The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
CVE-2023-2007: Fixed a flaw in the DPT I2O Controller driver that could allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel (bsc#1210448).
CVE-2023-20588: Fixed a division-by-zero error on some AMD processors that can potentially return speculative data resulting in loss of confidentiality (bsc#1213927).
CVE-2023-34319: Fixed buffer overrun triggered by unusual packet in xen/netback (XSA-432) (bsc#1213546).
CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be exploited to achieve local privilege escalation (bsc#1213580).
CVE-2023-37453: Fixed oversight in SuperSpeed initialization (bsc#1213123).
CVE-2023-3772: Fixed a flaw in XFRM subsystem that may have allowed a malicious user with CAPNETADMIN privileges to directly dereference a NULL pointer leading to a possible kernel crash and denial of service (bsc#1213666).
CVE-2023-3863: Fixed a use-after-free flaw was found in nfcllcpfind_local that allowed a local user with special privileges to impact a kernel information leak issue (bsc#1213601).
CVE-2023-4128: Fixed a use-after-free flaw in net/sched/cls_fw.c that allowed a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue (bsc#1214149).
CVE-2023-4133: Fixed use after free bugs caused by circular dependency problem in cxgb4 (bsc#1213970).
CVE-2023-4134: Fixed use-after-free in cyttsp4watchdogwork() (bsc#1213971).
CVE-2023-4147: Fixed use-after-free in nftablesnewrule (bsc#1213968).
CVE-2023-4194: Fixed a type confusion in net tunchropen() (bsc#1214019).
CVE-2023-4273: Fixed a flaw in the exFAT driver of the Linux kernel that alloawed a local privileged attacker to overflow the kernel stack (bsc#1214120).
CVE-2023-4387: Fixed use-after-free flaw in vmxnet3rqallocrxbuf that could allow a local attacker to crash the system due to a double-free (bsc#1214350).
CVE-2023-4459: Fixed a NULL pointer dereference flaw in vmxnet3rqcleanup that may have allowed a local attacker with normal user privilege to cause a denial of service (bsc#1214451).
CVE-2023-4569: Fixed information leak in nftsetcatchallflush in net/netfilter/nftables_api.c (bsc#1214729).
The following non-security bugs were fixed:
acpi: processor: perflib: avoid updating frequency qos unnecessarily (git-fixes).
acpi: processor: perflib: use the 'no limit' frequency qos (git-fixes).
cpufreq: intel_pstate: hybrid: use known scaling factor for p-cores (bsc#1212526 bsc#1214368 jsc#ped-4927 jsc#ped-4929).
cpufreq: intel_pstate: read all msrs on the target cpu (bsc#1212526 bsc#1214368 jsc#ped-4927 jsc#ped-4929).
created new preempt kernel flavor configs are cloned from the respective $arch/default configs. all changed configs appart from configpreempt->y are a result of dependencies, namely many lock/unlock primitives are no longer inlined in the preempt kernel. treercu has been also changed to preempt_rcu which is the default implementation for preempt kernel.
crypto: caam - fix unchecked return value error (git-fixes).
kbuild: add -wno-shift-negative-value where -wextra is used (bsc#1214756).
kbuild: move to -std=gnu11 (bsc#1214756).
kernel-binary: common dependencies cleanup common dependencies are copied to a subpackage, there is no need for copying defines or build dependencies there.
kernel-binary: drop code for kerntypes support kerntypes was a suse-specific feature dropped before sle 12.
kunit: make kunittesttimeout compatible with comment (git-fixes).