[LU-16601] kernel update [SLES15 SP4 5.14.21-150400.24.46.1] Created: 27/Feb/23  Updated: 06/Apr/23  Resolved: 29/Mar/23

Status: Resolved
Project: Lustre
Component/s: None
Affects Version/s: Lustre 2.16.0, Lustre 2.15.3
Fix Version/s: Lustre 2.16.0

Type: Improvement Priority: Minor
Reporter: Jian Yu Assignee: Jian Yu
Resolution: Fixed Votes: 0
Labels: None

Issue Links:
Related
is related to LU-16546 kernel update [SLES15 SP4 5.14.21-150... Resolved
is related to LU-16718 kernel update [SLES15 SP4 5.14.21-150... Open
Rank (Obsolete): 9223372036854775807

 Description   

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various
security and bugfixes.

The following security bugs were fixed:

  • CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in
    net/sched/sch_atm.c because of type confusion (non-negative numbers can
    sometimes indicate a TC_ACT_SHOT condition rather than valid
    classification results) (bsc#1207125).
  • CVE-2023-23454: Fixed denial or service in cbq_classify in
    net/sched/sch_cbq.c (bnc#1207036).
  • CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).
  • CVE-2023-0266: Fixed a use-after-free vulnerability inside the ALSA PCM
    package. SNDRV_CTL_IOCTL_ELEM_ {READ|WRITE}

    32 was missing locks that
    could have been used in a use-after-free that could have resulted in a
    priviledge escalation to gain ring0 access from the system user
    (bsc#1207134).

  • CVE-2023-0179: Fixed incorrect arithmetics when fetching VLAN header
    bits (bsc#1207034).
  • CVE-2023-0122: Fixed a NULL pointer dereference vulnerability in
    nvmet_setup_auth(), that allowed an attacker to perform a Pre-Auth
    Denial of Service (DoS) attack on a remote machine (bnc#1207050).
  • CVE-2022-4382: Fixed a use-after-free flaw that was caused by a race
    condition among the superblock operations inside the gadgetfs code
    (bsc#1206258).
  • CVE-2020-24588: Fixed injection of arbitrary network packets against
    devices that support receiving non-SSP A-MSDU frames (which is mandatory
    as part of 802.11n) (bsc#1199701).

The following non-security bugs were fixed:
https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html



 Comments   
Comment by Gerrit Updater [ 02/Mar/23 ]

"Jian Yu <yujian@whamcloud.com>" uploaded a new patch: https://review.whamcloud.com/c/fs/lustre-release/+/50179
Subject: LU-16601 kernel: update SLES15 SP4 [5.14.21-150400.24.46.1]
Project: fs/lustre-release
Branch: master
Current Patch Set: 1
Commit: c1e032746e318daba275eec8995136a187de4a3c

Comment by Gerrit Updater [ 28/Mar/23 ]

"Oleg Drokin <green@whamcloud.com>" merged in patch https://review.whamcloud.com/c/fs/lustre-release/+/50179/
Subject: LU-16601 kernel: update SLES15 SP4 [5.14.21-150400.24.46.1]
Project: fs/lustre-release
Branch: master
Current Patch Set:
Commit: b30f825232cbee96ca548a11da8e01b401e2fa95

Comment by Peter Jones [ 29/Mar/23 ]

Landed for 2.16

Comment by Gerrit Updater [ 06/Apr/23 ]

"Andreas Dilger <adilger@whamcloud.com>" uploaded a new patch: https://review.whamcloud.com/c/fs/lustre-release/+/50563
Subject: LU-16601 kernel: update SLES15 SP4 [5.14.21-150400.24.46.1]
Project: fs/lustre-release
Branch: b2_15
Current Patch Set: 1
Commit: 739017e98fd75afe97ed06e5e2189cee6da6bacf

Generated at Sat Feb 10 03:28:25 UTC 2024 using Jira 9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c.