Описание
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).
The following non-security bugs were fixed:
- USB: serial: option: add Quectel RM500U-CN modem (git-fixes).
- USB: serial: option: add Telit FE990 compositions (git-fixes).
- USB: serial: option: add UNISOC vendor and TOZED LT70C product (git-fixes).
- cpu/SMT: Allow enabling partial SMT states via sysfs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Create topology_smt_thread_allowed() (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Move SMT prototypes into cpu_smt.h (bsc#1214408).
- cpu/SMT: Move smt/control simple exit cases earlier (bsc#1214408).
- cpu/SMT: Remove topology_smt_supported() (bsc#1214408).
- cpu/SMT: Store the current/max number of threads (bsc#1214408).
- cpu/hotplug: Create SMT sysfs interface for all arches (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- dm-raid: remove useless checking in raid_message() (git-fixes).
- l2tp: fix refcount leakage on PPPoL2TP sockets (git-fixes).
- l2tp: fix {pppol2tp, l2tp_dfs}_seq_stop() in case of seq_file overflow (git-fixes).
- md/bitmap: always wake up md_thread in timeout_store (git-fixes).
- md/bitmap: factor out a helper to set timeout (git-fixes).
- md/raid10: Do not add spare disk when recovery fails (git-fixes).
- md/raid10: check slab-out-of-bounds in md_bitmap_get_counter (git-fixes).
- md/raid10: clean up md_add_new_disk() (git-fixes).
- md/raid10: fix io loss while replacement replace rdev (git-fixes).
- md/raid10: fix leak of 'r10bio->remaining' for recovery (git-fixes).
- md/raid10: fix memleak for 'conf->bio_split' (git-fixes).
- md/raid10: fix memleak of md thread (git-fixes).
- md/raid10: fix null-ptr-deref in raid10_sync_request (git-fixes).
- md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request (git-fixes).
- md/raid10: fix overflow of md/safe_mode_delay (git-fixes).
- md/raid10: fix wrong setting of max_corr_read_errors (git-fixes).
- md/raid10: improve code of mrdev in raid10_sync_request (git-fixes).
- md/raid10: prevent soft lockup while flush writes (git-fixes).
- md/raid10: prioritize adding disk to 'removed' mirror (git-fixes).
- md: Flush workqueue md_rdev_misc_wq in md_alloc() (git-fixes).
- md: add new workqueue for delete rdev (git-fixes).
- md: avoid signed overflow in slot_store() (git-fixes).
- md: do not return existing mddevs from mddev_find_or_alloc (git-fixes).
- md: factor out a mddev_alloc_unit helper from mddev_find (git-fixes).
- md: fix data corruption for raid456 when reshape restart while grow up (git-fixes).
- md: fix deadlock causing by sysfs_notify (git-fixes).
- md: fix incorrect declaration about claim_rdev in md_import_device (git-fixes).
- md: flush md_rdev_misc_wq for HOT_ADD_DISK case (git-fixes).
- md: get sysfs entry after redundancy attr group create (git-fixes).
- md: refactor mddev_find_or_alloc (git-fixes).
- md: remove lock_bdev / unlock_bdev (git-fixes).
- mm, memcg: add mem_cgroup_disabled checks in vmpressure and swap-related functions (bsc#1190208 (MM functional and performance backports) bsc#1216759).
- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).
- net: mana: Configure hwc timeout from hardware (bsc#1214037).
- net: mana: Fix MANA VF unload when hardware is unresponsive (bsc#1214764).
- powerpc/pseries: Honour current SMT state when DLPAR onlining CPUs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- powerpc/pseries: Initialise CPU hotplug callbacks earlier (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- powerpc: Add HOTPLUG_SMT support (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588). Update config files.
- ring-buffer: Avoid softlockup in ring_buffer_resize() (git-fixes).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217607).
- s390/cmma: fix detection of DAT pages (LTC#203996 bsc#1217087).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203996 bsc#1217087).
- s390/cmma: fix initial kernel address space page table walk (LTC#203996 bsc#1217087).
- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217206).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217519).
- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217604).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203996 bsc#1217087).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203996 bsc#1217087).
- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217603).
- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).
- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1216031).
- usb-storage: fix deadlock when a scsi command timeouts more than once (git-fixes).
- usb: typec: tcpm: Fix altmode re-registration causes sysfs create fail (git-fixes).
- xfs: fix units conversion error in xfs_bmap_del_extent_delay (git-fixes).
- xfs: make sure maxlen is still congruent with prod when rounding down (git-fixes).
- xfs: reserve data and rt quota at the same time (bsc#1203496).
Список пакетов
Image SLES12-SP5-Azure-BYOS
Image SLES12-SP5-Azure-HPC-BYOS
Image SLES12-SP5-Azure-SAP-BYOS
Image SLES12-SP5-Azure-SAP-On-Demand
Image SLES12-SP5-EC2-BYOS
Image SLES12-SP5-EC2-ECS-On-Demand
Image SLES12-SP5-EC2-On-Demand
Image SLES12-SP5-EC2-SAP-BYOS
Image SLES12-SP5-EC2-SAP-On-Demand
Image SLES12-SP5-GCE-BYOS
Image SLES12-SP5-GCE-On-Demand
Image SLES12-SP5-GCE-SAP-BYOS
Image SLES12-SP5-GCE-SAP-On-Demand
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
SUSE Linux Enterprise High Availability Extension 12 SP5
SUSE Linux Enterprise Live Patching 12 SP5
SUSE Linux Enterprise Server 12 SP5
SUSE Linux Enterprise Server for SAP Applications 12 SP5
SUSE Linux Enterprise Software Development Kit 12 SP5
SUSE Linux Enterprise Workstation Extension 12 SP5
Ссылки
- Link for SUSE-SU-2023:4784-1
- E-Mail link for SUSE-SU-2023:4784-1
- SUSE Security Ratings
- SUSE Bug 1084909
- SUSE Bug 1176950
- SUSE Bug 1190208
- SUSE Bug 1203496
- SUSE Bug 1205462
- SUSE Bug 1208787
- SUSE Bug 1210780
- SUSE Bug 1214037
- SUSE Bug 1214285
- SUSE Bug 1214408
- SUSE Bug 1214764
- SUSE Bug 1216031
- SUSE Bug 1216058
- SUSE Bug 1216259
- SUSE Bug 1216584
- SUSE Bug 1216759
- SUSE Bug 1216965
Описание
There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c
Затронутые продукты
Ссылки
- CVE-2023-0461
- SUSE Bug 1208787
- SUSE Bug 1208911
- SUSE Bug 1211833
- SUSE Bug 1217079
- SUSE Bug 1218514
Описание
An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.
Затронутые продукты
Ссылки
- CVE-2023-31083
- SUSE Bug 1210780
Описание
An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.
Затронутые продукты
Ссылки
- CVE-2023-39197
- SUSE Bug 1216976
- SUSE Bug 1220015
Описание
A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.
Затронутые продукты
Ссылки
- CVE-2023-39198
- SUSE Bug 1216965
- SUSE Bug 1217116
- SUSE Bug 1219703
Описание
An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.
Затронутые продукты
Ссылки
- CVE-2023-45863
- SUSE Bug 1216058
- SUSE Bug 1220015
Описание
An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.
Затронутые продукты
Ссылки
- CVE-2023-45871
- SUSE Bug 1216259
Описание
A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation. If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer. We recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.
Затронутые продукты
Ссылки
- CVE-2023-5717
- SUSE Bug 1216584
- SUSE Bug 1216644
- SUSE Bug 1217557
- SUSE Bug 1219697
- SUSE Bug 1220191