Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: RHSA-2024:0412
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux BaseOS EUS (v.8.6), Red Hat Virtualization 4 Hypervisor for RHEL 8, Red Hat CodeReady Linux Builder EUS (v.8.6)
Datum: Do, 25. Januar 2024, 22:14
Referenzen: https://access.redhat.com/security/cve/CVE-2023-3611
https://bugzilla.redhat.com/show_bug.cgi?id=2154171
https://access.redhat.com/security/cve/CVE-2023-5178
https://bugzilla.redhat.com/show_bug.cgi?id=2237757
https://bugzilla.redhat.com/show_bug.cgi?id=2230042
https://bugzilla.redhat.com/show_bug.cgi?id=2221463
https://access.redhat.com/security/cve/CVE-2023-38409
https://bugzilla.redhat.com/show_bug.cgi?id=2244723
https://access.redhat.com/security/cve/CVE-2022-47929
https://access.redhat.com/security/cve/CVE-2023-31436
https://bugzilla.redhat.com/show_bug.cgi?id=2225191
https://bugzilla.redhat.com/show_bug.cgi?id=2168297
https://bugzilla.redhat.com/show_bug.cgi?id=2237760
https://bugzilla.redhat.com/show_bug.cgi?id=2168246
https://access.redhat.com/security/cve/CVE-2022-1016
https://bugzilla.redhat.com/show_bug.cgi?id=2122228
https://bugzilla.redhat.com/show_bug.cgi?id=2087568
https://bugzilla.redhat.com/show_bug.cgi?id=2134528
https://bugzilla.redhat.com/show_bug.cgi?id=2066614
https://bugzilla.redhat.com/show_bug.cgi?id=2143943
https://access.redhat.com/security/cve/CVE-2022-41858
https://bugzilla.redhat.com/show_bug.cgi?id=2058395
https://access.redhat.com/security/cve/CVE-2023-1195
https://bugzilla.redhat.com/show_bug.cgi?id=2114937
https://access.redhat.com/security/cve/CVE-2023-1838
https://access.redhat.com/security/cve/CVE-2023-1192
https://access.redhat.com/security/cve/CVE-2023-35823
https://bugzilla.redhat.com/show_bug.cgi?id=2173403
https://access.redhat.com/security/cve/CVE-2022-40982
https://access.redhat.com/security/cve/CVE-2022-3628
https://bugzilla.redhat.com/show_bug.cgi?id=2162120
https://access.redhat.com/security/cve/CVE-2022-4129
https://bugzilla.redhat.com/show_bug.cgi?id=2241924
https://access.redhat.com/security/cve/CVE-2023-4623
https://bugzilla.redhat.com/show_bug.cgi?id=2151270
https://access.redhat.com/security/cve/CVE-2023-1855
https://bugzilla.redhat.com/show_bug.cgi?id=2258475
https://access.redhat.com/security/cve/CVE-2023-35824
https://access.redhat.com/security/cve/CVE-2022-1679
https://access.redhat.com/security/cve/CVE-2023-4732
https://access.redhat.com/security/cve/CVE-2023-45871
https://bugzilla.redhat.com/show_bug.cgi?id=2215502
https://bugzilla.redhat.com/show_bug.cgi?id=2215835
https://bugzilla.redhat.com/show_bug.cgi?id=2144379
https://bugzilla.redhat.com/show_bug.cgi?id=2223949
https://access.redhat.com/security/cve/CVE-2023-33203
https://access.redhat.com/security/cve/CVE-2023-2162
https://bugzilla.redhat.com/show_bug.cgi?id=2230094
https://access.redhat.com/security/cve/CVE-2022-3028
https://bugzilla.redhat.com/show_bug.cgi?id=2236982
https://bugzilla.redhat.com/show_bug.cgi?id=2193097
https://bugzilla.redhat.com/show_bug.cgi?id=2219268
https://access.redhat.com/security/cve/CVE-2023-1382
https://bugzilla.redhat.com/show_bug.cgi?id=2218943
https://bugzilla.redhat.com/show_bug.cgi?id=2192671
https://access.redhat.com/security/cve/CVE-2022-43750
https://access.redhat.com/security/cve/CVE-2022-3567
https://bugzilla.redhat.com/show_bug.cgi?id=2192667
https://bugzilla.redhat.com/show_bug.cgi?id=2184578
https://access.redhat.com/security/cve/CVE-2022-0854
https://access.redhat.com/security/cve/CVE-2023-23454
https://bugzilla.redhat.com/show_bug.cgi?id=2188396
https://access.redhat.com/security/cve/CVE-2023-26545
https://access.redhat.com/security/cve/CVE-2023-0394
https://access.redhat.com/security/cve/CVE-2023-2513
https://access.redhat.com/security/cve/CVE-2023-3161
https://access.redhat.com/security/cve/CVE-2023-3812
https://access.redhat.com/security/cve/CVE-2023-42753
https://access.redhat.com/security/cve/CVE-2023-3772
https://bugzilla.redhat.com/show_bug.cgi?id=2240249
https://bugzilla.redhat.com/show_bug.cgi?id=2213485
https://access.redhat.com/security/cve/CVE-2023-1073
https://access.redhat.com/solutions/7027704
https://bugzilla.redhat.com/show_bug.cgi?id=2177371
https://bugzilla.redhat.com/show_bug.cgi?id=2239843
https://bugzilla.redhat.com/show_bug.cgi?id=2187773
https://bugzilla.redhat.com/show_bug.cgi?id=2150979
https://bugzilla.redhat.com/show_bug.cgi?id=2224048
https://access.redhat.com/security/cve/CVE-2022-30594
https://access.redhat.com/security/cve/CVE-2023-2194
https://bugzilla.redhat.com/show_bug.cgi?id=2154178
https://bugzilla.redhat.com/show_bug.cgi?id=2084125
https://access.redhat.com/security/cve/CVE-2023-3268
https://access.redhat.com/security/cve/CVE-2023-2163
https://access.redhat.com/security/cve/CVE-2022-3522
https://bugzilla.redhat.com/show_bug.cgi?id=2187257
https://access.redhat.com/security/cve/CVE-2023-4459
https://bugzilla.redhat.com/show_bug.cgi?id=2085300
https://access.redhat.com/security/cve/CVE-2023-1079
https://access.redhat.com/security/cve/CVE-2022-20141
https://bugzilla.redhat.com/show_bug.cgi?id=2150960
https://access.redhat.com/errata/RHSA-2024:0412
https://bugzilla.redhat.com/show_bug.cgi?id=2173444
https://bugzilla.redhat.com/show_bug.cgi?id=2122960
https://access.redhat.com/security/cve/CVE-2023-1998
https://access.redhat.com/security/cve/CVE-2023-3567
https://bugzilla.redhat.com/show_bug.cgi?id=2215836
https://access.redhat.com/security/cve/CVE-2024-0562
https://access.redhat.com/security/cve/CVE-2022-41218
https://bugzilla.redhat.com/show_bug.cgi?id=2182443
https://access.redhat.com/security/cve/CVE-2023-4622
Applikationen: Linux

Originalnachricht

An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended
Update Support.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

The kernel packages contain the Linux kernel, the core of any Linux operating
system.

Security Fix(es):

* kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being
incorrectly marked as safe (CVE-2023-2163)

* kernel: net/sched: multiple vulnerabilities (CVE-2023-3611, CVE-2023-4623)

* kernel: tun: bugs for oversize packet when napi frags enabled in
tun_napi_alloc_frags (CVE-2023-3812)

* kernel: use after free in unix_stream_sendpage (CVE-2023-4622)

* kernel: use after free in nvmet_tcp_free_crypto in NVMe (CVE-2023-5178)

* kernel: out-of-bounds write in qfq_change_class function (CVE-2023-31436)

* kernel: netfilter: potential slab-out-of-bound access due to integer
underflow (CVE-2023-42753)

* kernel: IGB driver inadequate buffer size for frames larger than MTU
(CVE-2023-45871)

* kernel: multiple race condition vulnerabilities (CVE-2022-3028,
CVE-2022-3522, CVE-2023-33203, CVE-2023-35823, CVE-2023-35824, CVE-2022-3567, BZ#2230094)

* kernel: swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854)

* kernel: uninitialized registers on stack in nft_do_chain can cause kernel
pointer leakage to UM (CVE-2022-1016)

* kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation
of privileges (CVE-2022-1679)

* kernel: USB-accessible buffer overflow in brcmfmac (CVE-2022-3628)

* kernel: multiple NULL pointer dereference vulnerabilities (CVE-2022-4129,
CVE-2022-47929, CVE-2023-0394, CVE-2023-3772, CVE-2023-4459)

* kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet
sockets (CVE-2022-20141)

* kernel: Unprivileged users may use PTRACE_SEIZE to set
PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)

* hw: Intel: Gather Data Sampling (GDS) side channel vulnerability
(CVE-2022-40982)

* kernel: Report vmalloc UAF in dvb-core/dmxdev (CVE-2022-41218)

* kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip
(CVE-2022-41858)

* kernel: memory corruption in usbmon driver (CVE-2022-43750)

* kernel: HID: multiple vulnerabilities (CVE-2023-1073, CVE-2023-1079)

* kernel: use-after-free caused by invalid pointer hostname in
fs/cifs/connect.c (CVE-2023-1195)

* kernel: denial of service in tipc_conn_close (CVE-2023-1382)

* kernel: Possible use-after-free since the two fdget() during
vhost_net_set_backend() (CVE-2023-1838)

* kernel: Spectre v2 SMT mitigations problem (CVE-2023-1998)

* Kernel: UAF during login when accessing the shost ipaddress (CVE-2023-2162)

* kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() (CVE-2023-2194)

* kernel: ext4: use-after-free in ext4_xattr_set_entry() (CVE-2023-2513)

* kernel: fbcon: shift-out-of-bounds in fbcon_set_font() (CVE-2023-3161)

* kernel: out-of-bounds access in relay_file_read (CVE-2023-3268)

* kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race
(CVE-2023-3567)

* kernel: Race between task migrating pages and another task calling exit_mmap
(CVE-2023-4732)

* kernel: slab-out-of-bounds read vulnerabilities in cbq_classify
(CVE-2023-23454)

* kernel: mpls: double free on sysctl allocation failure (CVE-2023-26545)

* kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong
con2fb_map assignment (CVE-2023-38409)

* kernel: use-after-free after removing device in wb_inode_writeback_end in
mm/page-writeback.c (CVE-2024-0562)

* kernel: use-after-free in smb2_is_status_io_timeout() (CVE-2023-1192)

* kernel: use-after-free bug in remove function xgene_hwmon_remove
(CVE-2023-1855)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* bpf_jit_limit hit again (BZ#2243013)

* HPE Edgeline 920t resets during kdump context when ice driver is loaded and
when system is booted with intel_iommu=on iommu=pt (BZ#2244627)

* RHEL8.6 - s390/dasd: Use correct lock while counting channel queue length
(BZ#2250882)

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2022-0854: Missing Release of Memory after Effective Lifetime (CWE-401)
CVE-2022-1016: Missing Initialization of Resource (CWE-909)
CVE-2022-1679: Use After Free (CWE-416)
CVE-2022-3028: Out-of-bounds Write (CWE-787)
CVE-2022-3522: Concurrent Execution using Shared Resource with Improper
Synchronization ('Race Condition') (CWE-362)
CVE-2022-3567: Race Condition During Access to Alternate Channel (CWE-421)
CVE-2022-3628: Buffer Copy without Checking Size of Input ('Classic Buffer
Overflow') (CWE-120)
CVE-2022-4129: NULL Pointer Dereference (CWE-476)
CVE-2022-20141: Improper Locking (CWE-667)
CVE-2022-30594: Incorrect Default Permissions (CWE-276)
CVE-2022-40982: Exposure of Sensitive Information to an Unauthorized Actor
(CWE-200)
CVE-2022-41218: Use After Free (CWE-416)
CVE-2022-41858: Use After Free (CWE-416)
CVE-2022-43750: Out-of-bounds Write (CWE-787)
CVE-2022-47929: NULL Pointer Dereference (CWE-476)
CVE-2023-0394: NULL Pointer Dereference (CWE-476)
CVE-2023-1073: Out-of-bounds Write (CWE-787)
CVE-2023-1079: Use After Free (CWE-416)
CVE-2023-1192: Use After Free (CWE-416)
CVE-2023-1195: Use After Free (CWE-416)
CVE-2023-1382: NULL Pointer Dereference (CWE-476)
CVE-2023-1838: Use After Free (CWE-416)
CVE-2023-1855: Use After Free (CWE-416)
CVE-2023-1998: Exposure of Sensitive Information to an Unauthorized Actor
(CWE-200)
CVE-2023-2162: Use After Free (CWE-416)
CVE-2023-2163: Incorrect Calculation (CWE-682)
CVE-2023-2194: Out-of-bounds Write (CWE-787)
CVE-2023-2513: Use After Free (CWE-416)
CVE-2023-3161: Incorrect Bitwise Shift of Integer (CWE-1335)
CVE-2023-3268: Out-of-bounds Read (CWE-125)
CVE-2023-3567: Use After Free (CWE-416)
CVE-2023-3611: Out-of-bounds Write (CWE-787)
CVE-2023-3772: NULL Pointer Dereference (CWE-476)
CVE-2023-3812: Out-of-bounds Write (CWE-787)
CVE-2023-4459: NULL Pointer Dereference (CWE-476)
CVE-2023-4622: Use After Free (CWE-416)
CVE-2023-4623: Use After Free (CWE-416)
CVE-2023-4732: Race Condition within a Thread (CWE-366)
CVE-2023-5178: Use After Free (CWE-416)
CVE-2023-23454: Out-of-bounds Read (CWE-125)
CVE-2023-26545: Double Free (CWE-415)
CVE-2023-31436: Out-of-bounds Write (CWE-787)
CVE-2023-33203: Use After Free (CWE-416)
CVE-2023-35823: Use After Free (CWE-416)
CVE-2023-35824: Use After Free (CWE-416)
CVE-2023-38409: Improper Validation of Array Index (CWE-129)
CVE-2023-42753: Out-of-bounds Write (CWE-787)
CVE-2023-45871: Buffer Copy without Checking Size of Input ('Classic Buffer
Overflow') (CWE-120)
CVE-2024-0562: Use After Free (CWE-416)
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung