SUSE update for the Linux Kernel



Published: 2023-12-15
Risk High
Patch available YES
Number of vulnerabilities 7
CVE-ID CVE-2023-0461
CVE-2023-31083
CVE-2023-39197
CVE-2023-39198
CVE-2023-45863
CVE-2023-45871
CVE-2023-5717
CWE-ID CWE-416
CWE-476
CWE-125
CWE-787
CWE-119
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SUSE Linux Enterprise Live Patching
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15 SP1 Business Critical Linux
Operating systems & Components / Operating system

SUSE Linux Enterprise High Availability Extension 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15 SP1 LTSS
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing 15
Operating systems & Components / Operating system

SUSE Manager Proxy
Operating systems & Components / Operating system

SUSE Manager Retail Branch Server
Operating systems & Components / Operating system

SUSE Manager Server
Operating systems & Components / Operating system

SUSE CaaS Platform
Operating systems & Components / Operating system

openSUSE Leap
Operating systems & Components / Operating system

kernel-zfcpdump-debuginfo
Operating systems & Components / Operating system package or component

kernel-zfcpdump-debugsource
Operating systems & Components / Operating system package or component

reiserfs-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

reiserfs-kmp-default
Operating systems & Components / Operating system package or component

kernel-docs
Operating systems & Components / Operating system package or component

kernel-macros
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-default-base
Operating systems & Components / Operating system package or component

kernel-syms
Operating systems & Components / Operating system package or component

kernel-obs-build-debugsource
Operating systems & Components / Operating system package or component

kernel-obs-build
Operating systems & Components / Operating system package or component

kernel-default-devel-debuginfo
Operating systems & Components / Operating system package or component

kernel-default-devel
Operating systems & Components / Operating system package or component

gfs2-kmp-default
Operating systems & Components / Operating system package or component

dlm-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

cluster-md-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

cluster-md-kmp-default
Operating systems & Components / Operating system package or component

gfs2-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

ocfs2-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

dlm-kmp-default
Operating systems & Components / Operating system package or component

ocfs2-kmp-default
Operating systems & Components / Operating system package or component

kernel-default-livepatch-devel
Operating systems & Components / Operating system package or component

kernel-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-default-livepatch
Operating systems & Components / Operating system package or component

kernel-default-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-4_12_14-150100_197_165-default
Operating systems & Components / Operating system package or component

kernel-zfcpdump-man
Operating systems & Components / Operating system package or component

kernel-default-man
Operating systems & Components / Operating system package or component

kernel-kvmsmall-base
Operating systems & Components / Operating system package or component

kernel-kvmsmall-base-debuginfo
Operating systems & Components / Operating system package or component

kernel-default-base-debuginfo
Operating systems & Components / Operating system package or component

kernel-debug-base-debuginfo
Operating systems & Components / Operating system package or component

kernel-debug-base
Operating systems & Components / Operating system package or component

kernel-zfcpdump
Operating systems & Components / Operating system package or component

kernel-debug
Operating systems & Components / Operating system package or component

kernel-kvmsmall
Operating systems & Components / Operating system package or component

kernel-default
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 7 vulnerabilities.

1) Use-after-free

EUVDB-ID: #VU72506

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-0461

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the Upper Level Protocol (ULP) subsystem in Linux kernel caused by improper handling of sockets entering the LISTEN state in certain protocols. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.


Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP1

SUSE Linux Enterprise Server 15 SP1 Business Critical Linux: 15-SP1

SUSE Linux Enterprise High Availability Extension 15: SP1

SUSE Linux Enterprise Server for SAP Applications 15: SP1

SUSE Linux Enterprise Server 15 SP1 LTSS: 15-SP1

SUSE Linux Enterprise Server 15: SP1

SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS: 15-SP1

SUSE Linux Enterprise High Performance Computing 15: SP1

SUSE Manager Proxy: 4.0

SUSE Manager Retail Branch Server: 4.0

SUSE Manager Server: 4.0

SUSE CaaS Platform: 4.0

openSUSE Leap: 15.4

kernel-zfcpdump-debuginfo: before 4.12.14-150100.197.165.1

kernel-zfcpdump-debugsource: before 4.12.14-150100.197.165.1

reiserfs-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

reiserfs-kmp-default: before 4.12.14-150100.197.165.1

kernel-docs: before 4.12.14-150100.197.165.1

kernel-macros: before 4.12.14-150100.197.165.1

kernel-source: before 4.12.14-150100.197.165.1

kernel-devel: before 4.12.14-150100.197.165.1

kernel-default-base: before 4.12.14-150100.197.165.1

kernel-syms: before 4.12.14-150100.197.165.1

kernel-obs-build-debugsource: before 4.12.14-150100.197.165.1

kernel-obs-build: before 4.12.14-150100.197.165.1

kernel-default-devel-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-devel: before 4.12.14-150100.197.165.1

gfs2-kmp-default: before 4.12.14-150100.197.165.1

dlm-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

cluster-md-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

cluster-md-kmp-default: before 4.12.14-150100.197.165.1

gfs2-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

ocfs2-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

dlm-kmp-default: before 4.12.14-150100.197.165.1

ocfs2-kmp-default: before 4.12.14-150100.197.165.1

kernel-default-livepatch-devel: before 4.12.14-150100.197.165.1

kernel-default-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-livepatch: before 4.12.14-150100.197.165.1

kernel-default-debugsource: before 4.12.14-150100.197.165.1

kernel-livepatch-4_12_14-150100_197_165-default: before 1-150100.3.5.1

kernel-zfcpdump-man: before 4.12.14-150100.197.165.1

kernel-default-man: before 4.12.14-150100.197.165.1

kernel-kvmsmall-base: before 4.12.14-150100.197.165.1

kernel-kvmsmall-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-debug-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-debug-base: before 4.12.14-150100.197.165.1

kernel-zfcpdump: before 4.12.14-150100.197.165.1

kernel-debug: before 4.12.14-150100.197.165.1

kernel-kvmsmall: before 4.12.14-150100.197.165.1

kernel-default: before 4.12.14-150100.197.165.1

External links

http://www.suse.com/support/update/announcement/2023/suse-su-20234882-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) NULL pointer dereference

EUVDB-ID: #VU79496

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-31083

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the hci_uart_tty_ioctl() function in drivers/bluetooth/hci_ldisc.c. A local user can pass specially crafted data to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP1

SUSE Linux Enterprise Server 15 SP1 Business Critical Linux: 15-SP1

SUSE Linux Enterprise High Availability Extension 15: SP1

SUSE Linux Enterprise Server for SAP Applications 15: SP1

SUSE Linux Enterprise Server 15 SP1 LTSS: 15-SP1

SUSE Linux Enterprise Server 15: SP1

SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS: 15-SP1

SUSE Linux Enterprise High Performance Computing 15: SP1

SUSE Manager Proxy: 4.0

SUSE Manager Retail Branch Server: 4.0

SUSE Manager Server: 4.0

SUSE CaaS Platform: 4.0

openSUSE Leap: 15.4

kernel-zfcpdump-debuginfo: before 4.12.14-150100.197.165.1

kernel-zfcpdump-debugsource: before 4.12.14-150100.197.165.1

reiserfs-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

reiserfs-kmp-default: before 4.12.14-150100.197.165.1

kernel-docs: before 4.12.14-150100.197.165.1

kernel-macros: before 4.12.14-150100.197.165.1

kernel-source: before 4.12.14-150100.197.165.1

kernel-devel: before 4.12.14-150100.197.165.1

kernel-default-base: before 4.12.14-150100.197.165.1

kernel-syms: before 4.12.14-150100.197.165.1

kernel-obs-build-debugsource: before 4.12.14-150100.197.165.1

kernel-obs-build: before 4.12.14-150100.197.165.1

kernel-default-devel-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-devel: before 4.12.14-150100.197.165.1

gfs2-kmp-default: before 4.12.14-150100.197.165.1

dlm-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

cluster-md-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

cluster-md-kmp-default: before 4.12.14-150100.197.165.1

gfs2-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

ocfs2-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

dlm-kmp-default: before 4.12.14-150100.197.165.1

ocfs2-kmp-default: before 4.12.14-150100.197.165.1

kernel-default-livepatch-devel: before 4.12.14-150100.197.165.1

kernel-default-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-livepatch: before 4.12.14-150100.197.165.1

kernel-default-debugsource: before 4.12.14-150100.197.165.1

kernel-livepatch-4_12_14-150100_197_165-default: before 1-150100.3.5.1

kernel-zfcpdump-man: before 4.12.14-150100.197.165.1

kernel-default-man: before 4.12.14-150100.197.165.1

kernel-kvmsmall-base: before 4.12.14-150100.197.165.1

kernel-kvmsmall-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-debug-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-debug-base: before 4.12.14-150100.197.165.1

kernel-zfcpdump: before 4.12.14-150100.197.165.1

kernel-debug: before 4.12.14-150100.197.165.1

kernel-kvmsmall: before 4.12.14-150100.197.165.1

kernel-default: before 4.12.14-150100.197.165.1

External links

http://www.suse.com/support/update/announcement/2023/suse-su-20234882-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Out-of-bounds read

EUVDB-ID: #VU84353

Risk: Medium

CVSSv3.1: 5.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-39197

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the Netfilter Connection Tracking (conntrack) in the Linux kernel in the nf_conntrack_dccp_packet() function in net/netfilter/nf_conntrack_proto_dccp.c. A remote attacker can send specially crafted DCCP packets to the system, trigger an out-of-bounds read error and read contents of memory on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP1

SUSE Linux Enterprise Server 15 SP1 Business Critical Linux: 15-SP1

SUSE Linux Enterprise High Availability Extension 15: SP1

SUSE Linux Enterprise Server for SAP Applications 15: SP1

SUSE Linux Enterprise Server 15 SP1 LTSS: 15-SP1

SUSE Linux Enterprise Server 15: SP1

SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS: 15-SP1

SUSE Linux Enterprise High Performance Computing 15: SP1

SUSE Manager Proxy: 4.0

SUSE Manager Retail Branch Server: 4.0

SUSE Manager Server: 4.0

SUSE CaaS Platform: 4.0

openSUSE Leap: 15.4

kernel-zfcpdump-debuginfo: before 4.12.14-150100.197.165.1

kernel-zfcpdump-debugsource: before 4.12.14-150100.197.165.1

reiserfs-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

reiserfs-kmp-default: before 4.12.14-150100.197.165.1

kernel-docs: before 4.12.14-150100.197.165.1

kernel-macros: before 4.12.14-150100.197.165.1

kernel-source: before 4.12.14-150100.197.165.1

kernel-devel: before 4.12.14-150100.197.165.1

kernel-default-base: before 4.12.14-150100.197.165.1

kernel-syms: before 4.12.14-150100.197.165.1

kernel-obs-build-debugsource: before 4.12.14-150100.197.165.1

kernel-obs-build: before 4.12.14-150100.197.165.1

kernel-default-devel-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-devel: before 4.12.14-150100.197.165.1

gfs2-kmp-default: before 4.12.14-150100.197.165.1

dlm-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

cluster-md-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

cluster-md-kmp-default: before 4.12.14-150100.197.165.1

gfs2-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

ocfs2-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

dlm-kmp-default: before 4.12.14-150100.197.165.1

ocfs2-kmp-default: before 4.12.14-150100.197.165.1

kernel-default-livepatch-devel: before 4.12.14-150100.197.165.1

kernel-default-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-livepatch: before 4.12.14-150100.197.165.1

kernel-default-debugsource: before 4.12.14-150100.197.165.1

kernel-livepatch-4_12_14-150100_197_165-default: before 1-150100.3.5.1

kernel-zfcpdump-man: before 4.12.14-150100.197.165.1

kernel-default-man: before 4.12.14-150100.197.165.1

kernel-kvmsmall-base: before 4.12.14-150100.197.165.1

kernel-kvmsmall-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-debug-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-debug-base: before 4.12.14-150100.197.165.1

kernel-zfcpdump: before 4.12.14-150100.197.165.1

kernel-debug: before 4.12.14-150100.197.165.1

kernel-kvmsmall: before 4.12.14-150100.197.165.1

kernel-default: before 4.12.14-150100.197.165.1

External links

http://www.suse.com/support/update/announcement/2023/suse-su-20234882-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Use-after-free

EUVDB-ID: #VU83904

Risk: Low

CVSSv3.1: 5.8 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-39198

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the QXL driver in the Linux kernel. A local privileged user can trigger a use-after-free error and escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP1

SUSE Linux Enterprise Server 15 SP1 Business Critical Linux: 15-SP1

SUSE Linux Enterprise High Availability Extension 15: SP1

SUSE Linux Enterprise Server for SAP Applications 15: SP1

SUSE Linux Enterprise Server 15 SP1 LTSS: 15-SP1

SUSE Linux Enterprise Server 15: SP1

SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS: 15-SP1

SUSE Linux Enterprise High Performance Computing 15: SP1

SUSE Manager Proxy: 4.0

SUSE Manager Retail Branch Server: 4.0

SUSE Manager Server: 4.0

SUSE CaaS Platform: 4.0

openSUSE Leap: 15.4

kernel-zfcpdump-debuginfo: before 4.12.14-150100.197.165.1

kernel-zfcpdump-debugsource: before 4.12.14-150100.197.165.1

reiserfs-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

reiserfs-kmp-default: before 4.12.14-150100.197.165.1

kernel-docs: before 4.12.14-150100.197.165.1

kernel-macros: before 4.12.14-150100.197.165.1

kernel-source: before 4.12.14-150100.197.165.1

kernel-devel: before 4.12.14-150100.197.165.1

kernel-default-base: before 4.12.14-150100.197.165.1

kernel-syms: before 4.12.14-150100.197.165.1

kernel-obs-build-debugsource: before 4.12.14-150100.197.165.1

kernel-obs-build: before 4.12.14-150100.197.165.1

kernel-default-devel-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-devel: before 4.12.14-150100.197.165.1

gfs2-kmp-default: before 4.12.14-150100.197.165.1

dlm-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

cluster-md-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

cluster-md-kmp-default: before 4.12.14-150100.197.165.1

gfs2-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

ocfs2-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

dlm-kmp-default: before 4.12.14-150100.197.165.1

ocfs2-kmp-default: before 4.12.14-150100.197.165.1

kernel-default-livepatch-devel: before 4.12.14-150100.197.165.1

kernel-default-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-livepatch: before 4.12.14-150100.197.165.1

kernel-default-debugsource: before 4.12.14-150100.197.165.1

kernel-livepatch-4_12_14-150100_197_165-default: before 1-150100.3.5.1

kernel-zfcpdump-man: before 4.12.14-150100.197.165.1

kernel-default-man: before 4.12.14-150100.197.165.1

kernel-kvmsmall-base: before 4.12.14-150100.197.165.1

kernel-kvmsmall-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-debug-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-debug-base: before 4.12.14-150100.197.165.1

kernel-zfcpdump: before 4.12.14-150100.197.165.1

kernel-debug: before 4.12.14-150100.197.165.1

kernel-kvmsmall: before 4.12.14-150100.197.165.1

kernel-default: before 4.12.14-150100.197.165.1

External links

http://www.suse.com/support/update/announcement/2023/suse-su-20234882-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Out-of-bounds write

EUVDB-ID: #VU84354

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-45863

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the fill_kobj_path() function in lib/kobject.c. A local user can can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP1

SUSE Linux Enterprise Server 15 SP1 Business Critical Linux: 15-SP1

SUSE Linux Enterprise High Availability Extension 15: SP1

SUSE Linux Enterprise Server for SAP Applications 15: SP1

SUSE Linux Enterprise Server 15 SP1 LTSS: 15-SP1

SUSE Linux Enterprise Server 15: SP1

SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS: 15-SP1

SUSE Linux Enterprise High Performance Computing 15: SP1

SUSE Manager Proxy: 4.0

SUSE Manager Retail Branch Server: 4.0

SUSE Manager Server: 4.0

SUSE CaaS Platform: 4.0

openSUSE Leap: 15.4

kernel-zfcpdump-debuginfo: before 4.12.14-150100.197.165.1

kernel-zfcpdump-debugsource: before 4.12.14-150100.197.165.1

reiserfs-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

reiserfs-kmp-default: before 4.12.14-150100.197.165.1

kernel-docs: before 4.12.14-150100.197.165.1

kernel-macros: before 4.12.14-150100.197.165.1

kernel-source: before 4.12.14-150100.197.165.1

kernel-devel: before 4.12.14-150100.197.165.1

kernel-default-base: before 4.12.14-150100.197.165.1

kernel-syms: before 4.12.14-150100.197.165.1

kernel-obs-build-debugsource: before 4.12.14-150100.197.165.1

kernel-obs-build: before 4.12.14-150100.197.165.1

kernel-default-devel-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-devel: before 4.12.14-150100.197.165.1

gfs2-kmp-default: before 4.12.14-150100.197.165.1

dlm-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

cluster-md-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

cluster-md-kmp-default: before 4.12.14-150100.197.165.1

gfs2-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

ocfs2-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

dlm-kmp-default: before 4.12.14-150100.197.165.1

ocfs2-kmp-default: before 4.12.14-150100.197.165.1

kernel-default-livepatch-devel: before 4.12.14-150100.197.165.1

kernel-default-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-livepatch: before 4.12.14-150100.197.165.1

kernel-default-debugsource: before 4.12.14-150100.197.165.1

kernel-livepatch-4_12_14-150100_197_165-default: before 1-150100.3.5.1

kernel-zfcpdump-man: before 4.12.14-150100.197.165.1

kernel-default-man: before 4.12.14-150100.197.165.1

kernel-kvmsmall-base: before 4.12.14-150100.197.165.1

kernel-kvmsmall-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-debug-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-debug-base: before 4.12.14-150100.197.165.1

kernel-zfcpdump: before 4.12.14-150100.197.165.1

kernel-debug: before 4.12.14-150100.197.165.1

kernel-kvmsmall: before 4.12.14-150100.197.165.1

kernel-default: before 4.12.14-150100.197.165.1

External links

http://www.suse.com/support/update/announcement/2023/suse-su-20234882-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Buffer overflow

EUVDB-ID: #VU83381

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-45871

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the IGB driver in drivers/net/ethernet/intel/igb/igb_main.c when handling frames larger than the MTU. A remote attacker can send specially crafted traffic to the system, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP1

SUSE Linux Enterprise Server 15 SP1 Business Critical Linux: 15-SP1

SUSE Linux Enterprise High Availability Extension 15: SP1

SUSE Linux Enterprise Server for SAP Applications 15: SP1

SUSE Linux Enterprise Server 15 SP1 LTSS: 15-SP1

SUSE Linux Enterprise Server 15: SP1

SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS: 15-SP1

SUSE Linux Enterprise High Performance Computing 15: SP1

SUSE Manager Proxy: 4.0

SUSE Manager Retail Branch Server: 4.0

SUSE Manager Server: 4.0

SUSE CaaS Platform: 4.0

openSUSE Leap: 15.4

kernel-zfcpdump-debuginfo: before 4.12.14-150100.197.165.1

kernel-zfcpdump-debugsource: before 4.12.14-150100.197.165.1

reiserfs-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

reiserfs-kmp-default: before 4.12.14-150100.197.165.1

kernel-docs: before 4.12.14-150100.197.165.1

kernel-macros: before 4.12.14-150100.197.165.1

kernel-source: before 4.12.14-150100.197.165.1

kernel-devel: before 4.12.14-150100.197.165.1

kernel-default-base: before 4.12.14-150100.197.165.1

kernel-syms: before 4.12.14-150100.197.165.1

kernel-obs-build-debugsource: before 4.12.14-150100.197.165.1

kernel-obs-build: before 4.12.14-150100.197.165.1

kernel-default-devel-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-devel: before 4.12.14-150100.197.165.1

gfs2-kmp-default: before 4.12.14-150100.197.165.1

dlm-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

cluster-md-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

cluster-md-kmp-default: before 4.12.14-150100.197.165.1

gfs2-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

ocfs2-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

dlm-kmp-default: before 4.12.14-150100.197.165.1

ocfs2-kmp-default: before 4.12.14-150100.197.165.1

kernel-default-livepatch-devel: before 4.12.14-150100.197.165.1

kernel-default-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-livepatch: before 4.12.14-150100.197.165.1

kernel-default-debugsource: before 4.12.14-150100.197.165.1

kernel-livepatch-4_12_14-150100_197_165-default: before 1-150100.3.5.1

kernel-zfcpdump-man: before 4.12.14-150100.197.165.1

kernel-default-man: before 4.12.14-150100.197.165.1

kernel-kvmsmall-base: before 4.12.14-150100.197.165.1

kernel-kvmsmall-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-debug-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-debug-base: before 4.12.14-150100.197.165.1

kernel-zfcpdump: before 4.12.14-150100.197.165.1

kernel-debug: before 4.12.14-150100.197.165.1

kernel-kvmsmall: before 4.12.14-150100.197.165.1

kernel-default: before 4.12.14-150100.197.165.1

External links

http://www.suse.com/support/update/announcement/2023/suse-su-20234882-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Out-of-bounds write

EUVDB-ID: #VU83311

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-5717

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in the Linux kernel's Linux Kernel Performance Events (perf) component. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP1

SUSE Linux Enterprise Server 15 SP1 Business Critical Linux: 15-SP1

SUSE Linux Enterprise High Availability Extension 15: SP1

SUSE Linux Enterprise Server for SAP Applications 15: SP1

SUSE Linux Enterprise Server 15 SP1 LTSS: 15-SP1

SUSE Linux Enterprise Server 15: SP1

SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS: 15-SP1

SUSE Linux Enterprise High Performance Computing 15: SP1

SUSE Manager Proxy: 4.0

SUSE Manager Retail Branch Server: 4.0

SUSE Manager Server: 4.0

SUSE CaaS Platform: 4.0

openSUSE Leap: 15.4

kernel-zfcpdump-debuginfo: before 4.12.14-150100.197.165.1

kernel-zfcpdump-debugsource: before 4.12.14-150100.197.165.1

reiserfs-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

reiserfs-kmp-default: before 4.12.14-150100.197.165.1

kernel-docs: before 4.12.14-150100.197.165.1

kernel-macros: before 4.12.14-150100.197.165.1

kernel-source: before 4.12.14-150100.197.165.1

kernel-devel: before 4.12.14-150100.197.165.1

kernel-default-base: before 4.12.14-150100.197.165.1

kernel-syms: before 4.12.14-150100.197.165.1

kernel-obs-build-debugsource: before 4.12.14-150100.197.165.1

kernel-obs-build: before 4.12.14-150100.197.165.1

kernel-default-devel-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-devel: before 4.12.14-150100.197.165.1

gfs2-kmp-default: before 4.12.14-150100.197.165.1

dlm-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

cluster-md-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

cluster-md-kmp-default: before 4.12.14-150100.197.165.1

gfs2-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

ocfs2-kmp-default-debuginfo: before 4.12.14-150100.197.165.1

dlm-kmp-default: before 4.12.14-150100.197.165.1

ocfs2-kmp-default: before 4.12.14-150100.197.165.1

kernel-default-livepatch-devel: before 4.12.14-150100.197.165.1

kernel-default-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-livepatch: before 4.12.14-150100.197.165.1

kernel-default-debugsource: before 4.12.14-150100.197.165.1

kernel-livepatch-4_12_14-150100_197_165-default: before 1-150100.3.5.1

kernel-zfcpdump-man: before 4.12.14-150100.197.165.1

kernel-default-man: before 4.12.14-150100.197.165.1

kernel-kvmsmall-base: before 4.12.14-150100.197.165.1

kernel-kvmsmall-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-default-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-debug-base-debuginfo: before 4.12.14-150100.197.165.1

kernel-debug-base: before 4.12.14-150100.197.165.1

kernel-zfcpdump: before 4.12.14-150100.197.165.1

kernel-debug: before 4.12.14-150100.197.165.1

kernel-kvmsmall: before 4.12.14-150100.197.165.1

kernel-default: before 4.12.14-150100.197.165.1

External links

http://www.suse.com/support/update/announcement/2023/suse-su-20234882-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###