Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2025:0771-1

Опубликовано: 03 мар. 2025
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763).
  • CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112).
  • CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
  • CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217).
  • CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230).
  • CVE-2024-56623: scsi: qla2xxx: Fix use after free on unload (bsc#1235466).
  • CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430).
  • CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441).
  • CVE-2024-56664: bpf, sockmap: Fix race between element replace and close() (bsc#1235249).
  • CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645).
  • CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining clc data (bsc#1235759).
  • CVE-2024-57798: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() (bsc#1235818).
  • CVE-2024-57849: s390/cpum_sf: Handle CPU hotplug remove during sampling (bsc#1235814).
  • CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages (bsc#1235920).

The following non-security bugs were fixed:

  • NFS: Adjust the amount of readahead performed by NFS readdir (bsc#1231847).
  • NFS: Do not flush the readdir cache in nfs_dentry_iput() (bsc#1231847).
  • NFS: Improve heuristic for readdirplus (bsc#1231847, bsc#1231847, bsc#1237389).
  • NFS: Reduce readdir stack usage (bsc#1231847).
  • NFS: Trigger the 'ls -l' readdir heuristic sooner (bsc#1231847).
  • NFS: Use kmemdup_nul() in nfs_readdir_make_qstr() (bsc#1231847).

Список пакетов

Container suse/sle-micro-rancher/5.2:latest
kernel-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production
cluster-md-kmp-default-5.3.18-150300.59.195.1
dlm-kmp-default-5.3.18-150300.59.195.1
gfs2-kmp-default-5.3.18-150300.59.195.1
kernel-default-5.3.18-150300.59.195.1
ocfs2-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production
cluster-md-kmp-default-5.3.18-150300.59.195.1
dlm-kmp-default-5.3.18-150300.59.195.1
gfs2-kmp-default-5.3.18-150300.59.195.1
kernel-default-5.3.18-150300.59.195.1
ocfs2-kmp-default-5.3.18-150300.59.195.1
SUSE Enterprise Storage 7.1
kernel-64kb-5.3.18-150300.59.195.1
kernel-64kb-devel-5.3.18-150300.59.195.1
kernel-default-5.3.18-150300.59.195.1
kernel-default-base-5.3.18-150300.59.195.1.150300.18.116.1
kernel-default-devel-5.3.18-150300.59.195.1
kernel-devel-5.3.18-150300.59.195.1
kernel-docs-5.3.18-150300.59.195.1
kernel-macros-5.3.18-150300.59.195.1
kernel-obs-build-5.3.18-150300.59.195.1
kernel-preempt-5.3.18-150300.59.195.1
kernel-preempt-devel-5.3.18-150300.59.195.1
kernel-source-5.3.18-150300.59.195.1
kernel-syms-5.3.18-150300.59.195.1
reiserfs-kmp-default-5.3.18-150300.59.195.1
SUSE Linux Enterprise High Availability Extension 15 SP3
cluster-md-kmp-default-5.3.18-150300.59.195.1
dlm-kmp-default-5.3.18-150300.59.195.1
gfs2-kmp-default-5.3.18-150300.59.195.1
ocfs2-kmp-default-5.3.18-150300.59.195.1
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
kernel-64kb-5.3.18-150300.59.195.1
kernel-64kb-devel-5.3.18-150300.59.195.1
kernel-default-5.3.18-150300.59.195.1
kernel-default-base-5.3.18-150300.59.195.1.150300.18.116.1
kernel-default-devel-5.3.18-150300.59.195.1
kernel-devel-5.3.18-150300.59.195.1
kernel-docs-5.3.18-150300.59.195.1
kernel-macros-5.3.18-150300.59.195.1
kernel-obs-build-5.3.18-150300.59.195.1
kernel-preempt-5.3.18-150300.59.195.1
kernel-preempt-devel-5.3.18-150300.59.195.1
kernel-source-5.3.18-150300.59.195.1
kernel-syms-5.3.18-150300.59.195.1
reiserfs-kmp-default-5.3.18-150300.59.195.1
SUSE Linux Enterprise Live Patching 15 SP3
kernel-default-livepatch-5.3.18-150300.59.195.1
kernel-default-livepatch-devel-5.3.18-150300.59.195.1
kernel-livepatch-5_3_18-150300_59_195-default-1-150300.7.3.1
SUSE Linux Enterprise Micro 5.1
kernel-default-5.3.18-150300.59.195.1
kernel-default-base-5.3.18-150300.59.195.1.150300.18.116.1
SUSE Linux Enterprise Micro 5.2
kernel-default-5.3.18-150300.59.195.1
kernel-default-base-5.3.18-150300.59.195.1.150300.18.116.1
SUSE Linux Enterprise Server 15 SP3-LTSS
kernel-64kb-5.3.18-150300.59.195.1
kernel-64kb-devel-5.3.18-150300.59.195.1
kernel-default-5.3.18-150300.59.195.1
kernel-default-base-5.3.18-150300.59.195.1.150300.18.116.1
kernel-default-devel-5.3.18-150300.59.195.1
kernel-devel-5.3.18-150300.59.195.1
kernel-docs-5.3.18-150300.59.195.1
kernel-macros-5.3.18-150300.59.195.1
kernel-obs-build-5.3.18-150300.59.195.1
kernel-preempt-5.3.18-150300.59.195.1
kernel-preempt-devel-5.3.18-150300.59.195.1
kernel-source-5.3.18-150300.59.195.1
kernel-syms-5.3.18-150300.59.195.1
kernel-zfcpdump-5.3.18-150300.59.195.1
reiserfs-kmp-default-5.3.18-150300.59.195.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3
kernel-default-5.3.18-150300.59.195.1
kernel-default-base-5.3.18-150300.59.195.1.150300.18.116.1
kernel-default-devel-5.3.18-150300.59.195.1
kernel-devel-5.3.18-150300.59.195.1
kernel-docs-5.3.18-150300.59.195.1
kernel-macros-5.3.18-150300.59.195.1
kernel-obs-build-5.3.18-150300.59.195.1
kernel-preempt-5.3.18-150300.59.195.1
kernel-preempt-devel-5.3.18-150300.59.195.1
kernel-source-5.3.18-150300.59.195.1
kernel-syms-5.3.18-150300.59.195.1
reiserfs-kmp-default-5.3.18-150300.59.195.1

Описание

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability. We recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-5.3.18-150300.59.195.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: adapt set backend to use GC transaction API Use the GC transaction API to replace the old and buggy gc API and the busy mark approach. No set elements are removed from async garbage collection anymore, instead the _DEAD bit is set on so the set element is not visible from lookup path anymore. Async GC enqueues transaction work that might be aborted and retried later. rbtree and pipapo set backends does not set on the _DEAD bit from the sync GC path since this runs in control plane path where mutex is held. In this case, set elements are deactivated, removed and then released via RCU callback, sync GC never fails.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-5.3.18-150300.59.195.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in is_valid_oplock_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-5.3.18-150300.59.195.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: mm/swapfile: skip HugeTLB pages for unuse_vma I got a bad pud error and lost a 1GB HugeTLB when calling swapoff. The problem can be reproduced by the following steps: 1. Allocate an anonymous 1GB HugeTLB and some other anonymous memory. 2. Swapout the above anonymous memory. 3. run swapoff and we will get a bad pud error in kernel message: mm/pgtable-generic.c:42: bad pud 00000000743d215d(84000001400000e7) We can tell that pud_clear_bad is called by pud_none_or_clear_bad in unuse_pud_range() by ftrace. And therefore the HugeTLB pages will never be freed because we lost it from page table. We can skip HugeTLB pages for unuse_vma to fix it.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-5.3.18-150300.59.195.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-5.3.18-150300.59.195.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the sock object retains the dangling sk pointer, which may cause use-after-free later. Clear the sock sk pointer on error.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-5.3.18-150300.59.195.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: net: inet: do not leave a dangling sk pointer in inet_create() sock_init_data() attaches the allocated sk object to the provided sock object. If inet_create() fails later, the sk object is freed, but the sock object retains the dangling pointer, which may create use-after-free later. Clear the sk pointer in the sock object on error.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-5.3.18-150300.59.195.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix use after free on unload System crash is observed with stack trace warning of use after free. There are 2 signals to tell dpc_thread to terminate (UNLOADING flag and kthread_stop). On setting the UNLOADING flag when dpc_thread happens to run at the time and sees the flag, this causes dpc_thread to exit and clean up itself. When kthread_stop is called for final cleanup, this causes use after free. Remove UNLOADING signal to terminate dpc_thread. Use the kthread_stop as the main signal to exit dpc_thread. [596663.812935] kernel BUG at mm/slub.c:294! [596663.812950] invalid opcode: 0000 [#1] SMP PTI [596663.812957] CPU: 13 PID: 1475935 Comm: rmmod Kdump: loaded Tainted: G IOE --------- - - 4.18.0-240.el8.x86_64 #1 [596663.812960] Hardware name: HP ProLiant DL380p Gen8, BIOS P70 08/20/2012 [596663.812974] RIP: 0010:__slab_free+0x17d/0x360 ... [596663.813008] Call Trace: [596663.813022] ? __dentry_kill+0x121/0x170 [596663.813030] ? _cond_resched+0x15/0x30 [596663.813034] ? _cond_resched+0x15/0x30 [596663.813039] ? wait_for_completion+0x35/0x190 [596663.813048] ? try_to_wake_up+0x63/0x540 [596663.813055] free_task+0x5a/0x60 [596663.813061] kthread_stop+0xf3/0x100 [596663.813103] qla2x00_remove_one+0x284/0x440 [qla2xxx]


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-5.3.18-150300.59.195.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: fix LED ID check in led_tg_check() Syzbot has reported the following BUG detected by KASAN: BUG: KASAN: slab-out-of-bounds in strlen+0x58/0x70 Read of size 1 at addr ffff8881022da0c8 by task repro/5879 ... Call Trace: <TASK> dump_stack_lvl+0x241/0x360 ? __pfx_dump_stack_lvl+0x10/0x10 ? __pfx__printk+0x10/0x10 ? _printk+0xd5/0x120 ? __virt_addr_valid+0x183/0x530 ? __virt_addr_valid+0x183/0x530 print_report+0x169/0x550 ? __virt_addr_valid+0x183/0x530 ? __virt_addr_valid+0x183/0x530 ? __virt_addr_valid+0x45f/0x530 ? __phys_addr+0xba/0x170 ? strlen+0x58/0x70 kasan_report+0x143/0x180 ? strlen+0x58/0x70 strlen+0x58/0x70 kstrdup+0x20/0x80 led_tg_check+0x18b/0x3c0 xt_check_target+0x3bb/0xa40 ? __pfx_xt_check_target+0x10/0x10 ? stack_depot_save_flags+0x6e4/0x830 ? nft_target_init+0x174/0xc30 nft_target_init+0x82d/0xc30 ? __pfx_nft_target_init+0x10/0x10 ? nf_tables_newrule+0x1609/0x2980 ? nf_tables_newrule+0x1609/0x2980 ? rcu_is_watching+0x15/0xb0 ? nf_tables_newrule+0x1609/0x2980 ? nf_tables_newrule+0x1609/0x2980 ? __kmalloc_noprof+0x21a/0x400 nf_tables_newrule+0x1860/0x2980 ? __pfx_nf_tables_newrule+0x10/0x10 ? __nla_parse+0x40/0x60 nfnetlink_rcv+0x14e5/0x2ab0 ? __pfx_validate_chain+0x10/0x10 ? __pfx_nfnetlink_rcv+0x10/0x10 ? __lock_acquire+0x1384/0x2050 ? netlink_deliver_tap+0x2e/0x1b0 ? __pfx_lock_release+0x10/0x10 ? netlink_deliver_tap+0x2e/0x1b0 netlink_unicast+0x7f8/0x990 ? __pfx_netlink_unicast+0x10/0x10 ? __virt_addr_valid+0x183/0x530 ? __check_object_size+0x48e/0x900 netlink_sendmsg+0x8e4/0xcb0 ? __pfx_netlink_sendmsg+0x10/0x10 ? aa_sock_msg_perm+0x91/0x160 ? __pfx_netlink_sendmsg+0x10/0x10 __sock_sendmsg+0x223/0x270 ____sys_sendmsg+0x52a/0x7e0 ? __pfx_____sys_sendmsg+0x10/0x10 __sys_sendmsg+0x292/0x380 ? __pfx___sys_sendmsg+0x10/0x10 ? lockdep_hardirqs_on_prepare+0x43d/0x780 ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 ? exc_page_fault+0x590/0x8c0 ? do_syscall_64+0xb6/0x230 do_syscall_64+0xf3/0x230 entry_SYSCALL_64_after_hwframe+0x77/0x7f ... </TASK> Since an invalid (without '\0' byte at all) byte sequence may be passed from userspace, add an extra check to ensure that such a sequence is rejected as possible ID and so never passed to 'kstrdup()' and further.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-5.3.18-150300.59.195.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: net: defer final 'struct net' free in netns dismantle Ilya reported a slab-use-after-free in dst_destroy [1] Issue is in xfrm6_net_init() and xfrm4_net_init() : They copy xfrm[46]_dst_ops_template into net->xfrm.xfrm[46]_dst_ops. But net structure might be freed before all the dst callbacks are called. So when dst_destroy() calls later : if (dst->ops->destroy) dst->ops->destroy(dst); dst->ops points to the old net->xfrm.xfrm[46]_dst_ops, which has been freed. See a relevant issue fixed in : ac888d58869b ("net: do not delay dst_entries_add() in dst_release()") A fix is to queue the 'struct net' to be freed after one another cleanup_net() round (and existing rcu_barrier()) [1] BUG: KASAN: slab-use-after-free in dst_destroy (net/core/dst.c:112) Read of size 8 at addr ffff8882137ccab0 by task swapper/37/0 Dec 03 05:46:18 kernel: CPU: 37 UID: 0 PID: 0 Comm: swapper/37 Kdump: loaded Not tainted 6.12.0 #67 Hardware name: Red Hat KVM/RHEL, BIOS 1.16.1-1.el9 04/01/2014 Call Trace: <IRQ> dump_stack_lvl (lib/dump_stack.c:124) print_address_description.constprop.0 (mm/kasan/report.c:378) ? dst_destroy (net/core/dst.c:112) print_report (mm/kasan/report.c:489) ? dst_destroy (net/core/dst.c:112) ? kasan_addr_to_slab (mm/kasan/common.c:37) kasan_report (mm/kasan/report.c:603) ? dst_destroy (net/core/dst.c:112) ? rcu_do_batch (kernel/rcu/tree.c:2567) dst_destroy (net/core/dst.c:112) rcu_do_batch (kernel/rcu/tree.c:2567) ? __pfx_rcu_do_batch (kernel/rcu/tree.c:2491) ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4339 kernel/locking/lockdep.c:4406) rcu_core (kernel/rcu/tree.c:2825) handle_softirqs (kernel/softirq.c:554) __irq_exit_rcu (kernel/softirq.c:589 kernel/softirq.c:428 kernel/softirq.c:637) irq_exit_rcu (kernel/softirq.c:651) sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1049 arch/x86/kernel/apic/apic.c:1049) </IRQ> <TASK> asm_sysvec_apic_timer_interrupt (./arch/x86/include/asm/idtentry.h:702) RIP: 0010:default_idle (./arch/x86/include/asm/irqflags.h:37 ./arch/x86/include/asm/irqflags.h:92 arch/x86/kernel/process.c:743) Code: 00 4d 29 c8 4c 01 c7 4c 29 c2 e9 6e ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 0f 00 2d c7 c9 27 00 fb f4 <fa> c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 90 RSP: 0018:ffff888100d2fe00 EFLAGS: 00000246 RAX: 00000000001870ed RBX: 1ffff110201a5fc2 RCX: ffffffffb61a3e46 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffb3d4d123 RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed11c7e1835d R10: ffff888e3f0c1aeb R11: 0000000000000000 R12: 0000000000000000 R13: ffff888100d20000 R14: dffffc0000000000 R15: 0000000000000000 ? ct_kernel_exit.constprop.0 (kernel/context_tracking.c:148) ? cpuidle_idle_call (kernel/sched/idle.c:186) default_idle_call (./include/linux/cpuidle.h:143 kernel/sched/idle.c:118) cpuidle_idle_call (kernel/sched/idle.c:186) ? __pfx_cpuidle_idle_call (kernel/sched/idle.c:168) ? lock_release (kernel/locking/lockdep.c:467 kernel/locking/lockdep.c:5848) ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4347 kernel/locking/lockdep.c:4406) ? tsc_verify_tsc_adjust (arch/x86/kernel/tsc_sync.c:59) do_idle (kernel/sched/idle.c:326) cpu_startup_entry (kernel/sched/idle.c:423 (discriminator 1)) start_secondary (arch/x86/kernel/smpboot.c:202 arch/x86/kernel/smpboot.c:282) ? __pfx_start_secondary (arch/x86/kernel/smpboot.c:232) ? soft_restart_cpu (arch/x86/kernel/head_64.S:452) common_startup_64 (arch/x86/kernel/head_64.S:414) </TASK> Dec 03 05:46:18 kernel: Allocated by task 12184: kasan_save_stack (mm/kasan/common.c:48) kasan_save_track (./arch/x86/include/asm/current.h:49 mm/kasan/common.c:60 mm/kasan/common.c:69) __kasan_slab_alloc (mm/kasan/common.c:319 mm/kasan/common.c:345) kmem_cache_alloc_noprof (mm/slub.c:4085 mm/slub.c:4134 mm/slub.c:4141) copy_net_ns (net/core/net_namespace.c:421 net/core/net_namespace.c:480) create_new_namespaces ---truncated---


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-5.3.18-150300.59.195.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix race between element replace and close() Element replace (with a socket different from the one stored) may race with socket's close() link popping & unlinking. __sock_map_delete() unconditionally unrefs the (wrong) element: // set map[0] = s0 map_update_elem(map, 0, s0) // drop fd of s0 close(s0) sock_map_close() lock_sock(sk) (s0!) sock_map_remove_links(sk) link = sk_psock_link_pop() sock_map_unlink(sk, link) sock_map_delete_from_link // replace map[0] with s1 map_update_elem(map, 0, s1) sock_map_update_elem (s1!) lock_sock(sk) sock_map_update_common psock = sk_psock(sk) spin_lock(&stab->lock) osk = stab->sks[idx] sock_map_add_link(..., &stab->sks[idx]) sock_map_unref(osk, &stab->sks[idx]) psock = sk_psock(osk) sk_psock_put(sk, psock) if (refcount_dec_and_test(&psock)) sk_psock_drop(sk, psock) spin_unlock(&stab->lock) unlock_sock(sk) __sock_map_delete spin_lock(&stab->lock) sk = *psk // s1 replaced s0; sk == s1 if (!sk_test || sk_test == sk) // sk_test (s0) != sk (s1); no branch sk = xchg(psk, NULL) if (sk) sock_map_unref(sk, psk) // unref s1; sks[idx] will dangle psock = sk_psock(sk) sk_psock_put(sk, psock) if (refcount_dec_and_test()) sk_psock_drop(sk, psock) spin_unlock(&stab->lock) release_sock(sk) Then close(map) enqueues bpf_map_free_deferred, which finally calls sock_map_free(). This results in some refcount_t warnings along with a KASAN splat [1]. Fix __sock_map_delete(), do not allow sock_map_unref() on elements that may have been replaced. [1]: BUG: KASAN: slab-use-after-free in sock_map_free+0x10e/0x330 Write of size 4 at addr ffff88811f5b9100 by task kworker/u64:12/1063 CPU: 14 UID: 0 PID: 1063 Comm: kworker/u64:12 Not tainted 6.12.0+ #125 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014 Workqueue: events_unbound bpf_map_free_deferred Call Trace: <TASK> dump_stack_lvl+0x68/0x90 print_report+0x174/0x4f6 kasan_report+0xb9/0x190 kasan_check_range+0x10f/0x1e0 sock_map_free+0x10e/0x330 bpf_map_free_deferred+0x173/0x320 process_one_work+0x846/0x1420 worker_thread+0x5b3/0xf80 kthread+0x29e/0x360 ret_from_fork+0x2d/0x70 ret_from_fork_asm+0x1a/0x30 </TASK> Allocated by task 1202: kasan_save_stack+0x1e/0x40 kasan_save_track+0x10/0x30 __kasan_slab_alloc+0x85/0x90 kmem_cache_alloc_noprof+0x131/0x450 sk_prot_alloc+0x5b/0x220 sk_alloc+0x2c/0x870 unix_create1+0x88/0x8a0 unix_create+0xc5/0x180 __sock_create+0x241/0x650 __sys_socketpair+0x1ce/0x420 __x64_sys_socketpair+0x92/0x100 do_syscall_64+0x93/0x180 entry_SYSCALL_64_after_hwframe+0x76/0x7e Freed by task 46: kasan_save_stack+0x1e/0x40 kasan_save_track+0x10/0x30 kasan_save_free_info+0x37/0x60 __kasan_slab_free+0x4b/0x70 kmem_cache_free+0x1a1/0x590 __sk_destruct+0x388/0x5a0 sk_psock_destroy+0x73e/0xa50 process_one_work+0x846/0x1420 worker_thread+0x5b3/0xf80 kthread+0x29e/0x360 ret_from_fork+0x2d/0x70 ret_from_fork_asm+0x1a/0x30 The bu ---truncated---


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-5.3.18-150300.59.195.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: btrfs: fix use-after-free when COWing tree bock and tracing is enabled When a COWing a tree block, at btrfs_cow_block(), and we have the tracepoint trace_btrfs_cow_block() enabled and preemption is also enabled (CONFIG_PREEMPT=y), we can trigger a use-after-free in the COWed extent buffer while inside the tracepoint code. This is because in some paths that call btrfs_cow_block(), such as btrfs_search_slot(), we are holding the last reference on the extent buffer @buf so btrfs_force_cow_block() drops the last reference on the @buf extent buffer when it calls free_extent_buffer_stale(buf), which schedules the release of the extent buffer with RCU. This means that if we are on a kernel with preemption, the current task may be preempted before calling trace_btrfs_cow_block() and the extent buffer already released by the time trace_btrfs_cow_block() is called, resulting in a use-after-free. Fix this by moving the trace_btrfs_cow_block() from btrfs_cow_block() to btrfs_force_cow_block() before the COWed extent buffer is freed. This also has a side effect of invoking the tracepoint in the tree defrag code, at defrag.c:btrfs_realloc_node(), since btrfs_force_cow_block() is called there, but this is fine and it was actually missing there.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-5.3.18-150300.59.195.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: net/smc: check return value of sock_recvmsg when draining clc data When receiving clc msg, the field length in smc_clc_msg_hdr indicates the length of msg should be received from network and the value should not be fully trusted as it is from the network. Once the value of length exceeds the value of buflen in function smc_clc_wait_msg it may run into deadloop when trying to drain the remaining data exceeding buflen. This patch checks the return value of sock_recvmsg when draining data in case of deadloop in draining.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-5.3.18-150300.59.195.1

Ссылки

Описание

** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-5.3.18-150300.59.195.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: s390/cpum_sf: Handle CPU hotplug remove during sampling CPU hotplug remove handling triggers the following function call sequence: CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu() The s390 CPUMF sampling CPU hotplug handler invokes: s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers() This function de-allocates all sampling data buffers (SDBs) allocated for that CPU at event initialization. It also clears the PMU_F_RESERVED bit. The CPU is gone and can not be sampled. With the event still being active on the removed CPU, the CPU event hotplug support in kernel performance subsystem triggers the following function calls on the removed CPU: perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from_context() +--> event_sched_out() +--> cpumsf_pmu_del() +--> cpumsf_pmu_stop() +--> hw_perf_event_update() to stop and remove the event. During removal of the event, the sampling device driver tries to read out the remaining samples from the sample data buffers (SDBs). But they have already been freed (and may have been re-assigned). This may lead to a use after free situation in which case the samples are most likely invalid. In the best case the memory has not been reassigned and still contains valid data. Remedy this situation and check if the CPU is still in reserved state (bit PMU_F_RESERVED set). In this case the SDBs have not been released an contain valid data. This is always the case when the event is removed (and no CPU hotplug off occured). If the PMU_F_RESERVED bit is not set, the SDB buffers are gone.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-5.3.18-150300.59.195.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: ALSA: seq: oss: Fix races at processing SysEx messages OSS sequencer handles the SysEx messages split in 6 bytes packets, and ALSA sequencer OSS layer tries to combine those. It stores the data in the internal buffer and this access is racy as of now, which may lead to the out-of-bounds access. As a temporary band-aid fix, introduce a mutex for serializing the process of the SysEx message packets.


Затронутые продукты
Container suse/sle-micro-rancher/5.2:latest:kernel-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-5.3.18-150300.59.195.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-5.3.18-150300.59.195.1

Ссылки
Уязвимость SUSE-SU-2025:0771-1