Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:4377-1

Опубликовано: 06 нояб. 2023
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd->erasesize) that could cause a local DoS. (bsc#1210778)
  • CVE-2023-45862: Fixed an issue in the ENE UB6250 reader driver whwere an object could potentially extend beyond the end of an allocation causing. (bsc#1216051)
  • CVE-2023-2163: Fixed an incorrect verifier pruning in BPF that could lead to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape. (bsc#1215518)
  • CVE-2023-34324: Fixed a possible deadlock in Linux kernel event handling. (bsc#1215745).
  • CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. (bsc#1216046)
  • CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051).
  • CVE-2023-39194: Fixed an out of bounds read in the XFRM subsystem (bsc#1215861).
  • CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).
  • CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858).
  • CVE-2023-42754: Fixed a NULL pointer dereference in the IPv4 stack that could lead to denial of service (bsc#1215467).

The following non-security bugs were fixed:

  • KVM: x86: fix sending PV IPI (git-fixes, bsc#1210853, bsc#1216134).
  • bpf: propagate precision in ALU/ALU64 operations (git-fixes).

Список пакетов

Image SLES15-SP2-BYOS-Azure
kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-HPC-BYOS-Azure
kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure
cluster-md-kmp-default-5.3.18-150200.24.169.1
dlm-kmp-default-5.3.18-150200.24.169.1
gfs2-kmp-default-5.3.18-150200.24.169.1
kernel-default-5.3.18-150200.24.169.1
ocfs2-kmp-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
cluster-md-kmp-default-5.3.18-150200.24.169.1
dlm-kmp-default-5.3.18-150200.24.169.1
gfs2-kmp-default-5.3.18-150200.24.169.1
kernel-default-5.3.18-150200.24.169.1
ocfs2-kmp-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
cluster-md-kmp-default-5.3.18-150200.24.169.1
dlm-kmp-default-5.3.18-150200.24.169.1
gfs2-kmp-default-5.3.18-150200.24.169.1
kernel-default-5.3.18-150200.24.169.1
ocfs2-kmp-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-BYOS-Azure
cluster-md-kmp-default-5.3.18-150200.24.169.1
dlm-kmp-default-5.3.18-150200.24.169.1
gfs2-kmp-default-5.3.18-150200.24.169.1
kernel-default-5.3.18-150200.24.169.1
ocfs2-kmp-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-BYOS-EC2-HVM
cluster-md-kmp-default-5.3.18-150200.24.169.1
dlm-kmp-default-5.3.18-150200.24.169.1
gfs2-kmp-default-5.3.18-150200.24.169.1
kernel-default-5.3.18-150200.24.169.1
ocfs2-kmp-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-BYOS-GCE
cluster-md-kmp-default-5.3.18-150200.24.169.1
dlm-kmp-default-5.3.18-150200.24.169.1
gfs2-kmp-default-5.3.18-150200.24.169.1
kernel-default-5.3.18-150200.24.169.1
ocfs2-kmp-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-EC2-HVM
cluster-md-kmp-default-5.3.18-150200.24.169.1
dlm-kmp-default-5.3.18-150200.24.169.1
gfs2-kmp-default-5.3.18-150200.24.169.1
kernel-default-5.3.18-150200.24.169.1
ocfs2-kmp-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-GCE
cluster-md-kmp-default-5.3.18-150200.24.169.1
dlm-kmp-default-5.3.18-150200.24.169.1
gfs2-kmp-default-5.3.18-150200.24.169.1
kernel-default-5.3.18-150200.24.169.1
ocfs2-kmp-default-5.3.18-150200.24.169.1
SUSE Linux Enterprise High Availability Extension 15 SP2
cluster-md-kmp-default-5.3.18-150200.24.169.1
dlm-kmp-default-5.3.18-150200.24.169.1
gfs2-kmp-default-5.3.18-150200.24.169.1
ocfs2-kmp-default-5.3.18-150200.24.169.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
kernel-default-5.3.18-150200.24.169.1
kernel-default-base-5.3.18-150200.24.169.1.150200.9.85.1
kernel-default-devel-5.3.18-150200.24.169.1
kernel-devel-5.3.18-150200.24.169.1
kernel-docs-5.3.18-150200.24.169.1
kernel-macros-5.3.18-150200.24.169.1
kernel-obs-build-5.3.18-150200.24.169.1
kernel-preempt-5.3.18-150200.24.169.1
kernel-preempt-devel-5.3.18-150200.24.169.1
kernel-source-5.3.18-150200.24.169.1
kernel-syms-5.3.18-150200.24.169.1
SUSE Linux Enterprise Live Patching 15 SP2
kernel-default-livepatch-5.3.18-150200.24.169.1
kernel-default-livepatch-devel-5.3.18-150200.24.169.1
kernel-livepatch-5_3_18-150200_24_169-default-1-150200.5.3.1
SUSE Linux Enterprise Server 15 SP2-LTSS
kernel-default-5.3.18-150200.24.169.1
kernel-default-base-5.3.18-150200.24.169.1.150200.9.85.1
kernel-default-devel-5.3.18-150200.24.169.1
kernel-devel-5.3.18-150200.24.169.1
kernel-docs-5.3.18-150200.24.169.1
kernel-macros-5.3.18-150200.24.169.1
kernel-obs-build-5.3.18-150200.24.169.1
kernel-preempt-5.3.18-150200.24.169.1
kernel-preempt-devel-5.3.18-150200.24.169.1
kernel-source-5.3.18-150200.24.169.1
kernel-syms-5.3.18-150200.24.169.1
reiserfs-kmp-default-5.3.18-150200.24.169.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2
kernel-default-5.3.18-150200.24.169.1
kernel-default-base-5.3.18-150200.24.169.1.150200.9.85.1
kernel-default-devel-5.3.18-150200.24.169.1
kernel-devel-5.3.18-150200.24.169.1
kernel-docs-5.3.18-150200.24.169.1
kernel-macros-5.3.18-150200.24.169.1
kernel-obs-build-5.3.18-150200.24.169.1
kernel-preempt-5.3.18-150200.24.169.1
kernel-preempt-devel-5.3.18-150200.24.169.1
kernel-source-5.3.18-150200.24.169.1
kernel-syms-5.3.18-150200.24.169.1
reiserfs-kmp-default-5.3.18-150200.24.169.1

Описание

Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.169.1

Ссылки

Описание

An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd->erasesize), used indirectly by ctrl_cdev_ioctl, when mtd->erasesize is 0.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.169.1

Ссылки

Описание

A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.169.1

Ссылки

Описание

Closing of an event channel in the Linux kernel can result in a deadlock. This happens when the close is being performed in parallel to an unrelated Xen console action and the handling of a Xen console interrupt in an unprivileged guest. The closing of an event channel is e.g. triggered by removal of a paravirtual device on the other side. As this action will cause console messages to be issued on the other side quite often, the chance of triggering the deadlock is not neglectable. Note that 32-bit Arm-guests are not affected, as the 32-bit Linux kernel on Arm doesn't use queued-RW-locks, which are required to trigger the issue (on Arm32 a waiting writer doesn't block further readers to get the lock).


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.169.1

Ссылки

Описание

A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.169.1

Ссылки

Описание

A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.169.1

Ссылки

Описание

A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.169.1

Ссылки

Описание

A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.169.1

Ссылки

Описание

A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.169.1

Ссылки

Описание

An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150200.24.169.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150200.24.169.1

Ссылки
Уязвимость SUSE-SU-2023:4377-1