Описание
Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP3)
This update for the Linux Kernel 5.3.18-150300_59_138 fixes several issues.
The following security issues were fixed:
- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078).
- CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219296).
Список пакетов
SUSE Linux Enterprise Live Patching 15 SP3
kernel-livepatch-5_3_18-150300_59_138-default-7-150300.2.1
Ссылки
- Link for SUSE-SU-2024:1248-1
- E-Mail link for SUSE-SU-2024:1248-1
- SUSE Security Ratings
- SUSE Bug 1219078
- SUSE Bug 1219296
- SUSE CVE CVE-2023-52340 page
- SUSE CVE CVE-2024-0565 page
Описание
The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.
Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_138-default-7-150300.2.1
Ссылки
- CVE-2023-52340
- SUSE Bug 1219295
- SUSE Bug 1219296
- SUSE Bug 1224298
- SUSE Bug 1224878
Описание
An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.
Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_138-default-7-150300.2.1
Ссылки
- CVE-2024-0565
- SUSE Bug 1218832
- SUSE Bug 1219078