RedHat: RHSA-2023-3491:01 Important: Red Hat Virtualization Host 4.4.z SP 1
Summary
Security Fix(es):
* kernel: use-after-free caused by l2cap_reassemble_sdu() in
net/bluetooth/l2cap_core.c (CVE-2022-3564)
* kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
(CVE-2022-4378)
* samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided
(CVE-2022-38023)
* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)
* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)
* openvswitch: ip proto 0 triggers incorrect handling (CVE-2023-1668)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Summary
Solution
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/2974891
References
https://access.redhat.com/security/cve/CVE-2022-3564 https://access.redhat.com/security/cve/CVE-2022-4378 https://access.redhat.com/security/cve/CVE-2022-38023 https://access.redhat.com/security/cve/CVE-2022-41222 https://access.redhat.com/security/cve/CVE-2023-0461 https://access.redhat.com/security/cve/CVE-2023-1668 https://access.redhat.com/security/updates/classification/#important
Package List
Red Hat Virtualization 4 Hypervisor for RHEL 8:
Source:
redhat-virtualization-host-4.5.3-202306050942_8.6.src.rpm
x86_64:
redhat-virtualization-host-image-update-4.5.3-202306050942_8.6.x86_64.rpm
RHEL 8-based RHEV-H for RHEV 4 (build requirements):
Source:
redhat-release-virtualization-host-4.5.3-7.el8ev.src.rpm
noarch:
redhat-virtualization-host-image-update-placeholder-4.5.3-7.el8ev.noarch.rpm
x86_64:
redhat-release-virtualization-host-4.5.3-7.el8ev.x86_64.rpm
redhat-release-virtualization-host-content-4.5.3-7.el8ev.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for redhat-release-virtualization-host andredhat-virtualization-host is now available for Red Hat Virtualization 4for Red Hat Enterprise Linux 8.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.
Topic
Relevant Releases Architectures
RHEL 8-based RHEV-H for RHEV 4 (build requirements) - noarch, x86_64
Red Hat Virtualization 4 Hypervisor for RHEL 8 - x86_64
Bugs Fixed
2137666 - CVE-2023-1668 openvswitch: ip proto 0 triggers incorrect handling
2138818 - CVE-2022-41222 kernel: mm/mremap.c use-after-free vulnerability
2150999 - CVE-2022-3564 kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
2152548 - CVE-2022-4378 kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
2154362 - CVE-2022-38023 samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided
2176192 - CVE-2023-0461 kernel: net/ulp: use-after-free in listening ULP sockets