[SUSE-SU-2023:4030-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
32
CVEs
13
Security update for the Linux Kernel
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2023-4389: Fixed a reference counting issue in the Btrfs filesystem that could be exploited in order to leak internal kernel information or crash the system (bsc#1214351).
- CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter subsystem. This issue may have allowed a local user to crash the system or potentially escalate their privileges (bsc#1215150).
- CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table which could be exploited by network adjacent attackers, increasing CPU usage by 95% (bsc#1212703).
- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalatio (bsc#1215275).
- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).
- CVE-2023-4622: Fixed a use-after-free vulnerability in the Unix domain sockets component which could be exploited to achieve local privilege escalation (bsc#1215117).
- CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215115).
- CVE-2020-36766: Fixed a potential information leak in in the CEC driver (bsc#1215299).
- CVE-2023-1859: Fixed a use-after-free flaw in Xen transport for 9pfs which could be exploited to crash the system (bsc#1210169).
- CVE-2023-2177: Fixed a null pointer dereference issue in the sctp network protocol which could allow a user to crash the system (bsc#1210643).
- CVE-2023-4881: Fixed an out-of-bounds write flaw in the netfilter subsystem that could lead to information disclosure or denial of service (bsc#1215221).
- CVE-2023-40283: Fixed a use-after-free issue in the Bluetooth subsystem (bsc#1214233).
- CVE-2023-1192: Fixed a use-after-free in the CIFS subsystem (bsc#1208995).
The following non-security bugs were fixed:
- check-for-config-changes: ignore BUILTIN_RETURN_ADDRESS_STRIPS_PAC (bsc#1214380).
- mkspec: Allow unsupported KMPs (bsc#1214386)
- rpm/mkspec-dtb: support for nested subdirs.
- x86/srso: Do not probe microcode in a guest (git-fixes).
- x86/srso: Fix SBPB enablement for spec_rstack_overflow=off (git-fixes).
- x86/srso: Fix srso_show_state() side effect (git-fixes).
- x86/srso: Set CPUID feature bits independently of bug or mitigation status (git-fixes).
- ID
- SUSE-SU-2023:4030-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2023/suse-su-20234030-1/
- Published
-
2023-10-10T12:14:23
(11 months ago) - Modified
-
2023-10-10T12:14:23
(11 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2023-1735
- ALAS-2023-1776
- ALAS-2023-1838
- ALAS2-2023-2027
- ALAS2-2023-2108
- ALAS2-2023-2264
- ALSA-2023:2951
- ALSA-2023:7077
- ALSA-2023:7549
- ALSA-2024:0113
- ALSA-2024:0897
- DSA-5324-1
- DSA-5480-1
- DSA-5492-1
- ELSA-2023-12196
- ELSA-2023-12206
- ELSA-2023-12207
- ELSA-2023-12375
- ELSA-2023-12824
- ELSA-2023-12825
- ELSA-2023-12826
- ELSA-2023-12858
- ELSA-2023-12874
- ELSA-2023-12875
- ELSA-2023-12910
- ELSA-2023-12911
- ELSA-2023-12914
- ELSA-2023-12915
- ELSA-2023-12970
- ELSA-2023-13039
- ELSA-2023-13043
- ELSA-2023-13047
- ELSA-2023-2951
- ELSA-2023-6583
- ELSA-2023-7077
- ELSA-2023-7549
- ELSA-2023-7749
- ELSA-2024-0346
- ELSA-2024-0461
- ELSA-2024-0897
- ELSA-2024-12069
- ELSA-2024-12094
- ELSA-2024-12110
- ELSA-2024-12149
- ELSA-2024-12169
- ELSA-2024-12187
- ELSA-2024-1249
- ELSA-2024-12610
- ELSA-2024-12612
- ELSA-2024-1831
- ELSA-2024-2004
- FEDORA-2023-4f2cf7e5d2
- FEDORA-2023-6325ed25c4
- FEDORA-2023-9e7774da21
- MS:CVE-2023-1192
- MS:CVE-2023-23454
- MS:CVE-2023-4622
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:2736
- RHSA-2023:2951
- RHSA-2023:6901
- RHSA-2023:7077
- RHSA-2023:7548
- RHSA-2023:7549
- RHSA-2024:0089
- RHSA-2024:0113
- RHSA-2024:0134
- RHSA-2024:0340
- RHSA-2024:0346
- RHSA-2024:0347
- RHSA-2024:0371
- RHSA-2024:0876
- RHSA-2024:0881
- RHSA-2024:0897
- RHSA-2024:1249
- RHSA-2024:1323
- RHSA-2024:1332
- RHSA-2024:1960
- RHSA-2024:2003
- RHSA-2024:2004
- RLSA-2023:7549
- SSA:2023-048-01
- SSA:2023-172-02
- SSA:2023-325-01
- SUSE-SU-2023:0145-1
- SUSE-SU-2023:0152-1
- SUSE-SU-2023:0406-1
- SUSE-SU-2023:0407-1
- SUSE-SU-2023:0410-1
- SUSE-SU-2023:0420-1
- SUSE-SU-2023:0433-1
- SUSE-SU-2023:0485-1
- SUSE-SU-2023:0488-1
- SUSE-SU-2023:0591-1
- SUSE-SU-2023:0618-1
- SUSE-SU-2023:0774-1
- SUSE-SU-2023:1608-1
- SUSE-SU-2023:1801-1
- SUSE-SU-2023:1803-1
- SUSE-SU-2023:1848-1
- SUSE-SU-2023:2232-1
- SUSE-SU-2023:2367-1
- SUSE-SU-2023:2368-1
- SUSE-SU-2023:2369-1
- SUSE-SU-2023:2371-1
- SUSE-SU-2023:2376-1
- SUSE-SU-2023:2384-1
- SUSE-SU-2023:2385-1
- SUSE-SU-2023:2386-1
- SUSE-SU-2023:2389-1
- SUSE-SU-2023:2399-1
- SUSE-SU-2023:2401-1
- SUSE-SU-2023:2405-1
- SUSE-SU-2023:2413-1
- SUSE-SU-2023:2420-1
- SUSE-SU-2023:2422-1
- SUSE-SU-2023:2423-1
- SUSE-SU-2023:2425-1
- SUSE-SU-2023:2428-1
- SUSE-SU-2023:2429-1
- SUSE-SU-2023:2431-1
- SUSE-SU-2023:2442-1
- SUSE-SU-2023:2443-1
- SUSE-SU-2023:2448-1
- SUSE-SU-2023:2450-1
- SUSE-SU-2023:2453-1
- SUSE-SU-2023:2455-1
- SUSE-SU-2023:2459-1
- SUSE-SU-2023:2468-1
- SUSE-SU-2023:2506-1
- SUSE-SU-2023:2805-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:3599-1
- SUSE-SU-2023:3599-2
- SUSE-SU-2023:3601-1
- SUSE-SU-2023:3656-1
- SUSE-SU-2023:3681-1
- SUSE-SU-2023:3704-1
- SUSE-SU-2023:3705-1
- SUSE-SU-2023:3971-1
- SUSE-SU-2023:3988-1
- SUSE-SU-2023:4028-1
- SUSE-SU-2023:4031-1
- SUSE-SU-2023:4032-1
- SUSE-SU-2023:4033-1
- SUSE-SU-2023:4035-1
- SUSE-SU-2023:4057-1
- SUSE-SU-2023:4058-1
- SUSE-SU-2023:4071-1
- SUSE-SU-2023:4072-1
- SUSE-SU-2023:4072-2
- SUSE-SU-2023:4093-1
- SUSE-SU-2023:4095-1
- SUSE-SU-2023:4142-1
- SUSE-SU-2023:4164-1
- SUSE-SU-2023:4165-1
- SUSE-SU-2023:4166-1
- SUSE-SU-2023:4175-1
- SUSE-SU-2023:4201-1
- SUSE-SU-2023:4204-1
- SUSE-SU-2023:4208-1
- SUSE-SU-2023:4219-1
- SUSE-SU-2023:4239-1
- SUSE-SU-2023:4243-1
- SUSE-SU-2023:4244-1
- SUSE-SU-2023:4245-1
- SUSE-SU-2023:4260-1
- SUSE-SU-2023:4261-1
- SUSE-SU-2023:4267-1
- SUSE-SU-2023:4273-1
- SUSE-SU-2023:4278-1
- SUSE-SU-2023:4279-1
- SUSE-SU-2023:4280-1
- SUSE-SU-2023:4285-1
- SUSE-SU-2023:4300-1
- SUSE-SU-2023:4301-1
- SUSE-SU-2023:4308-1
- SUSE-SU-2023:4313-1
- SUSE-SU-2023:4321-1
- SUSE-SU-2023:4322-1
- SUSE-SU-2023:4325-1
- SUSE-SU-2023:4326-1
- SUSE-SU-2023:4328-1
- SUSE-SU-2023:4347-1
- SUSE-SU-2023:4766-1
- SUSE-SU-2023:4775-1
- SUSE-SU-2023:4795-1
- SUSE-SU-2023:4796-1
- SUSE-SU-2023:4799-1
- SUSE-SU-2023:4801-1
- SUSE-SU-2023:4802-1
- SUSE-SU-2023:4805-1
- SUSE-SU-2023:4817-1
- SUSE-SU-2023:4820-1
- SUSE-SU-2023:4822-1
- SUSE-SU-2023:4831-1
- SUSE-SU-2023:4833-1
- SUSE-SU-2023:4836-1
- SUSE-SU-2023:4841-1
- SUSE-SU-2023:4847-1
- SUSE-SU-2023:4848-1
- SUSE-SU-2023:4849-1
- SUSE-SU-2023:4862-1
- SUSE-SU-2023:4863-1
- SUSE-SU-2023:4866-1
- SUSE-SU-2023:4871-1
- SUSE-SU-2023:4872-1
- SUSE-SU-2024:0112-1
- SUSE-SU-2024:0469-1
- SUSE-SU-2024:0474-1
- SUSE-SU-2024:0478-1
- SUSE-SU-2024:0514-1
- SUSE-SU-2024:0515-1
- SUSE-SU-2024:0516-1
- SUSE-SU-2024:0622-1
- SUSE-SU-2024:0624-1
- SUSE-SU-2024:0655-1
- SUSE-SU-2024:0666-1
- SUSE-SU-2024:0685-1
- SUSE-SU-2024:0698-1
- SUSE-SU-2024:0727-1
- SUSE-SU-2024:1181-1
- SUSE-SU-2024:1183-1
- SUSE-SU-2024:1236-1
- SUSE-SU-2024:1246-1
- SUSE-SU-2024:1249-1
- SUSE-SU-2024:1251-1
- SUSE-SU-2024:1252-1
- SUSE-SU-2024:1257-1
- SUSE-SU-2024:1288-1
- SUSE-SU-2024:1299-1
- SUSE-SU-2024:1312-1
- SUSE-SU-2024:1322-1
- SUSE-SU-2024:1454-1
- SUSE-SU-2024:1466-1
- SUSE-SU-2024:1480-1
- SUSE-SU-2024:1489-1
- SUSE-SU-2024:1490-1
- SUSE-SU-2024:1641-1
- SUSE-SU-2024:1643-1
- USN-5915-1
- USN-5917-1
- USN-5934-1
- USN-5939-1
- USN-5940-1
- USN-5951-1
- USN-5982-1
- USN-5987-1
- USN-6000-1
- USN-6004-1
- USN-6056-1
- USN-6071-1
- USN-6072-1
- USN-6079-1
- USN-6091-1
- USN-6096-1
- USN-6171-1
- USN-6172-1
- USN-6175-1
- USN-6185-1
- USN-6186-1
- USN-6187-1
- USN-6207-1
- USN-6222-1
- USN-6223-1
- USN-6252-1
- USN-6256-1
- USN-6343-1
- USN-6383-1
- USN-6385-1
- USN-6386-1
- USN-6386-2
- USN-6386-3
- USN-6387-1
- USN-6387-2
- USN-6388-1
- USN-6396-1
- USN-6396-2
- USN-6396-3
- USN-6412-1
- USN-6415-1
- USN-6416-1
- USN-6416-2
- USN-6416-3
- USN-6417-1
- USN-6439-1
- USN-6439-2
- USN-6440-1
- USN-6440-2
- USN-6440-3
- USN-6441-1
- USN-6441-2
- USN-6441-3
- USN-6442-1
- USN-6443-1
- USN-6444-1
- USN-6444-2
- USN-6445-1
- USN-6445-2
- USN-6446-1
- USN-6446-2
- USN-6446-3
- USN-6454-1
- USN-6454-2
- USN-6454-3
- USN-6454-4
- USN-6460-1
- USN-6461-1
- USN-6466-1
- USN-6479-1
- USN-6699-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=x86_64&distro=sles-15&sp=2 | suse | reiserfs-kmp-default | < 5.3.18-150200.24.166.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=s390x&distro=sles-15&sp=2 | suse | reiserfs-kmp-default | < 5.3.18-150200.24.166.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=ppc64le&distro=sles-15&sp=2 | suse | reiserfs-kmp-default | < 5.3.18-150200.24.166.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=aarch64&distro=sles-15&sp=2 | suse | reiserfs-kmp-default | < 5.3.18-150200.24.166.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-15&sp=2 | suse | kernel-syms | < 5.3.18-150200.24.166.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-15&sp=2 | suse | kernel-syms | < 5.3.18-150200.24.166.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-15&sp=2 | suse | kernel-syms | < 5.3.18-150200.24.166.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-15&sp=2 | suse | kernel-syms | < 5.3.18-150200.24.166.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-15&sp=2 | suse | kernel-source | < 5.3.18-150200.24.166.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-preempt?arch=x86_64&distro=sles-15&sp=2 | suse | kernel-preempt | < 5.3.18-150200.24.166.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-preempt?arch=aarch64&distro=sles-15&sp=2 | suse | kernel-preempt | < 5.3.18-150200.24.166.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-preempt-devel?arch=x86_64&distro=sles-15&sp=2 | suse | kernel-preempt-devel | < 5.3.18-150200.24.166.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-preempt-devel?arch=aarch64&distro=sles-15&sp=2 | suse | kernel-preempt-devel | < 5.3.18-150200.24.166.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=x86_64&distro=sles-15&sp=2 | suse | kernel-obs-build | < 5.3.18-150200.24.166.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=s390x&distro=sles-15&sp=2 | suse | kernel-obs-build | < 5.3.18-150200.24.166.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=ppc64le&distro=sles-15&sp=2 | suse | kernel-obs-build | < 5.3.18-150200.24.166.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=aarch64&distro=sles-15&sp=2 | suse | kernel-obs-build | < 5.3.18-150200.24.166.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-15&sp=2 | suse | kernel-macros | < 5.3.18-150200.24.166.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-docs?arch=noarch&distro=sles-15&sp=2 | suse | kernel-docs | < 5.3.18-150200.24.166.2 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-15&sp=2 | suse | kernel-devel | < 5.3.18-150200.24.166.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-15&sp=2 | suse | kernel-default | < 5.3.18-150200.24.166.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-15&sp=2 | suse | kernel-default | < 5.3.18-150200.24.166.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-15&sp=2 | suse | kernel-default | < 5.3.18-150200.24.166.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-15&sp=2 | suse | kernel-default | < 5.3.18-150200.24.166.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-15&sp=2 | suse | kernel-default-devel | < 5.3.18-150200.24.166.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-15&sp=2 | suse | kernel-default-devel | < 5.3.18-150200.24.166.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-15&sp=2 | suse | kernel-default-devel | < 5.3.18-150200.24.166.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-15&sp=2 | suse | kernel-default-devel | < 5.3.18-150200.24.166.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-15&sp=2 | suse | kernel-default-base | < 5.3.18-150200.24.166.1.150200.9.83.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-15&sp=2 | suse | kernel-default-base | < 5.3.18-150200.24.166.1.150200.9.83.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-15&sp=2 | suse | kernel-default-base | < 5.3.18-150200.24.166.1.150200.9.83.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-15&sp=2 | suse | kernel-default-base | < 5.3.18-150200.24.166.1.150200.9.83.1 | sles-15 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |