[SUSE-SU-2023:4095-1] Security update for the Linux Kernel

Severity Important
Affected Packages 41
CVEs 14

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95% (bsc#1212703).
  • CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter subsystem. This issue may have allowed a local user to crash the system or potentially escalate their privileges on the system. (bsc#1215150)
  • CVE-2023-4389: Fixed a a double decrement of the reference count flaw in the btrfs filesystem a double decrement of the reference count, which may have allowed a local attacker with user privilege to crash the system or may lead to leaked internal kernel information. (bsc#1214351)
  • CVE-2023-4921: Fixed a use-after-free vulnerability in the sch_qfq component which could be exploited to achieve local privilege escalation. (bsc#1215275)
  • CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).
  • CVE-2023-4004: Fixed improper element removal netfilter nft_set_pipapo (bsc#1213812).
  • CVE-2023-4622: Fixed a use-after-free vulnerability in the af_unix component which could be exploited to achieve local privilege escalation. (bsc#1215117)
  • CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215115).
  • CVE-2020-36766: Fixed an issue in drivers/media/cec/core/cec-api.c which could leaks one byte of kernel memory on specific hardware to unprivileged users. (bsc#1215299)
  • CVE-2023-1859: Fixed a use-after-free flaw in Xen transport for 9pfs. This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information leak. (bsc#1210169)
  • CVE-2023-2177: Fixed a null pointer dereference issue in the sctp network protocol which could allow a user to crash the system or potentially cause a denial of service. (bsc#1210643)
  • CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).
  • CVE-2023-40283: Fixed use-after-free in l2cap_sock_ready_cb (bsc#1214233).
  • CVE-2023-1192: Fixed use-after-free in cifs_demultiplex_thread() (bsc#1208995).

The following non-security bugs were fixed:

  • bnx2x: new flag for track HW resource allocation (bsc#1202845 bsc#1215322).
  • locking/rwsem: Disable reader optimistic spinning (bnc#1176588).
  • mkspec: Allow unsupported KMPs (bsc#1214386)
  • scsi: qedf: Add synchronization between I/O completions and abort (bsc#1210658).
  • x86/pkeys: Revert a5eff7259790 ('x86/pkeys: Add PKRU value to init_fpstate') (bsc#1215356).
  • x86/srso: Do not probe microcode in a guest (git-fixes).
  • x86/srso: Fix SBPB enablement for spec_rstack_overflow=off (git-fixes).
  • x86/srso: Fix srso_show_state() side effect (git-fixes).
  • x86/srso: Set CPUID feature bits independently of bug or mitigation status (git-fixes).
Package Affected Version
pkg:rpm/suse/reiserfs-kmp-default?arch=x86_64&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/reiserfs-kmp-default?arch=s390x&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/reiserfs-kmp-default?arch=ppc64le&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/reiserfs-kmp-default?arch=aarch64&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-zfcpdump?arch=s390x&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-preempt?arch=x86_64&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-preempt?arch=aarch64&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-preempt-devel?arch=x86_64&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-preempt-devel?arch=aarch64&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-obs-build?arch=x86_64&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-obs-build?arch=s390x&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-obs-build?arch=ppc64le&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-obs-build?arch=aarch64&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-docs?arch=noarch&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-default?arch=x86_64&distro=slem-5 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-default?arch=s390x&distro=slem-5 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-default?arch=aarch64&distro=slem-5 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1.150300.18.80.2
pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=slem-5 < 5.3.18-150300.59.138.1.150300.18.80.2
pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1.150300.18.80.2
pkg:rpm/suse/kernel-default-base?arch=s390x&distro=slem-5 < 5.3.18-150300.59.138.1.150300.18.80.2
pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1.150300.18.80.2
pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1.150300.18.80.2
pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=slem-5 < 5.3.18-150300.59.138.1.150300.18.80.2
pkg:rpm/suse/kernel-64kb?arch=aarch64&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
pkg:rpm/suse/kernel-64kb-devel?arch=aarch64&distro=sles-15&sp=3 < 5.3.18-150300.59.138.1
ID
SUSE-SU-2023:4095-1
Severity
important
URL
https://www.suse.com/support/update/announcement/2023/suse-su-20234095-1/
Published
2023-10-17T13:03:35
(11 months ago)
Modified
2023-10-17T13:03:35
(11 months ago)
Rights
Copyright 2024 SUSE LLC. All rights reserved.
Other Advisories
Source # ID Name URL
Suse SUSE ratings https://www.suse.com/support/security/rating/
Suse URL of this CSAF notice https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4095-1.json
Suse URL for SUSE-SU-2023:4095-1 https://www.suse.com/support/update/announcement/2023/suse-su-20234095-1/
Suse E-Mail link for SUSE-SU-2023:4095-1 https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html
Bugzilla SUSE Bug 1176588 https://bugzilla.suse.com/1176588
Bugzilla SUSE Bug 1202845 https://bugzilla.suse.com/1202845
Bugzilla SUSE Bug 1207036 https://bugzilla.suse.com/1207036
Bugzilla SUSE Bug 1207270 https://bugzilla.suse.com/1207270
Bugzilla SUSE Bug 1208995 https://bugzilla.suse.com/1208995
Bugzilla SUSE Bug 1210169 https://bugzilla.suse.com/1210169
Bugzilla SUSE Bug 1210643 https://bugzilla.suse.com/1210643
Bugzilla SUSE Bug 1210658 https://bugzilla.suse.com/1210658
Bugzilla SUSE Bug 1212703 https://bugzilla.suse.com/1212703
Bugzilla SUSE Bug 1213812 https://bugzilla.suse.com/1213812
Bugzilla SUSE Bug 1214233 https://bugzilla.suse.com/1214233
Bugzilla SUSE Bug 1214351 https://bugzilla.suse.com/1214351
Bugzilla SUSE Bug 1214380 https://bugzilla.suse.com/1214380
Bugzilla SUSE Bug 1214386 https://bugzilla.suse.com/1214386
Bugzilla SUSE Bug 1215115 https://bugzilla.suse.com/1215115
Bugzilla SUSE Bug 1215117 https://bugzilla.suse.com/1215117
Bugzilla SUSE Bug 1215150 https://bugzilla.suse.com/1215150
Bugzilla SUSE Bug 1215221 https://bugzilla.suse.com/1215221
Bugzilla SUSE Bug 1215275 https://bugzilla.suse.com/1215275
Bugzilla SUSE Bug 1215299 https://bugzilla.suse.com/1215299
Bugzilla SUSE Bug 1215322 https://bugzilla.suse.com/1215322
Bugzilla SUSE Bug 1215356 https://bugzilla.suse.com/1215356
CVE SUSE CVE CVE-2020-36766 page https://www.suse.com/security/cve/CVE-2020-36766/
CVE SUSE CVE CVE-2023-1192 page https://www.suse.com/security/cve/CVE-2023-1192/
CVE SUSE CVE CVE-2023-1206 page https://www.suse.com/security/cve/CVE-2023-1206/
CVE SUSE CVE CVE-2023-1859 page https://www.suse.com/security/cve/CVE-2023-1859/
CVE SUSE CVE CVE-2023-2177 page https://www.suse.com/security/cve/CVE-2023-2177/
CVE SUSE CVE CVE-2023-23454 page https://www.suse.com/security/cve/CVE-2023-23454/
CVE SUSE CVE CVE-2023-4004 page https://www.suse.com/security/cve/CVE-2023-4004/
CVE SUSE CVE CVE-2023-40283 page https://www.suse.com/security/cve/CVE-2023-40283/
CVE SUSE CVE CVE-2023-42753 page https://www.suse.com/security/cve/CVE-2023-42753/
CVE SUSE CVE CVE-2023-4389 page https://www.suse.com/security/cve/CVE-2023-4389/
CVE SUSE CVE CVE-2023-4622 page https://www.suse.com/security/cve/CVE-2023-4622/
CVE SUSE CVE CVE-2023-4623 page https://www.suse.com/security/cve/CVE-2023-4623/
CVE SUSE CVE CVE-2023-4881 page https://www.suse.com/security/cve/CVE-2023-4881/
CVE SUSE CVE CVE-2023-4921 page https://www.suse.com/security/cve/CVE-2023-4921/
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/reiserfs-kmp-default?arch=x86_64&distro=sles-15&sp=3 suse reiserfs-kmp-default < 5.3.18-150300.59.138.1 sles-15 x86_64
Affected pkg:rpm/suse/reiserfs-kmp-default?arch=s390x&distro=sles-15&sp=3 suse reiserfs-kmp-default < 5.3.18-150300.59.138.1 sles-15 s390x
Affected pkg:rpm/suse/reiserfs-kmp-default?arch=ppc64le&distro=sles-15&sp=3 suse reiserfs-kmp-default < 5.3.18-150300.59.138.1 sles-15 ppc64le
Affected pkg:rpm/suse/reiserfs-kmp-default?arch=aarch64&distro=sles-15&sp=3 suse reiserfs-kmp-default < 5.3.18-150300.59.138.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-zfcpdump?arch=s390x&distro=sles-15&sp=3 suse kernel-zfcpdump < 5.3.18-150300.59.138.1 sles-15 s390x
Affected pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-15&sp=3 suse kernel-syms < 5.3.18-150300.59.138.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-15&sp=3 suse kernel-syms < 5.3.18-150300.59.138.1 sles-15 s390x
Affected pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-15&sp=3 suse kernel-syms < 5.3.18-150300.59.138.1 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-15&sp=3 suse kernel-syms < 5.3.18-150300.59.138.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-15&sp=3 suse kernel-source < 5.3.18-150300.59.138.1 sles-15 noarch
Affected pkg:rpm/suse/kernel-preempt?arch=x86_64&distro=sles-15&sp=3 suse kernel-preempt < 5.3.18-150300.59.138.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-preempt?arch=aarch64&distro=sles-15&sp=3 suse kernel-preempt < 5.3.18-150300.59.138.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-preempt-devel?arch=x86_64&distro=sles-15&sp=3 suse kernel-preempt-devel < 5.3.18-150300.59.138.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-preempt-devel?arch=aarch64&distro=sles-15&sp=3 suse kernel-preempt-devel < 5.3.18-150300.59.138.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-obs-build?arch=x86_64&distro=sles-15&sp=3 suse kernel-obs-build < 5.3.18-150300.59.138.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-obs-build?arch=s390x&distro=sles-15&sp=3 suse kernel-obs-build < 5.3.18-150300.59.138.1 sles-15 s390x
Affected pkg:rpm/suse/kernel-obs-build?arch=ppc64le&distro=sles-15&sp=3 suse kernel-obs-build < 5.3.18-150300.59.138.1 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-obs-build?arch=aarch64&distro=sles-15&sp=3 suse kernel-obs-build < 5.3.18-150300.59.138.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-15&sp=3 suse kernel-macros < 5.3.18-150300.59.138.1 sles-15 noarch
Affected pkg:rpm/suse/kernel-docs?arch=noarch&distro=sles-15&sp=3 suse kernel-docs < 5.3.18-150300.59.138.1 sles-15 noarch
Affected pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-15&sp=3 suse kernel-devel < 5.3.18-150300.59.138.1 sles-15 noarch
Affected pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-15&sp=3 suse kernel-default < 5.3.18-150300.59.138.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-default?arch=x86_64&distro=slem-5 suse kernel-default < 5.3.18-150300.59.138.1 slem-5 x86_64
Affected pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-15&sp=3 suse kernel-default < 5.3.18-150300.59.138.1 sles-15 s390x
Affected pkg:rpm/suse/kernel-default?arch=s390x&distro=slem-5 suse kernel-default < 5.3.18-150300.59.138.1 slem-5 s390x
Affected pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-15&sp=3 suse kernel-default < 5.3.18-150300.59.138.1 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-15&sp=3 suse kernel-default < 5.3.18-150300.59.138.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-default?arch=aarch64&distro=slem-5 suse kernel-default < 5.3.18-150300.59.138.1 slem-5 aarch64
Affected pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-15&sp=3 suse kernel-default-devel < 5.3.18-150300.59.138.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-15&sp=3 suse kernel-default-devel < 5.3.18-150300.59.138.1 sles-15 s390x
Affected pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-15&sp=3 suse kernel-default-devel < 5.3.18-150300.59.138.1 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-15&sp=3 suse kernel-default-devel < 5.3.18-150300.59.138.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-15&sp=3 suse kernel-default-base < 5.3.18-150300.59.138.1.150300.18.80.2 sles-15 x86_64
Affected pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=slem-5 suse kernel-default-base < 5.3.18-150300.59.138.1.150300.18.80.2 slem-5 x86_64
Affected pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-15&sp=3 suse kernel-default-base < 5.3.18-150300.59.138.1.150300.18.80.2 sles-15 s390x
Affected pkg:rpm/suse/kernel-default-base?arch=s390x&distro=slem-5 suse kernel-default-base < 5.3.18-150300.59.138.1.150300.18.80.2 slem-5 s390x
Affected pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-15&sp=3 suse kernel-default-base < 5.3.18-150300.59.138.1.150300.18.80.2 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-15&sp=3 suse kernel-default-base < 5.3.18-150300.59.138.1.150300.18.80.2 sles-15 aarch64
Affected pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=slem-5 suse kernel-default-base < 5.3.18-150300.59.138.1.150300.18.80.2 slem-5 aarch64
Affected pkg:rpm/suse/kernel-64kb?arch=aarch64&distro=sles-15&sp=3 suse kernel-64kb < 5.3.18-150300.59.138.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-64kb-devel?arch=aarch64&distro=sles-15&sp=3 suse kernel-64kb-devel < 5.3.18-150300.59.138.1 sles-15 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...