Описание
Security update for the Linux Kernel (Live Patch 49 for SLE 12 SP5)
This update for the Linux Kernel 4.12.14-122_179 fixes several issues.
The following security issues were fixed:
- CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1225011).
- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311).
- CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309).
Список пакетов
SUSE Linux Enterprise Live Patching 12 SP5
Ссылки
- Link for SUSE-SU-2024:3816-1
- E-Mail link for SUSE-SU-2024:3816-1
- SUSE Security Ratings
- SUSE Bug 1225011
- SUSE Bug 1225012
- SUSE Bug 1225309
- SUSE Bug 1225311
- SUSE Bug 1225819
- SUSE CVE CVE-2023-52752 page
- SUSE CVE CVE-2024-35862 page
- SUSE CVE CVE-2024-35863 page
- SUSE CVE CVE-2024-35864 page
- SUSE CVE CVE-2024-35867 page
Описание
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() Skip SMB sessions that are being teared down (e.g. @ses->ses_status == SES_EXITING) in cifs_debug_data_proc_show() to avoid use-after-free in @ses. This fixes the following GPF when reading from /proc/fs/cifs/DebugData while mounting and umounting [ 816.251274] general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6d81: 0000 [#1] PREEMPT SMP NOPTI ... [ 816.260138] Call Trace: [ 816.260329] <TASK> [ 816.260499] ? die_addr+0x36/0x90 [ 816.260762] ? exc_general_protection+0x1b3/0x410 [ 816.261126] ? asm_exc_general_protection+0x26/0x30 [ 816.261502] ? cifs_debug_tcon+0xbd/0x240 [cifs] [ 816.261878] ? cifs_debug_tcon+0xab/0x240 [cifs] [ 816.262249] cifs_debug_data_proc_show+0x516/0xdb0 [cifs] [ 816.262689] ? seq_read_iter+0x379/0x470 [ 816.262995] seq_read_iter+0x118/0x470 [ 816.263291] proc_reg_read_iter+0x53/0x90 [ 816.263596] ? srso_alias_return_thunk+0x5/0x7f [ 816.263945] vfs_read+0x201/0x350 [ 816.264211] ksys_read+0x75/0x100 [ 816.264472] do_syscall_64+0x3f/0x90 [ 816.264750] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 816.265135] RIP: 0033:0x7fd5e669d381
Затронутые продукты
Ссылки
- CVE-2023-52752
- SUSE Bug 1225487
- SUSE Bug 1225819
Описание
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_network_name_deleted() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
Затронутые продукты
Ссылки
- CVE-2024-35862
- SUSE Bug 1224764
- SUSE Bug 1225311
Описание
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in is_valid_oplock_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
Затронутые продукты
Ссылки
- CVE-2024-35863
- SUSE Bug 1224763
- SUSE Bug 1225011
Описание
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_lease_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
Затронутые продукты
Ссылки
- CVE-2024-35864
- SUSE Bug 1224765
- SUSE Bug 1225309
Описание
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_stats_proc_show() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
Затронутые продукты
Ссылки
- CVE-2024-35867
- SUSE Bug 1224664
- SUSE Bug 1225012