Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2023:0334

Опубликовано: 23 янв. 2023
Источник: rocky
Оценка: Important

Описание

Important: kernel security and bug fix update

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)

  • kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)

  • kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)

  • kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)

  • kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077)

  • kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Intel 9.2: Important iavf bug fixes (BZ#2127884)

  • vfio zero page mappings fail after 2M instances (BZ#2128514)

  • nvme-tcp automatic reconnect fails intermittently during EMC powerstore NDU operation (BZ#2131359)

  • ice: Driver Update to 5.19 (BZ#2132070)

  • WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134588)

  • drm: duplicated call of drm_privacy_screen_register_notifier() in drm_connector_register() (BZ#2134619)

  • updating the appid field through sysfs is returning an -EINVAL error (BZ#2136914)

  • DELL EMC: System is not booting into RT Kernel with perc12. (BZ#2139213)

  • No signal showed in the VGA monitor when installing Rocky Linux9 in the legacy bios mode (BZ#2140153)

  • Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142168)

  • ppc64le: unexpected oom panic when there's enough memory left in zswap test (BZ#2143976)

  • fatal error: error in backend: Branch target out of insn range (BZ#2144902)

  • AMdCLIENT: The kernel command line parameter "nomodeset" not working properly (BZ#2145217)

  • Azure: PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150910)

  • Azure z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2151605)

  • DELL 9.0 RT - On PE R760 system, call traces are observed dmesg when system is running stress (BZ#2154407)

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
bpftoolx86_64162.12.1.el9_1.0.2bpftool-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm
kernelx86_64162.12.1.el9_1.0.2kernel-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm
kernel-abi-stablelistsnoarch162.12.1.el9_1.0.2kernel-abi-stablelists-5.14.0-162.12.1.el9_1.0.2.noarch.rpm
kernel-corex86_64162.12.1.el9_1.0.2kernel-core-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm
kernel-debugx86_64162.12.1.el9_1.0.2kernel-debug-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm
kernel-debug-corex86_64162.12.1.el9_1.0.2kernel-debug-core-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm
kernel-debug-modulesx86_64162.12.1.el9_1.0.2kernel-debug-modules-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm
kernel-debug-modules-extrax86_64162.12.1.el9_1.0.2kernel-debug-modules-extra-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm
kernel-modulesx86_64162.12.1.el9_1.0.2kernel-modules-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm
kernel-modules-extrax86_64162.12.1.el9_1.0.2kernel-modules-extra-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
больше 2 лет назад

ELSA-2023-0334: kernel security and bug fix update (IMPORTANT)

CVSS3: 7
ubuntu
почти 3 года назад

A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.

CVSS3: 7
redhat
около 3 лет назад

A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.

CVSS3: 7
nvd
почти 3 года назад

A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.

CVSS3: 7
msrc
почти 3 года назад

Описание отсутствует