Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:4030-1

Опубликовано: 10 окт. 2023
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2023-4389: Fixed a reference counting issue in the Btrfs filesystem that could be exploited in order to leak internal kernel information or crash the system (bsc#1214351).
  • CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter subsystem. This issue may have allowed a local user to crash the system or potentially escalate their privileges (bsc#1215150).
  • CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table which could be exploited by network adjacent attackers, increasing CPU usage by 95% (bsc#1212703).
  • CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalatio (bsc#1215275).
  • CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).
  • CVE-2023-4622: Fixed a use-after-free vulnerability in the Unix domain sockets component which could be exploited to achieve local privilege escalation (bsc#1215117).
  • CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215115).
  • CVE-2020-36766: Fixed a potential information leak in in the CEC driver (bsc#1215299).
  • CVE-2023-1859: Fixed a use-after-free flaw in Xen transport for 9pfs which could be exploited to crash the system (bsc#1210169).
  • CVE-2023-2177: Fixed a null pointer dereference issue in the sctp network protocol which could allow a user to crash the system (bsc#1210643).
  • CVE-2023-4881: Fixed an out-of-bounds write flaw in the netfilter subsystem that could lead to information disclosure or denial of service (bsc#1215221).
  • CVE-2023-40283: Fixed a use-after-free issue in the Bluetooth subsystem (bsc#1214233).
  • CVE-2023-1192: Fixed a use-after-free in the CIFS subsystem (bsc#1208995).

The following non-security bugs were fixed:

  • check-for-config-changes: ignore BUILTIN_RETURN_ADDRESS_STRIPS_PAC (bsc#1214380).
  • mkspec: Allow unsupported KMPs (bsc#1214386)
  • rpm/mkspec-dtb: support for nested subdirs.
  • x86/srso: Do not probe microcode in a guest (git-fixes).
  • x86/srso: Fix SBPB enablement for spec_rstack_overflow=off (git-fixes).
  • x86/srso: Fix srso_show_state() side effect (git-fixes).
  • x86/srso: Set CPUID feature bits independently of bug or mitigation status (git-fixes).

Список пакетов

Image SLES15-SP2-BYOS-Azure
kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-HPC-BYOS-Azure
kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure
cluster-md-kmp-default-5.3.18-150200.24.166.1
dlm-kmp-default-5.3.18-150200.24.166.1
gfs2-kmp-default-5.3.18-150200.24.166.1
kernel-default-5.3.18-150200.24.166.1
ocfs2-kmp-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
cluster-md-kmp-default-5.3.18-150200.24.166.1
dlm-kmp-default-5.3.18-150200.24.166.1
gfs2-kmp-default-5.3.18-150200.24.166.1
kernel-default-5.3.18-150200.24.166.1
ocfs2-kmp-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
cluster-md-kmp-default-5.3.18-150200.24.166.1
dlm-kmp-default-5.3.18-150200.24.166.1
gfs2-kmp-default-5.3.18-150200.24.166.1
kernel-default-5.3.18-150200.24.166.1
ocfs2-kmp-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-BYOS-Azure
cluster-md-kmp-default-5.3.18-150200.24.166.1
dlm-kmp-default-5.3.18-150200.24.166.1
gfs2-kmp-default-5.3.18-150200.24.166.1
kernel-default-5.3.18-150200.24.166.1
ocfs2-kmp-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-BYOS-EC2-HVM
cluster-md-kmp-default-5.3.18-150200.24.166.1
dlm-kmp-default-5.3.18-150200.24.166.1
gfs2-kmp-default-5.3.18-150200.24.166.1
kernel-default-5.3.18-150200.24.166.1
ocfs2-kmp-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-BYOS-GCE
cluster-md-kmp-default-5.3.18-150200.24.166.1
dlm-kmp-default-5.3.18-150200.24.166.1
gfs2-kmp-default-5.3.18-150200.24.166.1
kernel-default-5.3.18-150200.24.166.1
ocfs2-kmp-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-EC2-HVM
cluster-md-kmp-default-5.3.18-150200.24.166.1
dlm-kmp-default-5.3.18-150200.24.166.1
gfs2-kmp-default-5.3.18-150200.24.166.1
kernel-default-5.3.18-150200.24.166.1
ocfs2-kmp-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-GCE
cluster-md-kmp-default-5.3.18-150200.24.166.1
dlm-kmp-default-5.3.18-150200.24.166.1
gfs2-kmp-default-5.3.18-150200.24.166.1
kernel-default-5.3.18-150200.24.166.1
ocfs2-kmp-default-5.3.18-150200.24.166.1
SUSE Linux Enterprise High Availability Extension 15 SP2
cluster-md-kmp-default-5.3.18-150200.24.166.1
dlm-kmp-default-5.3.18-150200.24.166.1
gfs2-kmp-default-5.3.18-150200.24.166.1
ocfs2-kmp-default-5.3.18-150200.24.166.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
kernel-default-5.3.18-150200.24.166.1
kernel-default-base-5.3.18-150200.24.166.1.150200.9.83.1
kernel-default-devel-5.3.18-150200.24.166.1
kernel-devel-5.3.18-150200.24.166.1
kernel-docs-5.3.18-150200.24.166.2
kernel-macros-5.3.18-150200.24.166.1
kernel-obs-build-5.3.18-150200.24.166.1
kernel-preempt-5.3.18-150200.24.166.1
kernel-preempt-devel-5.3.18-150200.24.166.1
kernel-source-5.3.18-150200.24.166.1
kernel-syms-5.3.18-150200.24.166.1
SUSE Linux Enterprise Live Patching 15 SP2
kernel-default-livepatch-5.3.18-150200.24.166.1
kernel-default-livepatch-devel-5.3.18-150200.24.166.1
kernel-livepatch-5_3_18-150200_24_166-default-1-150200.5.3.1
SUSE Linux Enterprise Server 15 SP2-LTSS
kernel-default-5.3.18-150200.24.166.1
kernel-default-base-5.3.18-150200.24.166.1.150200.9.83.1
kernel-default-devel-5.3.18-150200.24.166.1
kernel-devel-5.3.18-150200.24.166.1
kernel-docs-5.3.18-150200.24.166.2
kernel-macros-5.3.18-150200.24.166.1
kernel-obs-build-5.3.18-150200.24.166.1
kernel-preempt-5.3.18-150200.24.166.1
kernel-preempt-devel-5.3.18-150200.24.166.1
kernel-source-5.3.18-150200.24.166.1
kernel-syms-5.3.18-150200.24.166.1
reiserfs-kmp-default-5.3.18-150200.24.166.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2
kernel-default-5.3.18-150200.24.166.1
kernel-default-base-5.3.18-150200.24.166.1.150200.9.83.1
kernel-default-devel-5.3.18-150200.24.166.1
kernel-devel-5.3.18-150200.24.166.1
kernel-docs-5.3.18-150200.24.166.2
kernel-macros-5.3.18-150200.24.166.1
kernel-obs-build-5.3.18-150200.24.166.1
kernel-preempt-5.3.18-150200.24.166.1
kernel-preempt-devel-5.3.18-150200.24.166.1
kernel-source-5.3.18-150200.24.166.1
kernel-syms-5.3.18-150200.24.166.1
reiserfs-kmp-default-5.3.18-150200.24.166.1

Описание

An issue was discovered in the Linux kernel before 5.8.6. drivers/media/cec/core/cec-api.c leaks one byte of kernel memory on specific hardware to unprivileged users, because of directly assigning log_addrs with a hole in the struct.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.166.1

Ссылки

Описание

A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.166.1

Ссылки

Описание

A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel's IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.166.1

Ссылки

Описание

A use-after-free flaw was found in xen_9pfs_front_removet in net/9p/trans_xen.c in Xen transport for 9pfs in the Linux Kernel. This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information leak.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.166.1

Ссылки

Описание

A null pointer dereference issue was found in the sctp network protocol in net/sctp/stream_sched.c in Linux Kernel. If stream_in allocation is failed, stream_out is freed which would further be accessed. A local user could use this flaw to crash the system or potentially cause a denial of service.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.166.1

Ссылки

Описание

cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.166.1

Ссылки

Описание

An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.166.1

Ссылки

Описание

An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.166.1

Ссылки

Описание

A flaw was found in btrfs_get_root_ref in fs/btrfs/disk-io.c in the btrfs filesystem in the Linux Kernel due to a double decrement of the reference count. This issue may allow a local attacker with user privilege to crash the system or may lead to leaked internal kernel information.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.166.1

Ссылки

Описание

A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.166.1

Ссылки

Описание

A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free. We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.166.1

Ссылки

Описание

** REJECT ** CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.166.1

Ссылки

Описание

A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue(). We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.166.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.166.1

Ссылки
Уязвимость SUSE-SU-2023:4030-1