[SUSE-SU-2023:4028-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
14
CVEs
8
Security update for the Linux Kernel
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity() that could cause memory corruption (bsc#1208600).
- CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215115).
- CVE-2023-1192: Fixed use-after-free in cifs_demultiplex_thread() (bsc#1208995).
- CVE-2023-20588: Fixed a potential data leak that could be triggered through a side channel when division by zero occurred on some AMD processors (bsc#1213927).
- CVE-2023-4459: Fixed a NULL pointer dereference flaw in the vmxnet3 driver that may have allowed a local attacker with user privileges to cause a denial of service (bsc#1214451).
- CVE-2023-3772: Fixed a flaw in the XFRM subsystem that may have allowed a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer leading to denial of service (bsc#1213666).
- CVE-2023-2007: Removed the dpt_i2o driver due to security issues (bsc#1210448, jsc#PED-4579).
- CVE-2023-4385: Fixed a NULL pointer dereference flaw in dbFree that may have allowed a local attacker to crash the system due to a missing sanity check (bsc#1214348).
- ID
- SUSE-SU-2023:4028-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2023/suse-su-20234028-1/
- Published
-
2023-10-10T12:06:24
(11 months ago) - Modified
-
2023-10-10T12:06:24
(11 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2022-1591
- ALAS-2023-1819
- ALAS-2023-1838
- ALAS-2024-1942
- ALAS2-2022-1798
- ALAS2-2023-2232
- ALAS2-2023-2264
- ALAS2-2024-2588
- ALPINE:CVE-2023-20588
- ALSA-2023:7077
- ALSA-2023:7549
- ALSA-2024:0897
- DSA-5480-1
- DSA-5492-1
- ELSA-2023-12842
- ELSA-2023-12858
- ELSA-2023-12874
- ELSA-2023-12910
- ELSA-2023-12911
- ELSA-2023-13039
- ELSA-2023-13043
- ELSA-2023-13047
- ELSA-2023-6583
- ELSA-2023-7077
- ELSA-2023-7549
- ELSA-2023-7749
- ELSA-2024-0461
- ELSA-2024-0897
- ELSA-2024-12110
- ELSA-2024-12149
- ELSA-2024-12150
- ELSA-2024-12187
- ELSA-2024-2004
- FEDORA-2023-35d2ad2328
- FEDORA-2023-4125279976
- FEDORA-2023-948136565a
- MS:CVE-2023-1192
- MS:CVE-2023-20588
- RHSA-2023:6901
- RHSA-2023:7077
- RHSA-2023:7548
- RHSA-2023:7549
- RHSA-2024:0340
- RHSA-2024:0876
- RHSA-2024:0881
- RHSA-2024:0897
- RHSA-2024:1960
- RHSA-2024:2003
- RHSA-2024:2004
- RLSA-2023:7549
- SSA:2023-172-02
- SSA:2023-325-01
- SUSE-SU-2023:2534-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2782-1
- SUSE-SU-2023:2804-1
- SUSE-SU-2023:2805-1
- SUSE-SU-2023:2808-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2810-1
- SUSE-SU-2023:2820-1
- SUSE-SU-2023:2822-1
- SUSE-SU-2023:2831-1
- SUSE-SU-2023:2834-1
- SUSE-SU-2023:2859-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:3566-1
- SUSE-SU-2023:3576-1
- SUSE-SU-2023:3582-1
- SUSE-SU-2023:3585-1
- SUSE-SU-2023:3592-1
- SUSE-SU-2023:3594-1
- SUSE-SU-2023:3595-1
- SUSE-SU-2023:3596-1
- SUSE-SU-2023:3599-1
- SUSE-SU-2023:3599-2
- SUSE-SU-2023:3600-1
- SUSE-SU-2023:3600-2
- SUSE-SU-2023:3601-1
- SUSE-SU-2023:3603-1
- SUSE-SU-2023:3607-1
- SUSE-SU-2023:3612-1
- SUSE-SU-2023:3620-1
- SUSE-SU-2023:3621-1
- SUSE-SU-2023:3623-1
- SUSE-SU-2023:3627-1
- SUSE-SU-2023:3628-1
- SUSE-SU-2023:3629-1
- SUSE-SU-2023:3630-1
- SUSE-SU-2023:3631-1
- SUSE-SU-2023:3644-1
- SUSE-SU-2023:3647-1
- SUSE-SU-2023:3648-1
- SUSE-SU-2023:3656-1
- SUSE-SU-2023:3657-1
- SUSE-SU-2023:3668-1
- SUSE-SU-2023:3671-1
- SUSE-SU-2023:3675-1
- SUSE-SU-2023:3680-1
- SUSE-SU-2023:3681-1
- SUSE-SU-2023:3682-1
- SUSE-SU-2023:3683-1
- SUSE-SU-2023:3684-1
- SUSE-SU-2023:3687-1
- SUSE-SU-2023:3704-1
- SUSE-SU-2023:3705-1
- SUSE-SU-2023:3785-1
- SUSE-SU-2023:3831-1
- SUSE-SU-2023:3832-1
- SUSE-SU-2023:3894-1
- SUSE-SU-2023:3895-1
- SUSE-SU-2023:3902-1
- SUSE-SU-2023:3903-1
- SUSE-SU-2023:3964-1
- SUSE-SU-2023:3969-1
- SUSE-SU-2023:3971-1
- SUSE-SU-2023:3988-1
- SUSE-SU-2023:4030-1
- SUSE-SU-2023:4031-1
- SUSE-SU-2023:4032-1
- SUSE-SU-2023:4033-1
- SUSE-SU-2023:4035-1
- SUSE-SU-2023:4057-1
- SUSE-SU-2023:4058-1
- SUSE-SU-2023:4071-1
- SUSE-SU-2023:4072-1
- SUSE-SU-2023:4072-2
- SUSE-SU-2023:4093-1
- SUSE-SU-2023:4095-1
- SUSE-SU-2023:4142-1
- SUSE-SU-2023:4164-1
- SUSE-SU-2023:4165-1
- SUSE-SU-2023:4166-1
- SUSE-SU-2023:4175-1
- SUSE-SU-2023:4201-1
- SUSE-SU-2023:4204-1
- SUSE-SU-2023:4208-1
- SUSE-SU-2023:4219-1
- SUSE-SU-2023:4239-1
- SUSE-SU-2023:4243-1
- SUSE-SU-2023:4244-1
- SUSE-SU-2023:4245-1
- SUSE-SU-2023:4260-1
- SUSE-SU-2023:4261-1
- SUSE-SU-2023:4267-1
- SUSE-SU-2023:4273-1
- SUSE-SU-2023:4278-1
- SUSE-SU-2023:4279-1
- SUSE-SU-2023:4280-1
- SUSE-SU-2023:4285-1
- SUSE-SU-2023:4300-1
- SUSE-SU-2023:4301-1
- SUSE-SU-2023:4308-1
- SUSE-SU-2023:4313-1
- SUSE-SU-2023:4321-1
- SUSE-SU-2023:4322-1
- SUSE-SU-2023:4325-1
- SUSE-SU-2023:4326-1
- SUSE-SU-2023:4328-1
- SUSE-SU-2023:4347-1
- SUSE-SU-2023:4475-1
- SUSE-SU-2023:4476-1
- SUSE-SU-2024:1454-1
- SUSE-SU-2024:1489-1
- USN-6033-1
- USN-6171-1
- USN-6172-1
- USN-6185-1
- USN-6187-1
- USN-6207-1
- USN-6222-1
- USN-6223-1
- USN-6256-1
- USN-6383-1
- USN-6384-1
- USN-6386-1
- USN-6386-2
- USN-6386-3
- USN-6387-1
- USN-6387-2
- USN-6388-1
- USN-6415-1
- USN-6439-1
- USN-6439-2
- USN-6440-1
- USN-6440-2
- USN-6440-3
- USN-6441-1
- USN-6441-2
- USN-6441-3
- USN-6442-1
- USN-6444-1
- USN-6444-2
- USN-6445-1
- USN-6445-2
- USN-6446-1
- USN-6446-2
- USN-6446-3
- USN-6460-1
- USN-6462-1
- USN-6462-2
- USN-6464-1
- USN-6465-1
- USN-6465-2
- USN-6465-3
- USN-6466-1
- USN-6516-1
- USN-6520-1
- USN-6577-1
- USN-6602-1
- USN-6604-1
- USN-6604-2
- XSA-439
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kernel-xen?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-xen | < 3.0.101-108.147.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-xen-devel?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-xen-devel | < 3.0.101-108.147.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-xen-base?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-xen-base | < 3.0.101-108.147.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-trace?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-trace | < 3.0.101-108.147.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-trace-devel?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-trace-devel | < 3.0.101-108.147.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-trace-base?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-trace-base | < 3.0.101-108.147.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-syms | < 3.0.101-108.147.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-source?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-source | < 3.0.101-108.147.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-ec2?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-ec2 | < 3.0.101-108.147.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-ec2-devel?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-ec2-devel | < 3.0.101-108.147.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-ec2-base?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-ec2-base | < 3.0.101-108.147.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-default | < 3.0.101-108.147.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-default-devel | < 3.0.101-108.147.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-default-base | < 3.0.101-108.147.1 | sles-11 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |