Security update for the Linux Kernel
Announcement ID: | SUSE-SU-2023:1892-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 17 vulnerabilities and has three security fixes can now be installed.
Description:
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).
- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).
- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).
- CVE-2023-28464: Fixed use-after-free that could lead to privilege escalation in hci_conn_cleanup in net/bluetooth/hci_conn.c (bsc#1209052).
- CVE-2023-0394: Fixed a null pointer dereference flaw in the network subcomponent in the Linux kernel which could lead to system crash (bsc#1207168).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1209366).
- CVE-2021-3923: Fixed stack information leak vulnerability that could lead to kernel protection bypass in infiniband RDMA (bsc#1209778).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).
- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209634).
- CVE-2023-1582: Fixed soft lockup in __page_mapcount (bsc#1209636).
- CVE-2023-28327: Fixed DoS in in_skb in unix_diag_get_exact() (bsc#1209290).
- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).
- CVE-2023-1382: Fixed denial of service in tipc_conn_close (bsc#1209288).
- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).
- CVE-2023-1078: Fixed a heap out-of-bounds write in rds_rm_zerocopy_callback (bsc#1208601).
- CVE-2023-1075: Fixed a type confusion in tls_is_tx_ready (bsc#1208598).
- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).
The following non-security bugs were fixed:
- ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168).
- net: ena: optimize data access in fast-path code (bsc#1208137).
- PCI: hv: Add a per-bus mutex state_lock (bsc#1209785).
- PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1209785).
- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1209785).
- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1209785).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Real Time Module 15-SP3
zypper in -t patch SUSE-SLE-Module-RT-15-SP3-2023-1892=1
-
SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-1892=1
-
SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-1892=1
-
SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-1892=1
Package List:
-
SUSE Real Time Module 15-SP3 (x86_64)
- kernel-rt-debugsource-5.3.18-150300.124.1
- kernel-rt-devel-debuginfo-5.3.18-150300.124.1
- kernel-rt-devel-5.3.18-150300.124.1
- ocfs2-kmp-rt-debuginfo-5.3.18-150300.124.1
- kernel-rt_debug-debugsource-5.3.18-150300.124.1
- kernel-rt_debug-debuginfo-5.3.18-150300.124.1
- cluster-md-kmp-rt-debuginfo-5.3.18-150300.124.1
- kernel-rt_debug-devel-5.3.18-150300.124.1
- kernel-syms-rt-5.3.18-150300.124.1
- dlm-kmp-rt-5.3.18-150300.124.1
- ocfs2-kmp-rt-5.3.18-150300.124.1
- cluster-md-kmp-rt-5.3.18-150300.124.1
- gfs2-kmp-rt-debuginfo-5.3.18-150300.124.1
- gfs2-kmp-rt-5.3.18-150300.124.1
- kernel-rt_debug-devel-debuginfo-5.3.18-150300.124.1
- kernel-rt-debuginfo-5.3.18-150300.124.1
- dlm-kmp-rt-debuginfo-5.3.18-150300.124.1
-
SUSE Real Time Module 15-SP3 (noarch)
- kernel-source-rt-5.3.18-150300.124.1
- kernel-devel-rt-5.3.18-150300.124.1
-
SUSE Real Time Module 15-SP3 (nosrc x86_64)
- kernel-rt-5.3.18-150300.124.1
-
SUSE Real Time Module 15-SP3 (nosrc)
- kernel-rt_debug-5.3.18-150300.124.1
-
SUSE Linux Enterprise Micro 5.1 (nosrc x86_64)
- kernel-rt-5.3.18-150300.124.1
-
SUSE Linux Enterprise Micro 5.1 (x86_64)
- kernel-rt-debugsource-5.3.18-150300.124.1
- kernel-rt-debuginfo-5.3.18-150300.124.1
-
SUSE Linux Enterprise Micro 5.2 (nosrc x86_64)
- kernel-rt-5.3.18-150300.124.1
-
SUSE Linux Enterprise Micro 5.2 (x86_64)
- kernel-rt-debugsource-5.3.18-150300.124.1
- kernel-rt-debuginfo-5.3.18-150300.124.1
-
SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64)
- kernel-rt-5.3.18-150300.124.1
-
SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
- kernel-rt-debugsource-5.3.18-150300.124.1
- kernel-rt-debuginfo-5.3.18-150300.124.1
References:
- https://www.suse.com/security/cve/CVE-2017-5753.html
- https://www.suse.com/security/cve/CVE-2021-3923.html
- https://www.suse.com/security/cve/CVE-2022-4744.html
- https://www.suse.com/security/cve/CVE-2023-0394.html
- https://www.suse.com/security/cve/CVE-2023-0461.html
- https://www.suse.com/security/cve/CVE-2023-1075.html
- https://www.suse.com/security/cve/CVE-2023-1078.html
- https://www.suse.com/security/cve/CVE-2023-1281.html
- https://www.suse.com/security/cve/CVE-2023-1382.html
- https://www.suse.com/security/cve/CVE-2023-1390.html
- https://www.suse.com/security/cve/CVE-2023-1513.html
- https://www.suse.com/security/cve/CVE-2023-1582.html
- https://www.suse.com/security/cve/CVE-2023-28327.html
- https://www.suse.com/security/cve/CVE-2023-28328.html
- https://www.suse.com/security/cve/CVE-2023-28464.html
- https://www.suse.com/security/cve/CVE-2023-28466.html
- https://www.suse.com/security/cve/CVE-2023-28772.html
- https://bugzilla.suse.com/show_bug.cgi?id=1207168
- https://bugzilla.suse.com/show_bug.cgi?id=1208137
- https://bugzilla.suse.com/show_bug.cgi?id=1208598
- https://bugzilla.suse.com/show_bug.cgi?id=1208601
- https://bugzilla.suse.com/show_bug.cgi?id=1208787
- https://bugzilla.suse.com/show_bug.cgi?id=1209052
- https://bugzilla.suse.com/show_bug.cgi?id=1209256
- https://bugzilla.suse.com/show_bug.cgi?id=1209288
- https://bugzilla.suse.com/show_bug.cgi?id=1209289
- https://bugzilla.suse.com/show_bug.cgi?id=1209290
- https://bugzilla.suse.com/show_bug.cgi?id=1209291
- https://bugzilla.suse.com/show_bug.cgi?id=1209366
- https://bugzilla.suse.com/show_bug.cgi?id=1209532
- https://bugzilla.suse.com/show_bug.cgi?id=1209547
- https://bugzilla.suse.com/show_bug.cgi?id=1209549
- https://bugzilla.suse.com/show_bug.cgi?id=1209634
- https://bugzilla.suse.com/show_bug.cgi?id=1209635
- https://bugzilla.suse.com/show_bug.cgi?id=1209636
- https://bugzilla.suse.com/show_bug.cgi?id=1209778
- https://bugzilla.suse.com/show_bug.cgi?id=1209785