Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:3329-1

Опубликовано: 16 авг. 2023
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling' (bsc#1206418).
  • CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).
  • CVE-2023-20569: Fixed side channel attack ‘Inception’ or ‘RAS Poisoning’ (bsc#1213287).
  • CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).
  • CVE-2023-3609: Fixed reference counter leak leading to overflow in net/sched (bsc#1213586).
  • CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).
  • CVE-2023-3776: Fixed improper refcount update in cls_fw leads to use-after-free (bsc#1213588).

The following non-security bugs were fixed:

  • fix double fget() in vhost_net_set_backend() (git-fixes).
  • nfsv4.1: always send a reclaim_complete after establishing lease (git-fixes).
  • sunrpc: fix uaf in svc_tcp_listen_data_ready() (git-fixes).
  • sunrpc: remove the maximum number of retries in call_bind_status (git-fixes).
  • update suse/s390-dasd-fix-no-record-found-for-raw_track_access (git-fixes bsc#1212266 bsc#1207528).
  • update suse/scsi-zfcp-fix-missing-auto-port-scan-and-thus-missing-target-ports (git-fixes bsc#1202670).
  • block: fix a source code comment in include/uapi/linux/blkzoned.h (git-fixes).
  • kabi fix test
  • kernel-binary.spec.in: remove superfluous %% in supplements fixes: 02b7735e0caf ('rpm/kernel-binary.spec.in: add enhances and supplements tags to in-tree kmps')
  • livepatch: check kzalloc return values (git-fixes).
  • media: videodev2.h: fix struct v4l2_input tuner index comment (git-fixes).
  • net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).
  • net: skip virtio_net_hdr_set_proto if protocol already set (git-fixes).
  • net: virtio_net_hdr_to_skb: count transport header in ufo (git-fixes).
  • nfsd: fix double fget() bug in __write_ports_addfd() (git-fixes).
  • powerpc/64: update speculation_store_bypass in /proc/<pid>/status (bsc#1188885 ltc#193722 git-fixes).
  • powerpc/security: fix speculation_store_bypass reporting on power10 (bsc#1188885 ltc#193722 git-fixes).
  • rpm/check-for-config-changes: ignore also riscv_isa_* and dynamic_sigframe they depend on config_toolchain_has_*.
  • s390/cio: add dev_busid sysfs entry for each subchannel (bsc#1207526).
  • s390/cio: check the subchannel validity for dev_busid (bsc#1207526).
  • s390/cio: introduce io_subchannel_type (bsc#1207526).
  • s390/cpum_sf: adjust sampling interval to avoid hitting sample limits (git-fixes bsc#1213827).
  • s390/maccess: add no dat mode to kernel_write (git-fixes bsc#1213825).
  • s390/numa: move initial setup of node_to_cpumask_map (git-fixes bsc#1213766).
  • scsi: qla2xxx: adjust iocb resource on qpair create (bsc#1213747).
  • scsi: qla2xxx: array index may go out of bound (bsc#1213747).
  • scsi: qla2xxx: avoid fcport pointer dereference (bsc#1213747).
  • scsi: qla2xxx: check valid rport returned by fc_bsg_to_rport() (bsc#1213747).
  • scsi: qla2xxx: correct the index of array (bsc#1213747).
  • scsi: qla2xxx: drop useless list_head (bsc#1213747).
  • scsi: qla2xxx: fix null pointer dereference in target mode (bsc#1213747).
  • scsi: qla2xxx: fix tmf leak through (bsc#1213747).
  • scsi: qla2xxx: fix buffer overrun (bsc#1213747).
  • scsi: qla2xxx: fix command flush during tmf (bsc#1213747).
  • scsi: qla2xxx: fix deletion race condition (bsc#1213747).
  • scsi: qla2xxx: fix end of loop test (bsc#1213747).
  • scsi: qla2xxx: fix erroneous link up failure (bsc#1213747).
  • scsi: qla2xxx: fix error code in qla2x00_start_sp() (bsc#1213747).
  • scsi: qla2xxx: fix potential null pointer dereference (bsc#1213747).
  • scsi: qla2xxx: fix session hang in gnl (bsc#1213747).
  • scsi: qla2xxx: limit tmf to 8 per function (bsc#1213747).
  • scsi: qla2xxx: pointer may be dereferenced (bsc#1213747).
  • scsi: qla2xxx: remove unused nvme_ls_waitq wait queue (bsc#1213747).
  • scsi: qla2xxx: silence a static checker warning (bsc#1213747).
  • scsi: qla2xxx: turn off noisy message log (bsc#1213747).
  • scsi: qla2xxx: update version to 10.02.08.400-k (bsc#1213747).
  • scsi: qla2xxx: update version to 10.02.08.500-k (bsc#1213747).
  • scsi: qla2xxx: fix inconsistent tmf timeout (bsc#1213747).
  • svcrdma: prevent page release when nothing was received (git-fixes).
  • vfio-ccw: prevent quiesce function going into an infinite loop (git-fixes bsc#1213819).
  • vfio-ccw: release any channel program when releasing/removing vfio-ccw mdev (git-fixes bsc#1213823).
  • vhost/test: fix build for vhost test (git-fixes).
  • vhost/vsock: use kvmalloc/kvfree for larger packets (git-fixes).
  • vhost/vsock: do not check owner in vhost_vsock_stop() while releasing (git-fixes).
  • vhost/vsock: fix incorrect used length reported to the guest (git-fixes).
  • vhost/vsock: fix packet delivery order to monitoring devices (git-fixes).
  • vhost/vsock: split packets to send using multiple buffers (git-fixes).
  • vhost: fix the calculation in vhost_overflow() (git-fixes).
  • vhost_net: disable zerocopy by default (git-fixes).
  • vhost_net: fix oob on sendmsg() failure (git-fixes).
  • virtio-balloon: fix managed page counts when migrating pages between zones (git-fixes).
  • virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).
  • virtio-net: keep stop() to follow mirror sequence of open() (git-fixes).
  • virtio-pci: remove wrong address verification in vp_del_vqs() (git-fixes).
  • virtio: improve vq->broken access to avoid any compiler optimization (git-fixes).
  • virtio_net: fix error handling in virtnet_restore() (git-fixes).
  • virtio_net: bugfix overflow inside xdp_linearize_page() (git-fixes).
  • virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).
  • virtio_ring: fix querying of maximum dma mapping size for virtio device (git-fixes).
  • vringh: use wiov->used to check for read/write desc order (git-fixes).
  • vringh: fix __vringh_iov() when riov and wiov are different (git-fixes).
  • vsock/virtio: stop workers during the .remove() (git-fixes).
  • vsock/virtio: use rcu to avoid use-after-free on the_virtio_vsock (git-fixes).
  • xen/blkfront: Only check REQ_FUA for writes (git-fixes).

Список пакетов

SUSE Linux Enterprise Real Time 12 SP5
cluster-md-kmp-rt-4.12.14-10.138.1
dlm-kmp-rt-4.12.14-10.138.1
gfs2-kmp-rt-4.12.14-10.138.1
kernel-devel-rt-4.12.14-10.138.1
kernel-rt-4.12.14-10.138.1
kernel-rt-base-4.12.14-10.138.1
kernel-rt-devel-4.12.14-10.138.1
kernel-rt_debug-4.12.14-10.138.1
kernel-rt_debug-devel-4.12.14-10.138.1
kernel-source-rt-4.12.14-10.138.1
kernel-syms-rt-4.12.14-10.138.1
ocfs2-kmp-rt-4.12.14-10.138.1

Описание

Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.


Затронутые продукты
SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.138.1

Ссылки

Описание

Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47


Затронутые продукты
SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.138.1

Ссылки

Описание

A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.


Затронутые продукты
SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.138.1

Ссылки

Описание

A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.


Затронутые продукты
SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.138.1

Ссылки

Описание

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.


Затронутые продукты
SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.138.1

Ссылки

Описание

An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks. We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.


Затронутые продукты
SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.138.1

Ссылки

Описание

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.


Затронутые продукты
SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.138.1
SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.138.1

Ссылки
Уязвимость SUSE-SU-2023:3329-1