<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE1-SA-2024-0045</id>
    <title>An update for kernel is now available for HCE 1.1</title>
    <severity>Critical</severity>
    <release>HCE 1.1</release>
    <issued date="2024-09-27 08:26:20"/>
    <updated date="2024-09-27 08:26:20"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002" id="CVE-2023-2002" title="CVE-2023-2002 Base Score: 6.8 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-36558" id="CVE-2020-36558" title="CVE-2020-36558 Base Score: 5.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-38409" id="CVE-2023-38409" title="CVE-2023-38409 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-48788" id="CVE-2022-48788" title="CVE-2022-48788 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-42896" id="CVE-2022-42896" title="CVE-2022-42896 Base Score: 8.8 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871" id="CVE-2023-45871" title="CVE-2023-45871 Base Score: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086" id="CVE-2024-1086" title="CVE-2024-1086 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775" id="CVE-2023-25775" title="CVE-2023-25775 Base Score: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602" id="CVE-2024-26602" title="CVE-2024-26602 Base Score: 4.7 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication. (CVE-2023-2002)

A race condition in the Linux kernel before 5.5.7 involving VT_RESIZEX could lead to a NULL pointer dereference and general protection fault. (CVE-2020-36558)

An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info). (CVE-2023-38409)

In the Linux kernel, the following vulnerability has been resolved:

nvme-rdma: fix possible use-after-free in transport error_recovery work

While nvme_rdma_submit_async_event_work is checking the ctrl and queue
state before preparing the AER command and scheduling io_work, in order
to fully prevent a race where this check is not reliable the error
recovery work must flush async_event_work before continuing to destroy
the admin queue after setting the ctrl state to RESETTING such that
there is no race .submit_async_event and the error recovery handler
itself changing the ctrl state. (CVE-2022-48788)

There are use-after-free vulnerabilities in the Linux kernel_x27;s net/bluetooth/l2cap_core.c_x27;s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url (CVE-2022-42896)

An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU. (CVE-2023-45871)

A use-after-free vulnerability in the Linux kernel_x27;s netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.

We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.

 (CVE-2024-1086)

Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access. (CVE-2023-25775)

In the Linux kernel, the following vulnerability has been resolved:

sched/membarrier: reduce the ability to hammer on sys_membarrier

On some systems, sys_membarrier can be very expensive, causing overall
slowdowns for everything.  So put a lock on the path in order to
serialize the accesses to prevent the ability for this to be called at
too high of a frequency and saturate the machine. (CVE-2024-26602)
</description>
    <pkglist>
      <collection short="HCE 1.1" package="kernel">
        <name>HCE 1.1</name>
        <package arch="x86_64" name="bpftool" version="3.10.0" release="1160.118.2.hce1c">
          <filename>bpftool-3.10.0-1160.118.2.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="kernel" version="3.10.0" release="1160.118.2.hce1c">
          <filename>kernel-3.10.0-1160.118.2.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="kernel-abi-whitelists" version="3.10.0" release="1160.118.2.hce1c">
          <filename>kernel-abi-whitelists-3.10.0-1160.118.2.hce1c.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="kernel-debug-devel" version="3.10.0" release="1160.118.2.hce1c">
          <filename>kernel-debug-devel-3.10.0-1160.118.2.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="kernel-devel" version="3.10.0" release="1160.118.2.hce1c">
          <filename>kernel-devel-3.10.0-1160.118.2.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="kernel-headers" version="3.10.0" release="1160.118.2.hce1c">
          <filename>kernel-headers-3.10.0-1160.118.2.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="kernel-tools" version="3.10.0" release="1160.118.2.hce1c">
          <filename>kernel-tools-3.10.0-1160.118.2.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="kernel-tools-libs" version="3.10.0" release="1160.118.2.hce1c">
          <filename>kernel-tools-libs-3.10.0-1160.118.2.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="perf" version="3.10.0" release="1160.118.2.hce1c">
          <filename>perf-3.10.0-1160.118.2.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="python-perf" version="3.10.0" release="1160.118.2.hce1c">
          <filename>python-perf-3.10.0-1160.118.2.hce1c.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
