kernel-4.18.0-348.20.1.el8_5
エラータID: AXSA:2022-3099:05
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The following packages have been upgraded to a later upstream version: kernel (4.18.0).
Security Fix(es):
* kernel: improper initialization of the "flags" member of the new pipe_buffer (CVE-2022-0847)
* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)
* kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout (CVE-2021-4154)
* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)
* kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS (CVE-2022-0435)
* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)
* kernel: missing check in ioctl allows kernel memory read/write (CVE-2022-0516)
* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Intel QAT Kernel power up fix
* scsi_dma_map failed with mpt3sas driver and affecting performance
* [Lenovo 8.4 bug] audio_HDMI certification failed(No hdmi out)
* [4.18.0-323.el8.ppc64le][POWER8/9/10] security_flavor mode is not set back to zero post online migration
* iommu/amd: Fix unable to handle page fault due to AVIC
* [Lenovo 8.4 bug]The VGA display shows no signal (black screen) when install MIRACLE LINUX in the legacy BIOS mode.
* Double free of kmalloc-64 cache struct ib_port->pkey_group from module ib_core.
* Bus error with huge pages enabled
* MIRACLE LINUX - kvm: floating interrupts may get stuck
* Data corruption on small files served by httpd, which is backed by cifs-mount
* Add a net/mlx5 patch for Hardware Offload Fix
* Windows guest random Bsod when 'hv-tlbflush' enlightenment is enabled
* DNS lookup failures when run two times in a row
* net/sched: Fix ct zone matching for invalid conntrack state
* Kernel 4.18.0-348.2.1 secpath_cache memory leak involving strongswan tunnel
* OCP node XFS metadata corruption after numerous reboots
* Broadcom bnxt_re: RDMA stats are not incrementing
* ice: bug fix series for 8.6
* panic while looking up a symlink due to NULL i_op->get_link
* ceph omnibus backport for MIRACLE LINUX
* SCTP peel-off with SELinux and containers in OCP
* Selinux is not allowing SCTP connection setup between inter pod communication in enforcing mode
* dnf fails with fsync() over local repository present on CIFS mount point
CVE-2021-0920
In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel
CVE-2021-4154
A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.
CVE-2022-0330
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2022-0435
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2022-0492
A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
CVE-2022-0516
A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.
CVE-2022-0847
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.
CVE-2022-22942
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Update packages.
In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel
A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
N/A
SRPMS
- kernel-4.18.0-348.20.1.el8_5.src.rpm
MD5: 1cc822fd3ecfc765734aab8f243adc43
SHA-256: 09d32c1233a7baf0f604a843cad791c23b6739e67709f4a556f4037a4ab9ab06
Size: 120.54 MB
Asianux Server 8 for x86_64
- bpftool-4.18.0-348.20.1.el8_5.x86_64.rpm
MD5: f525fd939cc78d3fda400350beaf7cd6
SHA-256: ebfd9fdd50ebd869a44e1597c84d86296d74081e1e776561d9789107616687d1
Size: 7.69 MB - kernel-4.18.0-348.20.1.el8_5.x86_64.rpm
MD5: af061a87398bd5eef42367ff6b1bc33f
SHA-256: f4e63ef34ed2f9e68f43c829b79dc0aa41db397e4ffd6229a628cc6dd5672fce
Size: 6.99 MB - kernel-abi-stablelists-4.18.0-348.20.1.el8_5.noarch.rpm
MD5: 7da29bf3fcdd2e23d049863e24fec424
SHA-256: 0dddbac1b86dbcaf11f033fd85dcb9fb5c3ab16ac0cc43917f50f08553ac37dd
Size: 7.00 MB - kernel-core-4.18.0-348.20.1.el8_5.x86_64.rpm
MD5: ae987fe3b1da3d1e67bbbb25abe5d6fd
SHA-256: ff0b59e578b3fac5cd72137805fe699ac8cc8ec5a57d4014c728ce595e356ca6
Size: 37.59 MB - kernel-cross-headers-4.18.0-348.20.1.el8_5.x86_64.rpm
MD5: 97e5d7e95be32acb2ab2a56e724c7e72
SHA-256: fd26026819f12546a07d7317f516679b91ea05d4e20b93ea48c672becda60ec2
Size: 12.04 MB - kernel-debug-4.18.0-348.20.1.el8_5.x86_64.rpm
MD5: b25640653a58ae7b6556a4fb5010e016
SHA-256: 09ced32d8fde48795c86d0f630710fb51638a27db7a095a58077aad156020c6c
Size: 6.99 MB - kernel-debug-core-4.18.0-348.20.1.el8_5.x86_64.rpm
MD5: 0942821dfa197dcc084fd07fd3659bc1
SHA-256: 6d50771b315724df01703b0e1a4ca16e43c87c8eff669e8ab467e19f22661706
Size: 65.31 MB - kernel-debug-devel-4.18.0-348.20.1.el8_5.x86_64.rpm
MD5: 6fb0fd5fdae245aa33178198efff98a0
SHA-256: 27e5975850a1d9b591457dfb5ae3bc7e17d51822f71d9489362ffd049a84bf45
Size: 20.28 MB - kernel-debug-modules-4.18.0-348.20.1.el8_5.x86_64.rpm
MD5: 842ba081d745718cce97a102a9ee6227
SHA-256: 69039d4be2193551fcaf1dbc99480dc49d2bbcf73d5a4c82d474d2d0b30450ae
Size: 56.09 MB - kernel-debug-modules-extra-4.18.0-348.20.1.el8_5.x86_64.rpm
MD5: 5b2803631dc5c846c8c031ab1b43ce76
SHA-256: 47ece5e8818ea74e57880167afa4572c5dc91117415c0f0ee80bfd16000bf8b9
Size: 8.35 MB - kernel-devel-4.18.0-348.20.1.el8_5.x86_64.rpm
MD5: 2658bdb770c412470e6b3aedf5a0ca95
SHA-256: 0b75e2dfd7859c1fb06700b9708be325aeb4bbdba0f11785b70e40cfe8f2f579
Size: 20.08 MB - kernel-doc-4.18.0-348.20.1.el8_5.noarch.rpm
MD5: c21cd81724897621146ca843af61ceca
SHA-256: 6255c606d8d2f197c3207837c338a95f2bd19069f5a3b75d719558dfb725c9b5
Size: 24.34 MB - kernel-headers-4.18.0-348.20.1.el8_5.x86_64.rpm
MD5: 67e21901b565c5ccd08f0946289ede6a
SHA-256: b3b3cb2baa40da060a911656544eaeaee5e49f1500747bbefe0c18ca9dfadc4d
Size: 8.26 MB - kernel-modules-4.18.0-348.20.1.el8_5.x86_64.rpm
MD5: 70f07c7e1df8bd02551d6f9c92c79e27
SHA-256: fd03842bebc044ce4fcf4d385db2d2ee64180f7bca0b05f9877cc3f01578fe8d
Size: 29.82 MB - kernel-modules-extra-4.18.0-348.20.1.el8_5.x86_64.rpm
MD5: fb284d53bb741bf50d26277196c21146
SHA-256: ad32a93cb40a33e29fcce95346fbf58aecd1f8a5be7cab07264b3ddf0970df78
Size: 7.66 MB - kernel-tools-4.18.0-348.20.1.el8_5.x86_64.rpm
MD5: e006241a2046ae187bd16bb872e27919
SHA-256: ae94b1cd72936cf3f6c44a5bcfea7eb7aa0dd94a70a19735dd6b730c74d0eef2
Size: 7.20 MB - kernel-tools-libs-4.18.0-348.20.1.el8_5.x86_64.rpm
MD5: ccf9cdb4c409999962a63ef1089be291
SHA-256: 8118db2164cdc3f3737d3c2c7496e89ca5a95cf9fa13a9bda647d62e5df7edde
Size: 7.00 MB - kernel-tools-libs-devel-4.18.0-348.20.1.el8_5.x86_64.rpm
MD5: efbd1a9c7f3b79e947be6e88a8e4f5f5
SHA-256: 5530af1956a04ed91193f0954521492c0987583a7fafd41fb466e93ca1166ab1
Size: 6.99 MB - perf-4.18.0-348.20.1.el8_5.x86_64.rpm
MD5: d16a84c31c1eb2e724dec980a219b53c
SHA-256: 41f6384d83699ed72dd039ecf9c5058127db35de9d0b1229ab12f2530135b841
Size: 9.26 MB - python3-perf-4.18.0-348.20.1.el8_5.x86_64.rpm
MD5: e84a13070c3499d295f170991eaee2d0
SHA-256: 030ee5bd25957574e7dd27435688f6b823aaf692d4596613b48ffc9e214270ad
Size: 7.11 MB