[LU-17133] kernel update [SLES15 SP4 5.14.21-150400.24.84.1] Created: 19/Sep/23  Updated: 24/Oct/23  Resolved: 24/Oct/23

Status: Resolved
Project: Lustre
Component/s: None
Affects Version/s: Lustre 2.16.0, Lustre 2.15.4
Fix Version/s: None

Type: Improvement Priority: Minor
Reporter: Jian Yu Assignee: Jian Yu
Resolution: Won't Fix Votes: 0
Labels: None

Issue Links:
Related
is related to LU-17113 kernel update [SLES15 SP4 5.14.21-150... Resolved
is related to LU-17221 kernel update [SLES15 SP4 5.14.21-150... Resolved
Severity: 3
Rank (Obsolete): 9223372036854775807

 Description   

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security
and bugfixes.

The following security bugs were fixed:

  • CVE-2023-37453: Fixed oversight in SuperSpeed initialization (bsc#1213123).
  • CVE-2023-4569: Fixed information leak in nft_set_catchall_flush in
    net/netfilter/nf_tables_api.c (bsc#1214729).
  • CVE-2023-4134: Fixed use-after-free in cyttsp4_watchdog_work()
    (bsc#1213971).
  • CVE-2023-20588: Fixed a division-by-zero error on some AMD processors that
    can potentially return speculative data resulting in loss of confidentiality
    (bsc#1213927).
  • CVE-2023-4459: Fixed a NULL pointer dereference flaw in vmxnet3_rq_cleanup
    that may have allowed a local attacker with normal user privilege to cause a
    denial of service (bsc#1214451).
  • CVE-2023-3863: Fixed a use-after-free flaw was found in nfc_llcp_find_local
    that allowed a local user with special privileges to impact a kernel
    information leak issue (bsc#1213601).
  • CVE-2023-3772: Fixed a flaw in XFRM subsystem that may have allowed a
    malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL
    pointer leading to a possible kernel crash and denial of service
    (bsc#1213666).
  • CVE-2023-2007: Fixed a flaw in the DPT I2O Controller driver that could
    allow an attacker to escalate privileges and execute arbitrary code in the
    context of the kernel (bsc#1210448).
  • CVE-2023-4387: Fixed use-after-free flaw in vmxnet3_rq_alloc_rx_buf that
    could allow a local attacker to crash the system due to a double-free
    (bsc#1214350).
  • CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be
    exploited to achieve local privilege escalation (bsc#1213580).
  • CVE-2023-4128: Fixed a use-after-free flaw in net/sched/cls_fw.c that
    allowed a local attacker to perform a local privilege escalation due to
    incorrect handling of the existing filter, leading to a kernel information
    leak issue (bsc#1214149).
  • CVE-2023-4273: Fixed a flaw in the exFAT driver of the Linux kernel that
    alloawed a local privileged attacker to overflow the kernel stack
    (bsc#1214120).
  • CVE-2023-4147: Fixed use-after-free in nf_tables_newrule (bsc#1213968).
  • CVE-2023-4133: Fixed use after free bugs caused by circular dependency
    problem in cxgb4 (bsc#1213970).
  • CVE-2023-34319: Fixed buffer overrun triggered by unusual packet in
    xen/netback (XSA-432) (bsc#1213546).
  • CVE-2023-4194: Fixed a type confusion in net tun_chr_open() (bsc#1214019).

The following non-security bugs were fixed:
https://lists.suse.com/pipermail/sle-security-updates/2023-September/016212.html



 Comments   
Comment by Gerrit Updater [ 22/Sep/23 ]

"Jian Yu <yujian@whamcloud.com>" uploaded a new patch: https://review.whamcloud.com/c/fs/lustre-release/+/52481
Subject: LU-17133 kernel: update SLES15 SP4 [5.14.21-150400.24.84.1]
Project: fs/lustre-release
Branch: master
Current Patch Set: 1
Commit: 5dcdbe687d136d7e976f578faccbb3bde1b0acc9

Comment by Jian Yu [ 24/Oct/23 ]

A newer version is available in LU-17221.

Generated at Sat Feb 10 03:32:55 UTC 2024 using Jira 9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c.