kernel-5.14.0-284.11.1.el9_2

エラータID: AXSA:2023-5567:15

Release date: 
Friday, May 26, 2023 - 10:41
Subject: 
kernel-5.14.0-284.11.1.el9_2
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896)
* net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)
* cpu: AMD CPUs may transiently execute beyond unconditional direct branch (CVE-2021-26341)
* malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory (CVE-2021-33655)
* possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462)
* KVM: NULL pointer dereference in kvm_mmu_invpcid_gva (CVE-2022-1789)
* use-after-free in free_pipe_info() could lead to privilege escalation (CVE-2022-1882)
* KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks (CVE-2022-2196)
* netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663)
* race condition in xfrm_probe_algs can lead to OOB read/write (CVE-2022-3028)
* out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c (CVE-2022-3435)
* race condition in hugetlb_no_page() in mm/hugetlb.c (CVE-2022-3522)
* memory leak in ipv6_renew_options() (CVE-2022-3524)
* data races around icsk->icsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566)
* data races around sk->sk_prot (CVE-2022-3567)
* memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (CVE-2022-3619)
* denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry (CVE-2022-3623)
* use-after-free after failed devlink reload in devlink_param_get (CVE-2022-3625)
* USB-accessible buffer overflow in brcmfmac (CVE-2022-3628)
* use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c (CVE-2022-3640)
* Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed (CVE-2022-3707)
* mptcp: NULL pointer dereference in subflow traversal at disconnect time (CVE-2022-4128)
* l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference (CVE-2022-4129)
* igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets (CVE-2022-20141)
* lockdown bypass using IMA (CVE-2022-21505)
* double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c (CVE-2022-28388)
* network backend may cause Linux netfront to use freed SKBs (XSA-405) (CVE-2022-33743)
* unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry (CVE-2022-39188)
* TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning (CVE-2022-39189)
* u8 overflow problem in cfg80211_update_notlisted_nontrans() (CVE-2022-41674)
* use-after-free related to leaf anon_vma double reuse (CVE-2022-42703)
* use-after-free in bss_ref_get in net/wireless/scan.c (CVE-2022-42720)
* BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c (CVE-2022-42721)
* Denial of service in beacon protection for P2P-device (CVE-2022-42722)
* memory corruption in usbmon driver (CVE-2022-43750)
* NULL pointer dereference in traffic control subsystem (CVE-2022-47929)
* NULL pointer dereference in rawv6_push_pending_frames (CVE-2023-0394)
* use-after-free due to race condition in qdisc_graft() (CVE-2023-0590)
* use-after-free caused by invalid pointer hostname in fs/cifs/connect.c (CVE-2023-1195)
* denial of service in tipc_conn_close (CVE-2023-1382)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2021-26341
Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.
CVE-2021-33655
When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.
CVE-2022-1462
An out-of-bounds read flaw was found in the Linux kernel’s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.
CVE-2022-1789
With shadow paging enabled, the INVPCID instruction results in a call to kvm_mmu_invpcid_gva. If INVPCID is executed with CR0.PG=0, the invlpg callback is not set and the result is a NULL pointer dereference.
CVE-2022-1882
A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.
CVE-2022-20141
In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel
CVE-2022-21505
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2022-2196
A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a
CVE-2022-2663
An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.
CVE-2022-28388
usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.
CVE-2022-3028
A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.
CVE-2022-33743
network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed.
CVE-2022-3435
A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.
CVE-2022-3522
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2022-3524
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.
CVE-2022-3566
A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the component TCP Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. The identifier VDB-211089 was assigned to this vulnerability.
CVE-2022-3567
A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.
CVE-2022-3619
A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211918 is the identifier assigned to this vulnerability.
CVE-2022-3623
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function follow_page_pte of the file mm/gup.c of the component BPF. The manipulation leads to race condition. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211921 was assigned to this vulnerability.
CVE-2022-3625
A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.
CVE-2022-3628
A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.
CVE-2022-3640
A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.
CVE-2022-3707
A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.
CVE-2022-39188
An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.
CVE-2022-39189
An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.
CVE-2022-4128
A NULL pointer dereference issue was discovered in the Linux kernel in the MPTCP protocol when traversing the subflow list at disconnect time. A local user could use this flaw to potentially crash the system causing a denial of service.
CVE-2022-4129
A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.
CVE-2022-41674
An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.
CVE-2022-42703
mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.
CVE-2022-42720
Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.
CVE-2022-42721
A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.
CVE-2022-42722
In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.
CVE-2022-42896
There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c... https://www.google.com/url
CVE-2022-43750
drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor's internal memory.
CVE-2022-47929
In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with "tc qdisc" and "tc class" commands. This affects qdisc_graft in net/sched/sch_api.c.
CVE-2023-0394
A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.
CVE-2023-0461
There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c
CVE-2023-0590
A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix race condition in qdisc_graft()") not applied yet, then kernel could be affected.
CVE-2023-1195
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2023-1382
A data race flaw was found in the Linux kernel, between where con is allocated and con->sock is set. This issue leads to a NULL pointer dereference when accessing con->sock->sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-5.14.0-284.11.1.el9_2.src.rpm
    MD5: 5a5878e3284b5a562623f8d23a4adb3c
    SHA-256: f14e0eabde6a201e6fe6c7e98cdd7dd85544fc6f101165b9501a22caa5627442
    Size: 138.40 MB

Asianux Server 9 for x86_64
  1. bpftool-7.0.0-284.11.1.el9_2.x86_64.rpm
    MD5: bed83bcb88153b17be4ab2d598190c22
    SHA-256: ffedb1c9dd816f8bea269df290263eb82ce56485bcf050a29f5eb96c0ec4a8c4
    Size: 4.18 MB
  2. kernel-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: 7380fca48028b88019567763293de0e6
    SHA-256: 244ec3481252dc79156acf1558ba746e1c73b4d2ebe5addea9c427dfda04e55d
    Size: 3.42 MB
  3. kernel-abi-stablelists-5.14.0-284.11.1.el9_2.noarch.rpm
    MD5: 53094e025fd1a21040722e9e1e768bdb
    SHA-256: 3d1d875b14f6cd048486c75b26c280ca7e57c92a5201f1e3fea112efab4fc5a9
    Size: 3.43 MB
  4. kernel-core-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: eeb80197ea8f41be718cc04651e8288b
    SHA-256: d2e41cb274a4bbdcc822ad8db5760338ff4ecd7bef621c8d92d547d008d09372
    Size: 16.64 MB
  5. kernel-cross-headers-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: fe71709f6cd746f73de0dc4c83125087
    SHA-256: 2e00b8ac796bd3c6b20285b5d280b97ba9e291d840636313bd8e07f287ebfba8
    Size: 8.99 MB
  6. kernel-debug-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: 418281c42282898766fd33994daebbde
    SHA-256: b69e5d649650f835e24d760680d22cd8e1a8d052ee1c043a60d41774250f1352
    Size: 3.42 MB
  7. kernel-debug-core-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: 50d1a499df6da64eb4ef04e2e74e1241
    SHA-256: 9fdf692c7b63fc4a5d2f164408a90ee54b3b6a02940c9d17c1cdf56c7cbe0c59
    Size: 27.69 MB
  8. kernel-debug-devel-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: 3b62443bcfea7f8a35df2b4b74c1b071
    SHA-256: afc4adab468b03ea8b83ce6691080d6fd418499635a58da710eb0fa054fe8aca
    Size: 18.61 MB
  9. kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: d9e5059ea898d989a6649ea7dd7c3d11
    SHA-256: 0ab822d2a52f4b3e1de2a7e636a9cf34bb5dd68fd156c036605676761bf36ef1
    Size: 3.42 MB
  10. kernel-debug-modules-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: 78a964ce2cc37a206810ca2acc7312c2
    SHA-256: 7b1a98a5e4441815cf9f296d77872d8d175d76a7e0c562b6451219d9d3eabf91
    Size: 58.57 MB
  11. kernel-debug-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: 1a15d07e330d6fb53341a5aef364f00b
    SHA-256: 384b0ef517023ef4b56c62e4f4d24671cbcbb13879484e1cabc4d9b206fc02a8
    Size: 50.55 MB
  12. kernel-debug-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: 8f12a35979d4edac04251677974c2bf1
    SHA-256: bb4134b819e337bc09169a3c0cfdf4c3c5cfeaa4df638e7247e5a213e69150a1
    Size: 4.43 MB
  13. kernel-debug-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: d35d71cf087ef91f4a7e8d37be17f9c2
    SHA-256: 32faa517274c3e126e6ebaaaea3047c7aaf45f9482b8efcb286042c4acffeded
    Size: 71.72 MB
  14. kernel-devel-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: 81743d620f8c5cf463cb01e60b4cc5b0
    SHA-256: ce65c28d08752dfa6371cf60160226c9385d994091b6b524f4a2f6a5e10dcab7
    Size: 18.62 MB
  15. kernel-devel-matched-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: 1b86842fce0ce70b8380ab8cc820fdf8
    SHA-256: 42e4e55f6f41ca59b7297eb436a7716135ff2c1cb1458aded3f767b668ac4b47
    Size: 3.42 MB
  16. kernel-doc-5.14.0-284.11.1.el9_2.noarch.rpm
    MD5: 24f4968701d3b5c0115f6ea136ca9f1b
    SHA-256: 32e231a096d68a60379710ae9fdb74ba4cc16618d1aaedf2b53b263e7a06cada
    Size: 31.85 MB
  17. kernel-headers-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: c76d9df36f021d4cb99e58b8537410cd
    SHA-256: b8a644e841d74461bb027263c4f8c174151f99ad42312fb5d9202057feb3b75e
    Size: 4.83 MB
  18. kernel-modules-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: 24b9c334b4d5331be5b21f69cb1d7157
    SHA-256: a31c6326c2e0e975844f0556f35db5ad70ac16ff0f30438b9a5b1c2649883d8b
    Size: 37.22 MB
  19. kernel-modules-core-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: 7d029dae45e9d4e502c388cd3162414a
    SHA-256: a64416f1059db6a0f0d36b6a5b192dca142d5b0e8eafa6fb60ca73b9419b2e78
    Size: 35.45 MB
  20. kernel-modules-extra-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: ccbf654ce70b8a01401b44f78a5f5ab0
    SHA-256: 89aae0e6e133717ebfa8572f2e3050469cc3767b46cf9375dc040e10c50dea22
    Size: 4.10 MB
  21. kernel-tools-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: 10ca0cf579d3ddb50ea0cc8b82b4c051
    SHA-256: eb1b27bfdab099ad3a3885432342ea179996c484cf6f70b351c447e16df31383
    Size: 3.65 MB
  22. kernel-tools-libs-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: b9dbdab2036351974316baa0953a592f
    SHA-256: a1c20d5a2349b674598beaa1c429fdf1109b59614775d69a2757012db4f745e0
    Size: 3.43 MB
  23. kernel-tools-libs-devel-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: a0f2e51e887788c1f9146286c78c0151
    SHA-256: 1e6fac2ed430a0eb1ea8dc46dad6af485f75efc0df8dc69082b57b89946ab58e
    Size: 3.42 MB
  24. kernel-uki-virt-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: 9826d51e45d194089c768385a9dbdf4a
    SHA-256: eeb71d3f9f5dba3813a0889960897c91651772acef189df66ab046edf38962ec
    Size: 53.70 MB
  25. perf-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: e3de916b006e81116fc5d4de64ed3395
    SHA-256: 56348814ef193fac44a4436a13446b639007c32844c4c4db501bc1c15c8438a1
    Size: 5.80 MB
  26. python3-perf-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: 57fe4f6863c4225485ae5721faa77805
    SHA-256: 27cb8476e061236ca53b5c0f32a8e0f137ef75ae5c210c4ddf85a88e636addec
    Size: 3.56 MB
  27. rtla-5.14.0-284.11.1.el9_2.x86_64.rpm
    MD5: e881aa7299ea6f3d86db3dfc67ab0bb6
    SHA-256: 098b948cdcae415e3cd0b6830c4930df24ae1354137916abb8ccf3fc3544fb17
    Size: 3.46 MB