SUSE-SU-2023:2147-1

Source
https://www.suse.com/support/update/announcement/2023/suse-su-20232147-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:2147-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2023:2147-1
Related
Published
2023-05-09T15:04:16Z
Modified
2023-05-09T15:04:16Z
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2023-2124: Fixed an out of bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).
  • CVE-2023-1872:Fixed a use after free vulnerability in the io_uring subsystem, which could lead to local privilege escalation (bsc#1210414).
  • CVE-2022-2196: Fixed a regression related to KVM that allowed for speculative execution attacks (bsc#1206992).
  • CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).
  • CVE-2023-2162: Fixed an use-after-free flaw in iscsiswtcpsessioncreate (bsc#1210647).
  • CVE-2023-2176: A vulnerability was found in comparenetdevand_ip in drivers/infiniband/core/cma.c in RDMA. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege (bsc#1210629).
  • CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).
  • CVE-2023-30772: Fixed a race condition and resultant use-after-free in da9150chargerremove (bsc#1210329).
  • CVE-2023-2008: A flaw was found in the fault handler of the udmabuf device driver. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code (bsc#1210453).
  • CVE-2023-1855: Fixed a use after free in xgenehwmonremove (bsc#1210202).
  • CVE-2020-36691: Fixed a denial of service vulnerability via a nested Netlink policy with a back reference (bsc#1209777).
  • CVE-2023-1990: Fixed a use after free in ndlc_remove (bsc#1210337).
  • CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).
  • CVE-2023-1611: Fixed an use-after-free flaw in btrfssearchslot (bsc#1209687).
  • CVE-2023-1838: Fixed an use-after-free flaw in virtio network subcomponent. This flaw could allow a local attacker to crash the system and lead to a kernel information leak problem. (bsc#1210203).

The following non-security bugs were fixed:

  • Drivers: vmbus: Check for channel allocation before looking up relids (git-fixes).
  • cifs: fix negotiate context parsing (bsc#1210301).
  • keys: Fix linking a duplicate key to a keyring's assoc_array (bsc#1207088).
  • vmxnet3: use gro callback when UPT is enabled (bsc#1209739).
References

Affected packages

SUSE:Real Time Module 15 SP3 / kernel-rt

Package

Name
kernel-rt
Purl
purl:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.127.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-devel-rt": "5.3.18-150300.127.1",
            "dlm-kmp-rt": "5.3.18-150300.127.1",
            "kernel-rt-devel": "5.3.18-150300.127.1",
            "cluster-md-kmp-rt": "5.3.18-150300.127.1",
            "kernel-rt_debug-devel": "5.3.18-150300.127.1",
            "kernel-source-rt": "5.3.18-150300.127.1",
            "kernel-rt": "5.3.18-150300.127.1",
            "ocfs2-kmp-rt": "5.3.18-150300.127.1",
            "gfs2-kmp-rt": "5.3.18-150300.127.1",
            "kernel-syms-rt": "5.3.18-150300.127.1"
        }
    ]
}

SUSE:Real Time Module 15 SP3 / kernel-rt_debug

Package

Name
kernel-rt_debug
Purl
purl:rpm/suse/kernel-rt_debug&distro=SUSE%20Real%20Time%20Module%2015%20SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.127.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-devel-rt": "5.3.18-150300.127.1",
            "dlm-kmp-rt": "5.3.18-150300.127.1",
            "kernel-rt-devel": "5.3.18-150300.127.1",
            "cluster-md-kmp-rt": "5.3.18-150300.127.1",
            "kernel-rt_debug-devel": "5.3.18-150300.127.1",
            "kernel-source-rt": "5.3.18-150300.127.1",
            "kernel-rt": "5.3.18-150300.127.1",
            "ocfs2-kmp-rt": "5.3.18-150300.127.1",
            "gfs2-kmp-rt": "5.3.18-150300.127.1",
            "kernel-syms-rt": "5.3.18-150300.127.1"
        }
    ]
}

SUSE:Real Time Module 15 SP3 / kernel-source-rt

Package

Name
kernel-source-rt
Purl
purl:rpm/suse/kernel-source-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.127.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-devel-rt": "5.3.18-150300.127.1",
            "dlm-kmp-rt": "5.3.18-150300.127.1",
            "kernel-rt-devel": "5.3.18-150300.127.1",
            "cluster-md-kmp-rt": "5.3.18-150300.127.1",
            "kernel-rt_debug-devel": "5.3.18-150300.127.1",
            "kernel-source-rt": "5.3.18-150300.127.1",
            "kernel-rt": "5.3.18-150300.127.1",
            "ocfs2-kmp-rt": "5.3.18-150300.127.1",
            "gfs2-kmp-rt": "5.3.18-150300.127.1",
            "kernel-syms-rt": "5.3.18-150300.127.1"
        }
    ]
}

SUSE:Real Time Module 15 SP3 / kernel-syms-rt

Package

Name
kernel-syms-rt
Purl
purl:rpm/suse/kernel-syms-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.127.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-devel-rt": "5.3.18-150300.127.1",
            "dlm-kmp-rt": "5.3.18-150300.127.1",
            "kernel-rt-devel": "5.3.18-150300.127.1",
            "cluster-md-kmp-rt": "5.3.18-150300.127.1",
            "kernel-rt_debug-devel": "5.3.18-150300.127.1",
            "kernel-source-rt": "5.3.18-150300.127.1",
            "kernel-rt": "5.3.18-150300.127.1",
            "ocfs2-kmp-rt": "5.3.18-150300.127.1",
            "gfs2-kmp-rt": "5.3.18-150300.127.1",
            "kernel-syms-rt": "5.3.18-150300.127.1"
        }
    ]
}

SUSE:Linux Enterprise Micro 5.1 / kernel-rt

Package

Name
kernel-rt
Purl
purl:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.127.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-rt": "5.3.18-150300.127.1"
        }
    ]
}

SUSE:Linux Enterprise Micro 5.2 / kernel-rt

Package

Name
kernel-rt
Purl
purl:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.127.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-rt": "5.3.18-150300.127.1"
        }
    ]
}