Race Condition Affecting kernel-uki-virt package, versions <0:5.14.0-284.11.1.el9_2
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ORACLE9-KERNELUKIVIRT-5536674
- published 5 Oct 2022
- disclosed 31 Aug 2022
How to fix?
Upgrade Oracle:9
kernel-uki-virt
to version 0:5.14.0-284.11.1.el9_2 or higher.
This issue was patched in ELSA-2023-2458
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-uki-virt
package and not the kernel-uki-virt
package as distributed by Oracle
.
See How to fix?
for Oracle:9
relevant fixed versions and status.
A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.
References
- https://linux.oracle.com/cve/CVE-2022-3028.html
- https://linux.oracle.com/errata/ELSA-2022-9852.html
- https://linux.oracle.com/errata/ELSA-2022-9870.html
- https://linux.oracle.com/errata/ELSA-2022-9871.html
- https://linux.oracle.com/errata/ELSA-2022-9926.html
- https://linux.oracle.com/errata/ELSA-2022-9927.html
- https://linux.oracle.com/errata/ELSA-2022-9930.html
- https://linux.oracle.com/errata/ELSA-2022-9931.html
- https://linux.oracle.com/errata/ELSA-2022-9998.html
- https://linux.oracle.com/errata/ELSA-2022-9999.html
- https://linux.oracle.com/errata/ELSA-2023-2458.html
- https://linux.oracle.com/errata/ELSA-2023-2951.html
- https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5
- https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
- https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3MYP7WX4PNE6RCITVXA43CECBZT4CL6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKVA75UHKVOHNOEPCLUHTFGWCOOUBDM3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEQYVCNYUWB4CJ2YRAYNF2GGFQ7SUYC4/
- https://lore.kernel.org/all/YtoWqEkKzvimzWS5@gondor.apana.org.au/T/
- https://security.netapp.com/advisory/ntap-20230214-0004/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3MYP7WX4PNE6RCITVXA43CECBZT4CL6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JKVA75UHKVOHNOEPCLUHTFGWCOOUBDM3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEQYVCNYUWB4CJ2YRAYNF2GGFQ7SUYC4/
- https://lore.kernel.org/all/YtoWqEkKzvimzWS5%40gondor.apana.org.au/T/