kernel-5.14.0-162.12.1.el9_1

エラータID: AXSA:2023-4976:04

Release date: 
Monday, February 6, 2023 - 06:24
Subject: 
kernel-5.14.0-162.12.1.el9_1
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)
* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)
* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)
* kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077)
* kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Intel 9.2: Important iavf bug fixes
* vfio zero page mappings fail after 2M instances
* nvme-tcp automatic reconnect fails intermittently during EMC powerstore NDU operation
* ice: Driver Update to 5.19
* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50
* drm: duplicated call of drm_privacy_screen_register_notifier() in drm_connector_register()
* updating the appid field through sysfs is returning an -EINVAL error
* DELL EMC: System is not booting into RT Kernel with perc12.
* No signal showed in the VGA monitor when installing MIRACLE LINUX 9 in the legacy bios mode
* Practically limit "Dummy wait" workaround to old Intel systems
* ppc64le: unexpected oom panic when there's enough memory left in zswap test
* fatal error: error in backend: Branch target out of insn range
* AMdCLIENT: The kernel command line parameter "nomodeset" not working properly
* Azure: PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time
* Azure z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning
* DELL 9.0 RT - On PE R760 system, call traces are observed dmesg when system is running stress

CVE-2022-2959
A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.
CVE-2022-2964
A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.
CVE-2022-30594
The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.
CVE-2022-3077
A buffer overflow vulnerability was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. This flaw could allow a local user to crash the system.
CVE-2022-4139
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2022-43945
The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-5.14.0-162.12.1.el9_1.src.rpm
    MD5: d97f5c33795a03e35adee7ecf0d7b8f6
    SHA-256: 82833b9a25d2fb9b9d2e2a473f54ee1f9743695a688e1c46179f156996db9890
    Size: 130.98 MB

Asianux Server 9 for x86_64
  1. bpftool-5.14.0-162.12.1.el9_1.x86_64.rpm
    MD5: e749ddec3026ff2533ca4fd86e6804b7
    SHA-256: 7cc74c2b4770f573f030a14b46c13d40c6c53f4c42486e7555760ba7fe0bb2ed
    Size: 2.58 MB
  2. kernel-5.14.0-162.12.1.el9_1.x86_64.rpm
    MD5: 5109af34b6bce232249d8761e96953d1
    SHA-256: dd15009b2d9ad317d1f4cf5be38e128acb3df342a9cb8b2f9c4861fa2f9278cc
    Size: 1.85 MB
  3. kernel-abi-stablelists-5.14.0-162.12.1.el9_1.noarch.rpm
    MD5: df4549963954b8198b6a9f48f174d906
    SHA-256: 995aeb088e60d8aed45ccdeb03c5bea3d05ca9d35f5cc5df346219ed4a7cd8fd
    Size: 1.86 MB
  4. kernel-core-5.14.0-162.12.1.el9_1.x86_64.rpm
    MD5: 74fe036f85a3515ac59c123e76cb546e
    SHA-256: ebc450118144511f4de5162c581cdeaefc746d5bc1c00e21da492aa9cf025f27
    Size: 45.42 MB
  5. kernel-cross-headers-5.14.0-162.12.1.el9_1.x86_64.rpm
    MD5: 38d58f4d9edfb99acdd97be9c96b7915
    SHA-256: bf56bd1476b67fa4e367d41a0894e5e282dc7c9bbb012d9f15de0ef7ab58847a
    Size: 7.33 MB
  6. kernel-debug-5.14.0-162.12.1.el9_1.x86_64.rpm
    MD5: fc94258616ad8a465e9d6d71d522df0a
    SHA-256: bcb06c239918b66b02e7e907bdcc25323890120e47d3130c876b9899651e7f2e
    Size: 1.85 MB
  7. kernel-debug-core-5.14.0-162.12.1.el9_1.x86_64.rpm
    MD5: 4f185685365a69e6087b71447139ee3b
    SHA-256: 1666567cfe770e46c17889675c7f8935c3cb29a2f6063e5930bc116b7f98e156
    Size: 67.08 MB
  8. kernel-debug-devel-5.14.0-162.12.1.el9_1.x86_64.rpm
    MD5: 4426394b0c00095beeb82a76fea9916d
    SHA-256: 5674d1aca8c8b8eab2ab2e78983303babcc11093d16ec9b2191ac2a7e31f7edd
    Size: 16.69 MB
  9. kernel-debug-devel-matched-5.14.0-162.12.1.el9_1.x86_64.rpm
    MD5: c4d0f649c26642d0914c821166e007da
    SHA-256: 756994b66771578ebc878f2655a4e3093b86d0ec9d8af8b6f02c69410eb0f5bd
    Size: 1.85 MB
  10. kernel-debug-modules-5.14.0-162.12.1.el9_1.x86_64.rpm
    MD5: 7065c770fda907e7b3a5a2787c736128
    SHA-256: b8e2bf9b6978ca2763c8d5bca8bc800694bae45003df378c1bc214f5dd506697
    Size: 52.28 MB
  11. kernel-debug-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm
    MD5: c3e89fdb0d365d97a175ac493542d042
    SHA-256: d215617ba42009de1cbe85cf1fd7fd255e373d22ccb0e767525c04cbea4b70e3
    Size: 2.67 MB
  12. kernel-devel-5.14.0-162.12.1.el9_1.x86_64.rpm
    MD5: 441593be4a09e1caf2faaea44279858c
    SHA-256: 700d8640a26691c8359b25b710127286d7c33d3e5101083fea49dba2668b0567
    Size: 16.58 MB
  13. kernel-devel-matched-5.14.0-162.12.1.el9_1.x86_64.rpm
    MD5: 4a2d1c6bd0ef4512d4a0cf4ae96f7eb2
    SHA-256: 2de6d7afa987b57b19dfe541dc2e88896365cf9c4f04dc15ab2d4bd470216947
    Size: 1.85 MB
  14. kernel-doc-5.14.0-162.12.1.el9_1.noarch.rpm
    MD5: b78e8f407349c80134bd71ff1f666cc5
    SHA-256: 050d1d58b48ec2e9525a06cb2f7753ffec1e3ddf54de70ef6922cc4b4b05fe8f
    Size: 29.90 MB
  15. kernel-headers-5.14.0-162.12.1.el9_1.x86_64.rpm
    MD5: bd0407dd2880434695eb93b3eaef0921
    SHA-256: 16e558f79b1ee74cf542e03c290e982edb51eb1f2117babe5b13b32d362de187
    Size: 3.24 MB
  16. kernel-modules-5.14.0-162.12.1.el9_1.x86_64.rpm
    MD5: cb35bef7a82c763136c0c355fd516026
    SHA-256: 96f6569e39e770d8a138bd1de7033c604756cedfc3a474c9b47864328411309e
    Size: 33.43 MB
  17. kernel-modules-extra-5.14.0-162.12.1.el9_1.x86_64.rpm
    MD5: fe45bfaba3ad186674b9003c357fc5a9
    SHA-256: 1e7aaabb891f383cb7492cef48987c6608cb6133c49f1a52438c0e02960f4b46
    Size: 2.57 MB
  18. kernel-tools-5.14.0-162.12.1.el9_1.x86_64.rpm
    MD5: 6475e99fec3e9256a7d896d44e339fa6
    SHA-256: 75341bdbb7348c24d1694d9b6abb83f7bfd8273e510fe94b78c84467edbf828c
    Size: 2.08 MB
  19. kernel-tools-libs-5.14.0-162.12.1.el9_1.x86_64.rpm
    MD5: 7dfa85d4d17934ae33edd939a1c6e572
    SHA-256: 6ff8f3ba8808e113b3498506e02a1c7d6e4fb03b7563e541d9af86b55db4fe6f
    Size: 1.86 MB
  20. kernel-tools-libs-devel-5.14.0-162.12.1.el9_1.x86_64.rpm
    MD5: 176792c8b8392e7654758ae605f4e021
    SHA-256: f8d4ae41978ee9a5720136ac285e5dd82962f0984791ce5b9c2f69a1ba3ef469
    Size: 1.86 MB
  21. perf-5.14.0-162.12.1.el9_1.x86_64.rpm
    MD5: 72ab1739c4e3e2f2da25f9626876eec6
    SHA-256: 275ef8f87b2362a1d6685dd81f55e5607f4aafdd6a5c3aeda17eb9572bfb4ecf
    Size: 4.17 MB
  22. python3-perf-5.14.0-162.12.1.el9_1.x86_64.rpm
    MD5: ef5e8cb7aff53fbbde715086096029bb
    SHA-256: 4b40052e3a915b472ac4850c4c72684f91d4186c50a1342c9167fbedf645537b
    Size: 1.98 MB