Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:4158-1

Опубликовано: 23 окт. 2023
Источник: suse-cvrf

Описание

Security update for suse-module-tools

This update for suse-module-tools fixes the following issues:

  • Updated to version 15.3.17:

    • CVE-2023-1829: Blacklisted the Linux kernel tcindex classifier module (bsc#1210335).
    • CVE-2023-23559: Blacklisted the Linux kernel RNDIS modules (bsc#1205767, jsc#PED-5731).
  • Updated to version 15.3.16:

    • Fixed a build issue for s390x (bsc#1207853).

Список пакетов

Container suse/sle-micro-rancher/5.2:latest
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-BYOS-Azure
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-BYOS-EC2-HVM
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-BYOS-GCE
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-CHOST-BYOS-Aliyun
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-CHOST-BYOS-Azure
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-CHOST-BYOS-EC2
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-CHOST-BYOS-GCE
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-CHOST-BYOS-SAP-CCloud
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-HPC-BYOS-Azure
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-HPC-BYOS-EC2-HVM
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-HPC-BYOS-GCE
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-Micro-5-1-BYOS-Azure
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-Micro-5-1-BYOS-GCE
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-Micro-5-2-BYOS-Azure
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-Micro-5-2-BYOS-GCE
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-SAP-BYOS-Azure
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-SAP-BYOS-EC2-HVM
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-SAP-BYOS-GCE
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-SAPCAL-Azure
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-SAPCAL-EC2-HVM
suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-SAPCAL-GCE
suse-module-tools-15.3.17-150300.3.22.1
SUSE Enterprise Storage 7.1
suse-module-tools-15.3.17-150300.3.22.1
SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS
suse-module-tools-15.3.17-150300.3.22.1
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
suse-module-tools-15.3.17-150300.3.22.1
SUSE Linux Enterprise Micro 5.1
suse-module-tools-15.3.17-150300.3.22.1
SUSE Linux Enterprise Micro 5.2
suse-module-tools-15.3.17-150300.3.22.1
SUSE Linux Enterprise Server 15 SP3-LTSS
suse-module-tools-15.3.17-150300.3.22.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3
suse-module-tools-15.3.17-150300.3.22.1
SUSE Manager Proxy 4.2
suse-module-tools-15.3.17-150300.3.22.1
SUSE Manager Server 4.2
suse-module-tools-15.3.17-150300.3.22.1

Описание

A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-BYOS-Azure:suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-BYOS-EC2-HVM:suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-BYOS-GCE:suse-module-tools-15.3.17-150300.3.22.1

Ссылки

Описание

In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-BYOS-Azure:suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-BYOS-EC2-HVM:suse-module-tools-15.3.17-150300.3.22.1
Image SLES15-SP3-BYOS-GCE:suse-module-tools-15.3.17-150300.3.22.1

Ссылки
Уязвимость SUSE-SU-2023:4158-1