kernel-4.18.0-513.18.1.el8_9

エラータID: AXSA:2024-7551:07

Release date: 
Wednesday, February 28, 2024 - 09:54
Subject: 
kernel-4.18.0-513.18.1.el8_9
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: net/sched: sch_hfsc UAF (CVE-2023-4623)
* kernel: use-after-free in sch_qfq network scheduler (CVE-2023-4921)
* kernel: inactive elements in nft_pipapo_walk (CVE-2023-6817)
* kernel: IGB driver inadequate buffer size for frames larger than MTU (CVE-2023-45871)
* kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination (CVE-2024-0646)
* kernel: nfp: use-after-free in area_cache_get() (CVE-2022-3545)
* kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip (CVE-2022-41858)
* kernel: HID: check empty report_list in hid_validate_values() (CVE-2023-1073)
* kernel: Possible use-after-free since the two fdget() during vhost_net_set_backend() (CVE-2023-1838)
* kernel: NULL pointer dereference in can_rcv_filter (CVE-2023-2166)
* kernel: Slab-out-of-bound read in compare_netdev_and_ip (CVE-2023-2176)
* kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list (CVE-2023-5717)
* kernel: NULL pointer dereference in nvmet_tcp_build_iovec (CVE-2023-6356)
* kernel: NULL pointer dereference in nvmet_tcp_execute_request (CVE-2023-6535)
* kernel: NULL pointer dereference in __nvmet_req_complete (CVE-2023-6536)
* kernel: Out-Of-Bounds Read vulnerability in smbCalcSize (CVE-2023-6606)
* kernel: OOB Access in smb2_dump_detail (CVE-2023-6610)
* kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c (CVE-2023-40283)
* kernel: SEV-ES local priv escalation (CVE-2023-46813)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2022-3545
A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.
CVE-2022-41858
A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.
CVE-2023-1073
A memory corruption flaw was found in the Linux kernel’s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.
CVE-2023-1838
A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.
CVE-2023-2166
A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.
CVE-2023-2176
A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA in the Linux Kernel. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege.
CVE-2023-40283
An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.
CVE-2023-45871
An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.
CVE-2023-4623
A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free. We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.
CVE-2023-46813
An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.
CVE-2023-4921
A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue(). We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.
CVE-2023-5717
A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation. If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer. We recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.
CVE-2023-6356
A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.
CVE-2023-6535
A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.
CVE-2023-6536
A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.
CVE-2023-6606
An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.
CVE-2023-6610
An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.
CVE-2023-6817
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free. We recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.
CVE-2024-0646
An out-of-bounds memory write flaw was found in the Linux kernel’s Transport Layer Security functionality in how a user calls a function splice with a ktls socket as the destination. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-4.18.0-513.18.1.el8_9.src.rpm
    MD5: 3b69c74391d55a765a451418b16f0e6b
    SHA-256: 4c8879cad75bd8ee5741a61bf9ab646222c492e44167b01522e2813c1c7c89e1
    Size: 131.35 MB

Asianux Server 8 for x86_64
  1. bpftool-4.18.0-513.18.1.el8_9.x86_64.rpm
    MD5: 0b2f940f68d67c48173f4f766a6221b7
    SHA-256: d39b9389405e9eb9c4d779afcb17fcf70831f54f1e6d8ba43d2547391590c327
    Size: 10.79 MB
  2. kernel-4.18.0-513.18.1.el8_9.x86_64.rpm
    MD5: 2d79e8cde77542ec9f58a7f678950c51
    SHA-256: a491bd9a7a06302458c8a419cff19616100adb78e5708d231d95772b0adfc1b0
    Size: 10.05 MB
  3. kernel-abi-stablelists-4.18.0-513.18.1.el8_9.noarch.rpm
    MD5: 6eb36e952c3a4a783a6ded2c07742d87
    SHA-256: f8c07e7f445319ba22c9992f53d82cbb326eef5ca2473f2d341cf1445f626146
    Size: 10.06 MB
  4. kernel-core-4.18.0-513.18.1.el8_9.x86_64.rpm
    MD5: 21a9f2ed3204827ea02df7323156043f
    SHA-256: 74b596771582268b193fbcd69a58a28298384aab75635bc43dd7450d30c85d80
    Size: 42.86 MB
  5. kernel-cross-headers-4.18.0-513.18.1.el8_9.x86_64.rpm
    MD5: 748c0785a9cc18885c2adc0e717c74b1
    SHA-256: cd8e6ddc4b9438575d09367039710f80c8499d92854d1355470fedfc7ef8114c
    Size: 15.39 MB
  6. kernel-debug-4.18.0-513.18.1.el8_9.x86_64.rpm
    MD5: 831692ca4f8b6b86f3e47675b996a832
    SHA-256: 504003f54926b76e10382b4ba4e6b4a89027078eaf5f6a9827f26da3dd7460e4
    Size: 10.05 MB
  7. kernel-debug-core-4.18.0-513.18.1.el8_9.x86_64.rpm
    MD5: b84658dbbc1a43e597b55cbe4b1937bc
    SHA-256: 53c18a53aa796a42c7b39f05ef8510d5d1c9a79b6e555b11835b606c77816857
    Size: 71.78 MB
  8. kernel-debug-devel-4.18.0-513.18.1.el8_9.x86_64.rpm
    MD5: 84d31b37783d339a3853daa7725afebe
    SHA-256: 9fefd6e0b3b1d4500c9c885eb6575d92c02c11d49be0a02652bb0838bf079006
    Size: 23.84 MB
  9. kernel-debug-modules-4.18.0-513.18.1.el8_9.x86_64.rpm
    MD5: 205c6aec410e096e78e583c5629bfa6d
    SHA-256: 3729ff8b107da82d0555079b27d699b0a64b30370a38d74ef9f16aba4691ba18
    Size: 65.28 MB
  10. kernel-debug-modules-extra-4.18.0-513.18.1.el8_9.x86_64.rpm
    MD5: ad84a0360bd03a53722df5a8a9d1dd4c
    SHA-256: f88d5c7c7fb7857c32a4a99318b567e05a3186a1899bded3753124362f8ba8a3
    Size: 11.42 MB
  11. kernel-devel-4.18.0-513.18.1.el8_9.x86_64.rpm
    MD5: 2ebea2173dcff882b98c25d614aa98c1
    SHA-256: 50e3366c2dcb91552faec9fba3e188388c558dd034d08ec3ec48ae7a369adc83
    Size: 23.64 MB
  12. kernel-doc-4.18.0-513.18.1.el8_9.noarch.rpm
    MD5: fa937ec4bd8a8ab6ad7f82f18c9fd635
    SHA-256: f4b5f13419d4db53509c7f84bc02b9a243648f47c3c097c6147ff336eab5a238
    Size: 27.83 MB
  13. kernel-headers-4.18.0-513.18.1.el8_9.x86_64.rpm
    MD5: 2d0eec9a23244c4d7e8bea1869fec20e
    SHA-256: aab01136572a28dbea83c976cf2a14b783f6356891045f13c909d571f8cc5a9c
    Size: 11.40 MB
  14. kernel-modules-4.18.0-513.18.1.el8_9.x86_64.rpm
    MD5: e2c7ad716eba85dc50be2df1f78fe805
    SHA-256: e676a294bb0bfe08f5f5409a8104a4b166a5b5252357e716947b71902e7a1b39
    Size: 35.78 MB
  15. kernel-modules-extra-4.18.0-513.18.1.el8_9.x86_64.rpm
    MD5: 02195db4c718e43ef2efc05d024b44a7
    SHA-256: 27fc72a3020f84a16e9d433646931d1d79fdae475ff41505fa4c3143c83e08e0
    Size: 10.74 MB
  16. kernel-tools-4.18.0-513.18.1.el8_9.x86_64.rpm
    MD5: 98c56bf766f1b87ac19b99e917191631
    SHA-256: 19f0701e6882bad79a8225d5f19e5fe50249617f134abef156c15e0cee53729f
    Size: 10.27 MB
  17. kernel-tools-libs-4.18.0-513.18.1.el8_9.x86_64.rpm
    MD5: d9a3aa6a32407c0d72e218baf7cb41fb
    SHA-256: 0b2fd7298648d272c1ee94bec880f650a9dc47815f5f1dd66e5c97695f17207c
    Size: 10.06 MB
  18. kernel-tools-libs-devel-4.18.0-513.18.1.el8_9.x86_64.rpm
    MD5: 902c6b107c94dcac2c0d8c36fc8fc19b
    SHA-256: f6ad5d5145bca399eadb411459fba93e1cd577e318bcaabfef8270d235ba9482
    Size: 10.05 MB
  19. perf-4.18.0-513.18.1.el8_9.x86_64.rpm
    MD5: 6e86aa9842818d37b2138dfa40ae4c35
    SHA-256: 16bd9a76ae417d132e03311dd6848691a826f3e9d39a6fd2b5e64dc93bdcd18d
    Size: 12.38 MB
  20. python3-perf-4.18.0-513.18.1.el8_9.x86_64.rpm
    MD5: d93e6bf78447163c19fa023ac0691008
    SHA-256: 39d56d61512fb42cc277c2f442ad788a2317b36e21645d09d221e475a68179a1
    Size: 10.17 MB