{"id":"RLSA-2022:5316","summary":"Important: kernel security and bug fix update","details":"The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)\n\n* kernel: out-of-bounds read in fbcon_get_font function (CVE-2020-28915)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* weird port mapping with asymmetric traffic (BZ#2065266)\n\n* HBR3 is malfunction via MST HUB against Intel ADL-HX CPU (BZ#2066644)\n\n* openvswitch connection tracking sends incorrect flow key for some upcalls (BZ#2068476)\n\n* sctp connection abort unexpected. (BZ#2070959)\n\n* soft quota cannot exceed more the 5 warns which breaks timer functionality (BZ#2071713)\n\n* VirtIO Throughput for VM on host with OVS HW-Offload is very low (BZ#2074221)\n\n* SR-IOV performance \u003e 50% degradation (BZ#2074829)\n\n* Call trace with parallel rules insertion and deletion (BZ#2075553)\n\n* Enable nested virtualization (BZ#2079069)\n\n* iscsi_ttx (iSERT) completions hung while waiting for mlx5_ib_drain_sq (BZ#2079433)\n\n* WARNING: CPU: 2 PID: 969 at kernel/locking/lockdep.c:895 register_lock_class+0x234/0x1640 (BZ#2079856)\n\n* mlx5: Some rule are not offloaded to HW in OVN K8s Pod 2 External use case (BZ#2079918)\n\n* OCP node kernel crash due to ceph_fsync - unsafe_request_wait+0x143 (BZ#2080071)\n\n* TCP doesn't retransmit if in reorder state and waits for RTO (BZ#2080972)\n\n* pnfs NFSv4.1 IO causes a soft lockup (after a server reboot) and an unresponsive client (BZ#2080998)\n\n* BlueField2:  DPU can't switch to switchdev mode (BZ#2081011)\n\n* Important ice bug fixes (BZ#2081794)\n\n* For isolated CPUs (with nohz_full enabled for isolated CPUs) CPU utilization statistics are not getting reflected continuously (BZ#2084138)\n\n* Host is getting crash/abrupt reboot while  the guest has been assigned with more than 128 GB RAM while it is using NVIDIA proprietary module. (BZ#2085572)\n\n* s_pf0vf2: hw csum failure for mlx5 (BZ#2086549)\n\n* kernel memory leak while freeing nested actions (BZ#2086590)\n\n* Regression: Bluetooth will not activate after 8.5 update (BZ#2087641)\n\n* mlx5,Internal port - traffic not offloaded on tunnel interface rules on chain \u003e 0 when internal port is the vtep device. (BZ#2088610)\n\n* rule not offloaded on server side with syndrome(0x389e56) when direction is in (BZ#2088611)\n\n* TTL decrease only on the first packet (BZ#2088638)\n\n* TC HWOL of inbound traffic over geneve with ovs bridge as VTEP is not working (BZ#2088639)\n\n* Audio No Function on Orchid Bay(Mini Config) (BZ#2090423)","modified":"2026-02-04T15:00:05.905639Z","published":"2022-06-28T10:52:11Z","upstream":["CVE-2020-28915","CVE-2022-27666"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2022:5316"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1899177"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061633"}],"affected":[{"package":{"name":"kernel","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/kernel?distro=rocky-linux-8-6-legacy&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-372.13.1.el8_6"}],"database_specific":{"yum_repository":"BaseOS"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2022:5316.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}