kernel-5.14.0-284.18.1.el9_2

エラータID: AXSA:2023-6137:18

Release date: 
Tuesday, June 27, 2023 - 00:40
Subject: 
kernel-5.14.0-284.18.1.el9_2
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events (CVE-2023-2235)
* kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)
* Kernel: bluetooth: Unauthorized management command execution (CVE-2023-2002)
* kernel: OOB access in the Linux kernel's XFS subsystem (CVE-2023-2124)
* kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() (CVE-2023-2194)
* kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference (CVE-2023-28466)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Intel QAT Update - (kernel changes) (BZ#2176846)
* RPL-P IOTG/RPL-S IOTG: cpu frequency issues (BZ#2178857)
* In FIPS mode, kernel does not transition into error state when RCT or APT health tests fail (BZ#2181727)
* Kernel BUG in iwlmvm wifi driver when used Mesh systems (BZ#2186723)
* Azure RHEL 9 Backport upstream commit 93827a0a36396f2fd6368a54a020f420c8916e9b [KVM: VMX: Fix crash due to uninitialized current_vmcs] (BZ#2186822)
* RHEL 9 blktests nvme/047 lead kernel NULL pointer (BZ#2187536)
* Single Node Openshift cluster becomes unreachable after running less than 2 hours (BZ#2187709)
* kernel[-rt]: task deadline_test:1778 blocked for more than 622 seconds (BZ#2188655)
* fix page end in filemap_get_read_batch (BZ#2189349)
* RHEL 9.2 hwpoison: data loss when memory error occurs on hugetlb pagecache (BZ#2192348)
* wdat_wdt watchdog timeout triggered unexpectedly (BZ#2192585)
* ice: high CPU usage with GNSS or ptp4l (BZ#2203154)
* RHEL 9 "smpboot: Scheduler frequency invariance went wobbly, disabling!" on nohz_full CPUs after long run (BZ#2203178)
* Dying percpu kworkers cause issues on isolated CPUs [rhel-9] (BZ#2203229)
* FJ9.2 Bug: [REG] NFS infinite loop of COMMIT call and NFS4ERR_DELAY reply. (BZ#2203335)
* perf errors - "event syntax error: 'unc_p_delayed_c_state_abort_core5'" b'_ value too big for format, maximum is 255' (BZ#2207471)
* RHEL 9: Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208242)
* cifs: backport small patches to bring us close to 9.1 - backport commit aea02fc40a7f cifs: fix wrong unlock before return from cifs_tree_connect (BZ#2209045)
* RHEL 9 x86_64, kdump 2nd kernel will randomly panic on "kvm-08-guest25.hv2" (BZ#2210614)

CVE-2023-2002
A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication.
CVE-2023-2124
An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.
CVE-2023-2194
An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace "data->block[0]" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution.
CVE-2023-2235
A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation. The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability. We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.
CVE-2023-28466
do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).
CVE-2023-32233
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-5.14.0-284.18.1.el9_2.src.rpm
    MD5: 7cbfd851d6ceb762344a5ac9f3553e00
    SHA-256: ab26a3c7c7abb69a077bc2f1d04dd500849f8a2c9d8893648f3e9357e480aed3
    Size: 138.39 MB

Asianux Server 9 for x86_64
  1. bpftool-7.0.0-284.18.1.el9_2.x86_64.rpm
    MD5: 01758616b59c4986e84a9153150ef2cd
    SHA-256: a24077e119ff0991839218c47daa6a8abd008742b1191cfff3877a7bdb95b3ab
    Size: 4.18 MB
  2. kernel-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: fc7bc41b710396eab90423800a3d6397
    SHA-256: 5c7da7676ac1c9879cf32433220a28c3f0d7864a1abd0b90daf2cc41e77d5146
    Size: 3.43 MB
  3. kernel-abi-stablelists-5.14.0-284.18.1.el9_2.noarch.rpm
    MD5: 2cbbdf7cffb8bbdf386768b956088749
    SHA-256: 8f7df1f0827e2b45a09f784d64d03069bc38e2cd4b2d3dbf5271ad42036dd89d
    Size: 3.44 MB
  4. kernel-core-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: e239e9256143baebe362cb981097f3ff
    SHA-256: 105d53c8a919c66f3d107764ace2bbc3c3acecf023290cec6a792e571bc45506
    Size: 16.65 MB
  5. kernel-cross-headers-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: 473982fc31d3f79825f61dcd93d1ae3f
    SHA-256: 612accfe84b4bdaaa40b17ecd71584af84acac1eebd5cedf7675d29529321efd
    Size: 9.00 MB
  6. kernel-debug-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: 926b419226965bda136232eac46f1da0
    SHA-256: f695d6ceef59e4cdeb559035e42bde7319cc670368cc3a4832be4eb6b0007d43
    Size: 3.43 MB
  7. kernel-debug-core-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: dcc3e996ea7bc101653c3f807453c9fb
    SHA-256: 21cf54d2e8a6bf1822899014f450ac688b6dfc91acba56817878a5e2316d5cbc
    Size: 27.70 MB
  8. kernel-debug-devel-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: 58ee87bd1128615b25d752861b3d9594
    SHA-256: 5dc2dc4ee26a9c481a3eccd1b74cc14236fdb79aa612509fbc60b77f4017bb64
    Size: 18.62 MB
  9. kernel-debug-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: 8eeed53381ed208338277af403161872
    SHA-256: 5f4744487f9a9897640986467f56c0ce8129db995d600fbd5dfda7cc39608f23
    Size: 3.43 MB
  10. kernel-debug-modules-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: 4d6b9b152de3f8c7c3af34f4cc74cfef
    SHA-256: b7417d5ef93eda583c6a0afed3930f8df095a7f0486847a52041d90d1c6d8782
    Size: 58.51 MB
  11. kernel-debug-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: 12b9a2ddbce08869086aba91af0ce40c
    SHA-256: 8e13aba675d9560a205d2ea95128f0e53f38685c8871d38c37d052a0d4868228
    Size: 50.54 MB
  12. kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: 4ea2c1900edc6837dda4117e902ede4a
    SHA-256: 627f925ac3a97256d2a0c4d954e533931c29305e57dddcd065560e845c862d77
    Size: 4.44 MB
  13. kernel-debug-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: 7fcbf99e2c1313013378ed8fff90de2d
    SHA-256: b9969ddfca5ca9cf9263bfc6dc96dfb598d52d4e6bcffe461ea75d89867dca68
    Size: 71.80 MB
  14. kernel-devel-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: 4002344370a0adf1a5563425cf5dafe6
    SHA-256: 7f3d6ff2a0ac9e7895f98682ebd0633252e4ed7731ac7d6fa56e075dd1c5cf24
    Size: 18.63 MB
  15. kernel-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: d5c4ca28540b75600c95d813158cce02
    SHA-256: 24c6957f643ae74f8eecce80990cf23dbbd4d99d2384dc17cefb048a3136fae9
    Size: 3.43 MB
  16. kernel-doc-5.14.0-284.18.1.el9_2.noarch.rpm
    MD5: e201fa440a2582dde3087bf06694b2c6
    SHA-256: e3ef26096f21b4950436bc246b900c632d31d795d83483ca0599a3e672176853
    Size: 31.86 MB
  17. kernel-headers-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: ea468fb607cbbf0cd9e2ba67c730b442
    SHA-256: bdb8af02bbf92e6573918941176a2629ecda7cca32490d40aea137122c808251
    Size: 4.84 MB
  18. kernel-modules-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: 89f874665e173b7a684bea831588d83c
    SHA-256: 0e48a2ab9497e0c912bd4b59208c4ae53f7abd0b1bdcd36f590c45002acf7551
    Size: 37.24 MB
  19. kernel-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: c6d4afa4f6a0e6cc2091171f1ef6663d
    SHA-256: de386aee9b1fbfa25a6d77b528d3ffe2e071b8cd23ccca0b8bb278de27e32d6a
    Size: 35.45 MB
  20. kernel-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: f2ec757f7e37fa386ccfd769e7ddf798
    SHA-256: cbdc5fe193f38af5cbc0a19971b388dd497e88f52abae6c4aebcb9330a8c4ff8
    Size: 4.11 MB
  21. kernel-tools-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: b28ea018301471fee3a691f964522edc
    SHA-256: ee2a0de1ce80ebfdaf17d5b0a05bfa8476882488a58195f4bf813bacd95d15ef
    Size: 3.65 MB
  22. kernel-tools-libs-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: d4e7e381795a861142e8f0849840db92
    SHA-256: 3041be1619b2c735bce03d8adb6ea1e75aa7f3e7bd35a330a402913adcff70a2
    Size: 3.44 MB
  23. kernel-tools-libs-devel-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: 0dcc7b3efff6864b1406ce65d71c5a28
    SHA-256: 7fc53b33e0f8c6e8aee0f071676b7352201e09b5594c39a7ebbc131fa9c5b289
    Size: 3.43 MB
  24. kernel-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: 375e663c3bfca0df0e471b9a05656a88
    SHA-256: b4561cb90fcedb2750d2a7072c699efb5cb64dbda5251fe4ab2dd323b0693290
    Size: 53.81 MB
  25. perf-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: a773976583a64cc77f66210b99f3c475
    SHA-256: 5b756842be3dbff5e4327cce7992cec421af3e759ce03d6fc1ef775e3d3a57b6
    Size: 5.81 MB
  26. python3-perf-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: 41cd8586a72f2af6f5cdc0b471d9ac31
    SHA-256: 18325b14b171484663e83f36d72d5bd18ee879e2b895fffbee98ede2aaeee92e
    Size: 3.56 MB
  27. rtla-5.14.0-284.18.1.el9_2.x86_64.rpm
    MD5: fe7841c710ffd026b8674e009340705d
    SHA-256: 0edfb0585dd5ea73975df111a7cde724a6da27a646340e78e642da8f1576df3a
    Size: 3.46 MB