Uploaded image for project: 'Lustre'
  1. Lustre
  2. LU-17133

kernel update [SLES15 SP4 5.14.21-150400.24.84.1]

    XMLWordPrintable

Details

    • Improvement
    • Resolution: Won't Fix
    • Minor
    • None
    • Lustre 2.16.0, Lustre 2.15.4
    • None
    • 3
    • 9223372036854775807

    Description

      The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security
      and bugfixes.

      The following security bugs were fixed:

      • CVE-2023-37453: Fixed oversight in SuperSpeed initialization (bsc#1213123).
      • CVE-2023-4569: Fixed information leak in nft_set_catchall_flush in
        net/netfilter/nf_tables_api.c (bsc#1214729).
      • CVE-2023-4134: Fixed use-after-free in cyttsp4_watchdog_work()
        (bsc#1213971).
      • CVE-2023-20588: Fixed a division-by-zero error on some AMD processors that
        can potentially return speculative data resulting in loss of confidentiality
        (bsc#1213927).
      • CVE-2023-4459: Fixed a NULL pointer dereference flaw in vmxnet3_rq_cleanup
        that may have allowed a local attacker with normal user privilege to cause a
        denial of service (bsc#1214451).
      • CVE-2023-3863: Fixed a use-after-free flaw was found in nfc_llcp_find_local
        that allowed a local user with special privileges to impact a kernel
        information leak issue (bsc#1213601).
      • CVE-2023-3772: Fixed a flaw in XFRM subsystem that may have allowed a
        malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL
        pointer leading to a possible kernel crash and denial of service
        (bsc#1213666).
      • CVE-2023-2007: Fixed a flaw in the DPT I2O Controller driver that could
        allow an attacker to escalate privileges and execute arbitrary code in the
        context of the kernel (bsc#1210448).
      • CVE-2023-4387: Fixed use-after-free flaw in vmxnet3_rq_alloc_rx_buf that
        could allow a local attacker to crash the system due to a double-free
        (bsc#1214350).
      • CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be
        exploited to achieve local privilege escalation (bsc#1213580).
      • CVE-2023-4128: Fixed a use-after-free flaw in net/sched/cls_fw.c that
        allowed a local attacker to perform a local privilege escalation due to
        incorrect handling of the existing filter, leading to a kernel information
        leak issue (bsc#1214149).
      • CVE-2023-4273: Fixed a flaw in the exFAT driver of the Linux kernel that
        alloawed a local privileged attacker to overflow the kernel stack
        (bsc#1214120).
      • CVE-2023-4147: Fixed use-after-free in nf_tables_newrule (bsc#1213968).
      • CVE-2023-4133: Fixed use after free bugs caused by circular dependency
        problem in cxgb4 (bsc#1213970).
      • CVE-2023-34319: Fixed buffer overrun triggered by unusual packet in
        xen/netback (XSA-432) (bsc#1213546).
      • CVE-2023-4194: Fixed a type confusion in net tun_chr_open() (bsc#1214019).

      The following non-security bugs were fixed:
      https://lists.suse.com/pipermail/sle-security-updates/2023-September/016212.html

      Attachments

        Issue Links

          Activity

            People

              yujian Jian Yu
              yujian Jian Yu
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: