SUSE-SU-2023:0420-1

Source
https://www.suse.com/support/update/announcement/2023/suse-su-20230420-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:0420-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2023:0420-1
Related
Published
2023-02-15T11:01:11Z
Modified
2025-05-02T04:30:02.007539Z
Upstream
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2018-9517: Fixed possible memory corruption due to a use after free in pppol2tp_connect (bsc#1108488).
  • CVE-2022-3564: Fixed use-after-free in l2cap_core.c of the Bluetooth component (bsc#1206073).
  • CVE-2022-3643: Fixed reset/abort/crash via netback from VM guest (bsc#1206113).
  • CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2capcore.c's l2capparseconfreq() which can be used to leak kernel pointers remotely (bsc#1205705).
  • CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2capcore.c's l2capconnect() and l2capleconnect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).
  • CVE-2022-4662: Fixed incorrect access control in the USB core subsystem that could lead a local user to crash the system (bsc#1206664).
  • CVE-2022-47929: Fixed NULL pointer dereference bug in the traffic control subsystem (bsc#1207237).
  • CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).
  • CVE-2023-23455: Fixed a denial of service inside atmtcenqueue in net/sched/schatm.c because of type confusion (non-negative numbers can sometimes indicate a TCACT_SHOT condition rather than valid classification results) (bsc#1207125).

The following non-security bugs were fixed:

  • HID: betop: check shape of output reports (git-fixes, bsc#1207186).
  • HID: betop: fix slab-out-of-bounds Write in betop_probe (git-fixes).
  • HID: check empty reportlist in hidvalidate_values() (git-fixes, bsc#1206784).
  • sctp: fail if no bound addresses can be used for a given scope (bsc#1206677).
References

Affected packages

SUSE:Linux Enterprise Server 12 SP2-BCL / kernel-default

Package

Name
kernel-default
Purl
pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.121-92.199.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.121-92.199.1",
            "kernel-devel": "4.4.121-92.199.1",
            "kernel-default-base": "4.4.121-92.199.1",
            "kernel-default": "4.4.121-92.199.1",
            "kernel-source": "4.4.121-92.199.1",
            "kernel-syms": "4.4.121-92.199.1",
            "kernel-default-devel": "4.4.121-92.199.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP2-BCL / kernel-source

Package

Name
kernel-source
Purl
pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.121-92.199.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.121-92.199.1",
            "kernel-devel": "4.4.121-92.199.1",
            "kernel-default-base": "4.4.121-92.199.1",
            "kernel-default": "4.4.121-92.199.1",
            "kernel-source": "4.4.121-92.199.1",
            "kernel-syms": "4.4.121-92.199.1",
            "kernel-default-devel": "4.4.121-92.199.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP2-BCL / kernel-syms

Package

Name
kernel-syms
Purl
pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.121-92.199.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.121-92.199.1",
            "kernel-devel": "4.4.121-92.199.1",
            "kernel-default-base": "4.4.121-92.199.1",
            "kernel-default": "4.4.121-92.199.1",
            "kernel-source": "4.4.121-92.199.1",
            "kernel-syms": "4.4.121-92.199.1",
            "kernel-default-devel": "4.4.121-92.199.1"
        }
    ]
}