kernel-5.14.0-362.24.1.el9_3

エラータID: AXSA:2024-7637:09

Release date: 
Wednesday, March 27, 2024 - 16:25
Subject: 
kernel-5.14.0-362.24.1.el9_3
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: inactive elements in nft_pipapo_walk (CVE-2023-6817)
* kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation (CVE-2024-0193)
* kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination (CVE-2024-0646)
* kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction (CVE-2023-4244)
* kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list (CVE-2023-5717)
* kernel: NULL pointer dereference in nvmet_tcp_build_iovec (CVE-2023-6356)
* kernel: NULL pointer dereference in nvmet_tcp_execute_request (CVE-2023-6535)
* kernel: NULL pointer dereference in __nvmet_req_complete (CVE-2023-6536)
* kernel: Out-Of-Bounds Read vulnerability in smbCalcSize (CVE-2023-6606)
* kernel: OOB Access in smb2_dump_detail (CVE-2023-6610)
* kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (CVE-2023-51042)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2023-4244
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability. We recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.
CVE-2023-51042
In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free.
CVE-2023-5717
A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation. If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer. We recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.
CVE-2023-6356
A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.
CVE-2023-6535
A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.
CVE-2023-6536
A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.
CVE-2023-6606
An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.
CVE-2023-6610
An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.
CVE-2023-6817
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free. We recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.
CVE-2024-0193
A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.
CVE-2024-0646
An out-of-bounds memory write flaw was found in the Linux kernel’s Transport Layer Security functionality in how a user calls a function splice with a ktls socket as the destination. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-5.14.0-362.24.1.el9_3.src.rpm
    MD5: da9f09a5dd5b0e4d3e2c3fb190b861e5
    SHA-256: 63f5911b6e2f69a50be653c0954aca3699bd600e67033981d2f02a262a56e392
    Size: 135.94 MB

Asianux Server 9 for x86_64
  1. bpftool-7.2.0-362.24.1.el9_3.x86_64.rpm
    MD5: 5fac05480e75818fe7fbe9a3365ed9d1
    SHA-256: a81cd867d7b5c3f98fee87c59cf24284c8af277745e65d52bba08e6409f93f65
    Size: 800.60 kB
  2. kernel-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: 3a967fa5c41f64d4616f48695f53c2c1
    SHA-256: 4403bdd84dfc5d5e69efde2871837f30bbfc915765396b754e0bab181c3e3924
    Size: 32.72 kB
  3. kernel-abi-stablelists-5.14.0-362.24.1.el9_3.noarch.rpm
    MD5: d891522e36a14077f2f3ae37bef8f07e
    SHA-256: 3332de0a88c4508085132fb97d8205b63624d0119ec0a9835ac92204f369ce1f
    Size: 44.34 kB
  4. kernel-core-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: c16e30431b8025ae0b9cb3e3b5e07d65
    SHA-256: 88a3fe6f74b02209522b08f6f39a09f6e159b7fb21dffc28e1bc9dc7278ac7cd
    Size: 14.65 MB
  5. kernel-cross-headers-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: 50b2ed5cc03adfbcbd32434f5180530f
    SHA-256: 4e6307b9c9b54bd6095c15cf1c85de130e1eb08846759bf379b5e0e80d3c3c6d
    Size: 6.53 MB
  6. kernel-debug-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: a4fc213fc980a2c9d8e693f95fa5a518
    SHA-256: ecf9b4f13593b37c7eeefab8e4ddc438f867dad4d710febcc3c3a136dae42399
    Size: 32.81 kB
  7. kernel-debug-core-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: b50187496df8b0ace89390864f9c994f
    SHA-256: cadd75a8c6c1628398eb1e14b4714b6e3f934f451c9a0fca0e11b61310f6af83
    Size: 27.08 MB
  8. kernel-debug-devel-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: 50fb45c9b1c1546b5770d8607de41154
    SHA-256: 577c4b56454621514f180b2ca7eb3a43adde7abb389de6c1c0009758d63debf7
    Size: 18.97 MB
  9. kernel-debug-devel-matched-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: c7bdf98ebe10564dceb60d0dbf16a073
    SHA-256: 242ee6ed5ce916a0daa77f73928a188a5ae7610d7f8464b2ed0e8d8d2f341150
    Size: 32.80 kB
  10. kernel-debug-modules-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: 9a16b1a46effd715797a87a5b90c4167
    SHA-256: d106d66b340c53445b03ea97020f323372da69028e310b907e98302c5d5b8bd0
    Size: 56.95 MB
  11. kernel-debug-modules-core-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: 0f1e7f0f1da24955a068e15b0493c21f
    SHA-256: c33e1aa5bd0f0d042a0a23558653382ec63b040249e9f2f0d3bba948615c05a9
    Size: 43.86 MB
  12. kernel-debug-modules-extra-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: 70aae14c26765504116314df1311b9b0
    SHA-256: b66383e380c4a580d15e451f1cae02219e0feaf9c6a1b8d7fe03523ecdad0318
    Size: 888.57 kB
  13. kernel-debug-uki-virt-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: 7a08673024a02616b4a90837fd3e563e
    SHA-256: 63759c99f68c578c5110eff7a056f8f40729fcc9eea98fed96fba82e33b54e2e
    Size: 74.96 MB
  14. kernel-devel-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: 0675e618dd650c9e8cfa6c647fa8803a
    SHA-256: ca415a22424e9db285bbdce94ca746b0984a4895c1378d0add8def50b5c871b9
    Size: 18.83 MB
  15. kernel-devel-matched-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: 500623a53fcedd397875c15d407c23be
    SHA-256: cd5f34d61ae9c0c885a2e76ed8d8428edfa56578e6d85b0005c83cb7553e9f45
    Size: 32.77 kB
  16. kernel-doc-5.14.0-362.24.1.el9_3.noarch.rpm
    MD5: 9e881302d5de57678fbf7fb5ca2eec00
    SHA-256: 4698e62fb0dbc476232e81a7175be583a14aad47c5010153305bd16945a9b1c9
    Size: 32.87 MB
  17. kernel-headers-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: 8f0572cff9e0d23d7837d33ae705ff91
    SHA-256: f10b996c5f673290c05a296d7c40b27792a9c3b44a9ec5e9768e747378b7afe8
    Size: 1.68 MB
  18. kernel-modules-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: 79dd54848c5785dc85b8695fd708b223
    SHA-256: d9c1c1eb83b920602b0cd88ba5d3847b87ea1bba8643c1fe552fa0b6ba1da50f
    Size: 32.43 MB
  19. kernel-modules-core-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: 94606be61eecc9ed3cdd2d00ea21aafa
    SHA-256: 77a7a07a321b0fba0cb24391080237c85306291f4f4b25812657edf8f400edfa
    Size: 26.97 MB
  20. kernel-modules-extra-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: d7a206a167faf463261069311412c191
    SHA-256: 07f64f8e1d9d14a5082725ea00f08f496d5648e11c34ee790366392b0925a464
    Size: 498.66 kB
  21. kernel-tools-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: d14d3598853affc2a9489241e8eb672c
    SHA-256: be5fefd8fb62cd8845b7e15a26a68ed5f0d25810ea90853b4f5a3287a49d73a7
    Size: 277.55 kB
  22. kernel-tools-libs-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: b85ec548ffbc43ed53b0fe7baab804a9
    SHA-256: 9d75137801640aeb9a763e14c60d3c7d5cf70e01d61418658fc117f3a0a63390
    Size: 43.57 kB
  23. kernel-tools-libs-devel-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: 97ccaeae134480752469fac473fe1ab1
    SHA-256: 77e231311db75849f3d9e2cd94edbf0dc084993df45febdfa0cfacb572e36ccb
    Size: 35.15 kB
  24. kernel-uki-virt-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: fefe560c4dfed242710416158e8a06ca
    SHA-256: 8cbbf7b9791d17622cecab3c217c482b7616a17677877d512e51925a797420f0
    Size: 55.06 MB
  25. libperf-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: cf020d952013f8310b58270b9b0f0dfa
    SHA-256: 41deee7b901c7d7513f1bb3fa9b45651c208ad38f1c466b1d0ad66c5b24b7124
    Size: 52.37 kB
  26. perf-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: 240c1c8a5e314d92b4b43edb5cb4ae80
    SHA-256: 032f3bfad1a2e8cc50ba473e57ead19a15f323ad5f7fa054de1411b3f7830713
    Size: 2.55 MB
  27. python3-perf-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: 74c5d7ea9f165e1626eb92d2d21d1ea9
    SHA-256: e1f9ca34dd8e5ba239d23cc9528aff0a6ddade911841f3ca5831a68a9d53bd4d
    Size: 130.23 kB
  28. rtla-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: 8ecd750f9fe3a23aa9cd958ef7121faa
    SHA-256: 7538e4cdb38208e87d460d959379b856c8b0e20f3d1d65ad71b3863070c6737a
    Size: 81.05 kB
  29. rv-5.14.0-362.24.1.el9_3.x86_64.rpm
    MD5: 76db1228196dff0d45d7a9f929b33cbc
    SHA-256: d5219c08dfd7daf312267d020b42cc40631003ba1da3bbbd58ab4f16e75df2ad
    Size: 45.77 kB