Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:0406-1

Опубликовано: 14 фев. 2023
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).
  • CVE-2023-23454: Fixed denial or service in cbq_classify in net/sched/sch_cbq.c (bnc#1207036).
  • CVE-2023-0266: Fixed a use-after-free vulnerability inside the ALSA PCM package. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 was missing locks that could have been used in a use-after-free that could have resulted in a priviledge escalation to gain ring0 access from the system user (bsc#1207134).
  • CVE-2022-47929: Fixed NULL pointer dereference bug in the traffic control subsystem (bnc#1207237).
  • CVE-2022-47520: Fixed a out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet in the WILC1000 wireless driver (bsc#1206515).
  • CVE-2022-4662: Fixed incorrect access control in the USB core subsystem that could lead a local user to crash the system (bnc#1206664).
  • CVE-2022-42328, CVE-2022-42329: Fixed deadlock inside the netback driver that could have been triggered from a VM guest (bnc#1206114).
  • CVE-2022-3643: Fixed reset/abort/crash via netback from VM guest (bnc#1206113).
  • CVE-2022-3564: Fixed use-after-free in l2cap_core.c of the Bluetooth component (bnc#1206073).
  • CVE-2022-3435: Fixed a out-of-bounds read in function fib_nh_match of the file net/ipv4/fib_semantics.c. It is possible to initiate the attack remotely (bnc#1204171).
  • CVE-2022-3115: Fixed a null pointer dereference inside malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c that lacked a check of the return value of kzalloc() (bnc#1206393).
  • CVE-2022-3112: Fixed a null pointer dereference in amvdec_set_canvases in drivers/staging/media/meson/vdec/vdec_helpers.c that lacked a check of the return value of kzalloc() (bnc#1206399).
  • CVE-2022-3108: Fixed missing check of return value of kmemdup() (bnc#1206389).
  • CVE-2022-3107: Fixed missing check of return value of kvmalloc_array() (bnc#1206395).
  • CVE-2022-3105: Fixed missing check of kmalloc_array() in uapi_finalize in drivers/infiniband/core/uverbs_uapi.c (bnc#1206398).

The following non-security bugs were fixed:

  • HID: betop: check shape of output reports (git-fixes, bsc#1207186).
  • HID: check empty report_list in bigben_probe() (git-fixes, bsc#1206784).
  • HID: check empty report_list in hid_validate_values() (git-fixes, bsc#1206784).
  • NFS: Handle missing attributes in OPEN reply (bsc#1203740).
  • constraints: increase disk space for all architectures (bsc#1203693).
  • ipv6: ping: fix wrong checksum for large frames (bsc#1203183).
  • mm: /proc/pid/smaps_rollup: fix no vma's null-deref (bsc#1207769).
  • net: sched: atm: dont intepret cls results when asked to drop (bsc#1207036).
  • net: sched: cbq: dont intepret cls results when asked to drop (bsc#1207036).
  • netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find() (bsc#1204614).
  • rpm: suse-kernel-rpm-scriptlets to kmp buildreqs (boo#1205149).
  • sctp: fail if no bound addresses can be used for a given scope (bsc#1206677).
  • sctp: sysctl: make extra pointers netns aware (bsc#1204760).

Список пакетов

Image SLES15-SP2-BYOS-Azure
kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-HPC-BYOS-Azure
kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure
cluster-md-kmp-default-5.3.18-150200.24.142.1
dlm-kmp-default-5.3.18-150200.24.142.1
gfs2-kmp-default-5.3.18-150200.24.142.1
kernel-default-5.3.18-150200.24.142.1
ocfs2-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
cluster-md-kmp-default-5.3.18-150200.24.142.1
dlm-kmp-default-5.3.18-150200.24.142.1
gfs2-kmp-default-5.3.18-150200.24.142.1
kernel-default-5.3.18-150200.24.142.1
ocfs2-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
cluster-md-kmp-default-5.3.18-150200.24.142.1
dlm-kmp-default-5.3.18-150200.24.142.1
gfs2-kmp-default-5.3.18-150200.24.142.1
kernel-default-5.3.18-150200.24.142.1
ocfs2-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-BYOS-Azure
cluster-md-kmp-default-5.3.18-150200.24.142.1
dlm-kmp-default-5.3.18-150200.24.142.1
gfs2-kmp-default-5.3.18-150200.24.142.1
kernel-default-5.3.18-150200.24.142.1
ocfs2-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-BYOS-EC2-HVM
cluster-md-kmp-default-5.3.18-150200.24.142.1
dlm-kmp-default-5.3.18-150200.24.142.1
gfs2-kmp-default-5.3.18-150200.24.142.1
kernel-default-5.3.18-150200.24.142.1
ocfs2-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-BYOS-GCE
cluster-md-kmp-default-5.3.18-150200.24.142.1
dlm-kmp-default-5.3.18-150200.24.142.1
gfs2-kmp-default-5.3.18-150200.24.142.1
kernel-default-5.3.18-150200.24.142.1
ocfs2-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-EC2-HVM
cluster-md-kmp-default-5.3.18-150200.24.142.1
dlm-kmp-default-5.3.18-150200.24.142.1
gfs2-kmp-default-5.3.18-150200.24.142.1
kernel-default-5.3.18-150200.24.142.1
ocfs2-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-GCE
cluster-md-kmp-default-5.3.18-150200.24.142.1
dlm-kmp-default-5.3.18-150200.24.142.1
gfs2-kmp-default-5.3.18-150200.24.142.1
kernel-default-5.3.18-150200.24.142.1
ocfs2-kmp-default-5.3.18-150200.24.142.1
SUSE Enterprise Storage 7
kernel-default-5.3.18-150200.24.142.1
kernel-default-base-5.3.18-150200.24.142.1.150200.9.67.1
kernel-default-devel-5.3.18-150200.24.142.1
kernel-devel-5.3.18-150200.24.142.1
kernel-docs-5.3.18-150200.24.142.1
kernel-macros-5.3.18-150200.24.142.1
kernel-obs-build-5.3.18-150200.24.142.1
kernel-preempt-5.3.18-150200.24.142.1
kernel-preempt-devel-5.3.18-150200.24.142.1
kernel-source-5.3.18-150200.24.142.1
kernel-syms-5.3.18-150200.24.142.1
reiserfs-kmp-default-5.3.18-150200.24.142.1
SUSE Linux Enterprise High Availability Extension 15 SP2
cluster-md-kmp-default-5.3.18-150200.24.142.1
dlm-kmp-default-5.3.18-150200.24.142.1
gfs2-kmp-default-5.3.18-150200.24.142.1
ocfs2-kmp-default-5.3.18-150200.24.142.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
kernel-default-5.3.18-150200.24.142.1
kernel-default-base-5.3.18-150200.24.142.1.150200.9.67.1
kernel-default-devel-5.3.18-150200.24.142.1
kernel-devel-5.3.18-150200.24.142.1
kernel-docs-5.3.18-150200.24.142.1
kernel-macros-5.3.18-150200.24.142.1
kernel-obs-build-5.3.18-150200.24.142.1
kernel-preempt-5.3.18-150200.24.142.1
kernel-preempt-devel-5.3.18-150200.24.142.1
kernel-source-5.3.18-150200.24.142.1
kernel-syms-5.3.18-150200.24.142.1
SUSE Linux Enterprise Live Patching 15 SP2
kernel-default-livepatch-5.3.18-150200.24.142.1
kernel-default-livepatch-devel-5.3.18-150200.24.142.1
kernel-livepatch-5_3_18-150200_24_142-default-1-150200.5.3.1
SUSE Linux Enterprise Server 15 SP2-LTSS
kernel-default-5.3.18-150200.24.142.1
kernel-default-base-5.3.18-150200.24.142.1.150200.9.67.1
kernel-default-devel-5.3.18-150200.24.142.1
kernel-devel-5.3.18-150200.24.142.1
kernel-docs-5.3.18-150200.24.142.1
kernel-macros-5.3.18-150200.24.142.1
kernel-obs-build-5.3.18-150200.24.142.1
kernel-preempt-5.3.18-150200.24.142.1
kernel-preempt-devel-5.3.18-150200.24.142.1
kernel-source-5.3.18-150200.24.142.1
kernel-syms-5.3.18-150200.24.142.1
reiserfs-kmp-default-5.3.18-150200.24.142.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2
kernel-default-5.3.18-150200.24.142.1
kernel-default-base-5.3.18-150200.24.142.1.150200.9.67.1
kernel-default-devel-5.3.18-150200.24.142.1
kernel-devel-5.3.18-150200.24.142.1
kernel-docs-5.3.18-150200.24.142.1
kernel-macros-5.3.18-150200.24.142.1
kernel-obs-build-5.3.18-150200.24.142.1
kernel-preempt-5.3.18-150200.24.142.1
kernel-preempt-devel-5.3.18-150200.24.142.1
kernel-source-5.3.18-150200.24.142.1
kernel-syms-5.3.18-150200.24.142.1
reiserfs-kmp-default-5.3.18-150200.24.142.1

Описание

An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.142.1

Ссылки

Описание

An issue was discovered in the Linux kernel through 5.16-rc6. netvsc_get_ethtool_stats in drivers/net/hyperv/netvsc_drv.c lacks check of the return value of kvmalloc_array() and will cause the null pointer dereference.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.142.1

Ссылки

Описание

An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.142.1

Ссылки

Описание

An issue was discovered in the Linux kernel through 5.16-rc6. amvdec_set_canvases in drivers/staging/media/meson/vdec/vdec_helpers.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.142.1

Ссылки

Описание

An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.142.1

Ссылки

Описание

A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.142.1

Ссылки

Описание

A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.142.1

Ссылки

Описание

Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.142.1

Ссылки

Описание

Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.142.1

Ссылки

Описание

Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.142.1

Ссылки

Описание

A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.142.1

Ссылки

Описание

An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.142.1

Ссылки

Описание

In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with "tc qdisc" and "tc class" commands. This affects qdisc_graft in net/sched/sch_api.c.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.142.1

Ссылки

Описание

A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.142.1

Ссылки

Описание

cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.142.1

Ссылки

Описание

atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.142.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.142.1

Ссылки
Уязвимость SUSE-SU-2023:0406-1