kernel-5.14.0-362.18.1.el9_3

エラータID: AXSA:2024-7499:06

Release date: 
Friday, February 2, 2024 - 18:27
Subject: 
kernel-5.14.0-362.18.1.el9_3
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating
system.

Security Fix(es):

kernel: tun: bugs for oversize packet when napi frags enabled in
tun_napi_alloc_frags (CVE-2023-3812)
kernel: use after free in unix_stream_sendpage (CVE-2023-4622)
kernel: net/sched: sch_hfsc UAF (CVE-2023-4623)
kernel: use after free in nvmet_tcp_free_crypto in NVMe (CVE-2023-5178)
kernel: vmwgfx: reference count issue leads to use-after-free in surface
handling (CVE-2023-5633)
kernel: netfilter: potential slab-out-of-bound access due to integer
underflow (CVE-2023-42753)
kernel: nfp: use-after-free in area_cache_get() (CVE-2022-3545)
kernel: vmwgfx: integer overflow in vmwgfx_execbuf.c (CVE-2022-36402)
kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip
(CVE-2022-41858)
kernel: NULL pointer dereference in can_rcv_filter (CVE-2023-2166)
kernel: Slab-out-of-bound read in compare_netdev_and_ip (CVE-2023-2176)
kernel: use-after-free in netfilter: nf_tables (CVE-2023-3777)
kernel: use after free in nft_immediate_deactivate (CVE-2023-4015)
kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong
con2fb_map assignment (CVE-2023-38409)
kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c
(CVE-2023-40283)
kernel: SEV-ES local priv escalation (CVE-2023-46813)
kernel: NULL pointer dereference in dpll_pin_parent_pin_set() in
drivers/dpll/dpll_netlink.c (CVE-2023-6679)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.

CVE(s):
CVE-2022-3545
A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.
CVE-2022-36402
An integer overflow vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).
CVE-2022-41858
A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.
CVE-2023-2166
A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.
CVE-2023-2176
A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA in the Linux Kernel. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege.
CVE-2023-3777
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances. We recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.
CVE-2023-3812
An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.
CVE-2023-38409
An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info).
CVE-2023-4015
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. On an error when building a nftables rule, deactivating immediate expressions in nft_immediate_deactivate() can lead unbinding the chain and objects be deactivated but later used. We recommend upgrading past commit 0a771f7b266b02d262900c75f1e175c7fe76fec2.
CVE-2023-40283
An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.
CVE-2023-42753
An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.
CVE-2023-4622
A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.
CVE-2023-4623
A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free. We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.
CVE-2023-46813
An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.
CVE-2023-5178
A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation problem.
CVE-2023-5633
The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.
CVE-2023-6679
A null pointer dereference vulnerability was found in dpll_pin_parent_pin_set() in drivers/dpll/dpll_netlink.c in the Digital Phase Locked Loop (DPLL) subsystem in the Linux kernel. This issue could be exploited to trigger a denial of service.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-5.14.0-362.18.1.el9_3.src.rpm
    MD5: f503b97859364635d77235aa3b6b7e37
    SHA-256: 287840e7a9766300aed3ec1de39e8a61074c65dc80378b33dbb5bcd6066d46e5
    Size: 135.88 MB

Asianux Server 9 for x86_64
  1. bpftool-7.2.0-362.18.1.el9_3.x86_64.rpm
    MD5: e4c9fd6baae6626b36a30af92ba0617f
    SHA-256: ce89e4792289b9d22759ed0b6898af3b249514d141c8261f538ef030d8c098ea
    Size: 777.20 kB
  2. kernel-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: c3f2e208a563b5b84ffbf4a811f7f2e8
    SHA-256: 725c4206abee72cb8f6861d10b05eee03daf98d4fc2ec8ba2747637bfb964da5
    Size: 9.73 kB
  3. kernel-abi-stablelists-5.14.0-362.18.1.el9_3.noarch.rpm
    MD5: 6a7f6b6a12cd25cc041b93e77a0b440b
    SHA-256: c5a987b0705ce90da07c758cc7971a4f9bd4a267fc52e0a4655958f7fe631363
    Size: 21.34 kB
  4. kernel-core-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: 148a8e22a05a51314dc1c3e986e30d5d
    SHA-256: 1936389a9bf673bcedbf2f2e169ec1d5a71f69db3991647da4db152e512a51d0
    Size: 14.62 MB
  5. kernel-cross-headers-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: 12f81152396595de6ee65e78de0e1fed
    SHA-256: 7efd334aaa0ee0efe56d0c9265164842a1dfd3e815b7ff574fbcc58339254291
    Size: 6.50 MB
  6. kernel-debug-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: 451db7b96a5f5241ca5c2d1c2e2f3d25
    SHA-256: 667a8278e128983284ebe356bee10dac34eb69d04f59b42b031378407cb8eefd
    Size: 9.82 kB
  7. kernel-debug-core-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: c0443ea71890644727c77c4f61095070
    SHA-256: 9278b2e0b7cb298b2ac4815c2b576bbe5d4e39ad7748a2541ccf767ed7388e66
    Size: 27.03 MB
  8. kernel-debug-devel-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: 75d2bfeef832c06c69b3d89f642c71f2
    SHA-256: 34c9385f19534e3ce690aebba493bc1a5345773638d5bc451cf6864d7821e9bf
    Size: 18.94 MB
  9. kernel-debug-devel-matched-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: 4dbb1221d5a585e3235b03a976fc668b
    SHA-256: 53c9a08141bc198a0348aa53bdecd4ef5225c81bbfd3a14062260d96a234797b
    Size: 9.81 kB
  10. kernel-debug-modules-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: 29b100f8a49de950c48b7cdcf5ae5f30
    SHA-256: 08371b411c66ca5028146826b980b38fac7545092dbba57eda6437035b024cc7
    Size: 56.90 MB
  11. kernel-debug-modules-core-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: cdab14bff7201e2521c60b7d7e624720
    SHA-256: 63d53e77da0df2359743a1bf142556780cabc6f654d49000a4183bb43923d478
    Size: 43.82 MB
  12. kernel-debug-modules-extra-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: c21c7531039169a5d8c7ae1d83adef3e
    SHA-256: 2b1bea29795b286fdbca64e21e290de741bbdf8afb3189b82213918d8c6e8ef7
    Size: 866.22 kB
  13. kernel-debug-uki-virt-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: 7e37d8390242197bad634dae1c99655b
    SHA-256: 8f7277ec943546cbcaace286bc14cc9fb9a0f0e62b3e5407fd204d4767a8678c
    Size: 74.92 MB
  14. kernel-devel-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: 7ccae4cdae8fd9a3bb28ab165408d704
    SHA-256: 1b2278317b981a0662dbc2a592db062c9c7d9897439850d14c7d80b61a9ebc30
    Size: 18.80 MB
  15. kernel-devel-matched-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: 5c1e2363e95c2bba4530b9ab8bc2e8c2
    SHA-256: 5522907d593374e070fbcbf9e41e64fb55a5375f78bf7002f0aab4ce7c139983
    Size: 9.77 kB
  16. kernel-doc-5.14.0-362.18.1.el9_3.noarch.rpm
    MD5: c83508c9e55708a7fb202f9044128eed
    SHA-256: 7154b6fbce38682c5734a05191a99559bc863689842ea2ff583ca534b527a185
    Size: 32.84 MB
  17. kernel-headers-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: 17abbc09effa3313826ee8c3b284f712
    SHA-256: 4ed9e4daaa81ec7a0e6c3a6ed6de2725ab9be04f5ace5bd4dce50dc006e9cea5
    Size: 1.65 MB
  18. kernel-modules-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: 942c4ffaaca6b65ef8ab33d9af3b9c1e
    SHA-256: 1194037b4038d53b02926e051820a4a9cda5fbdf39d5e4811eeb346f4051f4bf
    Size: 32.39 MB
  19. kernel-modules-core-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: 48ae2e052ac5515f1a89a345087641f6
    SHA-256: 41a7f47d897b022f6fd3d973494def37615891b98b4ad521d3e4d53fc5315539
    Size: 26.93 MB
  20. kernel-modules-extra-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: c9485c5575b34c5bd257e8d8b7177638
    SHA-256: d3c2558d6fa95eabbff638b0d63145bb4789b99fa91c4750cdd681fb74c68292
    Size: 476.12 kB
  21. kernel-tools-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: 018ab9f38deec96dc3f67b033b27d705
    SHA-256: c0bc040fcd634c64682fa9fb8107dff72f2ccd164320acd2a902ba0c30006e6e
    Size: 254.55 kB
  22. kernel-tools-libs-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: b6e34b074d7e3e131a60f75a995a96b3
    SHA-256: 2d6510f8a59edac811046dd1369704e108f966d244859a87e54e874fa6fed151
    Size: 20.58 kB
  23. kernel-tools-libs-devel-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: 6f0bcc81859490e0628026ed55cd3414
    SHA-256: ec57a8ced52080a390d46506096f61d6f4a792c7c23fe7423342cecfb5a8310d
    Size: 12.16 kB
  24. kernel-uki-virt-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: ff10401ab6ac6d050e5a889def614a5c
    SHA-256: 7d209c524b485f419429a184fce6054f498e5328fead91711b008d1ba9e98ce6
    Size: 55.07 MB
  25. libperf-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: 48223d4e994c585200a9cf649153be6e
    SHA-256: 8a1639080cfe314288f7a06f5552267e511386a9b0ed231f0ba58061cb5e3ff2
    Size: 29.38 kB
  26. perf-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: 064efb1d466d17a8a7e7c8e5c5b89672
    SHA-256: 08e0f1cb869ad34b7162c3e0f89e6e6f311303e434126dfd234b811a6499c26b
    Size: 2.53 MB
  27. python3-perf-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: d11574dc49d73bb13180f80b30e6ea59
    SHA-256: b4bcab0dd2a034f0cd0336f5caf708c0d9b75a58c0cff283f3b6f20c9d505fa7
    Size: 107.24 kB
  28. rtla-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: 67237a76ff860adae633a528ba71cae2
    SHA-256: cdc64f1a2cf99f573eeafb8460632cd8871a083cd079a60ba5914f2083437e59
    Size: 58.06 kB
  29. rv-5.14.0-362.18.1.el9_3.x86_64.rpm
    MD5: 0b2e9a87de99f8f153f52e47af7827bc
    SHA-256: ea4d3d14935d83cbfa64ce10e30e7f5cd4dde4b1ee13d7cdfba22e5a6693b1f7
    Size: 22.78 kB