exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

CentOS Stream 9 Missing Kernel Security Fixes

CentOS Stream 9 Missing Kernel Security Fixes
Posted Mar 21, 2023
Authored by Jann Horn, Google Security Research

The kernel tree of CentOS Stream 9 suffers from multiple use-after-free conditions that were already patched in upstream stable trees.

tags | advisory, kernel
systems | linux, centos
advisories | CVE-2023-0590, CVE-2023-1249, CVE-2023-1252
SHA-256 | a5f94e90c58a4d65e7349c5ac6abff2cbc680f758ae71b7d0bf35a8ec6642057

CentOS Stream 9 Missing Kernel Security Fixes

Change Mirror Download
CentOS Stream 9: missing kernel security fixes

Someone reminded me last week that lots of enterprise Linux kernels are
not based on upstream stable trees. The most notable enterprise Linux
distro I'm aware of is RHEL (Red Hat Enterprise Linux), so I decided to
take a look at the kernel tree of CentOS Stream 9 - according to
<https://developers.redhat.com/products/rhel/contribute-to-rhel>
CentOS Stream is the closest freely available thing to RHEL.

The CentOS Stream 9 kernel
(<https://gitlab.com/redhat/centos-stream/src/kernel/centos-stream-9>)
is based on the original upstream 5.14 release, so I decided to look
through for interesting commits in the linux-5.15.y stable tree and
check whether the same commits exist in the CentOS kernel tree.

One interesting candidate I found is
390031c94211 (\"coredump: Use the vma snapshot in fill_files_note\")
which fixes a locking bug that can lead to out-of-bounds writes,
but from what I can tell actually exploiting this would be a big pain
because unless you manage to race with the vulnerable code twice,
a memory write will happen approximately 4GiB out of bounds.

ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\")
also looked maybe interesting.

9a2544037600 (\"ovl: fix use after free in struct ovl_aio_req\")
looks like a moderately nice bug, but I think it might only be
hittable on CentOS if an ext4 filesystem is mounted, although
https://access.redhat.com/articles/rhel-limits seems to imply
that ext4 is a supported filesystem on RHEL.


I am reporting this bug under our usual 90-day deadline this time because our
policy currently doesn't have anything stricter for cases where security fixes
aren't backported; we might change our treatment of this type of issue in the
future.
It would be good if upstream Linux and distributions like you could figure out
some kind of solution to keep your security fixes in sync, so that an attacker
who wants to quickly find a nice memory corruption bug in CentOS/RHEL can't
just find such bugs in the delta between upstream stable and your kernel.
(I realize there's probably a lot of history here.)


This bug is subject to a 90-day disclosure deadline. If a fix for this
issue is made available to users before the end of the 90-day deadline,
this bug report will become public 30 days after the fix was made
available. Otherwise, this bug report will become public at the deadline.
The scheduled deadline is 2023-03-19.

Related CVE Numbers: CVE-2023-1249,CVE-2023-0590,CVE-2023-1252.





Found by: jannh@google.com

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close