Security update for the Linux Kernel
Announcement ID: | SUSE-SU-2023:2147-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 15 vulnerabilities and has five security fixes can now be installed.
Description:
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-2124: Fixed an out of bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).
- CVE-2023-1872:Fixed a use after free vulnerability in the io_uring subsystem, which could lead to local privilege escalation (bsc#1210414).
- CVE-2022-2196: Fixed a regression related to KVM that allowed for speculative execution attacks (bsc#1206992).
- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).
- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).
- CVE-2023-2176: A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege (bsc#1210629).
- CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).
- CVE-2023-30772: Fixed a race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).
- CVE-2023-2008: A flaw was found in the fault handler of the udmabuf device driver. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code (bsc#1210453).
- CVE-2023-1855: Fixed a use after free in xgene_hwmon_remove (bsc#1210202).
- CVE-2020-36691: Fixed a denial of service vulnerability via a nested Netlink policy with a back reference (bsc#1209777).
- CVE-2023-1990: Fixed a use after free in ndlc_remove (bsc#1210337).
- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).
- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).
- CVE-2023-1838: Fixed an use-after-free flaw in virtio network subcomponent. This flaw could allow a local attacker to crash the system and lead to a kernel information leak problem. (bsc#1210203).
The following non-security bugs were fixed:
- Drivers: vmbus: Check for channel allocation before looking up relids (git-fixes).
- cifs: fix negotiate context parsing (bsc#1210301).
- keys: Fix linking a duplicate key to a keyring's assoc_array (bsc#1207088).
- vmxnet3: use gro callback when UPT is enabled (bsc#1209739).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Real Time Module 15-SP3
zypper in -t patch SUSE-SLE-Module-RT-15-SP3-2023-2147=1
-
SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-2147=1
-
SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-2147=1
-
SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-2147=1
Package List:
-
SUSE Real Time Module 15-SP3 (x86_64)
- ocfs2-kmp-rt-debuginfo-5.3.18-150300.127.1
- dlm-kmp-rt-5.3.18-150300.127.1
- kernel-rt-debuginfo-5.3.18-150300.127.1
- kernel-rt_debug-devel-5.3.18-150300.127.1
- gfs2-kmp-rt-debuginfo-5.3.18-150300.127.1
- kernel-rt_debug-devel-debuginfo-5.3.18-150300.127.1
- kernel-rt_debug-debuginfo-5.3.18-150300.127.1
- dlm-kmp-rt-debuginfo-5.3.18-150300.127.1
- kernel-rt-debugsource-5.3.18-150300.127.1
- kernel-rt-devel-5.3.18-150300.127.1
- cluster-md-kmp-rt-debuginfo-5.3.18-150300.127.1
- kernel-rt_debug-debugsource-5.3.18-150300.127.1
- kernel-syms-rt-5.3.18-150300.127.1
- cluster-md-kmp-rt-5.3.18-150300.127.1
- ocfs2-kmp-rt-5.3.18-150300.127.1
- gfs2-kmp-rt-5.3.18-150300.127.1
- kernel-rt-devel-debuginfo-5.3.18-150300.127.1
-
SUSE Real Time Module 15-SP3 (noarch)
- kernel-source-rt-5.3.18-150300.127.1
- kernel-devel-rt-5.3.18-150300.127.1
-
SUSE Real Time Module 15-SP3 (nosrc x86_64)
- kernel-rt-5.3.18-150300.127.1
-
SUSE Real Time Module 15-SP3 (nosrc)
- kernel-rt_debug-5.3.18-150300.127.1
-
SUSE Linux Enterprise Micro 5.1 (nosrc x86_64)
- kernel-rt-5.3.18-150300.127.1
-
SUSE Linux Enterprise Micro 5.1 (x86_64)
- kernel-rt-debuginfo-5.3.18-150300.127.1
- kernel-rt-debugsource-5.3.18-150300.127.1
-
SUSE Linux Enterprise Micro 5.2 (nosrc x86_64)
- kernel-rt-5.3.18-150300.127.1
-
SUSE Linux Enterprise Micro 5.2 (x86_64)
- kernel-rt-debuginfo-5.3.18-150300.127.1
- kernel-rt-debugsource-5.3.18-150300.127.1
-
SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64)
- kernel-rt-5.3.18-150300.127.1
-
SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
- kernel-rt-debuginfo-5.3.18-150300.127.1
- kernel-rt-debugsource-5.3.18-150300.127.1
References:
- https://www.suse.com/security/cve/CVE-2020-36691.html
- https://www.suse.com/security/cve/CVE-2022-2196.html
- https://www.suse.com/security/cve/CVE-2023-1611.html
- https://www.suse.com/security/cve/CVE-2023-1670.html
- https://www.suse.com/security/cve/CVE-2023-1838.html
- https://www.suse.com/security/cve/CVE-2023-1855.html
- https://www.suse.com/security/cve/CVE-2023-1872.html
- https://www.suse.com/security/cve/CVE-2023-1989.html
- https://www.suse.com/security/cve/CVE-2023-1990.html
- https://www.suse.com/security/cve/CVE-2023-1998.html
- https://www.suse.com/security/cve/CVE-2023-2008.html
- https://www.suse.com/security/cve/CVE-2023-2124.html
- https://www.suse.com/security/cve/CVE-2023-2162.html
- https://www.suse.com/security/cve/CVE-2023-2176.html
- https://www.suse.com/security/cve/CVE-2023-30772.html
- https://bugzilla.suse.com/show_bug.cgi?id=1202353
- https://bugzilla.suse.com/show_bug.cgi?id=1206992
- https://bugzilla.suse.com/show_bug.cgi?id=1207088
- https://bugzilla.suse.com/show_bug.cgi?id=1209687
- https://bugzilla.suse.com/show_bug.cgi?id=1209739
- https://bugzilla.suse.com/show_bug.cgi?id=1209777
- https://bugzilla.suse.com/show_bug.cgi?id=1209871
- https://bugzilla.suse.com/show_bug.cgi?id=1210202
- https://bugzilla.suse.com/show_bug.cgi?id=1210203
- https://bugzilla.suse.com/show_bug.cgi?id=1210301
- https://bugzilla.suse.com/show_bug.cgi?id=1210329
- https://bugzilla.suse.com/show_bug.cgi?id=1210336
- https://bugzilla.suse.com/show_bug.cgi?id=1210337
- https://bugzilla.suse.com/show_bug.cgi?id=1210414
- https://bugzilla.suse.com/show_bug.cgi?id=1210453
- https://bugzilla.suse.com/show_bug.cgi?id=1210469
- https://bugzilla.suse.com/show_bug.cgi?id=1210498
- https://bugzilla.suse.com/show_bug.cgi?id=1210506
- https://bugzilla.suse.com/show_bug.cgi?id=1210629
- https://bugzilla.suse.com/show_bug.cgi?id=1210647