• 公告ID (KylinSec-SA-2023-2298)

摘要:

kernel security update

安全等级: High

公告ID: KylinSec-SA-2023-2298

发布日期: 2023年11月3日

关联CVE: CVE-2022-44033   CVE-2022-45919   CVE-2023-31083   CVE-2023-31085   CVE-2023-34324   CVE-2023-39194   CVE-2023-45863   CVE-2023-5717  

  • 详细介绍

1. 漏洞描述

   

The Linux Kernel, the operating system core itself.

Security Fix(es):

An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().(CVE-2022-44033)

An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.(CVE-2022-45919)

An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.(CVE-2023-31083)

An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd->erasesize), used indirectly by ctrl_cdev_ioctl, when mtd->erasesize is 0.(CVE-2023-31085)

Closing of an event channel in the Linux kernel can result in a deadlock. This happens when the close is being performed in parallel to an unrelated Xen console action and the handling of a Xen console interrupt in an unprivileged guest. The closing of an event channel is e.g. triggered by removal of a paravirtual device on the other side. As this action will cause console messages to be issued on the other side quite often, the chance of triggering the deadlock is not neglectable.
A (malicious) guest administrator could cause a denial of service (DoS) in a backend domain (other than dom0) by disabling a paravirtualized device. A malicious backend could cause DoS in a guest running a Linux kernel by disabling a paravirtualized device.(CVE-2023-34324)

A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.(CVE-2023-39194)

An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.(CVE-2023-45863)

A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.

If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.

We recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.

(CVE-2023-5717)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2022-44033 KY3.4-5A kernel Fixed
CVE-2022-45919 KY3.4-5A kernel Fixed
CVE-2023-31083 KY3.4-5A kernel Fixed
CVE-2023-31085 KY3.4-5A kernel Fixed
CVE-2023-34324 KY3.4-5A kernel Fixed
CVE-2023-34324 KY3.4-5A kernel Unaffected
CVE-2023-39194 KY3.4-5A kernel Fixed
CVE-2023-45863 KY3.4-5A kernel Fixed
CVE-2023-45863 KY3.4-5A kernel Unaffected
CVE-2023-5717 KY3.4-5A kernel Fixed

3. 影响组件

    kernel

4. 修复版本

   

KY3.4-5A

软件名称 架构 版本号
kernel-source x86_64 4.19.90-2403.1.0.0268.kb1.ky3_4
kernel-tools x86_64 4.19.90-2403.1.0.0268.kb1.ky3_4
python3-perf x86_64 4.19.90-2403.1.0.0268.kb1.ky3_4
perf x86_64 4.19.90-2403.1.0.0268.kb1.ky3_4
bpftool x86_64 4.19.90-2403.1.0.0268.kb1.ky3_4
kernel-tools-devel x86_64 4.19.90-2403.1.0.0268.kb1.ky3_4
kernel-devel x86_64 4.19.90-2403.1.0.0268.kb1.ky3_4
python2-perf x86_64 4.19.90-2403.1.0.0268.kb1.ky3_4
kernel x86_64 4.19.90-2403.1.0.0268.kb1.ky3_4
bpftool aarch64 4.19.90-2403.1.0.0268.kb1.ky3_4
kernel-source aarch64 4.19.90-2403.1.0.0268.kb1.ky3_4
kernel-tools-devel aarch64 4.19.90-2403.1.0.0268.kb1.ky3_4
perf aarch64 4.19.90-2403.1.0.0268.kb1.ky3_4
python3-perf aarch64 4.19.90-2403.1.0.0268.kb1.ky3_4
kernel-tools aarch64 4.19.90-2403.1.0.0268.kb1.ky3_4
kernel aarch64 4.19.90-2403.1.0.0268.kb1.ky3_4
kernel-devel aarch64 4.19.90-2403.1.0.0268.kb1.ky3_4
python2-perf aarch64 4.19.90-2403.1.0.0268.kb1.ky3_4

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

KY3.4-5A:

x86_64:

     kernel-source   

     kernel-tools   

     python3-perf   

     perf   

     bpftool   

     kernel-tools-devel   

     kernel-devel   

     python2-perf   

     kernel   

aarch64:

     bpftool   

     kernel-source   

     kernel-tools-devel   

     perf   

     python3-perf   

     kernel-tools   

     kernel   

     kernel-devel   

     python2-perf   

上一篇:KylinSec-SA-2023-2022 下一篇:KylinSec-SA-2023-2300