Описание
Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP5)
This update for the Linux Kernel 5.14.21-150500_13_35 fixes several issues.
The following security issues were fixed:
- CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828).
- CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219296).
Список пакетов
SUSE Linux Enterprise Live Patching 15 SP5
Ссылки
- Link for SUSE-SU-2024:1362-1
- E-Mail link for SUSE-SU-2024:1362-1
- SUSE Security Ratings
- SUSE Bug 1219296
- SUSE Bug 1220828
- SUSE CVE CVE-2023-52340 page
- SUSE CVE CVE-2024-26622 page
Описание
The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.
Затронутые продукты
Ссылки
- CVE-2023-52340
- SUSE Bug 1219295
- SUSE Bug 1219296
- SUSE Bug 1224298
- SUSE Bug 1224878
Описание
In the Linux kernel, the following vulnerability has been resolved: tomoyo: fix UAF write bug in tomoyo_write_control() Since tomoyo_write_control() updates head->write_buf when write() of long lines is requested, we need to fetch head->write_buf after head->io_sem is held. Otherwise, concurrent write() requests can cause use-after-free-write and double-free problems.
Затронутые продукты
Ссылки
- CVE-2024-26622
- SUSE Bug 1220825
- SUSE Bug 1220828
- SUSE Bug 1224298
- SUSE Bug 1224878