Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:2163-1

Опубликовано: 10 мая 2023
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2023-2483: Fixed a use after free bug in emac_remove due caused by a race condition (bsc#1211037).
  • CVE-2023-2124: Fixed an out of bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).
  • CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).
  • CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).
  • CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).
  • CVE-2023-30772: Fixed a race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).
  • CVE-2023-1855: Fixed a use after free in xgene_hwmon_remove (bsc#1210202).
  • CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).
  • CVE-2023-1990: Fixed a use after free in ndlc_remove (bsc#1210337).
  • CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).
  • CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).
  • CVE-2020-36691: Fixed a denial of service vulnerability via a nested Netlink policy with a back reference (bsc#1209777).

The following non-security bugs were fixed:

  • ARM: 8702/1: head-common.S: Clear lr before jumping to start_kernel() (git-fixes)
  • USB: dwc3: fix runtime pm imbalance on probe errors (git-fixes).
  • USB: dwc3: fix runtime pm imbalance on unbind (git-fixes).
  • arm64: kaslr: Reserve size of ARM64_MEMSTART_ALIGN in linear region (git-fixes)
  • ath10k: Fix error handling in case of CE pipe init failure (git-fixes).
  • ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).
  • ath10k: Fix the parsing error in service available event (git-fixes).
  • ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).
  • ath10k: fix control-message timeout (git-fixes).
  • ath10k: fix division by zero in send path (git-fixes).
  • ath10k: fix memory overwrite of the WoWLAN wakeup packet pattern (git-fixes).
  • audit: improve audit queue handling when 'audit=1' on cmdline (bsc#1209969).
  • bpf, x86: Fix encoding for lower 8-bit registers in BPF_STX BPF_B (git-fixes).
  • bs-upload-kernel: Do not skip post-build-checks
  • cachefiles: Drop superfluous readpages aops NULL check (bsc#1210430).
  • cachefiles: Fix page leak in cachefiles_read_backing_file while vmscan is active (bsc#1210430).
  • cachefiles: Fix race between read_waiter and read_copier involving op->to_do (bsc#1210430).
  • cachefiles: Handle readpage error correctly (bsc#1210430).
  • cgroup/cpuset: Wake up cpuset_attach_wq tasks in cpuset_cancel_attach() (bsc#1210827).
  • cifs: fix negotiate context parsing (bsc#1210301).
  • cifs: fix open leaks in open_cached_dir() (bsc#1209342).
  • cred: allow get_cred() and put_cred() to be given NULL (bsc#1209887).
  • crypto: x86/ghash - fix unaligned access in ghash_setkey() (git-fixes).
  • drivers: net: lmc: fix case value for target abort error (git-fixes).
  • fscache, cachefiles: remove redundant variable 'cache' (bsc#1210430).
  • ftrace: Mark get_lock_parent_ip() __always_inline (git-fixes).
  • intel_pmc_ipc: restore ability to call functions with irq enabled (git-fixes).
  • ipmi: fix SSIF not responding under certain cond (git-fixes).
  • iwlwifi: Fix -EIO error code that is never returned (git-fixes).
  • iwlwifi: fw: make pos static in iwl_sar_get_ewrd_table() loop (git-fixes).
  • iwlwifi: pcie: fix locking when 'HW not ready' (git-fixes).
  • iwlwifi: pcie: gen2: fix locking when 'HW not ready' (git-fixes).
  • iwlwifi: pcie: reschedule in long-running memory reads (git-fixes).
  • kabi/severities: ignore KABI for NVMe, except nvme-fc (bsc#1174777).
  • kcm: Only allow TCP sockets to be attached to a KCM mux (git-fixes).
  • keys: Change keyring_serialise_link_sem to a mutex (bsc#1207088).
  • keys: Fix linking a duplicate key to a keyring's assoc_array (bsc#1207088).
  • keys: Hoist locking out of __key_link_begin() (bsc#1207088).
  • kretprobe: Prevent triggering kretprobe from within kprobe_flush_task (git-fixes).
  • l2tp: clean up stale tunnel or session in pppol2tp_connect's error path (git-fixes).
  • l2tp: fix pseudo-wire type for sessions created by pppol2tp_connect() (git-fixes).
  • l2tp: reject creation of non-PPP sessions on L2TPv2 tunnels (git-fixes).
  • net/ncsi: Do not return error on normal response (git-fixes).
  • net: axienet: Fix double deregister of mdio (git-fixes).
  • net: core: dst: Add kernel-doc for 'net' parameter (git-fixes).
  • net: core: dst_cache_set_ip6: Rename 'addr' parameter to 'saddr' for consistency (git-fixes).
  • net: phy: realtek: Use the dummy stubs for MMD register access for rtl8211b (git-fixes).
  • net: prevent ISA drivers from building on PPC32 (git-fixes).
  • net: usb: qmi_wwan: add Telit 0x1080 composition (git-fixes).
  • netfilter: nft_set_rbtree: fix parameter of __nft_rbtree_lookup() (git-fixes).
  • netfilter: x_tables: Add note about how to free percpu counters (git-fixes).
  • ntp: Limit TAI-UTC offset (git-fixes)
  • nvme-pci: do not WARN_ON in nvme_reset_work if ctrl.state is not RESETTING (git-fixes).
  • nvme-pci: fix doorbell buffer value endianness (git-fixes).
  • nvme: retain split access workaround for capability reads (git-fixes).
  • platform/x86: intel_pmc_ipc: Use devm_* calls in driver probe function (git-fixes).
  • platform/x86: intel_pmc_ipc: Use spin_lock to protect GCR updates (git-fixes).
  • powercap: fix possible name leak in powercap_register_zone() (git-fixes).
  • powerpc/numa: Consider the max NUMA node for migratable LPAR (bsc#1209999 ltc#202140 bsc#1190544 ltc#194520 bsc#1142685 ltc#179509 git-fixes).
  • powerpc/numa: Detect support for coregroup (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
  • powerpc/numa: Limit possible nodes to within num_possible_nodes (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
  • powerpc/numa: Restrict possible nodes based on platform (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
  • powerpc/papr_scm: Update the NUMA distance table for the target node (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
  • powerpc/pseries: Consolidate different NUMA distance update code paths (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
  • powerpc/pseries: Rename TYPE1_AFFINITY to FORM1_AFFINITY (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
  • powerpc/pseries: rename min_common_depth to primary_domain_index (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
  • printk: Give error on attempt to set log buffer length to over 2G (bsc#1210534).
  • ring-buffer: Fix race while reader and writer are on the same page (git-fixes).
  • s390/percpu: add READ_ONCE() to arch_this_cpu_to_op_simple() (git-fixes).
  • scsi: qla2xxx: Fix memory leak in qla2x00_probe_one() (git-fixes).
  • scsi: qla2xxx: Perform lockless command completion in abort path (git-fixes).
  • sctp: do not free asoc when it is already dead in sctp_sendmsg (git-fixes).
  • sctp: return error if the asoc has been peeled off in sctp_wait_for_sndbuf (git-fixes).
  • sctp: use the right sk after waking up from wait_buf sleep (git-fixes).
  • struct ci_hdrc: hide new member at end (git-fixes).
  • struct wmi_svc_avail_ev_arg: new member to end (git-fixes).
  • timekeeping: Prevent 32bit truncation in (git-fixes)
  • tuntap: fix dividing by zero in ebpf queue selection (git-fixes).
  • uprobes/x86: Fix detection of 32-bit user mode (git-fixes).
  • usb/ohci-platform: Fix a warning when hibernating (git-fixes).
  • usb: chipidea: core: fix possible concurrent when switch role (git-fixes).
  • usb: chipidea: fix missing goto in ci_hdrc_probe (git-fixes).
  • usb: dwc3: core: fix kernel panic when do reboot (git-fixes).
  • usb: dwc3: gadget: Do not set IMI for no_interrupt (git-fixes).
  • usb: host: ohci-pxa27x: Fix and & vs | typo (git-fixes).
  • usb: storage: Add check for kcalloc (git-fixes).
  • usb: typec: Check for ops->exit instead of ops->enter in altmode_exit (git-fixes).
  • watchdog: pcwd_usb: Fix attempting to access uninitialized memory (git-fixes).
  • wifi: ath5k: fix an off by one check in ath5k_eeprom_read_freq_list() (git-fixes).
  • workqueue: Fix missing kfree(rescuer) in destroy_workqueue() (bsc#1210460).
  • workqueue: Fix spurious sanity check failures in destroy_workqueue() (bsc#1210460).
  • wq: handle VM suspension in stall detection (bsc#1210466).
  • x86, boot: Remove multiple copy of static function sanitize_boot_params() (git-fixes).
  • x86/apic: Fix arch_dynirq_lower_bound() bug for DT enabled machines (git-fixes).
  • x86/apic: Handle missing global clockevent gracefully (git-fixes bsc#1142926).
  • x86/apic: Soft disable APIC before initializing it (git-fixes).
  • x86/boot/compressed: Disable relocation relaxation (git-fixes).
  • x86/boot: Avoid using Intel mnemonics in AT&T syntax asm (git-fixes).
  • x86/bugs: Add Cannon lake to RETBleed affected CPU list (git-fixes).
  • x86/bugs: Enable STIBP for IBPB mitigated RETBleed (git-fixes).
  • x86/decoder: Add TEST opcode to Group3-2 (git-fixes).
  • x86/fpu: Prevent FPU state corruption (git-fixes).
  • x86/ioapic: Prevent inconsistent state when moving an interrupt (git-fixes).
  • x86/irq: Ensure PI wakeup handler is unregistered before module unload (git-fixes).
  • x86/kprobes: Fix to check non boostable prefixes correctly (git-fixes).
  • x86/kprobes: Restore BTF if the single-stepping is cancelled (git-fixes).
  • x86/lib/cpu: Address missing prototypes warning (git-fixes).
  • x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).
  • x86/mce: Lower throttling MCE messages' priority to warning (git-fixes).
  • x86/mm: Stop printing BRK addresses (git-fixes).
  • x86/mm: Use the correct function type for native_set_fixmap() (git-fixes).
  • x86/pkeys: Add check for pkey 'overflow' (git-fixes).
  • x86/reboot: Always use NMI fallback when shutdown via reboot vector IPI fails (git-fixes).
  • x86/speculation/mds: Mark mds_user_clear_cpu_buffers() __always_inline (git-fixes).
  • x86/sysfb: Fix check for bad VRAM size (git-fixes).
  • x86/tools/relocs: Fix non-POSIX regexp (git-fixes).
  • x86/tools: Fix objdump version check again (git-fixes).
  • x86/virt: Eat faults on VMXOFF in reboot flows (git-fixes).
  • x86/virt: Mark flags and memory as clobbered by VMXOFF (git-fixes).
  • x86: Do not let pgprot_modify() change the page encryption bit (git-fixes).
  • x86_64: Fix jiffies ODR violation (git-fixes).
  • xfrm: policy: use hlist rcu variants on insert (git-fixes).
  • xhci: also avoid the XHCI_ZERO_64B_REGS quirk with a passthrough iommu (git-fixes).
  • xhci: hide include of iommu.h (git-fixes).

Список пакетов

Image SLES12-SP5-Azure-BYOS
kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-HPC-BYOS
kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS
cluster-md-kmp-default-4.12.14-122.159.1
dlm-kmp-default-4.12.14-122.159.1
gfs2-kmp-default-4.12.14-122.159.1
kernel-default-4.12.14-122.159.1
ocfs2-kmp-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-On-Demand
cluster-md-kmp-default-4.12.14-122.159.1
dlm-kmp-default-4.12.14-122.159.1
gfs2-kmp-default-4.12.14-122.159.1
kernel-default-4.12.14-122.159.1
ocfs2-kmp-default-4.12.14-122.159.1
Image SLES12-SP5-EC2-BYOS
kernel-default-4.12.14-122.159.1
Image SLES12-SP5-EC2-ECS-On-Demand
kernel-default-4.12.14-122.159.1
Image SLES12-SP5-EC2-On-Demand
kernel-default-4.12.14-122.159.1
Image SLES12-SP5-EC2-SAP-BYOS
cluster-md-kmp-default-4.12.14-122.159.1
dlm-kmp-default-4.12.14-122.159.1
gfs2-kmp-default-4.12.14-122.159.1
kernel-default-4.12.14-122.159.1
ocfs2-kmp-default-4.12.14-122.159.1
Image SLES12-SP5-EC2-SAP-On-Demand
cluster-md-kmp-default-4.12.14-122.159.1
dlm-kmp-default-4.12.14-122.159.1
gfs2-kmp-default-4.12.14-122.159.1
kernel-default-4.12.14-122.159.1
ocfs2-kmp-default-4.12.14-122.159.1
Image SLES12-SP5-GCE-BYOS
kernel-default-4.12.14-122.159.1
Image SLES12-SP5-GCE-On-Demand
kernel-default-4.12.14-122.159.1
Image SLES12-SP5-GCE-SAP-BYOS
cluster-md-kmp-default-4.12.14-122.159.1
dlm-kmp-default-4.12.14-122.159.1
gfs2-kmp-default-4.12.14-122.159.1
kernel-default-4.12.14-122.159.1
ocfs2-kmp-default-4.12.14-122.159.1
Image SLES12-SP5-GCE-SAP-On-Demand
cluster-md-kmp-default-4.12.14-122.159.1
dlm-kmp-default-4.12.14-122.159.1
gfs2-kmp-default-4.12.14-122.159.1
kernel-default-4.12.14-122.159.1
ocfs2-kmp-default-4.12.14-122.159.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
cluster-md-kmp-default-4.12.14-122.159.1
dlm-kmp-default-4.12.14-122.159.1
gfs2-kmp-default-4.12.14-122.159.1
kernel-default-4.12.14-122.159.1
ocfs2-kmp-default-4.12.14-122.159.1
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
cluster-md-kmp-default-4.12.14-122.159.1
dlm-kmp-default-4.12.14-122.159.1
gfs2-kmp-default-4.12.14-122.159.1
kernel-default-4.12.14-122.159.1
ocfs2-kmp-default-4.12.14-122.159.1
SUSE Linux Enterprise High Availability Extension 12 SP5
cluster-md-kmp-default-4.12.14-122.159.1
dlm-kmp-default-4.12.14-122.159.1
gfs2-kmp-default-4.12.14-122.159.1
ocfs2-kmp-default-4.12.14-122.159.1
SUSE Linux Enterprise Live Patching 12 SP5
kernel-default-kgraft-4.12.14-122.159.1
kernel-default-kgraft-devel-4.12.14-122.159.1
kgraft-patch-4_12_14-122_159-default-1-8.3.1
SUSE Linux Enterprise Server 12 SP5
kernel-default-4.12.14-122.159.1
kernel-default-base-4.12.14-122.159.1
kernel-default-devel-4.12.14-122.159.1
kernel-default-man-4.12.14-122.159.1
kernel-devel-4.12.14-122.159.1
kernel-macros-4.12.14-122.159.1
kernel-source-4.12.14-122.159.1
kernel-syms-4.12.14-122.159.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
kernel-default-4.12.14-122.159.1
kernel-default-base-4.12.14-122.159.1
kernel-default-devel-4.12.14-122.159.1
kernel-default-man-4.12.14-122.159.1
kernel-devel-4.12.14-122.159.1
kernel-macros-4.12.14-122.159.1
kernel-source-4.12.14-122.159.1
kernel-syms-4.12.14-122.159.1
SUSE Linux Enterprise Software Development Kit 12 SP5
kernel-docs-4.12.14-122.159.1
kernel-obs-build-4.12.14-122.159.1
SUSE Linux Enterprise Workstation Extension 12 SP5
kernel-default-extra-4.12.14-122.159.1

Описание

An issue was discovered in the Linux kernel before 5.8. lib/nlattr.c allows attackers to cause a denial of service (unbounded recursion) via a nested Netlink policy with a back reference.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.159.1

Ссылки

Описание

The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.159.1

Ссылки

Описание

A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.159.1

Ссылки

Описание

A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.159.1

Ссылки

Описание

A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.159.1

Ссылки

Описание

A use-after-free flaw was found in btsdio_remove in drivers\bluetooth\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.159.1

Ссылки

Описание

A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.159.1

Ссылки

Описание

The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line. This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.159.1

Ссылки

Описание

An out-of-bounds memory access flaw was found in the Linux kernel's XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.159.1

Ссылки

Описание

A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.159.1

Ссылки

Описание

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-33203. Reason: This candidate is a reservation duplicate of CVE-2023-33203. Notes: All CVE users should reference CVE-2023-33203 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.159.1

Ссылки

Описание

The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.159.1
Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.159.1

Ссылки
Уязвимость SUSE-SU-2023:2163-1