[SUSE-SU-2023:4095-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
41
CVEs
14
Security update for the Linux Kernel
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95% (bsc#1212703).
- CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter subsystem. This issue may have allowed a local user to crash the system or potentially escalate their privileges on the system. (bsc#1215150)
- CVE-2023-4389: Fixed a a double decrement of the reference count flaw in the btrfs filesystem a double decrement of the reference count, which may have allowed a local attacker with user privilege to crash the system or may lead to leaked internal kernel information. (bsc#1214351)
- CVE-2023-4921: Fixed a use-after-free vulnerability in the sch_qfq component which could be exploited to achieve local privilege escalation. (bsc#1215275)
- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).
- CVE-2023-4004: Fixed improper element removal netfilter nft_set_pipapo (bsc#1213812).
- CVE-2023-4622: Fixed a use-after-free vulnerability in the af_unix component which could be exploited to achieve local privilege escalation. (bsc#1215117)
- CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215115).
- CVE-2020-36766: Fixed an issue in drivers/media/cec/core/cec-api.c which could leaks one byte of kernel memory on specific hardware to unprivileged users. (bsc#1215299)
- CVE-2023-1859: Fixed a use-after-free flaw in Xen transport for 9pfs. This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information leak. (bsc#1210169)
- CVE-2023-2177: Fixed a null pointer dereference issue in the sctp network protocol which could allow a user to crash the system or potentially cause a denial of service. (bsc#1210643)
- CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).
- CVE-2023-40283: Fixed use-after-free in l2cap_sock_ready_cb (bsc#1214233).
- CVE-2023-1192: Fixed use-after-free in cifs_demultiplex_thread() (bsc#1208995).
The following non-security bugs were fixed:
- bnx2x: new flag for track HW resource allocation (bsc#1202845 bsc#1215322).
- locking/rwsem: Disable reader optimistic spinning (bnc#1176588).
- mkspec: Allow unsupported KMPs (bsc#1214386)
- scsi: qedf: Add synchronization between I/O completions and abort (bsc#1210658).
- x86/pkeys: Revert a5eff7259790 ('x86/pkeys: Add PKRU value to init_fpstate') (bsc#1215356).
- x86/srso: Do not probe microcode in a guest (git-fixes).
- x86/srso: Fix SBPB enablement for spec_rstack_overflow=off (git-fixes).
- x86/srso: Fix srso_show_state() side effect (git-fixes).
- x86/srso: Set CPUID feature bits independently of bug or mitigation status (git-fixes).
- ID
- SUSE-SU-2023:4095-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2023/suse-su-20234095-1/
- Published
-
2023-10-17T13:03:35
(11 months ago) - Modified
-
2023-10-17T13:03:35
(11 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2023-1735
- ALAS-2023-1776
- ALAS-2023-1838
- ALAS2-2023-2027
- ALAS2-2023-2108
- ALAS2-2023-2264
- ALSA-2023:2951
- ALSA-2023:5069
- ALSA-2023:5244
- ALSA-2023:7077
- ALSA-2023:7549
- ALSA-2024:0113
- ALSA-2024:0897
- DSA-5324-1
- DSA-5480-1
- DSA-5492-1
- ELSA-2023-12196
- ELSA-2023-12206
- ELSA-2023-12207
- ELSA-2023-12375
- ELSA-2023-12824
- ELSA-2023-12825
- ELSA-2023-12826
- ELSA-2023-12858
- ELSA-2023-12874
- ELSA-2023-12875
- ELSA-2023-12910
- ELSA-2023-12911
- ELSA-2023-12914
- ELSA-2023-12915
- ELSA-2023-12970
- ELSA-2023-13039
- ELSA-2023-13043
- ELSA-2023-13047
- ELSA-2023-2951
- ELSA-2023-5069
- ELSA-2023-5244
- ELSA-2023-6583
- ELSA-2023-7077
- ELSA-2023-7549
- ELSA-2023-7749
- ELSA-2024-0346
- ELSA-2024-0461
- ELSA-2024-0897
- ELSA-2024-12069
- ELSA-2024-12094
- ELSA-2024-12110
- ELSA-2024-12149
- ELSA-2024-12169
- ELSA-2024-12187
- ELSA-2024-1249
- ELSA-2024-12610
- ELSA-2024-12612
- ELSA-2024-1831
- ELSA-2024-2004
- FEDORA-2023-4f2cf7e5d2
- FEDORA-2023-6325ed25c4
- FEDORA-2023-9e7774da21
- MS:CVE-2023-1192
- MS:CVE-2023-23454
- MS:CVE-2023-4004
- MS:CVE-2023-4622
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:2736
- RHSA-2023:2951
- RHSA-2023:5069
- RHSA-2023:5091
- RHSA-2023:5093
- RHSA-2023:5221
- RHSA-2023:5244
- RHSA-2023:5255
- RHSA-2023:6901
- RHSA-2023:7077
- RHSA-2023:7548
- RHSA-2023:7549
- RHSA-2024:0089
- RHSA-2024:0113
- RHSA-2024:0134
- RHSA-2024:0340
- RHSA-2024:0346
- RHSA-2024:0347
- RHSA-2024:0371
- RHSA-2024:0876
- RHSA-2024:0881
- RHSA-2024:0897
- RHSA-2024:1249
- RHSA-2024:1323
- RHSA-2024:1332
- RHSA-2024:1960
- RHSA-2024:2003
- RHSA-2024:2004
- RLSA-2023:5244
- RLSA-2023:7549
- SSA:2023-048-01
- SSA:2023-172-02
- SSA:2023-325-01
- SUSE-SU-2023:0145-1
- SUSE-SU-2023:0152-1
- SUSE-SU-2023:0406-1
- SUSE-SU-2023:0407-1
- SUSE-SU-2023:0410-1
- SUSE-SU-2023:0420-1
- SUSE-SU-2023:0433-1
- SUSE-SU-2023:0485-1
- SUSE-SU-2023:0488-1
- SUSE-SU-2023:0591-1
- SUSE-SU-2023:0618-1
- SUSE-SU-2023:0774-1
- SUSE-SU-2023:1608-1
- SUSE-SU-2023:1801-1
- SUSE-SU-2023:1803-1
- SUSE-SU-2023:1848-1
- SUSE-SU-2023:2232-1
- SUSE-SU-2023:2367-1
- SUSE-SU-2023:2368-1
- SUSE-SU-2023:2369-1
- SUSE-SU-2023:2371-1
- SUSE-SU-2023:2376-1
- SUSE-SU-2023:2384-1
- SUSE-SU-2023:2385-1
- SUSE-SU-2023:2386-1
- SUSE-SU-2023:2389-1
- SUSE-SU-2023:2399-1
- SUSE-SU-2023:2401-1
- SUSE-SU-2023:2405-1
- SUSE-SU-2023:2413-1
- SUSE-SU-2023:2420-1
- SUSE-SU-2023:2422-1
- SUSE-SU-2023:2423-1
- SUSE-SU-2023:2425-1
- SUSE-SU-2023:2428-1
- SUSE-SU-2023:2429-1
- SUSE-SU-2023:2431-1
- SUSE-SU-2023:2442-1
- SUSE-SU-2023:2443-1
- SUSE-SU-2023:2448-1
- SUSE-SU-2023:2450-1
- SUSE-SU-2023:2453-1
- SUSE-SU-2023:2455-1
- SUSE-SU-2023:2459-1
- SUSE-SU-2023:2468-1
- SUSE-SU-2023:2506-1
- SUSE-SU-2023:2805-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:3302-1
- SUSE-SU-2023:3311-1
- SUSE-SU-2023:3313-1
- SUSE-SU-2023:3318-1
- SUSE-SU-2023:3376-1
- SUSE-SU-2023:3377-1
- SUSE-SU-2023:3599-1
- SUSE-SU-2023:3599-2
- SUSE-SU-2023:3601-1
- SUSE-SU-2023:3656-1
- SUSE-SU-2023:3681-1
- SUSE-SU-2023:3704-1
- SUSE-SU-2023:3705-1
- SUSE-SU-2023:3971-1
- SUSE-SU-2023:3988-1
- SUSE-SU-2023:4028-1
- SUSE-SU-2023:4030-1
- SUSE-SU-2023:4031-1
- SUSE-SU-2023:4032-1
- SUSE-SU-2023:4033-1
- SUSE-SU-2023:4035-1
- SUSE-SU-2023:4057-1
- SUSE-SU-2023:4058-1
- SUSE-SU-2023:4071-1
- SUSE-SU-2023:4072-1
- SUSE-SU-2023:4072-2
- SUSE-SU-2023:4093-1
- SUSE-SU-2023:4142-1
- SUSE-SU-2023:4164-1
- SUSE-SU-2023:4165-1
- SUSE-SU-2023:4166-1
- SUSE-SU-2023:4175-1
- SUSE-SU-2023:4201-1
- SUSE-SU-2023:4204-1
- SUSE-SU-2023:4208-1
- SUSE-SU-2023:4219-1
- SUSE-SU-2023:4239-1
- SUSE-SU-2023:4243-1
- SUSE-SU-2023:4244-1
- SUSE-SU-2023:4245-1
- SUSE-SU-2023:4260-1
- SUSE-SU-2023:4261-1
- SUSE-SU-2023:4267-1
- SUSE-SU-2023:4273-1
- SUSE-SU-2023:4278-1
- SUSE-SU-2023:4279-1
- SUSE-SU-2023:4280-1
- SUSE-SU-2023:4285-1
- SUSE-SU-2023:4300-1
- SUSE-SU-2023:4301-1
- SUSE-SU-2023:4308-1
- SUSE-SU-2023:4313-1
- SUSE-SU-2023:4321-1
- SUSE-SU-2023:4322-1
- SUSE-SU-2023:4325-1
- SUSE-SU-2023:4326-1
- SUSE-SU-2023:4328-1
- SUSE-SU-2023:4347-1
- SUSE-SU-2023:4766-1
- SUSE-SU-2023:4775-1
- SUSE-SU-2023:4795-1
- SUSE-SU-2023:4796-1
- SUSE-SU-2023:4799-1
- SUSE-SU-2023:4801-1
- SUSE-SU-2023:4802-1
- SUSE-SU-2023:4805-1
- SUSE-SU-2023:4817-1
- SUSE-SU-2023:4820-1
- SUSE-SU-2023:4822-1
- SUSE-SU-2023:4831-1
- SUSE-SU-2023:4833-1
- SUSE-SU-2023:4836-1
- SUSE-SU-2023:4841-1
- SUSE-SU-2023:4847-1
- SUSE-SU-2023:4848-1
- SUSE-SU-2023:4849-1
- SUSE-SU-2023:4862-1
- SUSE-SU-2023:4863-1
- SUSE-SU-2023:4866-1
- SUSE-SU-2023:4871-1
- SUSE-SU-2023:4872-1
- SUSE-SU-2024:0112-1
- SUSE-SU-2024:0469-1
- SUSE-SU-2024:0474-1
- SUSE-SU-2024:0478-1
- SUSE-SU-2024:0514-1
- SUSE-SU-2024:0515-1
- SUSE-SU-2024:0516-1
- SUSE-SU-2024:0622-1
- SUSE-SU-2024:0624-1
- SUSE-SU-2024:0655-1
- SUSE-SU-2024:0666-1
- SUSE-SU-2024:0685-1
- SUSE-SU-2024:0698-1
- SUSE-SU-2024:0727-1
- SUSE-SU-2024:1181-1
- SUSE-SU-2024:1183-1
- SUSE-SU-2024:1236-1
- SUSE-SU-2024:1246-1
- SUSE-SU-2024:1249-1
- SUSE-SU-2024:1251-1
- SUSE-SU-2024:1252-1
- SUSE-SU-2024:1257-1
- SUSE-SU-2024:1288-1
- SUSE-SU-2024:1299-1
- SUSE-SU-2024:1312-1
- SUSE-SU-2024:1322-1
- SUSE-SU-2024:1454-1
- SUSE-SU-2024:1466-1
- SUSE-SU-2024:1480-1
- SUSE-SU-2024:1489-1
- SUSE-SU-2024:1490-1
- SUSE-SU-2024:1641-1
- SUSE-SU-2024:1643-1
- USN-5915-1
- USN-5917-1
- USN-5934-1
- USN-5939-1
- USN-5940-1
- USN-5951-1
- USN-5982-1
- USN-5987-1
- USN-6000-1
- USN-6004-1
- USN-6056-1
- USN-6071-1
- USN-6072-1
- USN-6079-1
- USN-6091-1
- USN-6096-1
- USN-6171-1
- USN-6172-1
- USN-6175-1
- USN-6185-1
- USN-6186-1
- USN-6187-1
- USN-6207-1
- USN-6222-1
- USN-6223-1
- USN-6252-1
- USN-6256-1
- USN-6315-1
- USN-6316-1
- USN-6318-1
- USN-6321-1
- USN-6325-1
- USN-6328-1
- USN-6330-1
- USN-6332-1
- USN-6343-1
- USN-6348-1
- USN-6383-1
- USN-6385-1
- USN-6386-1
- USN-6386-2
- USN-6386-3
- USN-6387-1
- USN-6387-2
- USN-6388-1
- USN-6396-1
- USN-6396-2
- USN-6396-3
- USN-6412-1
- USN-6415-1
- USN-6416-1
- USN-6416-2
- USN-6416-3
- USN-6417-1
- USN-6439-1
- USN-6439-2
- USN-6440-1
- USN-6440-2
- USN-6440-3
- USN-6441-1
- USN-6441-2
- USN-6441-3
- USN-6442-1
- USN-6443-1
- USN-6444-1
- USN-6444-2
- USN-6445-1
- USN-6445-2
- USN-6446-1
- USN-6446-2
- USN-6446-3
- USN-6454-1
- USN-6454-2
- USN-6454-3
- USN-6454-4
- USN-6460-1
- USN-6461-1
- USN-6466-1
- USN-6479-1
- USN-6699-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=x86_64&distro=sles-15&sp=3 | suse | reiserfs-kmp-default | < 5.3.18-150300.59.138.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=s390x&distro=sles-15&sp=3 | suse | reiserfs-kmp-default | < 5.3.18-150300.59.138.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=ppc64le&distro=sles-15&sp=3 | suse | reiserfs-kmp-default | < 5.3.18-150300.59.138.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=aarch64&distro=sles-15&sp=3 | suse | reiserfs-kmp-default | < 5.3.18-150300.59.138.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-zfcpdump?arch=s390x&distro=sles-15&sp=3 | suse | kernel-zfcpdump | < 5.3.18-150300.59.138.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-15&sp=3 | suse | kernel-syms | < 5.3.18-150300.59.138.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-15&sp=3 | suse | kernel-syms | < 5.3.18-150300.59.138.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-15&sp=3 | suse | kernel-syms | < 5.3.18-150300.59.138.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-15&sp=3 | suse | kernel-syms | < 5.3.18-150300.59.138.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-15&sp=3 | suse | kernel-source | < 5.3.18-150300.59.138.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-preempt?arch=x86_64&distro=sles-15&sp=3 | suse | kernel-preempt | < 5.3.18-150300.59.138.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-preempt?arch=aarch64&distro=sles-15&sp=3 | suse | kernel-preempt | < 5.3.18-150300.59.138.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-preempt-devel?arch=x86_64&distro=sles-15&sp=3 | suse | kernel-preempt-devel | < 5.3.18-150300.59.138.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-preempt-devel?arch=aarch64&distro=sles-15&sp=3 | suse | kernel-preempt-devel | < 5.3.18-150300.59.138.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=x86_64&distro=sles-15&sp=3 | suse | kernel-obs-build | < 5.3.18-150300.59.138.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=s390x&distro=sles-15&sp=3 | suse | kernel-obs-build | < 5.3.18-150300.59.138.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=ppc64le&distro=sles-15&sp=3 | suse | kernel-obs-build | < 5.3.18-150300.59.138.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=aarch64&distro=sles-15&sp=3 | suse | kernel-obs-build | < 5.3.18-150300.59.138.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-15&sp=3 | suse | kernel-macros | < 5.3.18-150300.59.138.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-docs?arch=noarch&distro=sles-15&sp=3 | suse | kernel-docs | < 5.3.18-150300.59.138.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-15&sp=3 | suse | kernel-devel | < 5.3.18-150300.59.138.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-15&sp=3 | suse | kernel-default | < 5.3.18-150300.59.138.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=slem-5 | suse | kernel-default | < 5.3.18-150300.59.138.1 | slem-5 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-15&sp=3 | suse | kernel-default | < 5.3.18-150300.59.138.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default?arch=s390x&distro=slem-5 | suse | kernel-default | < 5.3.18-150300.59.138.1 | slem-5 | s390x | |
Affected | pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-15&sp=3 | suse | kernel-default | < 5.3.18-150300.59.138.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-15&sp=3 | suse | kernel-default | < 5.3.18-150300.59.138.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default?arch=aarch64&distro=slem-5 | suse | kernel-default | < 5.3.18-150300.59.138.1 | slem-5 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-15&sp=3 | suse | kernel-default-devel | < 5.3.18-150300.59.138.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-15&sp=3 | suse | kernel-default-devel | < 5.3.18-150300.59.138.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-15&sp=3 | suse | kernel-default-devel | < 5.3.18-150300.59.138.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-15&sp=3 | suse | kernel-default-devel | < 5.3.18-150300.59.138.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-15&sp=3 | suse | kernel-default-base | < 5.3.18-150300.59.138.1.150300.18.80.2 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=slem-5 | suse | kernel-default-base | < 5.3.18-150300.59.138.1.150300.18.80.2 | slem-5 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-15&sp=3 | suse | kernel-default-base | < 5.3.18-150300.59.138.1.150300.18.80.2 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default-base?arch=s390x&distro=slem-5 | suse | kernel-default-base | < 5.3.18-150300.59.138.1.150300.18.80.2 | slem-5 | s390x | |
Affected | pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-15&sp=3 | suse | kernel-default-base | < 5.3.18-150300.59.138.1.150300.18.80.2 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-15&sp=3 | suse | kernel-default-base | < 5.3.18-150300.59.138.1.150300.18.80.2 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=slem-5 | suse | kernel-default-base | < 5.3.18-150300.59.138.1.150300.18.80.2 | slem-5 | aarch64 | |
Affected | pkg:rpm/suse/kernel-64kb?arch=aarch64&distro=sles-15&sp=3 | suse | kernel-64kb | < 5.3.18-150300.59.138.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-64kb-devel?arch=aarch64&distro=sles-15&sp=3 | suse | kernel-64kb-devel | < 5.3.18-150300.59.138.1 | sles-15 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |