Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:0420-1

Опубликовано: 15 фев. 2023
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2018-9517: Fixed possible memory corruption due to a use after free in pppol2tp_connect (bsc#1108488).
  • CVE-2022-3564: Fixed use-after-free in l2cap_core.c of the Bluetooth component (bsc#1206073).
  • CVE-2022-3643: Fixed reset/abort/crash via netback from VM guest (bsc#1206113).
  • CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c's l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).
  • CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c's l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).
  • CVE-2022-4662: Fixed incorrect access control in the USB core subsystem that could lead a local user to crash the system (bsc#1206664).
  • CVE-2022-47929: Fixed NULL pointer dereference bug in the traffic control subsystem (bsc#1207237).
  • CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).
  • CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).

The following non-security bugs were fixed:

  • HID: betop: check shape of output reports (git-fixes, bsc#1207186).
  • HID: betop: fix slab-out-of-bounds Write in betop_probe (git-fixes).
  • HID: check empty report_list in hid_validate_values() (git-fixes, bsc#1206784).
  • sctp: fail if no bound addresses can be used for a given scope (bsc#1206677).

Список пакетов

SUSE Linux Enterprise Server 12 SP2-BCL
kernel-default-4.4.121-92.199.1
kernel-default-base-4.4.121-92.199.1
kernel-default-devel-4.4.121-92.199.1
kernel-devel-4.4.121-92.199.1
kernel-macros-4.4.121-92.199.1
kernel-source-4.4.121-92.199.1
kernel-syms-4.4.121-92.199.1

Описание

In pppol2tp_connect, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-38159931.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.199.1

Ссылки

Описание

A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.199.1

Ссылки

Описание

Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.199.1

Ссылки

Описание

There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.199.1

Ссылки

Описание

There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.199.1

Ссылки

Описание

A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.199.1

Ссылки

Описание

In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with "tc qdisc" and "tc class" commands. This affects qdisc_graft in net/sched/sch_api.c.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.199.1

Ссылки

Описание

cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.199.1

Ссылки

Описание

atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.199.1
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.199.1

Ссылки
Уязвимость SUSE-SU-2023:0420-1