Security update for the Linux Kernel
Announcement ID: | SUSE-SU-2023:0768-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 11 vulnerabilities and has five security fixes can now be installed.
Description:
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bsc#1194535).
- CVE-2022-2991: Fixed an heap-based overflow in the lightnvm implemenation (bsc#1201420).
- CVE-2022-36280: Fixed out-of-bounds memory access vulnerability found in vmwgfx driver (bsc#1203332).
- CVE-2022-38096: Fixed NULL-ptr deref in vmw_cmd_dx_define_query() (bsc#1203331).
- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. (bsc#1205711)
- CVE-2023-0045: Fixed missing Flush IBP in ib_prctl_set (bsc#1207773).
- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).
- CVE-2023-0597: Fixed a lack of randomization of per-cpu entry area in x86/mm (bsc#1207845).
- CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).
- CVE-2023-23559: Fixed integer overflow in rndis_wlan that leads to a buffer overflow (bsc#1207051).
- CVE-2023-26545: Fixed double free in net/mpls/af_mpls.c upon an allocation failure (bsc#1208700).
The following non-security bugs were fixed:
- kabi/severities: add l2tp local symbols
- module: Do not wait for GOING modules (bsc#1196058, bsc#1186449, bsc#1204356, bsc#1204662).
- net: mana: Fix IRQ name - add PCI and queue number (bsc#1207875).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-768=1
-
SUSE Linux Enterprise Live Patching 15-SP1
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2023-768=1
-
SUSE Linux Enterprise High Availability Extension 15 SP1
zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2023-768=1
-
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-768=1
-
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-768=1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP1
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-768=1
-
SUSE CaaS Platform 4.0
To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way.
Package List:
-
openSUSE Leap 15.4 (nosrc)
- kernel-default-4.12.14-150100.197.137.2
- kernel-debug-4.12.14-150100.197.137.2
- kernel-zfcpdump-4.12.14-150100.197.137.2
- kernel-kvmsmall-4.12.14-150100.197.137.2
-
openSUSE Leap 15.4 (ppc64le x86_64)
- kernel-debug-base-debuginfo-4.12.14-150100.197.137.2
- kernel-debug-base-4.12.14-150100.197.137.2
-
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
- kernel-vanilla-base-debuginfo-4.12.14-150100.197.137.2
- kernel-vanilla-devel-debuginfo-4.12.14-150100.197.137.2
- kernel-vanilla-debugsource-4.12.14-150100.197.137.2
- kernel-vanilla-livepatch-devel-4.12.14-150100.197.137.2
- kernel-vanilla-base-4.12.14-150100.197.137.2
- kernel-default-base-debuginfo-4.12.14-150100.197.137.2
- kernel-vanilla-devel-4.12.14-150100.197.137.2
- kernel-vanilla-debuginfo-4.12.14-150100.197.137.2
-
openSUSE Leap 15.4 (x86_64)
- kernel-kvmsmall-base-debuginfo-4.12.14-150100.197.137.2
- kernel-kvmsmall-base-4.12.14-150100.197.137.2
-
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
- kernel-vanilla-4.12.14-150100.197.137.2
-
openSUSE Leap 15.4 (s390x)
- kernel-zfcpdump-man-4.12.14-150100.197.137.2
- kernel-default-man-4.12.14-150100.197.137.2
-
SUSE Linux Enterprise Live Patching 15-SP1 (nosrc)
- kernel-default-4.12.14-150100.197.137.2
-
SUSE Linux Enterprise Live Patching 15-SP1 (ppc64le x86_64)
- kernel-livepatch-4_12_14-150100_197_137-default-1-150100.3.3.2
- kernel-default-debuginfo-4.12.14-150100.197.137.2
- kernel-default-livepatch-devel-4.12.14-150100.197.137.2
- kernel-default-livepatch-4.12.14-150100.197.137.2
- kernel-default-debugsource-4.12.14-150100.197.137.2
-
SUSE Linux Enterprise High Availability Extension 15 SP1 (aarch64 ppc64le s390x x86_64)
- dlm-kmp-default-debuginfo-4.12.14-150100.197.137.2
- gfs2-kmp-default-4.12.14-150100.197.137.2
- dlm-kmp-default-4.12.14-150100.197.137.2
- ocfs2-kmp-default-debuginfo-4.12.14-150100.197.137.2
- gfs2-kmp-default-debuginfo-4.12.14-150100.197.137.2
- kernel-default-debuginfo-4.12.14-150100.197.137.2
- cluster-md-kmp-default-4.12.14-150100.197.137.2
- kernel-default-debugsource-4.12.14-150100.197.137.2
- cluster-md-kmp-default-debuginfo-4.12.14-150100.197.137.2
- ocfs2-kmp-default-4.12.14-150100.197.137.2
-
SUSE Linux Enterprise High Availability Extension 15 SP1 (nosrc)
- kernel-default-4.12.14-150100.197.137.2
-
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 nosrc x86_64)
- kernel-default-4.12.14-150100.197.137.2
-
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64)
- kernel-default-debugsource-4.12.14-150100.197.137.2
- kernel-obs-build-debugsource-4.12.14-150100.197.137.2
- kernel-default-debuginfo-4.12.14-150100.197.137.2
- kernel-default-devel-4.12.14-150100.197.137.2
- kernel-default-devel-debuginfo-4.12.14-150100.197.137.2
- kernel-default-base-debuginfo-4.12.14-150100.197.137.2
- kernel-obs-build-4.12.14-150100.197.137.2
- kernel-default-base-4.12.14-150100.197.137.2
- kernel-syms-4.12.14-150100.197.137.2
-
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch)
- kernel-devel-4.12.14-150100.197.137.2
- kernel-source-4.12.14-150100.197.137.2
- kernel-macros-4.12.14-150100.197.137.2
-
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch nosrc)
- kernel-docs-4.12.14-150100.197.137.2
-
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64 nosrc)
- kernel-default-4.12.14-150100.197.137.2
-
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64)
- reiserfs-kmp-default-debuginfo-4.12.14-150100.197.137.2
- kernel-default-debugsource-4.12.14-150100.197.137.2
- kernel-obs-build-debugsource-4.12.14-150100.197.137.2
- kernel-default-debuginfo-4.12.14-150100.197.137.2
- reiserfs-kmp-default-4.12.14-150100.197.137.2
- kernel-default-devel-4.12.14-150100.197.137.2
- kernel-default-devel-debuginfo-4.12.14-150100.197.137.2
- kernel-default-base-debuginfo-4.12.14-150100.197.137.2
- kernel-obs-build-4.12.14-150100.197.137.2
- kernel-default-base-4.12.14-150100.197.137.2
- kernel-syms-4.12.14-150100.197.137.2
-
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch)
- kernel-devel-4.12.14-150100.197.137.2
- kernel-source-4.12.14-150100.197.137.2
- kernel-macros-4.12.14-150100.197.137.2
-
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch nosrc)
- kernel-docs-4.12.14-150100.197.137.2
-
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (s390x)
- kernel-zfcpdump-debuginfo-4.12.14-150100.197.137.2
- kernel-zfcpdump-debugsource-4.12.14-150100.197.137.2
- kernel-default-man-4.12.14-150100.197.137.2
-
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (nosrc)
- kernel-zfcpdump-4.12.14-150100.197.137.2
-
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (nosrc ppc64le x86_64)
- kernel-default-4.12.14-150100.197.137.2
-
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64)
- reiserfs-kmp-default-debuginfo-4.12.14-150100.197.137.2
- kernel-default-debugsource-4.12.14-150100.197.137.2
- kernel-obs-build-debugsource-4.12.14-150100.197.137.2
- kernel-default-debuginfo-4.12.14-150100.197.137.2
- reiserfs-kmp-default-4.12.14-150100.197.137.2
- kernel-default-devel-4.12.14-150100.197.137.2
- kernel-default-devel-debuginfo-4.12.14-150100.197.137.2
- kernel-default-base-debuginfo-4.12.14-150100.197.137.2
- kernel-obs-build-4.12.14-150100.197.137.2
- kernel-default-base-4.12.14-150100.197.137.2
- kernel-syms-4.12.14-150100.197.137.2
-
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch)
- kernel-devel-4.12.14-150100.197.137.2
- kernel-source-4.12.14-150100.197.137.2
- kernel-macros-4.12.14-150100.197.137.2
-
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch nosrc)
- kernel-docs-4.12.14-150100.197.137.2
-
SUSE CaaS Platform 4.0 (nosrc x86_64)
- kernel-default-4.12.14-150100.197.137.2
-
SUSE CaaS Platform 4.0 (x86_64)
- reiserfs-kmp-default-debuginfo-4.12.14-150100.197.137.2
- kernel-default-debugsource-4.12.14-150100.197.137.2
- kernel-obs-build-debugsource-4.12.14-150100.197.137.2
- kernel-default-debuginfo-4.12.14-150100.197.137.2
- reiserfs-kmp-default-4.12.14-150100.197.137.2
- kernel-default-devel-4.12.14-150100.197.137.2
- kernel-default-devel-debuginfo-4.12.14-150100.197.137.2
- kernel-default-base-debuginfo-4.12.14-150100.197.137.2
- kernel-obs-build-4.12.14-150100.197.137.2
- kernel-default-base-4.12.14-150100.197.137.2
- kernel-syms-4.12.14-150100.197.137.2
-
SUSE CaaS Platform 4.0 (noarch)
- kernel-devel-4.12.14-150100.197.137.2
- kernel-source-4.12.14-150100.197.137.2
- kernel-macros-4.12.14-150100.197.137.2
-
SUSE CaaS Platform 4.0 (noarch nosrc)
- kernel-docs-4.12.14-150100.197.137.2
References:
- https://www.suse.com/security/cve/CVE-2021-4203.html
- https://www.suse.com/security/cve/CVE-2022-2991.html
- https://www.suse.com/security/cve/CVE-2022-36280.html
- https://www.suse.com/security/cve/CVE-2022-38096.html
- https://www.suse.com/security/cve/CVE-2022-4129.html
- https://www.suse.com/security/cve/CVE-2023-0045.html
- https://www.suse.com/security/cve/CVE-2023-0590.html
- https://www.suse.com/security/cve/CVE-2023-0597.html
- https://www.suse.com/security/cve/CVE-2023-1118.html
- https://www.suse.com/security/cve/CVE-2023-23559.html
- https://www.suse.com/security/cve/CVE-2023-26545.html
- https://bugzilla.suse.com/show_bug.cgi?id=1186449
- https://bugzilla.suse.com/show_bug.cgi?id=1194535
- https://bugzilla.suse.com/show_bug.cgi?id=1201420
- https://bugzilla.suse.com/show_bug.cgi?id=1203331
- https://bugzilla.suse.com/show_bug.cgi?id=1203332
- https://bugzilla.suse.com/show_bug.cgi?id=1204356
- https://bugzilla.suse.com/show_bug.cgi?id=1204662
- https://bugzilla.suse.com/show_bug.cgi?id=1205711
- https://bugzilla.suse.com/show_bug.cgi?id=1207051
- https://bugzilla.suse.com/show_bug.cgi?id=1207773
- https://bugzilla.suse.com/show_bug.cgi?id=1207795
- https://bugzilla.suse.com/show_bug.cgi?id=1207845
- https://bugzilla.suse.com/show_bug.cgi?id=1207875
- https://bugzilla.suse.com/show_bug.cgi?id=1208700
- https://bugzilla.suse.com/show_bug.cgi?id=1208837
- https://bugzilla.suse.com/show_bug.cgi?id=1209188