Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:0778-1

Опубликовано: 16 мар. 2023
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

  • CVE-2022-36280: Fixed out-of-bounds memory access vulnerability found in vmwgfx driver (bsc#1203332).
  • CVE-2022-38096: Fixed NULL-ptr deref in vmw_cmd_dx_define_query() (bsc#1203331).
  • CVE-2023-0045: Fixed missing Flush IBP in ib_prctl_set (bsc#1207773).
  • CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).
  • CVE-2023-0597: Fixed lack of randomization of per-cpu entry area in x86/mm (bsc#1207845).
  • CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).
  • CVE-2023-22995: Fixed lacks of certain platform_device_put and kfree in drivers/usb/dwc3/dwc3-qcom.c (bsc#1208741).
  • CVE-2023-23000: Fixed return value of tegra_xusb_find_port_node function phy/tegra (bsc#1208816).
  • CVE-2023-23006: Fixed NULL vs IS_ERR checking in dr_domain_init_resources (bsc#120884).
  • CVE-2023-23559: Fixed integer overflow in rndis_wlan that leads to a buffer overflow (bsc#1207051).
  • CVE-2023-26545: Fixed double free in net/mpls/af_mpls.c upon an allocation failure (bsc#1208700).

The following non-security bugs were fixed:

  • cifs: fix use-after-free caused by invalid pointer hostname (bsc#1208971).
  • genirq: Provide new interfaces for affinity hints (bsc#1208153).
  • mm/slub: fix panic in slab_alloc_node() (bsc#1208023).
  • module: Do not wait for GOING modules (bsc#1196058, bsc#1186449, bsc#1204356, bsc#1204662).
  • net: mana: Assign interrupts to CPUs based on NUMA nodes (bsc#1208153).
  • net: mana: Fix IRQ name - add PCI and queue number (bsc#1207875).
  • net: mana: Fix accessing freed irq affinity_hint (bsc#1208153).
  • nfsd: fix use-after-free due to delegation race (bsc#1208813).
  • rdma/core: Fix ib block iterator counter overflow (bsc#1207878).
  • vmxnet3: move rss code block under eop descriptor (bsc#1208212).

Список пакетов

Image SLES15-SP2-BYOS-Azure
kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-HPC-BYOS-Azure
kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure
cluster-md-kmp-default-5.3.18-150200.24.145.1
dlm-kmp-default-5.3.18-150200.24.145.1
gfs2-kmp-default-5.3.18-150200.24.145.1
kernel-default-5.3.18-150200.24.145.1
ocfs2-kmp-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
cluster-md-kmp-default-5.3.18-150200.24.145.1
dlm-kmp-default-5.3.18-150200.24.145.1
gfs2-kmp-default-5.3.18-150200.24.145.1
kernel-default-5.3.18-150200.24.145.1
ocfs2-kmp-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
cluster-md-kmp-default-5.3.18-150200.24.145.1
dlm-kmp-default-5.3.18-150200.24.145.1
gfs2-kmp-default-5.3.18-150200.24.145.1
kernel-default-5.3.18-150200.24.145.1
ocfs2-kmp-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-BYOS-Azure
cluster-md-kmp-default-5.3.18-150200.24.145.1
dlm-kmp-default-5.3.18-150200.24.145.1
gfs2-kmp-default-5.3.18-150200.24.145.1
kernel-default-5.3.18-150200.24.145.1
ocfs2-kmp-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-BYOS-EC2-HVM
cluster-md-kmp-default-5.3.18-150200.24.145.1
dlm-kmp-default-5.3.18-150200.24.145.1
gfs2-kmp-default-5.3.18-150200.24.145.1
kernel-default-5.3.18-150200.24.145.1
ocfs2-kmp-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-BYOS-GCE
cluster-md-kmp-default-5.3.18-150200.24.145.1
dlm-kmp-default-5.3.18-150200.24.145.1
gfs2-kmp-default-5.3.18-150200.24.145.1
kernel-default-5.3.18-150200.24.145.1
ocfs2-kmp-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-EC2-HVM
cluster-md-kmp-default-5.3.18-150200.24.145.1
dlm-kmp-default-5.3.18-150200.24.145.1
gfs2-kmp-default-5.3.18-150200.24.145.1
kernel-default-5.3.18-150200.24.145.1
ocfs2-kmp-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-GCE
cluster-md-kmp-default-5.3.18-150200.24.145.1
dlm-kmp-default-5.3.18-150200.24.145.1
gfs2-kmp-default-5.3.18-150200.24.145.1
kernel-default-5.3.18-150200.24.145.1
ocfs2-kmp-default-5.3.18-150200.24.145.1
SUSE Enterprise Storage 7
kernel-default-5.3.18-150200.24.145.1
kernel-default-base-5.3.18-150200.24.145.1.150200.9.69.1
kernel-default-devel-5.3.18-150200.24.145.1
kernel-devel-5.3.18-150200.24.145.1
kernel-docs-5.3.18-150200.24.145.1
kernel-macros-5.3.18-150200.24.145.1
kernel-obs-build-5.3.18-150200.24.145.1
kernel-preempt-5.3.18-150200.24.145.1
kernel-preempt-devel-5.3.18-150200.24.145.1
kernel-source-5.3.18-150200.24.145.1
kernel-syms-5.3.18-150200.24.145.1
reiserfs-kmp-default-5.3.18-150200.24.145.1
SUSE Linux Enterprise High Availability Extension 15 SP2
cluster-md-kmp-default-5.3.18-150200.24.145.1
dlm-kmp-default-5.3.18-150200.24.145.1
gfs2-kmp-default-5.3.18-150200.24.145.1
ocfs2-kmp-default-5.3.18-150200.24.145.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
kernel-default-5.3.18-150200.24.145.1
kernel-default-base-5.3.18-150200.24.145.1.150200.9.69.1
kernel-default-devel-5.3.18-150200.24.145.1
kernel-devel-5.3.18-150200.24.145.1
kernel-docs-5.3.18-150200.24.145.1
kernel-macros-5.3.18-150200.24.145.1
kernel-obs-build-5.3.18-150200.24.145.1
kernel-preempt-5.3.18-150200.24.145.1
kernel-preempt-devel-5.3.18-150200.24.145.1
kernel-source-5.3.18-150200.24.145.1
kernel-syms-5.3.18-150200.24.145.1
SUSE Linux Enterprise Live Patching 15 SP2
kernel-default-livepatch-5.3.18-150200.24.145.1
kernel-default-livepatch-devel-5.3.18-150200.24.145.1
kernel-livepatch-5_3_18-150200_24_145-default-1-150200.5.3.1
SUSE Linux Enterprise Server 15 SP2-LTSS
kernel-default-5.3.18-150200.24.145.1
kernel-default-base-5.3.18-150200.24.145.1.150200.9.69.1
kernel-default-devel-5.3.18-150200.24.145.1
kernel-devel-5.3.18-150200.24.145.1
kernel-docs-5.3.18-150200.24.145.1
kernel-macros-5.3.18-150200.24.145.1
kernel-obs-build-5.3.18-150200.24.145.1
kernel-preempt-5.3.18-150200.24.145.1
kernel-preempt-devel-5.3.18-150200.24.145.1
kernel-source-5.3.18-150200.24.145.1
kernel-syms-5.3.18-150200.24.145.1
reiserfs-kmp-default-5.3.18-150200.24.145.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2
kernel-default-5.3.18-150200.24.145.1
kernel-default-base-5.3.18-150200.24.145.1.150200.9.69.1
kernel-default-devel-5.3.18-150200.24.145.1
kernel-devel-5.3.18-150200.24.145.1
kernel-docs-5.3.18-150200.24.145.1
kernel-macros-5.3.18-150200.24.145.1
kernel-obs-build-5.3.18-150200.24.145.1
kernel-preempt-5.3.18-150200.24.145.1
kernel-preempt-devel-5.3.18-150200.24.145.1
kernel-source-5.3.18-150200.24.145.1
kernel-syms-5.3.18-150200.24.145.1
reiserfs-kmp-default-5.3.18-150200.24.145.1

Описание

An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.145.1

Ссылки

Описание

A NULL pointer dereference vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.145.1

Ссылки

Описание

The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176. We recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.145.1

Ссылки

Описание

A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix race condition in qdisc_graft()") not applied yet, then kernel could be affected.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.145.1

Ссылки

Описание

A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected location in memory.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.145.1

Ссылки

Описание

A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.145.1

Ссылки

Описание

In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.145.1

Ссылки

Описание

In the Linux kernel before 5.17, drivers/phy/tegra/xusb.c mishandles the tegra_xusb_find_port_node return value. Callers expect NULL in the error case, but an error pointer is used.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.145.1

Ссылки

Описание

In the Linux kernel before 5.15.13, drivers/net/ethernet/mellanox/mlx5/core/steering/dr_domain.c misinterprets the mlx5_get_uars_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.145.1

Ссылки

Описание

In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.145.1

Ссылки

Описание

In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.145.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.145.1

Ссылки
Уязвимость SUSE-SU-2023:0778-1