[SUSE-SU-2023:0405-1] Security update for libbpf
Severity
Important
Affected Packages
9
CVEs
2
Security update for libbpf
This update for libbpf fixes the following issues:
- CVE-2022-3534: Fixed use-after-free in btf_dump_name_dups (bsc#1204391).
- CVE-2022-3606: Fixed null pointer dereference in find_prog_by_sec_insn() (bsc#1204502).
Package | Affected Version |
---|---|
pkg:rpm/suse/libbpf0?arch=x86_64&distro=opensuse-leap-15.4 | < 0.5.0-150400.3.3.1 |
pkg:rpm/suse/libbpf0?arch=s390x&distro=opensuse-leap-15.4 | < 0.5.0-150400.3.3.1 |
pkg:rpm/suse/libbpf0?arch=ppc64le&distro=opensuse-leap-15.4 | < 0.5.0-150400.3.3.1 |
pkg:rpm/suse/libbpf0?arch=aarch64&distro=opensuse-leap-15.4 | < 0.5.0-150400.3.3.1 |
pkg:rpm/suse/libbpf0-32bit?arch=x86_64&distro=opensuse-leap-15.4 | < 0.5.0-150400.3.3.1 |
pkg:rpm/suse/libbpf-devel?arch=x86_64&distro=opensuse-leap-15.4 | < 0.5.0-150400.3.3.1 |
pkg:rpm/suse/libbpf-devel?arch=s390x&distro=opensuse-leap-15.4 | < 0.5.0-150400.3.3.1 |
pkg:rpm/suse/libbpf-devel?arch=ppc64le&distro=opensuse-leap-15.4 | < 0.5.0-150400.3.3.1 |
pkg:rpm/suse/libbpf-devel?arch=aarch64&distro=opensuse-leap-15.4 | < 0.5.0-150400.3.3.1 |
- ID
- SUSE-SU-2023:0405-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2023/suse-su-20230405-1/
- Published
-
2023-02-14T10:48:07
(19 months ago) - Modified
-
2023-02-14T10:48:07
(19 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0405-1.json | |
Suse | URL for SUSE-SU-2023:0405-1 | https://www.suse.com/support/update/announcement/2023/suse-su-20230405-1/ | |
Suse | E-Mail link for SUSE-SU-2023:0405-1 | https://lists.suse.com/pipermail/sle-security-updates/2023-February/013756.html | |
Bugzilla | SUSE Bug 1204391 | https://bugzilla.suse.com/1204391 | |
Bugzilla | SUSE Bug 1204502 | https://bugzilla.suse.com/1204502 | |
CVE | SUSE CVE CVE-2022-3534 page | https://www.suse.com/security/cve/CVE-2022-3534/ | |
CVE | SUSE CVE CVE-2022-3606 page | https://www.suse.com/security/cve/CVE-2022-3606/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/libbpf0?arch=x86_64&distro=opensuse-leap-15.4 | suse | libbpf0 | < 0.5.0-150400.3.3.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/libbpf0?arch=s390x&distro=opensuse-leap-15.4 | suse | libbpf0 | < 0.5.0-150400.3.3.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/libbpf0?arch=ppc64le&distro=opensuse-leap-15.4 | suse | libbpf0 | < 0.5.0-150400.3.3.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/libbpf0?arch=aarch64&distro=opensuse-leap-15.4 | suse | libbpf0 | < 0.5.0-150400.3.3.1 | opensuse-leap-15.4 | aarch64 | |
Affected | pkg:rpm/suse/libbpf0-32bit?arch=x86_64&distro=opensuse-leap-15.4 | suse | libbpf0-32bit | < 0.5.0-150400.3.3.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/libbpf-devel?arch=x86_64&distro=opensuse-leap-15.4 | suse | libbpf-devel | < 0.5.0-150400.3.3.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/libbpf-devel?arch=s390x&distro=opensuse-leap-15.4 | suse | libbpf-devel | < 0.5.0-150400.3.3.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/libbpf-devel?arch=ppc64le&distro=opensuse-leap-15.4 | suse | libbpf-devel | < 0.5.0-150400.3.3.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/libbpf-devel?arch=aarch64&distro=opensuse-leap-15.4 | suse | libbpf-devel | < 0.5.0-150400.3.3.1 | opensuse-leap-15.4 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |