[SUSE-SU-2024:0112-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
14
CVEs
13
Security update for the Linux Kernel
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237).
- CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762).
- CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table which could be exploited by network adjacent attackers, increasing CPU usage by 95% (bsc#1212703).
- CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd->erasesize) that could cause a local DoS (bsc#1210778).
- CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051).
- CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure (bsc#1216046).
- CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858).
- CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559).
- CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947).
- CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253).
- ID
- SUSE-SU-2024:0112-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2024/suse-su-20240112-1/
- Published
-
2024-01-16T12:29:23
(8 months ago) - Modified
-
2024-01-16T12:29:23
(8 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2023-1773
- ALAS-2023-1776
- ALAS-2023-1838
- ALAS-2024-1899
- ALAS-2024-1906
- ALAS2-2023-2100
- ALAS2-2023-2108
- ALAS2-2023-2264
- ALAS2-2024-2391
- ALAS2-2024-2418
- ALSA-2023:7077
- ALSA-2024:0897
- ALSA-2024:3138
- ALSA-2024:4211
- ASB-A-174626251
- DSA-5480-1
- DSA-5492-1
- DSA-5593-1
- DSA-5594-1
- ELSA-2023-12206
- ELSA-2023-12207
- ELSA-2023-13019
- ELSA-2023-6583
- ELSA-2023-7077
- ELSA-2024-0897
- ELSA-2024-12110
- ELSA-2024-12150
- ELSA-2024-12151
- ELSA-2024-12153
- ELSA-2024-12154
- ELSA-2024-12159
- ELSA-2024-12169
- ELSA-2024-12258
- ELSA-2024-1248
- ELSA-2024-2394
- ELSA-2024-3138
- ELSA-2024-4211
- FEDORA-2021-a35b44fd9f
- RHSA-2023:6901
- RHSA-2023:7077
- RHSA-2024:0881
- RHSA-2024:0897
- RHSA-2024:2950
- RHSA-2024:3138
- RHSA-2024:4211
- RHSA-2024:4352
- RLSA-2024:3138
- RLSA-2024:4211
- SSA:2023-325-01
- SUSE-SU-2023:2500-1
- SUSE-SU-2023:2501-1
- SUSE-SU-2023:2502-1
- SUSE-SU-2023:2507-1
- SUSE-SU-2023:2534-1
- SUSE-SU-2023:2537-1
- SUSE-SU-2023:2538-1
- SUSE-SU-2023:2611-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2651-1
- SUSE-SU-2023:2653-1
- SUSE-SU-2023:2782-1
- SUSE-SU-2023:2803-1
- SUSE-SU-2023:2804-1
- SUSE-SU-2023:2805-1
- SUSE-SU-2023:2808-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2820-1
- SUSE-SU-2023:2822-1
- SUSE-SU-2023:2830-1
- SUSE-SU-2023:2831-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:2892-1
- SUSE-SU-2023:3302-1
- SUSE-SU-2023:4030-1
- SUSE-SU-2023:4031-1
- SUSE-SU-2023:4032-1
- SUSE-SU-2023:4033-1
- SUSE-SU-2023:4035-1
- SUSE-SU-2023:4057-1
- SUSE-SU-2023:4058-1
- SUSE-SU-2023:4071-1
- SUSE-SU-2023:4072-1
- SUSE-SU-2023:4072-2
- SUSE-SU-2023:4093-1
- SUSE-SU-2023:4095-1
- SUSE-SU-2023:4142-1
- SUSE-SU-2023:4343-1
- SUSE-SU-2023:4345-1
- SUSE-SU-2023:4346-1
- SUSE-SU-2023:4347-1
- SUSE-SU-2023:4348-1
- SUSE-SU-2023:4349-1
- SUSE-SU-2023:4351-1
- SUSE-SU-2023:4358-1
- SUSE-SU-2023:4359-1
- SUSE-SU-2023:4375-1
- SUSE-SU-2023:4377-1
- SUSE-SU-2023:4378-1
- SUSE-SU-2023:4414-1
- SUSE-SU-2023:4730-1
- SUSE-SU-2023:4731-1
- SUSE-SU-2023:4732-1
- SUSE-SU-2023:4733-1
- SUSE-SU-2023:4734-1
- SUSE-SU-2023:4735-1
- SUSE-SU-2023:4782-1
- SUSE-SU-2023:4783-1
- SUSE-SU-2023:4784-1
- SUSE-SU-2023:4810-1
- SUSE-SU-2023:4811-1
- SUSE-SU-2023:4882-1
- SUSE-SU-2023:4883-1
- SUSE-SU-2024:0110-1
- SUSE-SU-2024:0113-1
- SUSE-SU-2024:0115-1
- SUSE-SU-2024:0117-1
- SUSE-SU-2024:0118-1
- SUSE-SU-2024:0120-1
- SUSE-SU-2024:0129-1
- SUSE-SU-2024:0141-1
- SUSE-SU-2024:0153-1
- SUSE-SU-2024:0154-1
- SUSE-SU-2024:0156-1
- SUSE-SU-2024:0160-1
- SUSE-SU-2024:0331-1
- SUSE-SU-2024:0339-1
- SUSE-SU-2024:0344-1
- SUSE-SU-2024:0347-1
- SUSE-SU-2024:0348-1
- SUSE-SU-2024:0351-1
- SUSE-SU-2024:0352-1
- SUSE-SU-2024:0358-1
- SUSE-SU-2024:0362-1
- SUSE-SU-2024:0373-1
- SUSE-SU-2024:0376-1
- SUSE-SU-2024:0378-1
- SUSE-SU-2024:0380-1
- SUSE-SU-2024:0389-1
- SUSE-SU-2024:0393-1
- SUSE-SU-2024:0395-1
- SUSE-SU-2024:0409-1
- SUSE-SU-2024:0411-1
- SUSE-SU-2024:0414-1
- SUSE-SU-2024:0418-1
- SUSE-SU-2024:0421-1
- SUSE-SU-2024:0428-1
- SUSE-SU-2024:0429-1
- SUSE-SU-2024:0986-1
- SUSE-SU-2024:0989-1
- SUSE-SU-2024:0991-1
- SUSE-SU-2024:0995-1
- SUSE-SU-2024:1017-1
- SUSE-SU-2024:1023-1
- SUSE-SU-2024:1025-1
- SUSE-SU-2024:1028-1
- SUSE-SU-2024:1039-1
- SUSE-SU-2024:1040-1
- SUSE-SU-2024:1045-1
- SUSE-SU-2024:1047-1
- SUSE-SU-2024:1053-1
- SUSE-SU-2024:1063-1
- SUSE-SU-2024:1072-1
- SUSE-SU-2024:1097-1
- SUSE-SU-2024:1153-1
- USN-5343-1
- USN-6221-1
- USN-6252-1
- USN-6284-1
- USN-6301-1
- USN-6312-1
- USN-6314-1
- USN-6331-1
- USN-6337-1
- USN-6343-1
- USN-6385-1
- USN-6412-1
- USN-6416-1
- USN-6416-2
- USN-6416-3
- USN-6417-1
- USN-6439-1
- USN-6439-2
- USN-6440-1
- USN-6440-2
- USN-6440-3
- USN-6445-1
- USN-6445-2
- USN-6460-1
- USN-6461-1
- USN-6466-1
- USN-6494-1
- USN-6494-2
- USN-6495-1
- USN-6495-2
- USN-6496-1
- USN-6496-2
- USN-6502-1
- USN-6502-2
- USN-6502-3
- USN-6502-4
- USN-6503-1
- USN-6516-1
- USN-6520-1
- USN-6532-1
- USN-6534-1
- USN-6534-2
- USN-6534-3
- USN-6536-1
- USN-6537-1
- USN-6548-1
- USN-6548-2
- USN-6548-3
- USN-6548-4
- USN-6548-5
- USN-6549-1
- USN-6549-2
- USN-6549-3
- USN-6549-4
- USN-6549-5
- USN-6572-1
- USN-6573-1
- USN-6577-1
- USN-6601-1
- USN-6602-1
- USN-6603-1
- USN-6604-1
- USN-6604-2
- USN-6605-1
- USN-6605-2
- USN-6606-1
- USN-6607-1
- USN-6608-1
- USN-6608-2
- USN-6609-1
- USN-6609-2
- USN-6609-3
- USN-6625-1
- USN-6625-2
- USN-6625-3
- USN-6628-1
- USN-6628-2
- USN-6635-1
- USN-6639-1
- USN-6680-1
- USN-6680-2
- USN-6680-3
- USN-6681-1
- USN-6681-2
- USN-6681-3
- USN-6681-4
- USN-6686-1
- USN-6686-2
- USN-6686-3
- USN-6686-4
- USN-6686-5
- USN-6700-1
- USN-6700-2
- USN-6701-1
- USN-6701-2
- USN-6701-3
- USN-6701-4
- USN-6705-1
- USN-6716-1
- USN-6739-1
- USN-6740-1
- VU:799380
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kernel-xen?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-xen | < 3.0.101-108.150.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-xen-devel?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-xen-devel | < 3.0.101-108.150.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-xen-base?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-xen-base | < 3.0.101-108.150.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-trace?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-trace | < 3.0.101-108.150.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-trace-devel?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-trace-devel | < 3.0.101-108.150.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-trace-base?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-trace-base | < 3.0.101-108.150.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-syms | < 3.0.101-108.150.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-source?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-source | < 3.0.101-108.150.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-ec2?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-ec2 | < 3.0.101-108.150.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-ec2-devel?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-ec2-devel | < 3.0.101-108.150.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-ec2-base?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-ec2-base | < 3.0.101-108.150.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-default | < 3.0.101-108.150.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-default-devel | < 3.0.101-108.150.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-11&sp=4 | suse | kernel-default-base | < 3.0.101-108.150.1 | sles-11 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |