[Debian] High CVE: CVE-2023-42755/CVE-2023-42752/CVE-2023-4622/CVE-2023-37453/CVE-2023-42753/CVE-2023-4623/CVE-2023-4921 kernel: multiple CVEs

Bug #2038710 reported by Yue Tao
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
StarlingX
Fix Released
High
Peng Zhang

Bug Description

CVE-2023-4244: https://nvd.nist.gov/vuln/detail/CVE-2023-4244

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability. We recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.

CVE-2023-31085: https://nvd.nist.gov/vuln/detail/CVE-2023-31085

An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd->erasesize), used indirectly by ctrl_cdev_ioctl, when mtd->erasesize is 0.

CVE-2023-45871: https://nvd.nist.gov/vuln/detail/CVE-2023-45871

An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.

CVE-2023-5197: https://nvd.nist.gov/vuln/detail/CVE-2023-5197

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free. We recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.

CVE-2023-39194: https://nvd.nist.gov/vuln/detail/CVE-2023-39194

A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.

CVE-2023-39192: https://nvd.nist.gov/vuln/detail/CVE-2023-39192

A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.

CVE-2023-39193: https://nvd.nist.gov/vuln/detail/CVE-2023-39193

A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

CVE-2023-42756: https://nvd.nist.gov/vuln/detail/CVE-2023-42756

A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.

CVE-2023-42754: https://nvd.nist.gov/vuln/detail/CVE-2023-42754

A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.

CVE-2023-39189: https://nvd.nist.gov/vuln/detail/CVE-2023-39189

A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

CVE-2023-31084: https://nvd.nist.gov/vuln/detail/CVE-2023-31084

An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(&fepriv->sem) is called. However, wait_event_interruptible would put the process to sleep, and down(&fepriv->sem) may block the process.

CVE-2023-3389: https://nvd.nist.gov/vuln/detail/CVE-2023-3389

A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Racing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer. We recommend upgrading past commit ef7dfac51d8ed961b742218f526bd589f3900a59 (4716c73b188566865bdd79c3a6709696a224ac04 for 5.10 stable and 0e388fce7aec40992eadee654193cad345d62663 for 5.15 stable).

CVE-2022-45884: https://nvd.nist.gov/vuln/detail/CVE-2022-45884:

An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.

CVE-2023-42755: https://nvd.nist.gov/vuln/detail/CVE-2023-42755

A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.

CVE-2023-42752: https://nvd.nist.gov/vuln/detail/CVE-2023-42752

CVE-2023-4622: https://nvd.nist.gov/vuln/detail/CVE-2023-4622

A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.

CVE-2023-37453: https://nvd.nist.gov/vuln/detail/CVE-2023-37453

An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.

CVE-2023-42753: https://nvd.nist.gov/vuln/detail/CVE-2023-42753

An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.

CVE-2023-4623: https://nvd.nist.gov/vuln/detail/CVE-2023-4623

A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.

If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.

We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.

CVE-2023-4921: https://nvd.nist.gov/vuln/detail/CVE-2023-4921

A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.

When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().

We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.

Base Score: High

Reference:

Upgrade Yocto Linux_5.10.198

Yue Tao (wrytao)
summary: [Debian] High CVE:
- CVE-2023-4622/CVE-2023-37453/CVE-2023-42753/CVE-2023-4623/CVE-2023-4921
+ CVE-2023-42752/CVE-2023-4622/CVE-2023-37453/CVE-2023-42753/CVE-2023-4623/CVE-2023-4921
kernel: multiple CVEs
description: updated
Yue Tao (wrytao)
summary: [Debian] High CVE:
- CVE-2023-42752/CVE-2023-4622/CVE-2023-37453/CVE-2023-42753/CVE-2023-4623/CVE-2023-4921
+ CVE-2023-42755/CVE-2023-42752/CVE-2023-4622/CVE-2023-37453/CVE-2023-42753/CVE-2023-4623/CVE-2023-4921
kernel: multiple CVEs
description: updated
description: updated
Yue Tao (wrytao)
description: updated
Yue Tao (wrytao)
description: updated
Yue Tao (wrytao)
description: updated
description: updated
Yue Tao (wrytao)
description: updated
Yue Tao (wrytao)
description: updated
Yue Tao (wrytao)
description: updated
Yue Tao (wrytao)
description: updated
Yue Tao (wrytao)
description: updated
description: updated
Yue Tao (wrytao)
description: updated
Yue Tao (wrytao)
description: updated
description: updated
Yue Tao (wrytao)
description: updated
Yue Tao (wrytao)
description: updated
Yue Tao (wrytao)
description: updated
Yue Tao (wrytao)
description: updated
Peng Zhang (pzhang2)
Changed in starlingx:
assignee: nobody → Peng Zhang (pzhang2)
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to kernel (master)

Fix proposed to branch: master
Review: https://review.opendev.org/c/starlingx/kernel/+/899024

Changed in starlingx:
status: Triaged → In Progress
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to kernel (master)
Download full text (3.4 KiB)

Reviewed: https://review.opendev.org/c/starlingx/kernel/+/899024
Committed: https://opendev.org/starlingx/kernel/commit/88eaffd00c2b4cc1e866ea2ead446d648e04296b
Submitter: "Zuul (22348)"
Branch: master

commit 88eaffd00c2b4cc1e866ea2ead446d648e04296b
Author: Peng Zhang <email address hidden>
Date: Wed Nov 1 11:03:09 2023 +0000

    Update kernel to v5.10.198

    This commit updates kernel to v5.10.198 to fix following CVE issues:
    1.CVE-2023-4244: https://nvd.nist.gov/vuln/detail/CVE-2023-4244
    2.CVE-2023-31085: https://nvd.nist.gov/vuln/detail/CVE-2023-31085
    3.CVE-2023-45871: https://nvd.nist.gov/vuln/detail/CVE-2023-45871
    4.CVE-2023-5197: https://nvd.nist.gov/vuln/detail/CVE-2023-5197
    5.CVE-2023-39194: https://nvd.nist.gov/vuln/detail/CVE-2023-39194
    6.CVE-2023-39192: https://nvd.nist.gov/vuln/detail/CVE-2023-39192
    7.CVE-2023-39193: https://nvd.nist.gov/vuln/detail/CVE-2023-39193
    8.CVE-2023-42756: https://nvd.nist.gov/vuln/detail/CVE-2023-42756
    9.CVE-2023-42754: https://nvd.nist.gov/vuln/detail/CVE-2023-42754
    10.CVE-2023-39189: https://nvd.nist.gov/vuln/detail/CVE-2023-39189
    11.CVE-2023-31084: https://nvd.nist.gov/vuln/detail/CVE-2023-31084
    12.CVE-2023-3389: https://nvd.nist.gov/vuln/detail/CVE-2023-3389
    13.CVE-2022-45884: https://nvd.nist.gov/vuln/detail/CVE-2022-45884
    14.CVE-2023-42755: https://nvd.nist.gov/vuln/detail/CVE-2023-42755
    15.CVE-2023-42752: https://nvd.nist.gov/vuln/detail/CVE-2023-42752
    16.CVE-2023-4622: https://nvd.nist.gov/vuln/detail/CVE-2023-4622
    17.CVE-2023-37453: https://nvd.nist.gov/vuln/detail/CVE-2023-37453
    18.CVE-2023-42753: https://nvd.nist.gov/vuln/detail/CVE-2023-42753
    19.CVE-2023-4623: https://nvd.nist.gov/vuln/detail/CVE-2023-4623
    20.CVE-2023-4921: https://nvd.nist.gov/vuln/detail/CVE-2023-4921

    One of our source patches requires refresh against the new kernel
    source.It was deleted for content has been contained in the new
    kernel:
      0072-kernel-fork-beware-of-__put_task_struct-calling-cont.patch.

    Under PREEMPT_RT, when kernel is upgraded to v5.10.198,
    raw_write_seqcount_t_begin function is still used by qdisc_run_begin
    function in include/net/sch_generic.h. While
    raw_write_seqcount_t_begin function is replaced by
    do_raw_write_seqcount_begin in include/linux/seqlock.h whose commit
    is a8dd21118b0f.
     Commit ID Title
    a8dd21118b0f seqlock: Prefix internal seqcount_t-only macros with
                  a "do_"
    To fix implicit declaration of function raw_write_seqcount_t_begin,
    replace it with do_raw_write_seqcount_begin in the following patch:
     0083-net-replace-raw_write_seqcount_t_begin-by-do_raw_wri.patch

    Verification:
    - Build kernel and out of tree modules success for rt and std.
    - Build iso success for rt and std.
    - Install success onto a AIO-DX lab with rt kernel.
    - Boot up successfully in the lab.
    - The sanity testing was done by our test team and no regression
      defect was found.
    - The cyclictest benchmark was also run on the starlingx lab, the
      result is "samples: 259200000 avg: 1610 max:...

Read more...

Changed in starlingx:
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.