Описание
Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP3)
This update for the Linux Kernel 5.3.18-150300_59_124 fixes several issues.
The following security issues were fixed:
- CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215440).
- CVE-2023-4147: Fixed use-after-free in nf_tables_newrule (bsc#1215118).
- CVE-2023-4004: Fixed improper element removal netfilter nft_set_pipapo (bsc#1214812).
- CVE-2023-3390: Fixed an use-after-free vulnerability in the netfilter subsystem in net/netfilter/nf_tables_api.c that could allow a local attacker with user access to cause a privilege escalation issue (bsc#1212934).
Список пакетов
SUSE Linux Enterprise Live Patching 15 SP3
Ссылки
- Link for SUSE-SU-2023:4219-1
- E-Mail link for SUSE-SU-2023:4219-1
- SUSE Security Ratings
- SUSE Bug 1212934
- SUSE Bug 1214812
- SUSE Bug 1215118
- SUSE Bug 1215440
- SUSE CVE CVE-2023-3390 page
- SUSE CVE CVE-2023-4004 page
- SUSE CVE CVE-2023-4147 page
- SUSE CVE CVE-2023-4623 page
Описание
A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c. Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue. We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.
Затронутые продукты
Ссылки
- CVE-2023-3390
- SUSE Bug 1212846
- SUSE Bug 1212934
- SUSE Bug 1216225
Описание
A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.
Затронутые продукты
Ссылки
- CVE-2023-4004
- SUSE Bug 1213812
- SUSE Bug 1214812
Описание
A use-after-free flaw was found in the Linux kernel's Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.
Затронутые продукты
Ссылки
- CVE-2023-4147
- SUSE Bug 1213968
- SUSE Bug 1215118
Описание
A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free. We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.
Затронутые продукты
Ссылки
- CVE-2023-4623
- SUSE Bug 1215115
- SUSE Bug 1215440
- SUSE Bug 1217444
- SUSE Bug 1217531
- SUSE Bug 1219698
- SUSE Bug 1221578
- SUSE Bug 1221598