Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:2148-1

Опубликовано: 09 мая 2023
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2023-2124: Fixed an out of bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).
  • CVE-2023-1872:Fixed a use after free vulnerability in the io_uring subsystem, which could lead to local privilege escalation (bsc#1210414).
  • CVE-2022-2196: Fixed a regression related to KVM that allowed for speculative execution attacks (bsc#1206992).
  • CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).
  • CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).
  • CVE-2023-2176: A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege (bsc#1210629).
  • CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).
  • CVE-2023-30772: Fixed a race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).
  • CVE-2023-2008: A flaw was found in the fault handler of the udmabuf device driver. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code (bsc#1210453).
  • CVE-2023-1855: Fixed a use after free in xgene_hwmon_remove (bsc#1210202).
  • CVE-2020-36691: Fixed a denial of service vulnerability via a nested Netlink policy with a back reference (bsc#1209777).
  • CVE-2023-1990: Fixed a use after free in ndlc_remove (bsc#1210337).
  • CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).
  • CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).
  • CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).
  • CVE-2023-1838: Fixed an use-after-free flaw in virtio network subcomponent. This flaw could allow a local attacker to crash the system and lead to a kernel information leak problem. (bsc#1210203).

The following non-security bugs were fixed:

  • Drivers: vmbus: Check for channel allocation before looking up relids (git-fixes).
  • cifs: fix negotiate context parsing (bsc#1210301).
  • keys: Fix linking a duplicate key to a keyring's assoc_array (bsc#1207088).
  • vmxnet3: use gro callback when UPT is enabled (bsc#1209739).

Список пакетов

Container suse/sle-micro-rancher/5.2:latest
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-Azure
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-EC2-HVM
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-GCE
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-CHOST-BYOS-Aliyun
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-CHOST-BYOS-Azure
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-CHOST-BYOS-EC2
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-CHOST-BYOS-GCE
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-CHOST-BYOS-SAP-CCloud
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-HPC-BYOS-Azure
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-HPC-BYOS-EC2-HVM
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-HPC-BYOS-GCE
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-Micro-5-1-BYOS-Azure
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-Micro-5-1-BYOS-GCE
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-Micro-5-2-BYOS-Azure
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-Micro-5-2-BYOS-GCE
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production
cluster-md-kmp-default-5.3.18-150300.59.121.2
dlm-kmp-default-5.3.18-150300.59.121.2
gfs2-kmp-default-5.3.18-150300.59.121.2
kernel-default-5.3.18-150300.59.121.2
ocfs2-kmp-default-5.3.18-150300.59.121.2
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production
cluster-md-kmp-default-5.3.18-150300.59.121.2
dlm-kmp-default-5.3.18-150300.59.121.2
gfs2-kmp-default-5.3.18-150300.59.121.2
kernel-default-5.3.18-150300.59.121.2
ocfs2-kmp-default-5.3.18-150300.59.121.2
Image SLES15-SP3-SAP-BYOS-Azure
cluster-md-kmp-default-5.3.18-150300.59.121.2
dlm-kmp-default-5.3.18-150300.59.121.2
gfs2-kmp-default-5.3.18-150300.59.121.2
kernel-default-5.3.18-150300.59.121.2
ocfs2-kmp-default-5.3.18-150300.59.121.2
Image SLES15-SP3-SAP-BYOS-EC2-HVM
cluster-md-kmp-default-5.3.18-150300.59.121.2
dlm-kmp-default-5.3.18-150300.59.121.2
gfs2-kmp-default-5.3.18-150300.59.121.2
kernel-default-5.3.18-150300.59.121.2
ocfs2-kmp-default-5.3.18-150300.59.121.2
Image SLES15-SP3-SAP-BYOS-GCE
cluster-md-kmp-default-5.3.18-150300.59.121.2
dlm-kmp-default-5.3.18-150300.59.121.2
gfs2-kmp-default-5.3.18-150300.59.121.2
kernel-default-5.3.18-150300.59.121.2
ocfs2-kmp-default-5.3.18-150300.59.121.2
Image SLES15-SP3-SAPCAL-Azure
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-SAPCAL-EC2-HVM
kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-SAPCAL-GCE
kernel-default-5.3.18-150300.59.121.2
SUSE Enterprise Storage 7.1
kernel-64kb-5.3.18-150300.59.121.2
kernel-64kb-devel-5.3.18-150300.59.121.2
kernel-default-5.3.18-150300.59.121.2
kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2
kernel-default-devel-5.3.18-150300.59.121.2
kernel-devel-5.3.18-150300.59.121.2
kernel-docs-5.3.18-150300.59.121.2
kernel-macros-5.3.18-150300.59.121.2
kernel-obs-build-5.3.18-150300.59.121.2
kernel-preempt-5.3.18-150300.59.121.2
kernel-preempt-devel-5.3.18-150300.59.121.2
kernel-source-5.3.18-150300.59.121.2
kernel-syms-5.3.18-150300.59.121.1
reiserfs-kmp-default-5.3.18-150300.59.121.2
SUSE Linux Enterprise High Availability Extension 15 SP3
cluster-md-kmp-default-5.3.18-150300.59.121.2
dlm-kmp-default-5.3.18-150300.59.121.2
gfs2-kmp-default-5.3.18-150300.59.121.2
ocfs2-kmp-default-5.3.18-150300.59.121.2
SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS
kernel-64kb-5.3.18-150300.59.121.2
kernel-64kb-devel-5.3.18-150300.59.121.2
kernel-default-5.3.18-150300.59.121.2
kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2
kernel-default-devel-5.3.18-150300.59.121.2
kernel-devel-5.3.18-150300.59.121.2
kernel-docs-5.3.18-150300.59.121.2
kernel-macros-5.3.18-150300.59.121.2
kernel-obs-build-5.3.18-150300.59.121.2
kernel-preempt-5.3.18-150300.59.121.2
kernel-preempt-devel-5.3.18-150300.59.121.2
kernel-source-5.3.18-150300.59.121.2
kernel-syms-5.3.18-150300.59.121.1
reiserfs-kmp-default-5.3.18-150300.59.121.2
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
kernel-64kb-5.3.18-150300.59.121.2
kernel-64kb-devel-5.3.18-150300.59.121.2
kernel-default-5.3.18-150300.59.121.2
kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2
kernel-default-devel-5.3.18-150300.59.121.2
kernel-devel-5.3.18-150300.59.121.2
kernel-docs-5.3.18-150300.59.121.2
kernel-macros-5.3.18-150300.59.121.2
kernel-obs-build-5.3.18-150300.59.121.2
kernel-preempt-5.3.18-150300.59.121.2
kernel-preempt-devel-5.3.18-150300.59.121.2
kernel-source-5.3.18-150300.59.121.2
kernel-syms-5.3.18-150300.59.121.1
reiserfs-kmp-default-5.3.18-150300.59.121.2
SUSE Linux Enterprise Live Patching 15 SP3
kernel-default-livepatch-5.3.18-150300.59.121.2
kernel-default-livepatch-devel-5.3.18-150300.59.121.2
kernel-livepatch-5_3_18-150300_59_121-default-1-150300.7.3.2
SUSE Linux Enterprise Micro 5.1
kernel-default-5.3.18-150300.59.121.2
kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2
SUSE Linux Enterprise Micro 5.2
kernel-default-5.3.18-150300.59.121.2
kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2
SUSE Linux Enterprise Real Time 15 SP3
kernel-default-5.3.18-150300.59.121.2
kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2
kernel-default-devel-5.3.18-150300.59.121.2
kernel-devel-5.3.18-150300.59.121.2
kernel-docs-5.3.18-150300.59.121.2
kernel-macros-5.3.18-150300.59.121.2
kernel-obs-build-5.3.18-150300.59.121.2
kernel-preempt-5.3.18-150300.59.121.2
kernel-preempt-devel-5.3.18-150300.59.121.2
kernel-source-5.3.18-150300.59.121.2
kernel-syms-5.3.18-150300.59.121.1
SUSE Linux Enterprise Server 15 SP3-LTSS
kernel-64kb-5.3.18-150300.59.121.2
kernel-64kb-devel-5.3.18-150300.59.121.2
kernel-default-5.3.18-150300.59.121.2
kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2
kernel-default-devel-5.3.18-150300.59.121.2
kernel-devel-5.3.18-150300.59.121.2
kernel-docs-5.3.18-150300.59.121.2
kernel-macros-5.3.18-150300.59.121.2
kernel-obs-build-5.3.18-150300.59.121.2
kernel-preempt-5.3.18-150300.59.121.2
kernel-preempt-devel-5.3.18-150300.59.121.2
kernel-source-5.3.18-150300.59.121.2
kernel-syms-5.3.18-150300.59.121.1
kernel-zfcpdump-5.3.18-150300.59.121.2
reiserfs-kmp-default-5.3.18-150300.59.121.2
SUSE Linux Enterprise Server for SAP Applications 15 SP3
kernel-default-5.3.18-150300.59.121.2
kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2
kernel-default-devel-5.3.18-150300.59.121.2
kernel-devel-5.3.18-150300.59.121.2
kernel-docs-5.3.18-150300.59.121.2
kernel-macros-5.3.18-150300.59.121.2
kernel-obs-build-5.3.18-150300.59.121.2
kernel-preempt-5.3.18-150300.59.121.2
kernel-preempt-devel-5.3.18-150300.59.121.2
kernel-source-5.3.18-150300.59.121.2
kernel-syms-5.3.18-150300.59.121.1
reiserfs-kmp-default-5.3.18-150300.59.121.2
SUSE Manager Proxy 4.2
kernel-default-5.3.18-150300.59.121.2
kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2
kernel-default-devel-5.3.18-150300.59.121.2
kernel-devel-5.3.18-150300.59.121.2
kernel-macros-5.3.18-150300.59.121.2
kernel-preempt-5.3.18-150300.59.121.2
SUSE Manager Server 4.2
kernel-default-5.3.18-150300.59.121.2
kernel-default-base-5.3.18-150300.59.121.2.150300.18.70.2
kernel-default-devel-5.3.18-150300.59.121.2
kernel-devel-5.3.18-150300.59.121.2
kernel-macros-5.3.18-150300.59.121.2
kernel-preempt-5.3.18-150300.59.121.2
kernel-zfcpdump-5.3.18-150300.59.121.2
openSUSE Leap 15.4
dtb-al-5.3.18-150300.59.121.1
dtb-zte-5.3.18-150300.59.121.1

Описание

An issue was discovered in the Linux kernel before 5.8. lib/nlattr.c allows attackers to cause a denial of service (unbounded recursion) via a nested Netlink policy with a back reference.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.121.2

Ссылки

Описание

A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.121.2

Ссылки

Описание

The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.121.2

Ссылки

Описание

A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.121.2

Ссылки

Описание

A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.121.2

Ссылки

Описание

A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.121.2

Ссылки

Описание

A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.121.2

Ссылки

Описание

A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation. The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered. We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.121.2

Ссылки

Описание

A use-after-free flaw was found in btsdio_remove in drivers\bluetooth\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.121.2

Ссылки

Описание

A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.121.2

Ссылки

Описание

The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line. This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.121.2

Ссылки

Описание

A flaw was found in the Linux kernel's udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.121.2

Ссылки

Описание

An out-of-bounds memory access flaw was found in the Linux kernel's XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.121.2

Ссылки

Описание

A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.121.2

Ссылки

Описание

A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA in the Linux Kernel. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.121.2

Ссылки

Описание

The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.121.2
Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.121.2

Ссылки
Уязвимость SUSE-SU-2023:2148-1