SUSE-SU-2023:3392-1: important: Security update for the Linux Kernel
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Wed Aug 23 16:30:08 UTC 2023
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2023:3392-1
Rating: important
References:
* #1206418
* #1207088
* #1210584
* #1211738
* #1211867
* #1212301
* #1212741
* #1212835
* #1213059
* #1213167
* #1213286
* #1213287
* #1213546
* #1213585
* #1213586
* #1213588
* #1213970
* #1214019
Cross-References:
* CVE-2022-40982
* CVE-2023-0459
* CVE-2023-20569
* CVE-2023-20593
* CVE-2023-2985
* CVE-2023-34319
* CVE-2023-35001
* CVE-2023-3567
* CVE-2023-3609
* CVE-2023-3611
* CVE-2023-3776
* CVE-2023-4133
* CVE-2023-4194
CVSS scores:
* CVE-2022-40982 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-40982 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-0459 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-0459 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-20569 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-20569 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-20593 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-20593 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-2985 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-34319 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2023-35001 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-35001 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3567 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3567 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3609 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3609 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3611 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3611 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3776 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3776 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-4133 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-4133 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-4194 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-4194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE CaaS Platform 4.0
* SUSE Linux Enterprise High Availability Extension 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
* SUSE Linux Enterprise Live Patching 15-SP1
* SUSE Linux Enterprise Server 15 SP1
* SUSE Linux Enterprise Server 15 SP1 Business Critical Linux 15-SP1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
* SUSE Manager Proxy 4.0
* SUSE Manager Retail Branch Server 4.0
* SUSE Manager Server 4.0
An update that solves 13 vulnerabilities and has five fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security
and bugfixes.
The following security bugs were fixed:
* CVE-2022-40982: Fixed transient execution attack called "Gather Data
Sampling" (bsc#1206418).
* CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec
(bsc#1211738).
* CVE-2023-20569: Fixed side channel attack ‘Inception’ or ‘RAS Poisoning’
(bsc#1213287).
* CVE-2023-20593: Fixed a ZenBleed issue in "Zen 2" CPUs that could allow an
attacker to potentially access sensitive information (bsc#1213286).
* CVE-2023-2985: Fixed an use-after-free vulnerability in hfsplus_put_super in
fs/hfsplus/super.c that could allow a local user to cause a denial of
service (bsc#1211867).
* CVE-2023-34319: Fixed buffer overrun triggered by unusual packet in
xen/netback (XSA-432) (bsc#1213546).
* CVE-2023-35001: Fixed an out-of-bounds memory access flaw in nft_byteorder
that could allow a local attacker to escalate their privilege (bsc#1213059).
* CVE-2023-3567: Fixed a use-after-free in vcs_read in
drivers/tty/vt/vc_screen.c (bsc#1213167).
* CVE-2023-3609: Fixed reference counter leak leading to overflow in net/sched
(bsc#1213586).
* CVE-2023-3611: Fixed an out-of-bounds write in net/sched
sch_qfq(bsc#1213585).
* CVE-2023-3776: Fixed improper refcount update in cls_fw leads to use-after-
free (bsc#1213588).
* CVE-2023-4133: Fixed use after free bugs caused by circular dependency
problem in cxgb4 (bsc#1213970).
* CVE-2023-4194: Fixed a type confusion in net tun_chr_open() bsc#1214019).
The following non-security bugs were fixed:
* arm: spear: do not use timer namespace for timer_shutdown() function
(bsc#1213970).
* clocksource/drivers/arm_arch_timer: do not use timer namespace for
timer_shutdown() function (bsc#1213970).
* clocksource/drivers/sp804: do not use timer namespace for timer_shutdown()
function (bsc#1213970).
* cpufeatures: allow adding more cpuid words
* get module prefix from kmod (bsc#1212835).
* kernel-binary.spec.in: remove superfluous %% in supplements fixes:
02b7735e0caf ("rpm/kernel-binary.spec.in: add enhances and supplements tags
to in-tree kmps")
* kernel-docs: add buildrequires on python3-base when using python3 the
python3 binary is provided by python3-base.
* kernel-docs: use python3 together with python3-sphinx (bsc#1212741).
* keys: change keyring_serialise_link_sem to a mutex (bsc#1207088).
* keys: fix linking a duplicate key to a keyring's assoc_array (bsc#1207088).
* keys: hoist locking out of __key_link_begin() (bsc#1207088).
* net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).
* net: mana: add support for vlan tagging (bsc#1212301).
* readme.branch: add myself as co-maintainer
* remove more packaging cruft for sle < 12 sp3
* rpm/check-for-config-changes: ignore also pahole_has_* we now also have
options like config_pahole_has_lang_exclude.
* rpm/check-for-config-changes: ignore also riscv_isa_ _and dynamic_sigframe
they depend on config_toolchain_has__.
* timers: add shutdown mechanism to the internal functions (bsc#1213970).
* timers: provide timer_shutdown_sync (bsc#1213970).
* timers: rename del_timer() to timer_delete() (bsc#1213970).
* timers: rename del_timer_sync() to timer_delete_sync() (bsc#1213970).
* timers: replace bug_on()s (bsc#1213970).
* timers: silently ignore timers with a null function (bsc#1213970).
* timers: split [try_to_]del_timer_sync to prepare for shutdown mode
(bsc#1213970).
* timers: update kernel-doc for various functions (bsc#1213970).
* timers: use del_timer_sync() even on up (bsc#1213970).
* ubi: ensure that vid header offset + vid header size <= alloc, size
(bsc#1210584).
* ubi: fix failure attaching when vid_hdr offset equals to (sub)page size
(bsc#1210584).
* usrmerge: Adjust module path in the kernel sources (bsc#1212835).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE Important update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-3392=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-3392=1
* SUSE Linux Enterprise Live Patching 15-SP1
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2023-3392=1
* SUSE Linux Enterprise High Availability Extension 15 SP1
zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2023-3392=1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3392=1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3392=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3392=1
* SUSE CaaS Platform 4.0
To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform
you if it detects new updates and let you then trigger updating of the complete
cluster in a controlled way.
## Package List:
* openSUSE Leap 15.4 (nosrc)
* kernel-kvmsmall-4.12.14-150100.197.154.1
* kernel-default-4.12.14-150100.197.154.1
* kernel-debug-4.12.14-150100.197.154.1
* kernel-zfcpdump-4.12.14-150100.197.154.1
* openSUSE Leap 15.4 (ppc64le x86_64)
* kernel-debug-base-debuginfo-4.12.14-150100.197.154.1
* kernel-debug-base-4.12.14-150100.197.154.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* kernel-vanilla-devel-4.12.14-150100.197.154.1
* kernel-vanilla-base-debuginfo-4.12.14-150100.197.154.1
* kernel-vanilla-debuginfo-4.12.14-150100.197.154.1
* kernel-vanilla-livepatch-devel-4.12.14-150100.197.154.1
* kernel-vanilla-debugsource-4.12.14-150100.197.154.1
* kernel-default-base-debuginfo-4.12.14-150100.197.154.1
* kernel-vanilla-devel-debuginfo-4.12.14-150100.197.154.1
* kernel-vanilla-base-4.12.14-150100.197.154.1
* openSUSE Leap 15.4 (x86_64)
* kernel-kvmsmall-base-debuginfo-4.12.14-150100.197.154.1
* kernel-kvmsmall-base-4.12.14-150100.197.154.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-vanilla-4.12.14-150100.197.154.1
* openSUSE Leap 15.4 (s390x)
* kernel-default-man-4.12.14-150100.197.154.1
* kernel-zfcpdump-man-4.12.14-150100.197.154.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-vanilla-4.12.14-150100.197.154.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kernel-vanilla-devel-4.12.14-150100.197.154.1
* kernel-vanilla-base-debuginfo-4.12.14-150100.197.154.1
* kernel-vanilla-debuginfo-4.12.14-150100.197.154.1
* kernel-vanilla-livepatch-devel-4.12.14-150100.197.154.1
* kernel-vanilla-debugsource-4.12.14-150100.197.154.1
* kernel-vanilla-devel-debuginfo-4.12.14-150100.197.154.1
* kernel-vanilla-base-4.12.14-150100.197.154.1
* SUSE Linux Enterprise Live Patching 15-SP1 (nosrc)
* kernel-default-4.12.14-150100.197.154.1
* SUSE Linux Enterprise Live Patching 15-SP1 (ppc64le x86_64)
* kernel-default-debuginfo-4.12.14-150100.197.154.1
* kernel-default-debugsource-4.12.14-150100.197.154.1
* kernel-default-livepatch-4.12.14-150100.197.154.1
* kernel-default-livepatch-devel-4.12.14-150100.197.154.1
* kernel-livepatch-4_12_14-150100_197_154-default-1-150100.3.3.1
* SUSE Linux Enterprise High Availability Extension 15 SP1 (aarch64 ppc64le
s390x x86_64)
* gfs2-kmp-default-debuginfo-4.12.14-150100.197.154.1
* kernel-default-debuginfo-4.12.14-150100.197.154.1
* kernel-default-debugsource-4.12.14-150100.197.154.1
* ocfs2-kmp-default-debuginfo-4.12.14-150100.197.154.1
* dlm-kmp-default-debuginfo-4.12.14-150100.197.154.1
* gfs2-kmp-default-4.12.14-150100.197.154.1
* cluster-md-kmp-default-4.12.14-150100.197.154.1
* ocfs2-kmp-default-4.12.14-150100.197.154.1
* cluster-md-kmp-default-debuginfo-4.12.14-150100.197.154.1
* dlm-kmp-default-4.12.14-150100.197.154.1
* SUSE Linux Enterprise High Availability Extension 15 SP1 (nosrc)
* kernel-default-4.12.14-150100.197.154.1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64
nosrc x86_64)
* kernel-default-4.12.14-150100.197.154.1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64
x86_64)
* kernel-obs-build-debugsource-4.12.14-150100.197.154.1
* kernel-default-debuginfo-4.12.14-150100.197.154.1
* kernel-default-debugsource-4.12.14-150100.197.154.1
* kernel-default-devel-debuginfo-4.12.14-150100.197.154.1
* kernel-default-devel-4.12.14-150100.197.154.1
* kernel-default-base-debuginfo-4.12.14-150100.197.154.1
* kernel-syms-4.12.14-150100.197.154.1
* kernel-default-base-4.12.14-150100.197.154.1
* kernel-obs-build-4.12.14-150100.197.154.1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch)
* kernel-source-4.12.14-150100.197.154.1
* kernel-macros-4.12.14-150100.197.154.1
* kernel-devel-4.12.14-150100.197.154.1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch
nosrc)
* kernel-docs-4.12.14-150100.197.154.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x
x86_64 nosrc)
* kernel-default-4.12.14-150100.197.154.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x
x86_64)
* kernel-obs-build-debugsource-4.12.14-150100.197.154.1
* reiserfs-kmp-default-4.12.14-150100.197.154.1
* kernel-default-debuginfo-4.12.14-150100.197.154.1
* kernel-default-debugsource-4.12.14-150100.197.154.1
* kernel-default-devel-debuginfo-4.12.14-150100.197.154.1
* kernel-default-devel-4.12.14-150100.197.154.1
* kernel-default-base-debuginfo-4.12.14-150100.197.154.1
* reiserfs-kmp-default-debuginfo-4.12.14-150100.197.154.1
* kernel-syms-4.12.14-150100.197.154.1
* kernel-default-base-4.12.14-150100.197.154.1
* kernel-obs-build-4.12.14-150100.197.154.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch)
* kernel-source-4.12.14-150100.197.154.1
* kernel-macros-4.12.14-150100.197.154.1
* kernel-devel-4.12.14-150100.197.154.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch nosrc)
* kernel-docs-4.12.14-150100.197.154.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (s390x)
* kernel-default-man-4.12.14-150100.197.154.1
* kernel-zfcpdump-debugsource-4.12.14-150100.197.154.1
* kernel-zfcpdump-debuginfo-4.12.14-150100.197.154.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (nosrc)
* kernel-zfcpdump-4.12.14-150100.197.154.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (nosrc ppc64le
x86_64)
* kernel-default-4.12.14-150100.197.154.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64)
* kernel-obs-build-debugsource-4.12.14-150100.197.154.1
* reiserfs-kmp-default-4.12.14-150100.197.154.1
* kernel-default-debuginfo-4.12.14-150100.197.154.1
* kernel-default-debugsource-4.12.14-150100.197.154.1
* kernel-default-devel-debuginfo-4.12.14-150100.197.154.1
* kernel-default-devel-4.12.14-150100.197.154.1
* kernel-default-base-debuginfo-4.12.14-150100.197.154.1
* reiserfs-kmp-default-debuginfo-4.12.14-150100.197.154.1
* kernel-syms-4.12.14-150100.197.154.1
* kernel-default-base-4.12.14-150100.197.154.1
* kernel-obs-build-4.12.14-150100.197.154.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch)
* kernel-source-4.12.14-150100.197.154.1
* kernel-macros-4.12.14-150100.197.154.1
* kernel-devel-4.12.14-150100.197.154.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch nosrc)
* kernel-docs-4.12.14-150100.197.154.1
* SUSE CaaS Platform 4.0 (nosrc x86_64)
* kernel-default-4.12.14-150100.197.154.1
* SUSE CaaS Platform 4.0 (x86_64)
* kernel-obs-build-debugsource-4.12.14-150100.197.154.1
* reiserfs-kmp-default-4.12.14-150100.197.154.1
* kernel-default-debuginfo-4.12.14-150100.197.154.1
* kernel-default-debugsource-4.12.14-150100.197.154.1
* kernel-default-devel-debuginfo-4.12.14-150100.197.154.1
* kernel-default-devel-4.12.14-150100.197.154.1
* kernel-default-base-debuginfo-4.12.14-150100.197.154.1
* reiserfs-kmp-default-debuginfo-4.12.14-150100.197.154.1
* kernel-syms-4.12.14-150100.197.154.1
* kernel-default-base-4.12.14-150100.197.154.1
* kernel-obs-build-4.12.14-150100.197.154.1
* SUSE CaaS Platform 4.0 (noarch)
* kernel-source-4.12.14-150100.197.154.1
* kernel-macros-4.12.14-150100.197.154.1
* kernel-devel-4.12.14-150100.197.154.1
* SUSE CaaS Platform 4.0 (noarch nosrc)
* kernel-docs-4.12.14-150100.197.154.1
## References:
* https://www.suse.com/security/cve/CVE-2022-40982.html
* https://www.suse.com/security/cve/CVE-2023-0459.html
* https://www.suse.com/security/cve/CVE-2023-20569.html
* https://www.suse.com/security/cve/CVE-2023-20593.html
* https://www.suse.com/security/cve/CVE-2023-2985.html
* https://www.suse.com/security/cve/CVE-2023-34319.html
* https://www.suse.com/security/cve/CVE-2023-35001.html
* https://www.suse.com/security/cve/CVE-2023-3567.html
* https://www.suse.com/security/cve/CVE-2023-3609.html
* https://www.suse.com/security/cve/CVE-2023-3611.html
* https://www.suse.com/security/cve/CVE-2023-3776.html
* https://www.suse.com/security/cve/CVE-2023-4133.html
* https://www.suse.com/security/cve/CVE-2023-4194.html
* https://bugzilla.suse.com/show_bug.cgi?id=1206418
* https://bugzilla.suse.com/show_bug.cgi?id=1207088
* https://bugzilla.suse.com/show_bug.cgi?id=1210584
* https://bugzilla.suse.com/show_bug.cgi?id=1211738
* https://bugzilla.suse.com/show_bug.cgi?id=1211867
* https://bugzilla.suse.com/show_bug.cgi?id=1212301
* https://bugzilla.suse.com/show_bug.cgi?id=1212741
* https://bugzilla.suse.com/show_bug.cgi?id=1212835
* https://bugzilla.suse.com/show_bug.cgi?id=1213059
* https://bugzilla.suse.com/show_bug.cgi?id=1213167
* https://bugzilla.suse.com/show_bug.cgi?id=1213286
* https://bugzilla.suse.com/show_bug.cgi?id=1213287
* https://bugzilla.suse.com/show_bug.cgi?id=1213546
* https://bugzilla.suse.com/show_bug.cgi?id=1213585
* https://bugzilla.suse.com/show_bug.cgi?id=1213586
* https://bugzilla.suse.com/show_bug.cgi?id=1213588
* https://bugzilla.suse.com/show_bug.cgi?id=1213970
* https://bugzilla.suse.com/show_bug.cgi?id=1214019
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20230823/af70d1af/attachment.htm>
More information about the sle-updates
mailing list