[SUSE-SU-2023:2611-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
43
CVEs
22
Security update for the Linux Kernel
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).
- CVE-2023-1637: Fixed vulnerability that could lead to unauthorized access to CPU memory after resuming CPU from suspend-to-RAM (bsc#1209779).
- CVE-2022-3566: Fixed race condition in the TCP Handler (bsc#1204405).
- CVE-2021-29650: Fixed an issue where the netfilter subsystem allowed attackers to cause a denial of service (bsc#1184208).
- CVE-2020-36694: Fixed an use-after-free issue in netfilter in the packet processing context (bsc#1211596).
- CVE-2023-1079: Fixed a use-after-free problem that could have been triggered in asus_kbd_backlight_set when plugging/disconnecting a malicious USB device (bsc#1208604).
- CVE-2023-33288: Fixed a use-after-free in bq24190_remove in drivers/power/supply/bq24190_charger.c (bsc#1211590).
- CVE-2022-45886: Fixed a .disconnect versus dvb_device_open race condition in dvb_net.c that lead to a use-after-free (bsc#1205760).
- CVE-2022-45885: Fixed a race condition in dvb_frontend.c that could cause a use-after-free when a device is disconnected (bsc#1205758).
- CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762).
- CVE-2022-45919: Fixed a use-after-free in dvb_ca_en50221.c that could occur if there is a disconnect after an open, because of the lack of a wait_event (bsc#1205803).
- CVE-2022-45884: Fixed a use-after-free in dvbdev.c, related to dvb_register_device dynamically allocating fops (bsc#1205756).
- CVE-2023-31084: Fixed a blocking issue in drivers/media/dvb-core/dvb_frontend.c (bsc#1210783).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210940).
- CVE-2023-2194: Fixed an out-of-bounds write vulnerability in the SLIMpro I2C device driver (bsc#1210715).
- CVE-2023-32269: Fixed a use-after-free in af_netrom.c, related to the fact that accept() was also allowed for a successfully connected AF_NETROM socket (bsc#1211186).
- CVE-2023-32233: Fixed a use-after-free in Netfilter nf_tables when processing batch requests (bsc#1211043).
- CVE-2022-4269: Fixed a flaw was found inside the Traffic Control (TC) subsystem (bsc#1206024).
- CVE-2023-1380: Fixed a slab-out-of-bound read problem in brcmf_get_assoc_ies() (bsc#1209287).
- CVE-2023-2513: Fixed a use-after-free vulnerability in the ext4 filesystem (bsc#1211105).
- CVE-2023-2483: Fixed a use after free bug in emac_remove caused by a race condition (bsc#1211037).
- CVE-2023-23586: Fixed a memory information leak in the io_uring subsystem (bsc#1208474).
The following non-security bugs were fixed:
- SUNRPC: Ensure the transport backchannel association (bsc#1211203).
- hv: vmbus: Optimize vmbus_on_event (bsc#1211622).
- ipv6: sr: fix out-of-bounds read when setting HMAC data (bsc#1211592).
- s390,dcssblk,dax: Add dax zero_page_range operation to dcssblk driver (bsc#1199636).
- ID
- SUSE-SU-2023:2611-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2023/suse-su-20232611-1/
- Published
-
2023-06-22T07:55:12
(15 months ago) - Modified
-
2023-06-22T07:55:12
(15 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2021-1516
- ALAS-2022-1591
- ALAS-2023-1744
- ALAS-2023-1750
- ALAS2-2021-1685
- ALAS2-2022-1793
- ALAS2-2023-2027
- ALAS2-2023-2035
- ALAS2-2023-2050
- ALAS2-2024-2569
- ALPINE:CVE-2023-32233
- ALSA-2021:4356
- ALSA-2023:1470
- ALSA-2023:1566
- ALSA-2023:2458
- ALSA-2023:2951
- ALSA-2023:3349
- ALSA-2023:3723
- ALSA-2023:4517
- ALSA-2023:5069
- ALSA-2023:7077
- ALSA-2023:7549
- DSA-5402-1
- DSA-5448-1
- DSA-5453-1
- DSA-5480-1
- ELSA-2021-3327
- ELSA-2021-4356
- ELSA-2021-9215
- ELSA-2021-9220
- ELSA-2021-9221
- ELSA-2021-9222
- ELSA-2021-9223
- ELSA-2023-12199
- ELSA-2023-12200
- ELSA-2023-12206
- ELSA-2023-12207
- ELSA-2023-12393
- ELSA-2023-12394
- ELSA-2023-12412
- ELSA-2023-12413
- ELSA-2023-12688
- ELSA-2023-12842
- ELSA-2023-1470
- ELSA-2023-1566
- ELSA-2023-2458
- ELSA-2023-2951
- ELSA-2023-3349
- ELSA-2023-3723
- ELSA-2023-4517
- ELSA-2023-5069
- ELSA-2023-5622
- ELSA-2023-6583
- ELSA-2023-7077
- ELSA-2023-7549
- ELSA-2024-12610
- ELSA-2024-12612
- ELSA-2024-1831
- FEDORA-2021-2306e89112
- FEDORA-2021-41fb54ae9f
- FEDORA-2021-6b0f287b8b
- FEDORA-2023-4426b7005f
- FEDORA-2023-75b22000cd
- MS:CVE-2021-29650
- MS:CVE-2023-1079
- MS:CVE-2023-2513
- MS:CVE-2023-31436
- openSUSE-SU-2021:0716-1
- openSUSE-SU-2021:0873-1
- openSUSE-SU-2021:1975-1
- openSUSE-SU-2021:1977-1
- RHSA-2021:1578
- RHSA-2021:1739
- RHSA-2021:3327
- RHSA-2021:3328
- RHSA-2021:4140
- RHSA-2021:4356
- RHSA-2023:1469
- RHSA-2023:1470
- RHSA-2023:1566
- RHSA-2023:1584
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:2736
- RHSA-2023:2951
- RHSA-2023:3349
- RHSA-2023:3350
- RHSA-2023:3351
- RHSA-2023:3705
- RHSA-2023:3708
- RHSA-2023:3723
- RHSA-2023:4517
- RHSA-2023:4541
- RHSA-2023:5069
- RHSA-2023:5091
- RHSA-2023:5244
- RHSA-2023:5255
- RHSA-2023:5574
- RHSA-2023:5621
- RHSA-2023:5622
- RHSA-2023:6901
- RHSA-2023:7077
- RHSA-2023:7548
- RHSA-2023:7549
- RHSA-2024:1323
- RLSA-2023:1470
- RLSA-2023:1566
- RLSA-2023:4517
- RLSA-2023:7549
- SSA:2021-202-01
- SSA:2023-172-02
- SSA:2023-325-01
- SUSE-SU-2021:1571-1
- SUSE-SU-2021:1572-1
- SUSE-SU-2021:1573-1
- SUSE-SU-2021:1574-1
- SUSE-SU-2021:1595-1
- SUSE-SU-2021:1596-1
- SUSE-SU-2021:1605-1
- SUSE-SU-2021:1617-1
- SUSE-SU-2021:1622-1
- SUSE-SU-2021:1623-1
- SUSE-SU-2021:1624-1
- SUSE-SU-2021:1915-1
- SUSE-SU-2021:1975-1
- SUSE-SU-2021:1977-1
- SUSE-SU-2022:4504-1
- SUSE-SU-2022:4585-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0416-1
- SUSE-SU-2023:1802-1
- SUSE-SU-2023:1897-1
- SUSE-SU-2023:1992-1
- SUSE-SU-2023:2162-1
- SUSE-SU-2023:2163-1
- SUSE-SU-2023:2232-1
- SUSE-SU-2023:2500-1
- SUSE-SU-2023:2501-1
- SUSE-SU-2023:2502-1
- SUSE-SU-2023:2506-1
- SUSE-SU-2023:2507-1
- SUSE-SU-2023:2534-1
- SUSE-SU-2023:2537-1
- SUSE-SU-2023:2538-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2651-1
- SUSE-SU-2023:2653-1
- SUSE-SU-2023:2660-1
- SUSE-SU-2023:2666-1
- SUSE-SU-2023:2679-1
- SUSE-SU-2023:2680-1
- SUSE-SU-2023:2681-1
- SUSE-SU-2023:2686-1
- SUSE-SU-2023:2687-1
- SUSE-SU-2023:2689-1
- SUSE-SU-2023:2690-1
- SUSE-SU-2023:2694-1
- SUSE-SU-2023:2695-1
- SUSE-SU-2023:2697-1
- SUSE-SU-2023:2698-1
- SUSE-SU-2023:2700-1
- SUSE-SU-2023:2701-1
- SUSE-SU-2023:2702-1
- SUSE-SU-2023:2703-1
- SUSE-SU-2023:2708-1
- SUSE-SU-2023:2709-1
- SUSE-SU-2023:2710-1
- SUSE-SU-2023:2714-1
- SUSE-SU-2023:2718-1
- SUSE-SU-2023:2719-1
- SUSE-SU-2023:2720-1
- SUSE-SU-2023:2721-1
- SUSE-SU-2023:2724-1
- SUSE-SU-2023:2727-1
- SUSE-SU-2023:2731-1
- SUSE-SU-2023:2734-1
- SUSE-SU-2023:2735-1
- SUSE-SU-2023:2741-1
- SUSE-SU-2023:2743-1
- SUSE-SU-2023:2755-1
- SUSE-SU-2023:2782-1
- SUSE-SU-2023:2804-1
- SUSE-SU-2023:2805-1
- SUSE-SU-2023:2808-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2822-1
- SUSE-SU-2023:2830-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:3302-1
- SUSE-SU-2023:3311-1
- SUSE-SU-2023:3313-1
- SUSE-SU-2023:3318-1
- SUSE-SU-2023:3324-1
- SUSE-SU-2023:3333-1
- SUSE-SU-2023:3376-1
- SUSE-SU-2023:3377-1
- SUSE-SU-2023:3391-1
- SUSE-SU-2023:3421-1
- SUSE-SU-2023:3594-1
- SUSE-SU-2023:3595-1
- SUSE-SU-2023:3607-1
- SUSE-SU-2023:3612-1
- SUSE-SU-2023:3620-1
- SUSE-SU-2023:3623-1
- SUSE-SU-2023:3627-1
- SUSE-SU-2023:3628-1
- SUSE-SU-2023:3630-1
- SUSE-SU-2023:3631-1
- SUSE-SU-2023:3632-1
- SUSE-SU-2023:3644-1
- SUSE-SU-2023:3647-1
- SUSE-SU-2023:3648-1
- SUSE-SU-2023:3653-1
- SUSE-SU-2023:3657-1
- SUSE-SU-2023:3658-1
- SUSE-SU-2023:3659-1
- SUSE-SU-2023:3668-1
- SUSE-SU-2023:3671-1
- SUSE-SU-2023:3675-1
- SUSE-SU-2023:3676-1
- SUSE-SU-2023:3677-1
- SUSE-SU-2024:0112-1
- USN-4945-1
- USN-4945-2
- USN-4946-1
- USN-4947-1
- USN-4948-1
- USN-4949-1
- USN-5343-1
- USN-5754-1
- USN-5754-2
- USN-5755-1
- USN-5755-2
- USN-5756-1
- USN-5756-2
- USN-5756-3
- USN-5757-1
- USN-5757-2
- USN-5758-1
- USN-5773-1
- USN-5774-1
- USN-5779-1
- USN-5789-1
- USN-6033-1
- USN-6079-1
- USN-6080-1
- USN-6081-1
- USN-6084-1
- USN-6085-1
- USN-6090-1
- USN-6091-1
- USN-6092-1
- USN-6094-1
- USN-6095-1
- USN-6096-1
- USN-6109-1
- USN-6118-1
- USN-6122-1
- USN-6123-1
- USN-6124-1
- USN-6127-1
- USN-6130-1
- USN-6131-1
- USN-6132-1
- USN-6133-1
- USN-6134-1
- USN-6135-1
- USN-6149-1
- USN-6150-1
- USN-6162-1
- USN-6171-1
- USN-6172-1
- USN-6173-1
- USN-6175-1
- USN-6185-1
- USN-6186-1
- USN-6187-1
- USN-6207-1
- USN-6222-1
- USN-6223-1
- USN-6231-1
- USN-6254-1
- USN-6256-1
- USN-6284-1
- USN-6300-1
- USN-6301-1
- USN-6309-1
- USN-6311-1
- USN-6312-1
- USN-6314-1
- USN-6327-1
- USN-6331-1
- USN-6332-1
- USN-6337-1
- USN-6338-1
- USN-6338-2
- USN-6339-1
- USN-6339-2
- USN-6339-3
- USN-6339-4
- USN-6340-1
- USN-6340-2
- USN-6342-1
- USN-6342-2
- USN-6344-1
- USN-6347-1
- USN-6349-1
- USN-6350-1
- USN-6351-1
- USN-6357-1
- USN-6385-1
- USN-6388-1
- USN-6397-1
- USN-6412-1
- USN-6416-1
- USN-6416-2
- USN-6416-3
- USN-6445-1
- USN-6445-2
- USN-6460-1
- USN-6466-1
- USN-6604-1
- USN-6604-2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=x86_64&distro=sles-15&sp=3 | suse | reiserfs-kmp-default | < 5.3.18-150300.59.124.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=s390x&distro=sles-15&sp=3 | suse | reiserfs-kmp-default | < 5.3.18-150300.59.124.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=ppc64le&distro=sles-15&sp=3 | suse | reiserfs-kmp-default | < 5.3.18-150300.59.124.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=aarch64&distro=sles-15&sp=3 | suse | reiserfs-kmp-default | < 5.3.18-150300.59.124.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-zfcpdump?arch=s390x&distro=sles-15&sp=3 | suse | kernel-zfcpdump | < 5.3.18-150300.59.124.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-15&sp=3 | suse | kernel-syms | < 5.3.18-150300.59.124.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-15&sp=3 | suse | kernel-syms | < 5.3.18-150300.59.124.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-15&sp=3 | suse | kernel-syms | < 5.3.18-150300.59.124.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-15&sp=3 | suse | kernel-syms | < 5.3.18-150300.59.124.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-15&sp=3 | suse | kernel-source | < 5.3.18-150300.59.124.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-preempt?arch=x86_64&distro=sles-15&sp=3 | suse | kernel-preempt | < 5.3.18-150300.59.124.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-preempt?arch=aarch64&distro=sles-15&sp=3 | suse | kernel-preempt | < 5.3.18-150300.59.124.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-preempt-devel?arch=x86_64&distro=sles-15&sp=3 | suse | kernel-preempt-devel | < 5.3.18-150300.59.124.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-preempt-devel?arch=aarch64&distro=sles-15&sp=3 | suse | kernel-preempt-devel | < 5.3.18-150300.59.124.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=x86_64&distro=sles-15&sp=3 | suse | kernel-obs-build | < 5.3.18-150300.59.124.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=s390x&distro=sles-15&sp=3 | suse | kernel-obs-build | < 5.3.18-150300.59.124.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=ppc64le&distro=sles-15&sp=3 | suse | kernel-obs-build | < 5.3.18-150300.59.124.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=aarch64&distro=sles-15&sp=3 | suse | kernel-obs-build | < 5.3.18-150300.59.124.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-15&sp=3 | suse | kernel-macros | < 5.3.18-150300.59.124.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-docs?arch=noarch&distro=sles-15&sp=3 | suse | kernel-docs | < 5.3.18-150300.59.124.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-15&sp=3 | suse | kernel-devel | < 5.3.18-150300.59.124.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-15&sp=3 | suse | kernel-default | < 5.3.18-150300.59.124.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=slem-5 | suse | kernel-default | < 5.3.18-150300.59.124.1 | slem-5 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-15&sp=3 | suse | kernel-default | < 5.3.18-150300.59.124.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default?arch=s390x&distro=slem-5 | suse | kernel-default | < 5.3.18-150300.59.124.1 | slem-5 | s390x | |
Affected | pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-15&sp=3 | suse | kernel-default | < 5.3.18-150300.59.124.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-15&sp=3 | suse | kernel-default | < 5.3.18-150300.59.124.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default?arch=aarch64&distro=slem-5 | suse | kernel-default | < 5.3.18-150300.59.124.1 | slem-5 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-15&sp=3 | suse | kernel-default-devel | < 5.3.18-150300.59.124.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-15&sp=3 | suse | kernel-default-devel | < 5.3.18-150300.59.124.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-15&sp=3 | suse | kernel-default-devel | < 5.3.18-150300.59.124.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-15&sp=3 | suse | kernel-default-devel | < 5.3.18-150300.59.124.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-15&sp=3 | suse | kernel-default-base | < 5.3.18-150300.59.124.1.150300.18.72.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=slem-5 | suse | kernel-default-base | < 5.3.18-150300.59.124.1.150300.18.72.1 | slem-5 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-15&sp=3 | suse | kernel-default-base | < 5.3.18-150300.59.124.1.150300.18.72.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default-base?arch=s390x&distro=slem-5 | suse | kernel-default-base | < 5.3.18-150300.59.124.1.150300.18.72.1 | slem-5 | s390x | |
Affected | pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-15&sp=3 | suse | kernel-default-base | < 5.3.18-150300.59.124.1.150300.18.72.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-15&sp=3 | suse | kernel-default-base | < 5.3.18-150300.59.124.1.150300.18.72.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=slem-5 | suse | kernel-default-base | < 5.3.18-150300.59.124.1.150300.18.72.1 | slem-5 | aarch64 | |
Affected | pkg:rpm/suse/kernel-64kb?arch=aarch64&distro=sles-15&sp=3 | suse | kernel-64kb | < 5.3.18-150300.59.124.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-64kb-devel?arch=aarch64&distro=sles-15&sp=3 | suse | kernel-64kb-devel | < 5.3.18-150300.59.124.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/dtb-zte?arch=aarch64&distro=opensuse-leap-15.4 | suse | dtb-zte | < 5.3.18-150300.59.124.1 | opensuse-leap-15.4 | aarch64 | |
Affected | pkg:rpm/suse/dtb-al?arch=aarch64&distro=opensuse-leap-15.4 | suse | dtb-al | < 5.3.18-150300.59.124.1 | opensuse-leap-15.4 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |