Описание
Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP4)
This update for the Linux Kernel 5.14.21-150400_24_97 fixes several issues.
The following security issues were fixed:
- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1219078).
- CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219432).
- CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219296).
Список пакетов
SUSE Linux Enterprise Live Patching 15 SP4
Ссылки
- Link for SUSE-SU-2024:1318-1
- E-Mail link for SUSE-SU-2024:1318-1
- SUSE Security Ratings
- SUSE Bug 1219078
- SUSE Bug 1219296
- SUSE Bug 1219432
- SUSE CVE CVE-2023-52340 page
- SUSE CVE CVE-2024-0565 page
- SUSE CVE CVE-2024-1085 page
Описание
The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.
Затронутые продукты
Ссылки
- CVE-2023-52340
- SUSE Bug 1219295
- SUSE Bug 1219296
- SUSE Bug 1224298
- SUSE Bug 1224878
Описание
An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.
Затронутые продукты
Ссылки
- CVE-2024-0565
- SUSE Bug 1218832
- SUSE Bug 1219078
Описание
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the next generation before freeing it, but only flags it inactive in the next generation, making it possible to free the element multiple times, leading to a double free vulnerability. We recommend upgrading past commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7.
Затронутые продукты
Ссылки
- CVE-2024-1085
- SUSE Bug 1219429
- SUSE Bug 1219432