• 公告ID (KylinSec-SA-2024-1234)

摘要:

kernel security update

安全等级: High

公告ID: KylinSec-SA-2024-1234

发布日期: 2024年1月12日

关联CVE: CVE-2023-6610   CVE-2023-6932   CVE-2023-6606   CVE-2023-6931   CVE-2023-35827   CVE-2023-6817   CVE-2021-33631  

  • 详细介绍

1. 漏洞描述

   

The Linux Kernel, the operating system core itself.

Security Fix(es):

openeuler-linux-kernel-5.10.149-ext4_write_inline_data-kernel_bug-365020(CVE-2021-33631)

An issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c.(CVE-2023-35827)

An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.(CVE-2023-6606)

An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.(CVE-2023-6610)

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.

We recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.

(CVE-2023-6817)

A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation.

A perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().

We recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.

(CVE-2023-6931)

A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation.

A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.

We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.

(CVE-2023-6932)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2023-6610 KY3.5.2 kernel Fixed
CVE-2023-6932 KY3.5.2 kernel Fixed
CVE-2023-6606 KY3.5.2 kernel Fixed
CVE-2023-6931 KY3.5.2 kernel Fixed
CVE-2023-35827 KY3.5.2 kernel Fixed
CVE-2023-6817 KY3.5.2 kernel Fixed
CVE-2021-33631 KY3.5.2 kernel Fixed

3. 影响组件

    kernel

4. 修复版本

   

KY3.5.2

软件名称 架构 版本号
kernel-tools-devel x86_64 5.10.0-153.12.0.92.kb8.ky3_5
kernel-headers x86_64 5.10.0-153.12.0.92.kb8.ky3_5
python3-perf x86_64 5.10.0-153.12.0.92.kb8.ky3_5
kernel-tools x86_64 5.10.0-153.12.0.92.kb8.ky3_5
kernel-source x86_64 5.10.0-153.12.0.92.kb8.ky3_5
kernel x86_64 5.10.0-153.12.0.92.kb8.ky3_5
kernel-devel x86_64 5.10.0-153.12.0.92.kb8.ky3_5
perf x86_64 5.10.0-153.12.0.92.kb8.ky3_5
bpftool x86_64 5.10.0-153.12.0.92.kb8.ky3_5
perf aarch64 5.10.0-153.12.0.92.kb8.ky3_5
kernel-tools aarch64 5.10.0-153.12.0.92.kb8.ky3_5
kernel-tools-devel aarch64 5.10.0-153.12.0.92.kb8.ky3_5
bpftool aarch64 5.10.0-153.12.0.92.kb8.ky3_5
kernel-headers aarch64 5.10.0-153.12.0.92.kb8.ky3_5
kernel-devel aarch64 5.10.0-153.12.0.92.kb8.ky3_5
python3-perf aarch64 5.10.0-153.12.0.92.kb8.ky3_5
kernel-source aarch64 5.10.0-153.12.0.92.kb8.ky3_5
kernel aarch64 5.10.0-153.12.0.92.kb8.ky3_5

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

KY3.5.2:

x86_64:

     kernel-tools-devel   

     kernel-headers   

     python3-perf   

     kernel-tools   

     kernel-source   

     kernel   

     kernel-devel   

     perf   

     bpftool   

aarch64:

     perf   

     kernel-tools   

     kernel-tools-devel   

     bpftool   

     kernel-headers   

     kernel-devel   

     python3-perf   

     kernel-source   

     kernel   

上一篇:KylinSec-SA-2024-1232 下一篇:KylinSec-SA-2024-1235