[SUSE-SU-2023:3309-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
20
CVEs
10
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-20593: Fixed a ZenBleed issue in 'Zen 2' CPUs that could allow an attacker to potentially access sensitive information (bsc#1213286).
- CVE-2023-2985: Fixed an use-after-free vulnerability in hfsplus_put_super in fs/hfsplus/super.c that could allow a local user to cause a denial of service (bsc#1211867).
- CVE-2023-35001: Fixed an out-of-bounds memory access flaw in nft_byteorder that could allow a local attacker to escalate their privilege (bsc#1213059).
- CVE-2022-40982: A transient execution attack called 'Gather Data Sampling' affecting is mitigated, together with respective Intel CPU Microcode updates (bsc#1206418, CVE-2022-40982).
- CVE-2023-0459: Fixed that copy_from_user on 64-bit versions of the Linux kernel did not implement the __uaccess_begin_nospec allowing a user to bypass the 'access_ok' check which could be used to leak information (bsc#1211738).
- CVE-2023-20569: A side channel attack known as ‘Inception’ or ‘RAS Poisoning’ may allow an attacker to influence branch prediction, potentially leading to information disclosure. (bsc#1213287).
- CVE-2023-3567: A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen. This flaw allowed an attacker with local user access to cause a system crash or leak internal kernel information (bsc#1213167bsc#1213842).
- CVE-2023-3609: A use-after-free vulnerability was fixed in net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. (bsc#1213586).
- CVE-2023-3611: An out-of-bounds write vulnerability was fixed in net/sched: sch_qfq component can be exploited to achieve local privilege escalation. The qfq_change_agg() function in net/sched/sch_qfq.c allowed an out-of-bounds write because lmax is updated according to packet sizes without bounds checks. (bsc#1213585).
- CVE-2023-3776: A use-after-free vulnerability was fixed in net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. (bsc#1213588).
The following non-security bugs were fixed:
- Fix double fget() in vhost_net_set_backend() (git-fixes).
- NFSv4.1: Always send a RECLAIM_COMPLETE after establishing lease (git-fixes).
- SUNRPC: Fix UAF in svc_tcp_listen_data_ready() (git-fixes).
- SUNRPC: remove the maximum number of retries in call_bind_status (git-fixes).
- block: Fix a source code comment in include/uapi/linux/blkzoned.h (git-fixes).
- livepatch: check kzalloc return values (git-fixes).
- media: videodev2.h: Fix struct v4l2_input tuner index comment (git-fixes).
- net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).
- net: skip virtio_net_hdr_set_proto if protocol already set (git-fixes).
- net: virtio_net_hdr_to_skb: count transport header in UFO (git-fixes).
- nfsd: fix double fget() bug in __write_ports_addfd() (git-fixes).
- powerpc/64: Update Speculation_Store_Bypass in /proc/<pid>/status (bsc#1188885 ltc#193722 git-fixes).
- powerpc/security: Fix Speculation_Store_Bypass reporting on Power10 (bsc#1188885 ltc#193722 git-fixes).
- rpm/check-for-config-changes: ignore also RISCV_ISA_* and DYNAMIC_SIGFRAME They depend on CONFIG_TOOLCHAIN_HAS_*.
- s390/cio: add dev_busid sysfs entry for each subchannel (bsc#1207526).
- s390/cio: check the subchannel validity for dev_busid (bsc#1207526).
- s390/cio: introduce io_subchannel_type (bsc#1207526).
- s390/cpum_sf: Adjust sampling interval to avoid hitting sample limits (git-fixes bsc#1213827).
- s390/maccess: add no DAT mode to kernel_write (git-fixes bsc#1213825).
- s390/numa: move initial setup of node_to_cpumask_map (git-fixes bsc#1213766).
- scsi: qla2xxx: Adjust IOCB resource on qpair create (bsc#1213747).
- scsi: qla2xxx: Array index may go out of bound (bsc#1213747).
- scsi: qla2xxx: Avoid fcport pointer dereference (bsc#1213747).
- scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport() (bsc#1213747).
- scsi: qla2xxx: Correct the index of array (bsc#1213747).
- scsi: qla2xxx: Drop useless LIST_HEAD (bsc#1213747).
- scsi: qla2xxx: Fix NULL pointer dereference in target mode (bsc#1213747).
- scsi: qla2xxx: Fix TMF leak through (bsc#1213747).
- scsi: qla2xxx: Fix buffer overrun (bsc#1213747).
- scsi: qla2xxx: Fix command flush during TMF (bsc#1213747).
- scsi: qla2xxx: Fix deletion race condition (bsc#1213747).
- scsi: qla2xxx: Fix end of loop test (bsc#1213747).
- scsi: qla2xxx: Fix erroneous link up failure (bsc#1213747).
- scsi: qla2xxx: Fix error code in qla2x00_start_sp() (bsc#1213747).
- scsi: qla2xxx: Fix potential NULL pointer dereference (bsc#1213747).
- scsi: qla2xxx: Fix session hang in gnl (bsc#1213747).
- scsi: qla2xxx: Limit TMF to 8 per function (bsc#1213747).
- scsi: qla2xxx: Pointer may be dereferenced (bsc#1213747).
- scsi: qla2xxx: Remove unused nvme_ls_waitq wait queue (bsc#1213747).
- scsi: qla2xxx: Silence a static checker warning (bsc#1213747).
- scsi: qla2xxx: Turn off noisy message log (bsc#1213747).
- scsi: qla2xxx: Update version to 10.02.08.400-k (bsc#1213747).
- scsi: qla2xxx: Update version to 10.02.08.500-k (bsc#1213747).
- scsi: qla2xxx: fix inconsistent TMF timeout (bsc#1213747).
- svcrdma: Prevent page release when nothing was received (git-fixes).
- vfio-ccw: Prevent quiesce function going into an infinite loop (git-fixes bsc#1213819).
- vfio-ccw: Release any channel program when releasing/removing vfio-ccw mdev (git-fixes bsc#1213823).
- vhost/test: fix build for vhost test (git-fixes).
- vhost/vsock: Use kvmalloc/kvfree for larger packets (git-fixes).
- vhost/vsock: do not check owner in vhost_vsock_stop() while releasing (git-fixes).
- vhost/vsock: fix incorrect used length reported to the guest (git-fixes).
- vhost/vsock: fix packet delivery order to monitoring devices (git-fixes).
- vhost/vsock: split packets to send using multiple buffers (git-fixes).
- vhost: Fix the calculation in vhost_overflow() (git-fixes).
- vhost_net: disable zerocopy by default (git-fixes).
- vhost_net: fix OoB on sendmsg() failure (git-fixes).
- virtio-balloon: fix managed page counts when migrating pages between zones (git-fixes).
- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).
- virtio-net: Keep stop() to follow mirror sequence of open() (git-fixes).
- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).
- virtio: Improve vq->broken access to avoid any compiler optimization (git-fixes).
- virtio_net: Fix error handling in virtnet_restore() (git-fixes).
- virtio_net: bugfix overflow inside xdp_linearize_page() (git-fixes).
- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).
- virtio_ring: Fix querying of maximum DMA mapping size for virtio device (git-fixes).
- vringh: Use wiov->used to check for read/write desc order (git-fixes).
- vringh: fix __vringh_iov() when riov and wiov are different (git-fixes).
- vsock/virtio: stop workers during the .remove() (git-fixes).
- vsock/virtio: use RCU to avoid use-after-free on the_virtio_vsock (git-fixes).
- xen/blkfront: Only check REQ_FUA for writes (git-fixes).
- ID
- SUSE-SU-2023:3309-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2023/suse-su-20233309-1/
- Published
-
2023-09-08T15:41:47
(12 months ago) - Modified
-
2023-09-08T15:41:47
(12 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2023-1701
- ALAS-2023-1706
- ALAS-2023-1783
- ALAS-2023-1792
- ALAS-2023-1897
- ALAS2-2023-1932
- ALAS2-2023-1987
- ALAS2-2023-2130
- ALAS2-2023-2179
- ALAS2-2023-2190
- ALAS2-2023-2195
- ALAS2-2023-2359
- ALPINE:CVE-2022-40982
- ALPINE:CVE-2023-20569
- ALPINE:CVE-2023-20593
- ALSA-2023:5068
- ALSA-2023:5069
- ALSA-2023:5244
- ALSA-2023:5245
- ALSA-2023:6595
- ALSA-2023:7077
- ALSA-2023:7109
- ALSA-2024:0113
- ALSA-2024:3138
- DSA-5453-1
- DSA-5459-1
- DSA-5461-1
- DSA-5462-1
- DSA-5474-1
- DSA-5475-1
- DSA-5480-1
- DSA-5492-1
- ELSA-2023-12654
- ELSA-2023-12655
- ELSA-2023-12656
- ELSA-2023-12657
- ELSA-2023-12689
- ELSA-2023-12690
- ELSA-2023-12691
- ELSA-2023-12692
- ELSA-2023-12712
- ELSA-2023-12713
- ELSA-2023-12714
- ELSA-2023-12715
- ELSA-2023-12722
- ELSA-2023-12723
- ELSA-2023-12724
- ELSA-2023-12759
- ELSA-2023-12782
- ELSA-2023-12785
- ELSA-2023-12786
- ELSA-2023-12788
- ELSA-2023-12792
- ELSA-2023-12836
- ELSA-2023-12839
- ELSA-2023-12842
- ELSA-2023-12874
- ELSA-2023-12910
- ELSA-2023-12911
- ELSA-2023-4819
- ELSA-2023-5068
- ELSA-2023-5069
- ELSA-2023-5244
- ELSA-2023-5622
- ELSA-2023-6583
- ELSA-2023-6595
- ELSA-2023-7077
- ELSA-2023-7109
- ELSA-2023-7423
- ELSA-2023-7749
- ELSA-2024-1831
- ELSA-2024-2394
- ELSA-2024-3138
- FEDORA-2023-04473fc41e
- FEDORA-2023-0d6aa10621
- FEDORA-2023-10d34be85a
- FEDORA-2023-3661f028b8
- FEDORA-2023-638681260a
- FEDORA-2023-7228464f28
- FEDORA-2023-ddfd3073b3
- FEDORA-2023-e1482687dd
- FEDORA-2023-e4e985b5dd
- FEDORA-2023-fff31650c8
- MS:CVE-2023-0459
- MS:CVE-2023-20569
- MS:CVE-2023-2985
- MS:CVE-2023-3567
- MS:CVE-2023-3609
- MS:CVE-2023-3611
- MS:CVE-2023-3776
- RHBA-2023:2977
- RHSA-2022:1975
- RHSA-2022:1988
- RHSA-2023:4819
- RHSA-2023:4821
- RHSA-2023:5068
- RHSA-2023:5069
- RHSA-2023:5091
- RHSA-2023:5093
- RHSA-2023:5221
- RHSA-2023:5244
- RHSA-2023:5245
- RHSA-2023:5255
- RHSA-2023:5574
- RHSA-2023:5621
- RHSA-2023:5622
- RHSA-2023:6595
- RHSA-2023:6901
- RHSA-2023:7077
- RHSA-2023:7109
- RHSA-2023:7419
- RHSA-2023:7423
- RHSA-2023:7424
- RHSA-2023:7513
- RHSA-2024:0113
- RHSA-2024:0134
- RHSA-2024:2950
- RHSA-2024:3138
- RLSA-2023:5244
- RLSA-2024:3138
- SSA:2023-172-02
- SSA:2023-205-01
- SSA:2023-325-01
- SUSE-SU-2023:2986-1
- SUSE-SU-2023:3001-1
- SUSE-SU-2023:3006-1
- SUSE-SU-2023:3019-1
- SUSE-SU-2023:3020-1
- SUSE-SU-2023:3022-1
- SUSE-SU-2023:3171-1
- SUSE-SU-2023:3172-1
- SUSE-SU-2023:3180-1
- SUSE-SU-2023:3182-1
- SUSE-SU-2023:3206-1
- SUSE-SU-2023:3262-1
- SUSE-SU-2023:3289-1
- SUSE-SU-2023:3298-1
- SUSE-SU-2023:3302-1
- SUSE-SU-2023:3311-1
- SUSE-SU-2023:3313-1
- SUSE-SU-2023:3318-1
- SUSE-SU-2023:3324-1
- SUSE-SU-2023:3329-1
- SUSE-SU-2023:3333-1
- SUSE-SU-2023:3349-1
- SUSE-SU-2023:3359-1
- SUSE-SU-2023:3360-1
- SUSE-SU-2023:3361-1
- SUSE-SU-2023:3362-1
- SUSE-SU-2023:3376-1
- SUSE-SU-2023:3377-1
- SUSE-SU-2023:3382-1
- SUSE-SU-2023:3383-1
- SUSE-SU-2023:3389-1
- SUSE-SU-2023:3390-1
- SUSE-SU-2023:3391-1
- SUSE-SU-2023:3392-1
- SUSE-SU-2023:3395-1
- SUSE-SU-2023:3421-1
- SUSE-SU-2023:3446-1
- SUSE-SU-2023:3447-1
- SUSE-SU-2023:3494-1
- SUSE-SU-2023:3495-1
- SUSE-SU-2023:3496-1
- SUSE-SU-2023:3566-1
- SUSE-SU-2023:3571-1
- SUSE-SU-2023:3572-1
- SUSE-SU-2023:3576-1
- SUSE-SU-2023:3582-1
- SUSE-SU-2023:3585-1
- SUSE-SU-2023:3592-1
- SUSE-SU-2023:3594-1
- SUSE-SU-2023:3595-1
- SUSE-SU-2023:3596-1
- SUSE-SU-2023:3598-1
- SUSE-SU-2023:3603-1
- SUSE-SU-2023:3607-1
- SUSE-SU-2023:3612-1
- SUSE-SU-2023:3620-1
- SUSE-SU-2023:3621-1
- SUSE-SU-2023:3622-1
- SUSE-SU-2023:3623-1
- SUSE-SU-2023:3627-1
- SUSE-SU-2023:3628-1
- SUSE-SU-2023:3629-1
- SUSE-SU-2023:3630-1
- SUSE-SU-2023:3631-1
- SUSE-SU-2023:3632-1
- SUSE-SU-2023:3644-1
- SUSE-SU-2023:3647-1
- SUSE-SU-2023:3648-1
- SUSE-SU-2023:3653-1
- SUSE-SU-2023:3657-1
- SUSE-SU-2023:3659-1
- SUSE-SU-2023:3668-1
- SUSE-SU-2023:3671-1
- SUSE-SU-2023:3675-1
- SUSE-SU-2023:3676-1
- SUSE-SU-2023:3677-1
- SUSE-SU-2023:3749-1
- SUSE-SU-2023:3768-1
- SUSE-SU-2023:3772-1
- SUSE-SU-2023:3773-1
- SUSE-SU-2023:3783-1
- SUSE-SU-2023:3784-1
- SUSE-SU-2023:3786-1
- SUSE-SU-2023:3788-1
- SUSE-SU-2023:3809-1
- SUSE-SU-2023:3812-1
- SUSE-SU-2023:3838-1
- SUSE-SU-2023:3844-1
- SUSE-SU-2023:3846-1
- SUSE-SU-2023:3889-1
- SUSE-SU-2023:3892-1
- SUSE-SU-2023:3893-1
- SUSE-SU-2023:3894-1
- SUSE-SU-2023:3895-1
- SUSE-SU-2023:3902-1
- SUSE-SU-2023:3903-1
- SUSE-SU-2023:3922-1
- SUSE-SU-2023:3923-1
- SUSE-SU-2023:3924-1
- SUSE-SU-2023:3928-1
- SUSE-SU-2024:0884-1
- SUSE-SU-2024:0885-1
- USN-6079-1
- USN-6080-1
- USN-6081-1
- USN-6084-1
- USN-6085-1
- USN-6090-1
- USN-6091-1
- USN-6092-1
- USN-6094-1
- USN-6095-1
- USN-6096-1
- USN-6109-1
- USN-6118-1
- USN-6132-1
- USN-6133-1
- USN-6134-1
- USN-6171-1
- USN-6172-1
- USN-6174-1
- USN-6185-1
- USN-6187-1
- USN-6207-1
- USN-6222-1
- USN-6223-1
- USN-6235-1
- USN-6244-1
- USN-6246-1
- USN-6247-1
- USN-6248-1
- USN-6250-1
- USN-6251-1
- USN-6252-1
- USN-6254-1
- USN-6255-1
- USN-6256-1
- USN-6260-1
- USN-6261-1
- USN-6285-1
- USN-6286-1
- USN-6309-1
- USN-6315-1
- USN-6316-1
- USN-6317-1
- USN-6318-1
- USN-6319-1
- USN-6321-1
- USN-6324-1
- USN-6325-1
- USN-6327-1
- USN-6328-1
- USN-6329-1
- USN-6330-1
- USN-6331-1
- USN-6332-1
- USN-6341-1
- USN-6342-1
- USN-6342-2
- USN-6346-1
- USN-6348-1
- USN-6357-1
- USN-6385-1
- USN-6388-1
- USN-6396-1
- USN-6396-2
- USN-6396-3
- USN-6397-1
- USN-6412-1
- USN-6415-1
- USN-6416-1
- USN-6416-2
- USN-6416-3
- USN-6445-1
- USN-6445-2
- USN-6460-1
- USN-6466-1
- USN-6532-1
- XSA-433
- XSA-434
- XSA-435
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12&sp=5 | suse | kernel-syms | < 4.12.14-122.173.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-12&sp=5 | suse | kernel-syms | < 4.12.14-122.173.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-12&sp=5 | suse | kernel-syms | < 4.12.14-122.173.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-12&sp=5 | suse | kernel-syms | < 4.12.14-122.173.1 | sles-12 | aarch64 | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12&sp=5 | suse | kernel-source | < 4.12.14-122.173.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12&sp=5 | suse | kernel-macros | < 4.12.14-122.173.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12&sp=5 | suse | kernel-devel | < 4.12.14-122.173.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12&sp=5 | suse | kernel-default | < 4.12.14-122.173.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-12&sp=5 | suse | kernel-default | < 4.12.14-122.173.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-12&sp=5 | suse | kernel-default | < 4.12.14-122.173.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-12&sp=5 | suse | kernel-default | < 4.12.14-122.173.1 | sles-12 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default-man?arch=s390x&distro=sles-12&sp=5 | suse | kernel-default-man | < 4.12.14-122.173.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12&sp=5 | suse | kernel-default-devel | < 4.12.14-122.173.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-12&sp=5 | suse | kernel-default-devel | < 4.12.14-122.173.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-12&sp=5 | suse | kernel-default-devel | < 4.12.14-122.173.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-12&sp=5 | suse | kernel-default-devel | < 4.12.14-122.173.1 | sles-12 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12&sp=5 | suse | kernel-default-base | < 4.12.14-122.173.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-12&sp=5 | suse | kernel-default-base | < 4.12.14-122.173.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-12&sp=5 | suse | kernel-default-base | < 4.12.14-122.173.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-12&sp=5 | suse | kernel-default-base | < 4.12.14-122.173.1 | sles-12 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |