-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.5859
         [RHSA-2023:5627] Important: kernel security, bug fix, and
                            enhancement update
                              11 October 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           kernel
Publisher:         Red Hat
Operating System:  Red Hat
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-35001 CVE-2023-4128 CVE-2023-4004
                   CVE-2023-3090 CVE-2023-2235 CVE-2023-1206
                   CVE-2023-1095 CVE-2023-0590 CVE-2022-36879
                   CVE-2022-2873 CVE-2022-2503 CVE-2020-36558

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2023:5627

Comment: CVSS (Max):  7.8 CVE-2023-4128 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: Red Hat
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

=====================================================================
                Red Hat Security Advisory

Synopsis:          Important: kernel security, bug fix, and
                   enhancement update
Advisory ID:       RHSA-2023:5627
Product:           Red Hat Virtualization 4 Hypervisor for RHEL 8
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:5627
Issue date:        2023-10-10
CVE Names:         CVE-2020-36558 CVE-2022-2503 CVE-2022-2873 CVE-2022-36879
                   CVE-2023-0590 CVE-2023-1095 CVE-2023-1206 CVE-2023-2235
                   CVE-2023-3090 CVE-2023-4004 CVE-2023-4128 CVE-2023-35001
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended
Update Support.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Virtualization 4 Hypervisor for RHEL 8 - aarch64, ppc64le, x86_64,
s390x, noarch
Red Hat Enterprise Linux BaseOS EUS (v.8.6) - aarch64, ppc64le, x86_64, s390x,
noarch
Red Hat CodeReady Linux Builder EUS (v.8.6) - aarch64, ppc64le, x86_64, s390x,
noarch

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux operating
system.

Security Fix(es):

* kernel: use-after-free vulnerability in the perf_group_detach function of the
Linux Kernel Performance Events (CVE-2023-2235)

* kernel: ipvlan: out-of-bounds write caused by unclear skb->cb (CVE-2023-3090)

* kernel: netfilter: use-after-free due to improper element removal in
nft_pipapo_remove() (CVE-2023-4004)

* kernel: net/sched: Use-after-free vulnerabilities in the net/sched
classifiers: cls_fw, cls_u32 and cls_route (CVE-2023-4128)

* kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()
(CVE-2023-35001)

* kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL
leading to NULL pointer dereference (CVE-2020-36558)

* kernel: LoadPin bypass via dm-verity table reload (CVE-2022-2503)

* kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873)

* kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount
to be dropped twice (CVE-2022-36879)

* kernel: use-after-free due to race condition in qdisc_graft() (CVE-2023-0590)

* kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list
head (CVE-2023-1095)

* kernel: hash collisions in the IPv6 connection lookup table (CVE-2023-1206)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.

Bug Fix(es):

* [HPEMC RHEL 8 REGRESSION] acpi-cpufreq: Skip initialization if a cpufreq
driver exists (BZ#2186307)

* [max] RHEL8.4 Pre-Alpha - [ 4.18.0-240.4.el8.dt2.ppc64le ][ fleetwood / P9
64TB/192c ] While performing DLPAR CPU operations "BUG: arch topology borken"
messages are observed and CPU remove operation fails for removal of 140 with 255
return (BZ#2210295)

* [Intel 8.8 BUG] [SPR] IOMMU: QAT Device Address Translation Issue with
Invalidation Completion Ordering (BZ#2221098)

* avoid unnecessary page fault retires on shared memory types (BZ#2221101)

* [i40e] error: Cannot set interface MAC/vlanid to 1e:b7:e2:02:b1:aa/0 for
ifname ens4f0 vf 0: Resource temporarily unavailable (BZ#2228164)

* oops on cifs_mount due to null tcon (BZ#2229129)

* kernel panic due to stack overflow on ppc64le due to deep call chain.
(BZ#2230268)

* [Hyper-V][RHEL 8]incomplete fc_transport implementation in storvsc causes null
dereference in fc_timed_out() (BZ#2230744)

* Withdrawal: GFS2: couldn't freeze filesystem: -16 (BZ#2231826)

* [RHEL 8][Hyper-V]Excessive hv_storvsc driver logging with srb_status
SRB_STATUS_INTERNAL_ERROR  (0x30) (BZ#2231989)

* kernel-devel RPM cross-compiled by CKI contains host-arch scripts (BZ#2232138)

* RHEL-8: crypto: rng - Fix lock imbalance in crypto_del_rng (BZ#2232216)

* [Intel 8.9] iavf: Driver Update (BZ#2232400)

* Important iavf bug fixes July 2023 (BZ#2232401)

* iavf: hang in iavf_remove() - SNO node hangs after running systemctl reboot
(BZ#2232404)

* [RHEL 8.9] Proactively backport locking fixes from upstream (BZ#2235394)

* NAT sport clash in OCP causing 1 second TCP connection establishment delay.
(BZ#2236515)

* xfs: mount fails when device file name is long (BZ#2236814)

* netfilter: RHEL 8.8 phase 2 backports from upstream (BZ#2236817)

* swap deadlock when attempt to charge a page to a cgroup stalls waiting on I/O
plugged on another task in swap code (BZ#2237686)

Enhancement(s):

* [Intel 8.7 FEAT] TSC: Avoid clock watchdog when not needed (BZ#2216051)

4. Solution:

For details on how to apply this update, which includes the changes described in
this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

2112693 - CVE-2020-36558 - race condition in VT_RESIZEX ioctl when vc_cons[i].d
is already NULL leading to NULL pointer dereference
2177862 - CVE-2022-2503 - LoadPin bypass via dm-verity table reload 
2119048 - CVE-2022-2873 - an out-of-bounds vulnerability in i2c-ismt driver 
2119855 - CVE-2022-36879 - xfrm_expand_policies() in net/xfrm/xfrm_policy.c can
cause a refcount to be dropped twice
2165741 - CVE-2023-0590 - use-after-free due to race condition in qdisc_graft() 
2173973 - CVE-2023-1095 - NULL pointer dereference in nf_tables due to zeroed
list head
2175903 - CVE-2023-1206 - hash collisions in the IPv6 connection lookup table 
2192589 - CVE-2023-2235 - use-after-free vulnerability in the perf_group_detach
function of the Linux Kernel Performance Events
2218672 - CVE-2023-3090 - out-of-bounds write caused by unclear skb->cb 
2225275 - CVE-2023-4004 - use-after-free due to improper element removal in
nft_pipapo_remove()
2225511 - CVE-2023-4128 - cls_fw, cls_u32 and cls_route 
2220892 - CVE-2023-35001 - stack-out-of-bounds-read in nft_byteorder_eval() 

6. Package List:

Red Hat Virtualization 4 Hypervisor for RHEL 8

x86_64:
bpftool-debuginfo-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-debug-debuginfo-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-debuginfo-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-debuginfo-common-x86_64-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-devel-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-tools-debuginfo-0:4.18.0-372.75.1.el8_6.x86_64.rpm
perf-0:4.18.0-372.75.1.el8_6.x86_64.rpm
perf-debuginfo-0:4.18.0-372.75.1.el8_6.x86_64.rpm
python3-perf-debuginfo-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-headers-0:4.18.0-372.75.1.el8_6.x86_64.rpm

Red Hat Enterprise Linux BaseOS EUS (v.8.6)

aarch64:
bpftool-0:4.18.0-372.75.1.el8_6.aarch64.rpm
bpftool-debuginfo-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-core-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-cross-headers-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-debug-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-debug-core-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-debug-debuginfo-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-debug-devel-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-debug-modules-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-debug-modules-extra-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-debuginfo-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-debuginfo-common-aarch64-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-devel-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-modules-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-modules-extra-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-tools-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-tools-debuginfo-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-tools-libs-0:4.18.0-372.75.1.el8_6.aarch64.rpm
perf-0:4.18.0-372.75.1.el8_6.aarch64.rpm
perf-debuginfo-0:4.18.0-372.75.1.el8_6.aarch64.rpm
python3-perf-0:4.18.0-372.75.1.el8_6.aarch64.rpm
python3-perf-debuginfo-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-headers-0:4.18.0-372.75.1.el8_6.aarch64.rpm

ppc64le:
bpftool-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
bpftool-debuginfo-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-core-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-cross-headers-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-debug-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-debug-core-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-debug-debuginfo-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-debug-devel-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-debug-modules-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-debug-modules-extra-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-debuginfo-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-debuginfo-common-ppc64le-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-devel-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-modules-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-modules-extra-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-tools-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-tools-debuginfo-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-tools-libs-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
perf-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
perf-debuginfo-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
python3-perf-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
python3-perf-debuginfo-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-headers-0:4.18.0-372.75.1.el8_6.ppc64le.rpm

s390x:
bpftool-0:4.18.0-372.75.1.el8_6.s390x.rpm
bpftool-debuginfo-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-core-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-cross-headers-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-debug-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-debug-core-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-debug-debuginfo-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-debug-devel-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-debug-modules-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-debug-modules-extra-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-debuginfo-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-debuginfo-common-s390x-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-devel-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-modules-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-modules-extra-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-tools-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-tools-debuginfo-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-zfcpdump-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-zfcpdump-core-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-zfcpdump-debuginfo-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-zfcpdump-devel-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-zfcpdump-modules-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-zfcpdump-modules-extra-0:4.18.0-372.75.1.el8_6.s390x.rpm
perf-0:4.18.0-372.75.1.el8_6.s390x.rpm
perf-debuginfo-0:4.18.0-372.75.1.el8_6.s390x.rpm
python3-perf-0:4.18.0-372.75.1.el8_6.s390x.rpm
python3-perf-debuginfo-0:4.18.0-372.75.1.el8_6.s390x.rpm
kernel-headers-0:4.18.0-372.75.1.el8_6.s390x.rpm

x86_64:
bpftool-0:4.18.0-372.75.1.el8_6.x86_64.rpm
bpftool-debuginfo-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-core-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-cross-headers-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-debug-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-debug-core-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-debug-debuginfo-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-debug-devel-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-debug-modules-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-debug-modules-extra-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-debuginfo-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-debuginfo-common-x86_64-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-devel-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-modules-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-modules-extra-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-tools-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-tools-debuginfo-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-tools-libs-0:4.18.0-372.75.1.el8_6.x86_64.rpm
perf-0:4.18.0-372.75.1.el8_6.x86_64.rpm
perf-debuginfo-0:4.18.0-372.75.1.el8_6.x86_64.rpm
python3-perf-0:4.18.0-372.75.1.el8_6.x86_64.rpm
python3-perf-debuginfo-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-headers-0:4.18.0-372.75.1.el8_6.x86_64.rpm

Source:
kernel-0:4.18.0-372.75.1.el8_6.src.rpm

noarch:
kernel-abi-stablelists-0:4.18.0-372.75.1.el8_6.noarch.rpm
kernel-doc-0:4.18.0-372.75.1.el8_6.noarch.rpm

Red Hat CodeReady Linux Builder EUS (v.8.6)

aarch64:
bpftool-debuginfo-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-debug-debuginfo-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-debuginfo-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-debuginfo-common-aarch64-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-tools-debuginfo-0:4.18.0-372.75.1.el8_6.aarch64.rpm
kernel-tools-libs-devel-0:4.18.0-372.75.1.el8_6.aarch64.rpm
perf-debuginfo-0:4.18.0-372.75.1.el8_6.aarch64.rpm
python3-perf-debuginfo-0:4.18.0-372.75.1.el8_6.aarch64.rpm

ppc64le:
bpftool-debuginfo-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-debug-debuginfo-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-debuginfo-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-debuginfo-common-ppc64le-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-tools-debuginfo-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
kernel-tools-libs-devel-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
perf-debuginfo-0:4.18.0-372.75.1.el8_6.ppc64le.rpm
python3-perf-debuginfo-0:4.18.0-372.75.1.el8_6.ppc64le.rpm

x86_64:
bpftool-debuginfo-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-debug-debuginfo-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-debuginfo-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-debuginfo-common-x86_64-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-tools-debuginfo-0:4.18.0-372.75.1.el8_6.x86_64.rpm
kernel-tools-libs-devel-0:4.18.0-372.75.1.el8_6.x86_64.rpm
perf-debuginfo-0:4.18.0-372.75.1.el8_6.x86_64.rpm
python3-perf-debuginfo-0:4.18.0-372.75.1.el8_6.x86_64.rpm

7. References:

https://www.cve.org/CVERecord?id=CVE-2020-36558
https://www.cve.org/CVERecord?id=CVE-2022-2503
https://www.cve.org/CVERecord?id=CVE-2022-2873
https://www.cve.org/CVERecord?id=CVE-2022-36879
https://www.cve.org/CVERecord?id=CVE-2023-0590
https://www.cve.org/CVERecord?id=CVE-2023-1095
https://www.cve.org/CVERecord?id=CVE-2023-1206
https://www.cve.org/CVERecord?id=CVE-2023-2235
https://www.cve.org/CVERecord?id=CVE-2023-3090
https://www.cve.org/CVERecord?id=CVE-2023-4004
https://www.cve.org/CVERecord?id=CVE-2023-4128
https://www.cve.org/CVERecord?id=CVE-2023-35001
https://access.redhat.com/security/updates/classification/#important

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=DHJo
-----END PGP SIGNATURE-----