[SUSE-SU-2023:2151-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
50
CVEs
11
Security update for the Linux Kernel
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-2124: Fixed an out of bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).
- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).
- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).
- CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).
- CVE-2023-30772: Fixed a race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).
- CVE-2023-1855: Fixed a use after free in xgene_hwmon_remove (bsc#1210202).
- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).
- CVE-2023-1990: Fixed a use after free in ndlc_remove (bsc#1210337).
- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).
- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).
- CVE-2020-36691: Fixed a denial of service vulnerability via a nested Netlink policy with a back reference (bsc#1209777).
The following non-security bugs were fixed:
- cifs: fix negotiate context parsing (bsc#1210301).
- cred: allow get_cred() and put_cred() to be given NULL (bsc#1209887).
- ID
- SUSE-SU-2023:2151-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2023/suse-su-20232151-1/
- Published
-
2023-05-09T15:35:27
(16 months ago) - Modified
-
2023-05-09T15:35:27
(16 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2023-1701
- ALAS-2023-1735
- ALAS2-2023-1987
- ALAS2-2023-2027
- ALSA-2023:0334
- ALSA-2023:0832
- ALSA-2023:3723
- ALSA-2023:4377
- ALSA-2023:4517
- ALSA-2023:7077
- ALSA-2024:0113
- DSA-5448-1
- DSA-5480-1
- DSA-5492-1
- DSA-5730-1
- ELSA-2023-0334
- ELSA-2023-0832
- ELSA-2023-12375
- ELSA-2023-12974
- ELSA-2023-13001
- ELSA-2023-13005
- ELSA-2023-3723
- ELSA-2023-4377
- ELSA-2023-4517
- ELSA-2023-6583
- ELSA-2023-7077
- ELSA-2024-12069
- ELSA-2024-12354
- FEDORA-2023-00393126a0
- FEDORA-2023-26325e5399
- FEDORA-2023-98251cef79
- FEDORA-2023-c46eb02bbf
- FEDORA-2023-d525cf5272
- FEDORA-2023-dfd4a6e8f2
- MS:CVE-2022-43945
- RHSA-2023:0300
- RHSA-2023:0334
- RHSA-2023:0348
- RHSA-2023:0832
- RHSA-2023:0839
- RHSA-2023:0854
- RHSA-2023:3708
- RHSA-2023:3723
- RHSA-2023:4377
- RHSA-2023:4378
- RHSA-2023:4517
- RHSA-2023:4541
- RHSA-2023:6901
- RHSA-2023:7077
- RHSA-2024:0113
- RHSA-2024:0134
- RLSA-2023:0334
- RLSA-2023:0832
- RLSA-2023:4517
- SSA:2022-333-01
- SSA:2023-172-02
- SSA:2023-325-01
- SUSE-SU-2022:4503-1
- SUSE-SU-2022:4504-1
- SUSE-SU-2022:4505-1
- SUSE-SU-2022:4506-1
- SUSE-SU-2022:4510-1
- SUSE-SU-2022:4513-1
- SUSE-SU-2022:4515-1
- SUSE-SU-2022:4516-1
- SUSE-SU-2022:4517-1
- SUSE-SU-2022:4518-1
- SUSE-SU-2022:4520-1
- SUSE-SU-2022:4527-1
- SUSE-SU-2022:4528-1
- SUSE-SU-2022:4533-1
- SUSE-SU-2022:4534-1
- SUSE-SU-2022:4539-1
- SUSE-SU-2022:4542-1
- SUSE-SU-2022:4543-1
- SUSE-SU-2022:4544-1
- SUSE-SU-2022:4545-1
- SUSE-SU-2022:4546-1
- SUSE-SU-2022:4550-1
- SUSE-SU-2022:4551-1
- SUSE-SU-2022:4559-1
- SUSE-SU-2022:4560-1
- SUSE-SU-2022:4561-1
- SUSE-SU-2022:4562-1
- SUSE-SU-2022:4566-1
- SUSE-SU-2022:4569-1
- SUSE-SU-2022:4572-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4574-1
- SUSE-SU-2022:4577-1
- SUSE-SU-2022:4580-1
- SUSE-SU-2022:4585-1
- SUSE-SU-2022:4587-1
- SUSE-SU-2022:4589-1
- SUSE-SU-2022:4595-1
- SUSE-SU-2022:4611-1
- SUSE-SU-2022:4613-1
- SUSE-SU-2022:4614-1
- SUSE-SU-2022:4615-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:1894-1
- SUSE-SU-2023:1895-1
- SUSE-SU-2023:1897-1
- SUSE-SU-2023:1992-1
- SUSE-SU-2023:2140-1
- SUSE-SU-2023:2141-1
- SUSE-SU-2023:2146-1
- SUSE-SU-2023:2147-1
- SUSE-SU-2023:2148-1
- SUSE-SU-2023:2156-1
- SUSE-SU-2023:2162-1
- SUSE-SU-2023:2163-1
- SUSE-SU-2023:2231-1
- SUSE-SU-2023:2232-1
- SUSE-SU-2023:2368-1
- SUSE-SU-2023:2369-1
- SUSE-SU-2023:2371-1
- SUSE-SU-2023:2376-1
- SUSE-SU-2023:2384-1
- SUSE-SU-2023:2386-1
- SUSE-SU-2023:2389-1
- SUSE-SU-2023:2395-1
- SUSE-SU-2023:2399-1
- SUSE-SU-2023:2401-1
- SUSE-SU-2023:2405-1
- SUSE-SU-2023:2415-1
- SUSE-SU-2023:2416-1
- SUSE-SU-2023:2420-1
- SUSE-SU-2023:2422-1
- SUSE-SU-2023:2423-1
- SUSE-SU-2023:2425-1
- SUSE-SU-2023:2428-1
- SUSE-SU-2023:2431-1
- SUSE-SU-2023:2442-1
- SUSE-SU-2023:2443-1
- SUSE-SU-2023:2448-1
- SUSE-SU-2023:2453-1
- SUSE-SU-2023:2455-1
- SUSE-SU-2023:2459-1
- SUSE-SU-2023:2468-1
- SUSE-SU-2023:2500-1
- SUSE-SU-2023:2506-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2651-1
- SUSE-SU-2023:2653-1
- SUSE-SU-2023:2782-1
- SUSE-SU-2023:2805-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2871-1
- USN-5754-1
- USN-5754-2
- USN-5755-1
- USN-5755-2
- USN-5773-1
- USN-5779-1
- USN-5789-1
- USN-5794-1
- USN-5802-1
- USN-5804-1
- USN-5804-2
- USN-5808-1
- USN-5813-1
- USN-5829-1
- USN-5830-1
- USN-5861-1
- USN-5863-1
- USN-5875-1
- USN-5914-1
- USN-5918-1
- USN-6033-1
- USN-6045-1
- USN-6079-1
- USN-6080-1
- USN-6081-1
- USN-6084-1
- USN-6085-1
- USN-6090-1
- USN-6091-1
- USN-6092-1
- USN-6094-1
- USN-6095-1
- USN-6096-1
- USN-6109-1
- USN-6118-1
- USN-6123-1
- USN-6124-1
- USN-6132-1
- USN-6133-1
- USN-6134-1
- USN-6171-1
- USN-6172-1
- USN-6175-1
- USN-6185-1
- USN-6186-1
- USN-6187-1
- USN-6206-1
- USN-6207-1
- USN-6221-1
- USN-6222-1
- USN-6223-1
- USN-6224-1
- USN-6228-1
- USN-6231-1
- USN-6235-1
- USN-6252-1
- USN-6254-1
- USN-6256-1
- USN-6284-1
- USN-6300-1
- USN-6301-1
- USN-6311-1
- USN-6312-1
- USN-6314-1
- USN-6331-1
- USN-6332-1
- USN-6337-1
- USN-6347-1
- USN-6385-1
- USN-6739-1
- USN-6740-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=x86_64&distro=sles-15&sp=1 | suse | reiserfs-kmp-default | < 4.12.14-150100.197.145.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=s390x&distro=sles-15&sp=1 | suse | reiserfs-kmp-default | < 4.12.14-150100.197.145.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=ppc64le&distro=sles-15&sp=1 | suse | reiserfs-kmp-default | < 4.12.14-150100.197.145.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=aarch64&distro=sles-15&sp=1 | suse | reiserfs-kmp-default | < 4.12.14-150100.197.145.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-zfcpdump-man?arch=s390x&distro=opensuse-leap-15.4 | suse | kernel-zfcpdump-man | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/kernel-vanilla?arch=x86_64&distro=opensuse-leap-15.4 | suse | kernel-vanilla | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/kernel-vanilla?arch=s390x&distro=opensuse-leap-15.4 | suse | kernel-vanilla | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/kernel-vanilla?arch=ppc64le&distro=opensuse-leap-15.4 | suse | kernel-vanilla | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/kernel-vanilla?arch=aarch64&distro=opensuse-leap-15.4 | suse | kernel-vanilla | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | aarch64 | |
Affected | pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=x86_64&distro=opensuse-leap-15.4 | suse | kernel-vanilla-livepatch-devel | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=s390x&distro=opensuse-leap-15.4 | suse | kernel-vanilla-livepatch-devel | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=ppc64le&distro=opensuse-leap-15.4 | suse | kernel-vanilla-livepatch-devel | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/kernel-vanilla-livepatch-devel?arch=aarch64&distro=opensuse-leap-15.4 | suse | kernel-vanilla-livepatch-devel | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | aarch64 | |
Affected | pkg:rpm/suse/kernel-vanilla-devel?arch=x86_64&distro=opensuse-leap-15.4 | suse | kernel-vanilla-devel | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/kernel-vanilla-devel?arch=s390x&distro=opensuse-leap-15.4 | suse | kernel-vanilla-devel | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/kernel-vanilla-devel?arch=ppc64le&distro=opensuse-leap-15.4 | suse | kernel-vanilla-devel | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/kernel-vanilla-devel?arch=aarch64&distro=opensuse-leap-15.4 | suse | kernel-vanilla-devel | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | aarch64 | |
Affected | pkg:rpm/suse/kernel-vanilla-base?arch=x86_64&distro=opensuse-leap-15.4 | suse | kernel-vanilla-base | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/kernel-vanilla-base?arch=s390x&distro=opensuse-leap-15.4 | suse | kernel-vanilla-base | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/kernel-vanilla-base?arch=ppc64le&distro=opensuse-leap-15.4 | suse | kernel-vanilla-base | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | ppc64le | |
Affected | pkg:rpm/suse/kernel-vanilla-base?arch=aarch64&distro=opensuse-leap-15.4 | suse | kernel-vanilla-base | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | aarch64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-15&sp=1 | suse | kernel-syms | < 4.12.14-150100.197.145.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-15&sp=1 | suse | kernel-syms | < 4.12.14-150100.197.145.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-15&sp=1 | suse | kernel-syms | < 4.12.14-150100.197.145.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-15&sp=1 | suse | kernel-syms | < 4.12.14-150100.197.145.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-15&sp=1 | suse | kernel-source | < 4.12.14-150100.197.145.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=x86_64&distro=sles-15&sp=1 | suse | kernel-obs-build | < 4.12.14-150100.197.145.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=s390x&distro=sles-15&sp=1 | suse | kernel-obs-build | < 4.12.14-150100.197.145.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=ppc64le&distro=sles-15&sp=1 | suse | kernel-obs-build | < 4.12.14-150100.197.145.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=aarch64&distro=sles-15&sp=1 | suse | kernel-obs-build | < 4.12.14-150100.197.145.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-15&sp=1 | suse | kernel-macros | < 4.12.14-150100.197.145.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-kvmsmall-base?arch=x86_64&distro=opensuse-leap-15.4 | suse | kernel-kvmsmall-base | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/kernel-docs?arch=noarch&distro=sles-15&sp=1 | suse | kernel-docs | < 4.12.14-150100.197.145.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-15&sp=1 | suse | kernel-devel | < 4.12.14-150100.197.145.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-15&sp=1 | suse | kernel-default | < 4.12.14-150100.197.145.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-15&sp=1 | suse | kernel-default | < 4.12.14-150100.197.145.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-15&sp=1 | suse | kernel-default | < 4.12.14-150100.197.145.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-15&sp=1 | suse | kernel-default | < 4.12.14-150100.197.145.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default-man?arch=s390x&distro=sles-15&sp=1 | suse | kernel-default-man | < 4.12.14-150100.197.145.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default-man?arch=s390x&distro=opensuse-leap-15.4 | suse | kernel-default-man | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | s390x | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-15&sp=1 | suse | kernel-default-devel | < 4.12.14-150100.197.145.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-15&sp=1 | suse | kernel-default-devel | < 4.12.14-150100.197.145.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-15&sp=1 | suse | kernel-default-devel | < 4.12.14-150100.197.145.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-15&sp=1 | suse | kernel-default-devel | < 4.12.14-150100.197.145.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-15&sp=1 | suse | kernel-default-base | < 4.12.14-150100.197.145.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-15&sp=1 | suse | kernel-default-base | < 4.12.14-150100.197.145.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-15&sp=1 | suse | kernel-default-base | < 4.12.14-150100.197.145.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-15&sp=1 | suse | kernel-default-base | < 4.12.14-150100.197.145.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-debug-base?arch=x86_64&distro=opensuse-leap-15.4 | suse | kernel-debug-base | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | x86_64 | |
Affected | pkg:rpm/suse/kernel-debug-base?arch=ppc64le&distro=opensuse-leap-15.4 | suse | kernel-debug-base | < 4.12.14-150100.197.145.1 | opensuse-leap-15.4 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |