[SUSE-SU-2023:4142-1] Security update for the Linux Kernel

Severity Important
Affected Packages 1
CVEs 13

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2023-4389: Fixed a reference counting issue in the Btrfs filesystem that could be exploited in order to leak internal kernel information or crash the system (bsc#1214351).
  • CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter subsystem. This issue may have allowed a local user to crash the system or potentially escalate their privileges (bsc#1215150).
  • CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95% (bsc#1212703).
  • CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalatio (bsc#1215275).
  • CVE-2023-4004: Fixed improper element removal netfilter nft_set_pipapo (bsc#1213812).
  • CVE-2023-4622: Fixed a use-after-free vulnerability in the Unix domain sockets component which could be exploited to achieve local privilege escalation (bsc#1215117).
  • CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215115).
  • CVE-2020-36766: Fixed a potential information leak in in the CEC driver (bsc#1215299).
  • CVE-2023-1859: Fixed a use-after-free flaw in Xen transport for 9pfs which could be exploited to crash the system (bsc#1210169).
  • CVE-2023-2177: Fixed a null pointer dereference issue in the sctp network protocol which could allow a user to crash the system (bsc#1210643).
  • CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).
  • CVE-2023-40283: Fixed use-after-free in l2cap_sock_ready_cb (bsc#1214233).
  • CVE-2023-1192: Fixed use-after-free in cifs_demultiplex_thread() (bsc#1208995).

The following non-security bugs were fixed:

  • bnx2x: new flag for track HW resource allocation (bsc#1202845 bsc#1215322).
  • check-for-config-changes: ignore BUILTIN_RETURN_ADDRESS_STRIPS_PAC (bsc#1214380). gcc7 on SLE 15 does not support this while later gcc does.
  • locking/rwsem: Disable reader optimistic spinning (bnc#1176588).
  • mkspec: Allow unsupported KMPs (bsc#1214386)
  • scsi: qedf: Add synchronization between I/O completions and abort (bsc#1210658).
  • x86/pkeys: Revert a5eff7259790 ('x86/pkeys: Add PKRU value to init_fpstate') (bsc#1215356).
  • x86/srso: Do not probe microcode in a guest (git-fixes).
  • x86/srso: Fix SBPB enablement for spec_rstack_overflow=off (git-fixes).
  • x86/srso: Fix srso_show_state() side effect (git-fixes).
  • x86/srso: Set CPUID feature bits independently of bug or mitigation status (git-fixes).
Package Affected Version
pkg:rpm/suse/kernel-rt?arch=x86_64&distro=slem-5 < 5.3.18-150300.144.1
ID
SUSE-SU-2023:4142-1
Severity
important
URL
https://www.suse.com/support/update/announcement/2023/suse-su-20234142-1/
Published
2023-10-20T09:35:16
(11 months ago)
Modified
2023-10-20T09:35:16
(11 months ago)
Rights
Copyright 2024 SUSE LLC. All rights reserved.
Other Advisories
Source # ID Name URL
Suse SUSE ratings https://www.suse.com/support/security/rating/
Suse URL of this CSAF notice https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4142-1.json
Suse URL for SUSE-SU-2023:4142-1 https://www.suse.com/support/update/announcement/2023/suse-su-20234142-1/
Suse E-Mail link for SUSE-SU-2023:4142-1 https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html
Bugzilla SUSE Bug 1176588 https://bugzilla.suse.com/1176588
Bugzilla SUSE Bug 1202845 https://bugzilla.suse.com/1202845
Bugzilla SUSE Bug 1207270 https://bugzilla.suse.com/1207270
Bugzilla SUSE Bug 1208995 https://bugzilla.suse.com/1208995
Bugzilla SUSE Bug 1210169 https://bugzilla.suse.com/1210169
Bugzilla SUSE Bug 1210643 https://bugzilla.suse.com/1210643
Bugzilla SUSE Bug 1210658 https://bugzilla.suse.com/1210658
Bugzilla SUSE Bug 1212703 https://bugzilla.suse.com/1212703
Bugzilla SUSE Bug 1213812 https://bugzilla.suse.com/1213812
Bugzilla SUSE Bug 1214233 https://bugzilla.suse.com/1214233
Bugzilla SUSE Bug 1214351 https://bugzilla.suse.com/1214351
Bugzilla SUSE Bug 1214380 https://bugzilla.suse.com/1214380
Bugzilla SUSE Bug 1214386 https://bugzilla.suse.com/1214386
Bugzilla SUSE Bug 1215115 https://bugzilla.suse.com/1215115
Bugzilla SUSE Bug 1215117 https://bugzilla.suse.com/1215117
Bugzilla SUSE Bug 1215150 https://bugzilla.suse.com/1215150
Bugzilla SUSE Bug 1215221 https://bugzilla.suse.com/1215221
Bugzilla SUSE Bug 1215275 https://bugzilla.suse.com/1215275
Bugzilla SUSE Bug 1215299 https://bugzilla.suse.com/1215299
Bugzilla SUSE Bug 1215322 https://bugzilla.suse.com/1215322
Bugzilla SUSE Bug 1215356 https://bugzilla.suse.com/1215356
CVE SUSE CVE CVE-2020-36766 page https://www.suse.com/security/cve/CVE-2020-36766/
CVE SUSE CVE CVE-2023-1192 page https://www.suse.com/security/cve/CVE-2023-1192/
CVE SUSE CVE CVE-2023-1206 page https://www.suse.com/security/cve/CVE-2023-1206/
CVE SUSE CVE CVE-2023-1859 page https://www.suse.com/security/cve/CVE-2023-1859/
CVE SUSE CVE CVE-2023-2177 page https://www.suse.com/security/cve/CVE-2023-2177/
CVE SUSE CVE CVE-2023-4004 page https://www.suse.com/security/cve/CVE-2023-4004/
CVE SUSE CVE CVE-2023-40283 page https://www.suse.com/security/cve/CVE-2023-40283/
CVE SUSE CVE CVE-2023-42753 page https://www.suse.com/security/cve/CVE-2023-42753/
CVE SUSE CVE CVE-2023-4389 page https://www.suse.com/security/cve/CVE-2023-4389/
CVE SUSE CVE CVE-2023-4622 page https://www.suse.com/security/cve/CVE-2023-4622/
CVE SUSE CVE CVE-2023-4623 page https://www.suse.com/security/cve/CVE-2023-4623/
CVE SUSE CVE CVE-2023-4881 page https://www.suse.com/security/cve/CVE-2023-4881/
CVE SUSE CVE CVE-2023-4921 page https://www.suse.com/security/cve/CVE-2023-4921/
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/kernel-rt?arch=x86_64&distro=slem-5 suse kernel-rt < 5.3.18-150300.144.1 slem-5 x86_64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...