kernel-4.18.0-305.el8

エラータID: AXSA:2021-2148:12

Release date: 
Saturday, July 3, 2021 - 06:21
Subject: 
kernel-4.18.0-305.el8
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)
* kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c (CVE-2019-18811)
* kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (CVE-2019-19523)
* kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (CVE-2019-19528)
* kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)
* kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)
* kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)
* kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)
* kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)
* kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)
* kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)
* kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)
* kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)
* kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)
* kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)
* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)
* kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)
* kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)
* kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)
* kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent (CVE-2020-35508)
* kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations (CVE-2020-36322)
* kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege (CVE-2021-0342)
* kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c (CVE-2020-11608)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Asianux Server 8.4 Release Notes linked from the References section.

CVE-2019-18811
A memory leak in the sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering sof_get_ctrl_copy_params() failures, aka CID-45c1380358b1.
CVE-2019-19523
In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.
CVE-2019-19528
In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.
CVE-2020-0431
In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459
CVE-2020-11608
An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.
CVE-2020-12114
A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.
CVE-2020-12362
Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access.
CVE-2020-12464
usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.
CVE-2020-14314
A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.
CVE-2020-14356
A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.
CVE-2020-15437
The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized.
CVE-2020-24394
In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.
CVE-2020-25212
A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.
CVE-2020-25284
The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.
CVE-2020-25285
A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.
CVE-2020-25643
A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CVE-2020-25704
A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.
CVE-2020-27786
A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
CVE-2020-27835
A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.
CVE-2020-28974
A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.
CVE-2020-35508
A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.
CVE-2020-36322
An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.
CVE-2021-0342
In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. User interaction is not required for exploitation. Product: Android; Versions: Android kernel; Android ID: A-146554327.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-4.18.0-305.el8.src.rpm
    MD5: 493e11b1c877a51b07f245cde308a626
    SHA-256: 502af547177128f893373c5cc15c7e9c6722b24c64c65debf0a36c7f3a07aa8a
    Size: 117.28 MB

Asianux Server 8 for x86_64
  1. bpftool-4.18.0-305.el8.x86_64.rpm
    MD5: b498b2772e8d5649e5c64d64a49f0cbe
    SHA-256: cbbf86e0f738827387967a4dc8fd35d0e5c2519c8d6f22c48402dd014b2e738f
    Size: 6.56 MB
  2. kernel-4.18.0-305.el8.x86_64.rpm
    MD5: 26b71c23f3740e36356a797f74c4bdd1
    SHA-256: 8f8830da358a97f90477f9c8e691162af6baaa21677422070a78bdb050bff948
    Size: 5.87 MB
  3. kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
    MD5: f8e21459703db7be6b2223a5185d3df4
    SHA-256: 7c06a1998117b9ec40df8a86b5d96a71636f8dd7937c11304042b5e5744d8822
    Size: 5.88 MB
  4. kernel-core-4.18.0-305.el8.x86_64.rpm
    MD5: 18f8d22d01aaed7388ebeb4f68eba75f
    SHA-256: 80c06b7c8258315414438a007534dbb58b803891109dffabb0ba1bac3183a7ed
    Size: 35.79 MB
  5. kernel-cross-headers-4.18.0-305.el8.x86_64.rpm
    MD5: dd25ee333caa0efc3819fa5eb0c88f90
    SHA-256: b9b6fd075a73608a08a250091e69e64a05b6af78fe083eb545fbe30bfc907ad4
    Size: 10.83 MB
  6. kernel-debug-4.18.0-305.el8.x86_64.rpm
    MD5: a510c72ce76a7e00f551ccfa6c02ce0f
    SHA-256: 74b4ce00ebdc07e1862f26cb3302c03c6314a02e34b73dafda4ee3abdc529817
    Size: 5.87 MB
  7. kernel-debug-core-4.18.0-305.el8.x86_64.rpm
    MD5: db246cafc7e5d2a8e83899ac87d68531
    SHA-256: 689b89f94b18342f7837a65781981b21d89b40f065424450032f58b797609cd8
    Size: 62.81 MB
  8. kernel-debug-devel-4.18.0-305.el8.x86_64.rpm
    MD5: 9b767a3e30fd5440e218cefb64a834fb
    SHA-256: 90671c59062c2c03133deacad8cff34f0e57c3fe90bb8e5b2ec3ad0c1aeef449
    Size: 18.54 MB
  9. kernel-debug-modules-4.18.0-305.el8.x86_64.rpm
    MD5: 01a34f1ed02d895fd52ad0730397dbda
    SHA-256: 131306a58b8e3f35e5cddf317d51ae5b5a24096b12d74cfe44841c93fba35ce1
    Size: 53.54 MB
  10. kernel-debug-modules-extra-4.18.0-305.el8.x86_64.rpm
    MD5: 3b2b2717d4f59563ae6fd3c7ab7ec536
    SHA-256: eef523d71236836cbfc7503b7ca9968451346ca845bc5b341e48844f8c0da939
    Size: 7.22 MB
  11. kernel-devel-4.18.0-305.el8.x86_64.rpm
    MD5: 5f12c3d65b64459d6c8e628f748b4358
    SHA-256: dd7991b90e7d3ac935dc7fef6767179f08e36d72b703d41bd0b66214d78b63a7
    Size: 18.35 MB
  12. kernel-doc-4.18.0-305.el8.noarch.rpm
    MD5: e373359762969152241a327a54bfa059
    SHA-256: 6896f8e613839760cfc789190f0d05b7a94d2f70b0bbc6b9f8bc648b4124376a
    Size: 22.59 MB
  13. kernel-headers-4.18.0-305.el8.x86_64.rpm
    MD5: 745f0bd1cb4af8e60257781fcd7b5993
    SHA-256: d81e642f9a4e7c9e62d0c71fa15d4b76600d03acde7bfb132949e940ee48168f
    Size: 7.13 MB
  14. kernel-modules-4.18.0-305.el8.x86_64.rpm
    MD5: 453ee24d1b05b4561c123f00f17e1e80
    SHA-256: 4e1e261acbf67bd5d6d5f83662f8eb9703543406a5fa7c521f04209dd5708568
    Size: 28.06 MB
  15. kernel-modules-extra-4.18.0-305.el8.x86_64.rpm
    MD5: fb4fec9b72514bb9b46f09afd3fd64d4
    SHA-256: 3bf7fa2affdc9345353e989b3e9e51cc56d3c69ecc10830fc9c30c243abc7537
    Size: 6.54 MB
  16. kernel-tools-4.18.0-305.el8.x86_64.rpm
    MD5: 51ad46c80f723d860d46c48974063c56
    SHA-256: bcba976a54afcb0fa1c7c2dd547e64dd5ca827b365842b41785db35653a57230
    Size: 6.08 MB
  17. kernel-tools-libs-4.18.0-305.el8.x86_64.rpm
    MD5: 57d81ebfb58cc77acc71d7ac340c1a92
    SHA-256: 93a399ee441ff50e03f804fd283c329ac54c62d8cbd82db2fa3596d5106d6f3f
    Size: 5.88 MB
  18. perf-4.18.0-305.el8.x86_64.rpm
    MD5: e949007a43ded62144bf5e0225fb9741
    SHA-256: cf330189263b546826d9ccb8f5ef571491cd6268c55ea296e5f0f224b7af81ff
    Size: 8.10 MB
  19. python3-perf-4.18.0-305.el8.x86_64.rpm
    MD5: 4c21fa635d80b17345bdc126acdbc8a2
    SHA-256: 4667a29cdc4b1a035f59e2a843e5a52abb9c49be44fce26f7aadf4c44cbc4159
    Size: 5.99 MB