<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE1-SA-2023-0090</id>
    <title>An update for kernel is now available for HCE 1.1</title>
    <severity>Important</severity>
    <release>HCE 1.1</release>
    <issued date="2023-12-01 03:34:47"/>
    <updated date="2023-12-01 03:34:47"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233" id="CVE-2023-32233" title="CVE-2023-32233 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001" id="CVE-2023-35001" title="CVE-2023-35001 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-3564" id="CVE-2022-3564" title="CVE-2022-3564 Base Score: 7.1 Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-35788" id="CVE-2023-35788" title="CVE-2023-35788 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-43750" id="CVE-2022-43750" title="CVE-2022-43750 Base Score: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593" id="CVE-2023-20593" title="CVE-2023-20593 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-3609" id="CVE-2023-3609" title="CVE-2023-3609 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled. (CVE-2023-32233)

Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace (CVE-2023-35001)

A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087. (CVE-2022-3564)

An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation. (CVE-2023-35788)

drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor's internal memory. (CVE-2022-43750)


An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.






 (CVE-2023-20593)

A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.

If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.

We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.

 (CVE-2023-3609)
</description>
    <pkglist>
      <collection short="HCE 1.1" package="kernel">
        <name>HCE 1.1</name>
        <package arch="x86_64" name="bpftool" version="3.10.0" release="1160.102.1.hce1c">
          <filename>bpftool-3.10.0-1160.102.1.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="kernel" version="3.10.0" release="1160.102.1.hce1c">
          <filename>kernel-3.10.0-1160.102.1.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="kernel-abi-whitelists" version="3.10.0" release="1160.102.1.hce1c">
          <filename>kernel-abi-whitelists-3.10.0-1160.102.1.hce1c.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="kernel-debug-devel" version="3.10.0" release="1160.102.1.hce1c">
          <filename>kernel-debug-devel-3.10.0-1160.102.1.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="kernel-devel" version="3.10.0" release="1160.102.1.hce1c">
          <filename>kernel-devel-3.10.0-1160.102.1.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="kernel-headers" version="3.10.0" release="1160.102.1.hce1c">
          <filename>kernel-headers-3.10.0-1160.102.1.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="kernel-tools" version="3.10.0" release="1160.102.1.hce1c">
          <filename>kernel-tools-3.10.0-1160.102.1.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="kernel-tools-libs" version="3.10.0" release="1160.102.1.hce1c">
          <filename>kernel-tools-libs-3.10.0-1160.102.1.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="perf" version="3.10.0" release="1160.102.1.hce1c">
          <filename>perf-3.10.0-1160.102.1.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="python-perf" version="3.10.0" release="1160.102.1.hce1c">
          <filename>python-perf-3.10.0-1160.102.1.hce1c.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
