Security update for the Linux Kernel
Announcement ID: | SUSE-SU-2023:0852-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves nine vulnerabilities and has two security fixes can now be installed.
Description:
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. (bsc#1205711)
- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bsc#1194535).
- CVE-2023-23559: Fixed integer overflow in rndis_wlan that leads to a buffer overflow (bsc#1207051).
- CVE-2023-26545: Fixed double free in net/mpls/af_mpls.c upon an allocation failure (bsc#1208700).
- CVE-2022-38096: Fixed NULL-ptr deref in vmw_cmd_dx_define_query() (bsc#1203331).
- CVE-2022-36280: Fixed out-of-bounds memory access vulnerability found in vmwgfx driver (bsc#1203332).
- CVE-2023-0045: Fixed missing Flush IBP in ib_prctl_set (bsc#1207773).
- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).
- CVE-2022-2991: Fixed an heap-based overflow in the lightnvm implemenation (bsc#1201420).
The following non-security bugs were fixed:
- kabi/severities: add l2tp local symbols
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE OpenStack Cloud 9
zypper in -t patch SUSE-OpenStack-Cloud-9-2023-852=1
-
SUSE OpenStack Cloud Crowbar 9
zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2023-852=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP4
zypper in -t patch SUSE-SLE-HA-12-SP4-2023-852=1 SUSE-SLE-SAP-12-SP4-2023-852=1
-
SUSE Linux Enterprise High Availability Extension 12 SP4
zypper in -t patch SUSE-SLE-HA-12-SP4-2023-852=1
-
SUSE Linux Enterprise Live Patching 12-SP4
zypper in -t patch SUSE-SLE-Live-Patching-12-SP4-2023-852=1
-
SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4
zypper in -t patch SUSE-SLE-SERVER-12-SP4-ESPOS-2023-852=1
-
SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4
zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2023-852=1
Package List:
-
SUSE OpenStack Cloud 9 (noarch)
- kernel-devel-4.12.14-95.120.4
- kernel-macros-4.12.14-95.120.4
- kernel-source-4.12.14-95.120.4
-
SUSE OpenStack Cloud 9 (nosrc x86_64)
- kernel-default-4.12.14-95.120.4
-
SUSE OpenStack Cloud 9 (x86_64)
- kernel-syms-4.12.14-95.120.4
- kernel-default-debugsource-4.12.14-95.120.4
- kernel-default-base-debuginfo-4.12.14-95.120.4
- kernel-default-debuginfo-4.12.14-95.120.4
- kernel-default-devel-debuginfo-4.12.14-95.120.4
- kernel-default-devel-4.12.14-95.120.4
- kernel-default-base-4.12.14-95.120.4
-
SUSE OpenStack Cloud Crowbar 9 (nosrc x86_64)
- kernel-default-4.12.14-95.120.4
-
SUSE OpenStack Cloud Crowbar 9 (x86_64)
- kernel-syms-4.12.14-95.120.4
- kernel-default-debugsource-4.12.14-95.120.4
- kernel-default-base-debuginfo-4.12.14-95.120.4
- kernel-default-debuginfo-4.12.14-95.120.4
- kernel-default-devel-debuginfo-4.12.14-95.120.4
- kernel-default-devel-4.12.14-95.120.4
- kernel-default-base-4.12.14-95.120.4
-
SUSE OpenStack Cloud Crowbar 9 (noarch)
- kernel-devel-4.12.14-95.120.4
- kernel-macros-4.12.14-95.120.4
- kernel-source-4.12.14-95.120.4
-
SUSE Linux Enterprise Server for SAP Applications 12 SP4 (ppc64le x86_64)
- dlm-kmp-default-4.12.14-95.120.4
- kernel-syms-4.12.14-95.120.4
- dlm-kmp-default-debuginfo-4.12.14-95.120.4
- kernel-default-base-4.12.14-95.120.4
- kernel-default-debugsource-4.12.14-95.120.4
- cluster-md-kmp-default-debuginfo-4.12.14-95.120.4
- ocfs2-kmp-default-4.12.14-95.120.4
- kernel-default-base-debuginfo-4.12.14-95.120.4
- kernel-default-debuginfo-4.12.14-95.120.4
- cluster-md-kmp-default-4.12.14-95.120.4
- ocfs2-kmp-default-debuginfo-4.12.14-95.120.4
- gfs2-kmp-default-debuginfo-4.12.14-95.120.4
- kernel-default-devel-4.12.14-95.120.4
- gfs2-kmp-default-4.12.14-95.120.4
-
SUSE Linux Enterprise Server for SAP Applications 12 SP4 (nosrc ppc64le x86_64)
- kernel-default-4.12.14-95.120.4
-
SUSE Linux Enterprise Server for SAP Applications 12 SP4 (noarch)
- kernel-devel-4.12.14-95.120.4
- kernel-macros-4.12.14-95.120.4
- kernel-source-4.12.14-95.120.4
-
SUSE Linux Enterprise Server for SAP Applications 12 SP4 (x86_64)
- kernel-default-devel-debuginfo-4.12.14-95.120.4
-
SUSE Linux Enterprise High Availability Extension 12 SP4 (ppc64le s390x x86_64)
- dlm-kmp-default-4.12.14-95.120.4
- dlm-kmp-default-debuginfo-4.12.14-95.120.4
- kernel-default-debugsource-4.12.14-95.120.4
- cluster-md-kmp-default-debuginfo-4.12.14-95.120.4
- ocfs2-kmp-default-4.12.14-95.120.4
- kernel-default-debuginfo-4.12.14-95.120.4
- cluster-md-kmp-default-4.12.14-95.120.4
- ocfs2-kmp-default-debuginfo-4.12.14-95.120.4
- gfs2-kmp-default-debuginfo-4.12.14-95.120.4
- gfs2-kmp-default-4.12.14-95.120.4
-
SUSE Linux Enterprise High Availability Extension 12 SP4 (nosrc)
- kernel-default-4.12.14-95.120.4
-
SUSE Linux Enterprise Live Patching 12-SP4 (nosrc)
- kernel-default-4.12.14-95.120.4
-
SUSE Linux Enterprise Live Patching 12-SP4 (ppc64le s390x x86_64)
- kernel-default-kgraft-devel-4.12.14-95.120.4
- kernel-default-kgraft-4.12.14-95.120.4
- kgraft-patch-4_12_14-95_120-default-1-6.3.4
-
SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (aarch64 nosrc x86_64)
- kernel-default-4.12.14-95.120.4
-
SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (aarch64 x86_64)
- kernel-syms-4.12.14-95.120.4
- kernel-default-debugsource-4.12.14-95.120.4
- kernel-default-base-debuginfo-4.12.14-95.120.4
- kernel-default-debuginfo-4.12.14-95.120.4
- kernel-default-devel-4.12.14-95.120.4
- kernel-default-base-4.12.14-95.120.4
-
SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (noarch)
- kernel-devel-4.12.14-95.120.4
- kernel-macros-4.12.14-95.120.4
- kernel-source-4.12.14-95.120.4
-
SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (x86_64)
- kernel-default-devel-debuginfo-4.12.14-95.120.4
-
SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (aarch64 ppc64le s390x x86_64 nosrc)
- kernel-default-4.12.14-95.120.4
-
SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (aarch64 ppc64le s390x x86_64)
- kernel-syms-4.12.14-95.120.4
- kernel-default-debugsource-4.12.14-95.120.4
- kernel-default-base-debuginfo-4.12.14-95.120.4
- kernel-default-debuginfo-4.12.14-95.120.4
- kernel-default-devel-4.12.14-95.120.4
- kernel-default-base-4.12.14-95.120.4
-
SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (noarch)
- kernel-devel-4.12.14-95.120.4
- kernel-macros-4.12.14-95.120.4
- kernel-source-4.12.14-95.120.4
-
SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (s390x)
- kernel-default-man-4.12.14-95.120.4
-
SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (x86_64)
- kernel-default-devel-debuginfo-4.12.14-95.120.4
References:
- https://www.suse.com/security/cve/CVE-2021-4203.html
- https://www.suse.com/security/cve/CVE-2022-2991.html
- https://www.suse.com/security/cve/CVE-2022-36280.html
- https://www.suse.com/security/cve/CVE-2022-38096.html
- https://www.suse.com/security/cve/CVE-2022-4129.html
- https://www.suse.com/security/cve/CVE-2023-0045.html
- https://www.suse.com/security/cve/CVE-2023-0590.html
- https://www.suse.com/security/cve/CVE-2023-23559.html
- https://www.suse.com/security/cve/CVE-2023-26545.html
- https://bugzilla.suse.com/show_bug.cgi?id=1191881
- https://bugzilla.suse.com/show_bug.cgi?id=1194535
- https://bugzilla.suse.com/show_bug.cgi?id=1201420
- https://bugzilla.suse.com/show_bug.cgi?id=1203331
- https://bugzilla.suse.com/show_bug.cgi?id=1203332
- https://bugzilla.suse.com/show_bug.cgi?id=1205711
- https://bugzilla.suse.com/show_bug.cgi?id=1207051
- https://bugzilla.suse.com/show_bug.cgi?id=1207773
- https://bugzilla.suse.com/show_bug.cgi?id=1207795
- https://bugzilla.suse.com/show_bug.cgi?id=1208700
- https://bugzilla.suse.com/show_bug.cgi?id=1209188