, sig: 11 [#1] when
changing mtu of a bond interface (P10/ ibmvnic/ Haleakala) (BZ#2103085)

* OS doesn't boot when vmd and interrupt remapping are enabled (BZ#2109974)

Enhancement(s):

* iommu/vt-d: Make DMAR_UNITS_SUPPORTED a config setting (BZ#2105326)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

2039448 - CVE-2022-0494 kernel: information leak in  scsi_ioctl()
2070220 - CVE-2022-1055 kernel: use-after-free in tc_new_tfilter() in net/sched/cls_api.c

6. Package List:

Red Hat Enterprise Linux AppStream (v. 9):

aarch64:
bpftool-debuginfo-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-debug-debuginfo-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-debug-devel-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-debug-devel-matched-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-debuginfo-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-debuginfo-common-aarch64-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-devel-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-devel-matched-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-headers-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-tools-debuginfo-5.14.0-70.22.1.el9_0.aarch64.rpm
perf-5.14.0-70.22.1.el9_0.aarch64.rpm
perf-debuginfo-5.14.0-70.22.1.el9_0.aarch64.rpm
python3-perf-debuginfo-5.14.0-70.22.1.el9_0.aarch64.rpm

noarch:
kernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm

ppc64le:
bpftool-debuginfo-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-debug-debuginfo-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-debug-devel-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-debug-devel-matched-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-debuginfo-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-debuginfo-common-ppc64le-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-devel-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-devel-matched-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-headers-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-tools-debuginfo-5.14.0-70.22.1.el9_0.ppc64le.rpm
perf-5.14.0-70.22.1.el9_0.ppc64le.rpm
perf-debuginfo-5.14.0-70.22.1.el9_0.ppc64le.rpm
python3-perf-debuginfo-5.14.0-70.22.1.el9_0.ppc64le.rpm

s390x:
bpftool-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-debug-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-debug-devel-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-debug-devel-matched-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-debuginfo-common-s390x-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-devel-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-devel-matched-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-headers-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-tools-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-zfcpdump-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-zfcpdump-devel-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-zfcpdump-devel-matched-5.14.0-70.22.1.el9_0.s390x.rpm
perf-5.14.0-70.22.1.el9_0.s390x.rpm
perf-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm
python3-perf-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm

x86_64:
bpftool-debuginfo-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-debug-debuginfo-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-debuginfo-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-debuginfo-common-x86_64-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-tools-debuginfo-5.14.0-70.22.1.el9_0.x86_64.rpm
perf-5.14.0-70.22.1.el9_0.x86_64.rpm
perf-debuginfo-5.14.0-70.22.1.el9_0.x86_64.rpm
python3-perf-debuginfo-5.14.0-70.22.1.el9_0.x86_64.rpm

Red Hat Enterprise Linux BaseOS (v. 9):

Source:
kernel-5.14.0-70.22.1.el9_0.src.rpm

aarch64:
bpftool-5.14.0-70.22.1.el9_0.aarch64.rpm
bpftool-debuginfo-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-core-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-debug-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-debug-core-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-debug-debuginfo-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-debug-modules-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-debug-modules-extra-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-debuginfo-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-debuginfo-common-aarch64-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-modules-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-modules-extra-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-tools-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-tools-debuginfo-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-tools-libs-5.14.0-70.22.1.el9_0.aarch64.rpm
perf-debuginfo-5.14.0-70.22.1.el9_0.aarch64.rpm
python3-perf-5.14.0-70.22.1.el9_0.aarch64.rpm
python3-perf-debuginfo-5.14.0-70.22.1.el9_0.aarch64.rpm

noarch:
kernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm

ppc64le:
bpftool-5.14.0-70.22.1.el9_0.ppc64le.rpm
bpftool-debuginfo-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-core-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-debug-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-debug-core-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-debug-debuginfo-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-debug-modules-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-debug-modules-extra-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-debuginfo-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-debuginfo-common-ppc64le-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-modules-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-modules-extra-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-tools-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-tools-debuginfo-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-tools-libs-5.14.0-70.22.1.el9_0.ppc64le.rpm
perf-debuginfo-5.14.0-70.22.1.el9_0.ppc64le.rpm
python3-perf-5.14.0-70.22.1.el9_0.ppc64le.rpm
python3-perf-debuginfo-5.14.0-70.22.1.el9_0.ppc64le.rpm

s390x:
bpftool-5.14.0-70.22.1.el9_0.s390x.rpm
bpftool-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-core-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-debug-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-debug-core-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-debug-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-debug-modules-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-debug-modules-extra-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-debuginfo-common-s390x-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-modules-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-modules-extra-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-tools-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-tools-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-zfcpdump-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-zfcpdump-core-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-zfcpdump-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-zfcpdump-modules-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-zfcpdump-modules-extra-5.14.0-70.22.1.el9_0.s390x.rpm
perf-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm
python3-perf-5.14.0-70.22.1.el9_0.s390x.rpm
python3-perf-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm

x86_64:
bpftool-5.14.0-70.22.1.el9_0.x86_64.rpm
bpftool-debuginfo-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-debug-debuginfo-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-debuginfo-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-debuginfo-common-x86_64-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-tools-debuginfo-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpm
perf-debuginfo-5.14.0-70.22.1.el9_0.x86_64.rpm
python3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm
python3-perf-debuginfo-5.14.0-70.22.1.el9_0.x86_64.rpm

Red Hat CodeReady Linux Builder (v. 9):

aarch64:
bpftool-debuginfo-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-cross-headers-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-debug-debuginfo-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-debuginfo-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-debuginfo-common-aarch64-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-tools-debuginfo-5.14.0-70.22.1.el9_0.aarch64.rpm
kernel-tools-libs-devel-5.14.0-70.22.1.el9_0.aarch64.rpm
perf-debuginfo-5.14.0-70.22.1.el9_0.aarch64.rpm
python3-perf-debuginfo-5.14.0-70.22.1.el9_0.aarch64.rpm

ppc64le:
bpftool-debuginfo-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-cross-headers-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-debug-debuginfo-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-debuginfo-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-debuginfo-common-ppc64le-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-tools-debuginfo-5.14.0-70.22.1.el9_0.ppc64le.rpm
kernel-tools-libs-devel-5.14.0-70.22.1.el9_0.ppc64le.rpm
perf-debuginfo-5.14.0-70.22.1.el9_0.ppc64le.rpm
python3-perf-debuginfo-5.14.0-70.22.1.el9_0.ppc64le.rpm

s390x:
bpftool-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-cross-headers-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-debug-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-debuginfo-common-s390x-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-tools-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm
kernel-zfcpdump-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm
perf-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm
python3-perf-debuginfo-5.14.0-70.22.1.el9_0.s390x.rpm

x86_64:
bpftool-debuginfo-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-debug-debuginfo-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-debuginfo-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-debuginfo-common-x86_64-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-tools-debuginfo-5.14.0-70.22.1.el9_0.x86_64.rpm
kernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm
perf-debuginfo-5.14.0-70.22.1.el9_0.x86_64.rpm
python3-perf-debuginfo-5.14.0-70.22.1.el9_0.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2022-0494
https://access.redhat.com/security/cve/CVE-2022-1055
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=26mo
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=fad1
-----END PGP SIGNATURE-----