Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:3349-1

Опубликовано: 17 авг. 2023
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2023-3609: Fixed reference counter leak leading to overflow in net/sched (bsc#1213586).
  • CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).
  • CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).
  • CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).
  • CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling' (bsc#1206418).
  • CVE-2023-20593: Fixed a ZenBleed issue in 'Zen 2' CPUs that could allow an attacker to potentially access sensitive information (bsc#1213286).
  • CVE-2023-2985: Fixed an use-after-free vulnerability in hfsplus_put_super in fs/hfsplus/super.c that could allow a local user to cause a denial of service (bsc#1211867).
  • CVE-2023-35001: Fixed an out-of-bounds memory access flaw in nft_byteorder that could allow a local attacker to escalate their privilege (bsc#1213059).
  • CVE-2023-20569: Fixed side channel attack ‘Inception’ or ‘RAS Poisoning’ (bsc#1213287).

The following non-security bugs were fixed:

  • Get module prefix from kmod (bsc#1212835).
  • USB: add NO_LPM quirk for Realforce 87U Keyboard (git-fixes).
  • USB: core: add quirk for Alcor Link AK9563 smartcard reader (git-fixes).
  • USB: core: hub: Disable autosuspend for Cypress CY7C65632 (git-fixes).
  • USB: hcd-pci: Fully suspend across freeze/thaw cycle (git-fixes).
  • USB: hub: Add delay for SuperSpeed hub resume to let links transit to U0 (git-fixes).
  • USB: serial: option: add Fibocom FM160 0x0111 composition (git-fixes).
  • USB: serial: option: add Quectel EM05-G (GR) modem (git-fixes).
  • USB: serial: option: add Quectel EM05-G (RS) modem (git-fixes).
  • USB: serial: option: add Sierra Wireless EM9191 (git-fixes).
  • USB: serial: option: add u-blox LARA-R6 00B modem (git-fixes).
  • blkcg, writeback: dead memcgs shouldn't contribute to writeback ownership arbitration (bsc#1213022).
  • btrfs: fix resolving backrefs for inline extent followed by prealloc (bsc#1213133).
  • delete suse/memcg-drop-kmem-limit_in_bytes. drop the patch in order to fix bsc#1213705.
  • dlm: Delete an unnecessary variable initialisation in dlm_ls_start() (git-fixes).
  • dlm: NULL check before kmem_cache_destroy is not needed (git-fixes).
  • dlm: fix invalid cluster name warning (git-fixes).
  • dlm: fix missing idr_destroy for recover_idr (git-fixes).
  • dlm: fix missing lkb refcount handling (git-fixes).
  • dlm: fix plock invalid read (git-fixes).
  • dlm: fix possible call to kfree() for non-initialized pointer (git-fixes).
  • ext4: Fix reusing stale buffer heads from last failed mounting (bsc#1213020).
  • ext4: add inode table check in __ext4_get_inode_loc to aovid possible infinite loop (bsc#1207617).
  • ext4: avoid BUG_ON when creating xattrs (bsc#1205496).
  • ext4: avoid unaccounted block allocation when expanding inode (bsc#1207634).
  • ext4: bail out of ext4_xattr_ibody_get() fails for any reason (bsc#1213018).
  • ext4: fail ext4_iget if special inode unallocated (bsc#1213010).
  • ext4: fix RENAME_WHITEOUT handling for inline directories (bsc#1210766).
  • ext4: fix WARNING in ext4_update_inline_data (bsc#1213012).
  • ext4: fix bug_on in __es_tree_search caused by bad boot loader inode (bsc#1207620).
  • ext4: fix cgroup writeback accounting with fs-layer encryption (bsc#1210765).
  • ext4: fix deadlock due to mbcache entry corruption (bsc#1207653).
  • ext4: fix error code return to user-space in ext4_get_branch() (bsc#1207630).
  • ext4: fix i_disksize exceeding i_size problem in paritally written case (bsc#1213015).
  • ext4: fix to check return value of freeze_bdev() in ext4_shutdown() (bsc#1213021).
  • ext4: improve error recovery code paths in __ext4_remount() (bsc#1213017).
  • ext4: init quota for 'old.inode' in 'ext4_rename' (bsc#1207629).
  • ext4: initialize quota before expanding inode in setproject ioctl (bsc#1207633).
  • ext4: move where set the MAY_INLINE_DATA flag is set (bsc#1213011).
  • ext4: only update i_reserved_data_blocks on successful block allocation (bsc#1213019).
  • ext4: zero i_disksize when initializing the bootloader inode (bsc#1213013).
  • fs: dlm: cancel work sync othercon (git-fixes).
  • fs: dlm: filter user dlm messages for kernel locks (git-fixes).
  • fs: dlm: fix configfs memory leak (git-fixes).
  • fs: dlm: fix debugfs dump (git-fixes).
  • fs: dlm: fix memory leak when fenced (git-fixes).
  • fs: dlm: fix race between test_bit() and queue_work() (git-fixes).
  • fs: dlm: handle -EBUSY first in lock arg validation (git-fixes).
  • fs: fix guard_bio_eod to check for real EOD errors (bsc#1213042).
  • fs: prevent BUG_ON in submit_bh_wbc() (bsc#1212990).
  • fuse: revalidate: do not invalidate if interrupted (bsc#1213525).
  • igb: revert rtnl_lock() that causes deadlock (git-fixes).
  • include/trace/events/writeback.h: fix -Wstringop-truncation warnings (bsc#1213023).
  • inotify: Avoid reporting event with invalid wd (bsc#1213025).
  • jbd2: Fix statistics for the number of logged blocks (bsc#1212988).
  • jbd2: abort journal if free a async write error metadata buffer (bsc#1212989).
  • jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted (bsc#1202716).
  • jbd2: fix data races at struct journal_head (bsc#1173438).
  • jbd2: fix invalid descriptor block checksum (bsc#1212987).
  • jbd2: fix race when writing superblock (bsc#1212986).
  • jdb2: Do not refuse invalidation of already invalidated buffers (bsc#1213014).
  • kernel-docs: Add buildrequires on python3-base when using python3 The python3 binary is provided by python3-base.
  • kernel-docs: Use python3 together with python3-Sphinx (bsc#1212741).
  • lib/string: Add strscpy_pad() function (bsc#1213023).
  • mbcache: Fixup kABI of mb_cache_entry (bsc#1207653).
  • memcg: drop kmem.limit_in_bytes (bsc#1208788, bsc#1212905).
  • memcg: fix a crash in wb_workfn when a device disappears (bsc#1213023).
  • net: mana: Add support for vlan tagging (bsc#1212301).
  • ocfs2: check new file size on fallocate call (git-fixes).
  • ocfs2: fix use-after-free when unmounting read-only filesystem (git-fixes).
  • powerpc/64: update speculation_store_bypass in /proc/<pid>/status (bsc#1188885 ltc#193722 git-fixes).
  • powerpc/mm/dax: Fix the condition when checking if altmap vmemap can cross-boundary (bsc#1150305 ltc#176097 git-fixes).
  • rpm/check-for-config-changes: ignore also PAHOLE_HAS_* We now also have options like CONFIG_PAHOLE_HAS_LANG_EXCLUDE.
  • s390/cio: check the subchannel validity for dev_busid (bsc#1207526).
  • s390/cpum_sf: adjust sampling interval to avoid hitting sample limits (git-fixes bsc#1213827).
  • s390/dasd: fix memleak in path handling error case (git-fixes bsc#1213221).
  • s390/maccess: add no dat mode to kernel_write (git-fixes bsc#1213825).
  • s390/numa: move initial setup of node_to_cpumask_map (git-fixes bsc#1213766).
  • s390/perf: Change CPUM_CF return code in event init function (git-fixes bsc#1213344).
  • s390/perf: Return error when debug_register fails (git-fixes bsc#1212657).
  • s390: limit brk randomization to 32MB (git-fixes bsc#1213346).
  • scsi: qla2xxx: update version to 10.02.08.400-k (bsc#1213747).
  • uas: add no-uas quirk for Hiksemi usb_disk (git-fixes).
  • uas: ignore UAS for Thinkplus chips (git-fixes).
  • ubi: Fix failure attaching when vid_hdr offset equals to (sub)page size (bsc#1210584).
  • ubi: ensure that VID header offset + VID header size <= alloc, size (bsc#1210584).
  • udf: Avoid double brelse() in udf_rename() (bsc#1213032).
  • udf: Check consistency of Space Bitmap Descriptor (bsc#1210771).
  • udf: Define EFSCORRUPTED error code (bsc#1213038).
  • udf: Discard preallocation before extending file with a hole (bsc#1213036).
  • udf: Do not bother looking for prealloc extents if i_lenExtents matches i_size (bsc#1213035).
  • udf: Do not bother merging very long extents (bsc#1213040).
  • udf: Do not update file length for failed writes to inline files (bsc#1213041).
  • udf: Drop unused arguments of udf_delete_aext() (bsc#1213033).
  • udf: Fix extending file within last block (bsc#1213037).
  • udf: Fix preallocation discarding at indirect extent boundary (bsc#1213034).
  • udf: Truncate added extents on failed expansion (bsc#1213039).
  • update suse/s390-dasd-fix-no-record-found-for-raw_track_access (git-fixes bsc#1212266 bsc#1207528).
  • update suse/scsi-zfcp-fix-missing-auto-port-scan-and-thus-missing-target-ports (git-fixes bsc#1202670).
  • usb-storage: Add Hiksemi USB3-FW to IGNORE_UAS (git-fixes).
  • usrmerge: Adjust module path in the kernel sources (bsc#1212835).
  • vfio-ccw: Do not call flush_workqueue while holding the spinlock (git-fixes bsc#1213218).
  • vfio-ccw: fence off transport mode (git-fixes bsc#1213215).
  • vfio-ccw: prevent quiesce function going into an infinite loop (git-fixes bsc#1213819).
  • vfio-ccw: release any channel program when releasing/removing vfio-ccw mdev (git-fixes bsc#1213823).
  • writeback: fix call of incorrect macro (bsc#1213024).
  • x86/bugs: Enable STIBP for JMP2RET (git-fixes).
  • x86/bugs: Remove apostrophe typo (git-fixes).
  • x86/bugs: Warn when 'ibrs' mitigation is selected on Enhanced IBRS parts (git-fixes).
  • x86/cpu: Load microcode during restore_processor_state() (git-fixes).
  • x86/delay: Fix the wrong asm constraint in delay_loop() (git-fixes).
  • x86/speculation/mmio: Print SMT warning (git-fixes).
  • x86: Fix return value of __setup handlers (git-fixes).

Список пакетов

Image SLES12-SP5-Azure-Basic-On-Demand
kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-HPC-On-Demand
kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-Standard-On-Demand
kernel-azure-4.12.14-16.146.1
SUSE Linux Enterprise Server 12 SP5
kernel-azure-4.12.14-16.146.1
kernel-azure-base-4.12.14-16.146.1
kernel-azure-devel-4.12.14-16.146.1
kernel-devel-azure-4.12.14-16.146.1
kernel-source-azure-4.12.14-16.146.1
kernel-syms-azure-4.12.14-16.146.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
kernel-azure-4.12.14-16.146.1
kernel-azure-base-4.12.14-16.146.1
kernel-azure-devel-4.12.14-16.146.1
kernel-devel-azure-4.12.14-16.146.1
kernel-source-azure-4.12.14-16.146.1
kernel-syms-azure-4.12.14-16.146.1

Описание

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.


Затронутые продукты
Image SLES12-SP5-Azure-Basic-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.146.1
SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1

Ссылки

Описание

Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.


Затронутые продукты
Image SLES12-SP5-Azure-Basic-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.146.1
SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1

Ссылки

Описание

Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47


Затронутые продукты
Image SLES12-SP5-Azure-Basic-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.146.1
SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1

Ссылки

Описание

A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.


Затронутые продукты
Image SLES12-SP5-Azure-Basic-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.146.1
SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1

Ссылки

Описание

An issue in "Zen 2" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.


Затронутые продукты
Image SLES12-SP5-Azure-Basic-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.146.1
SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1

Ссылки

Описание

A use after free flaw was found in hfsplus_put_super in fs/hfsplus/super.c in the Linux Kernel. This flaw could allow a local user to cause a denial of service problem.


Затронутые продукты
Image SLES12-SP5-Azure-Basic-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.146.1
SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1

Ссылки

Описание

Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace


Затронутые продукты
Image SLES12-SP5-Azure-Basic-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.146.1
SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1

Ссылки

Описание

A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.


Затронутые продукты
Image SLES12-SP5-Azure-Basic-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.146.1
SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1

Ссылки

Описание

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.


Затронутые продукты
Image SLES12-SP5-Azure-Basic-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.146.1
SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1

Ссылки

Описание

An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks. We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.


Затронутые продукты
Image SLES12-SP5-Azure-Basic-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.146.1
SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1

Ссылки

Описание

A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.


Затронутые продукты
Image SLES12-SP5-Azure-Basic-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-HPC-On-Demand:kernel-azure-4.12.14-16.146.1
Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.146.1
SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1

Ссылки
Уязвимость SUSE-SU-2023:3349-1