suse-su-2023:4358-1
Vulnerability from csaf_suse
Published
2023-11-03 12:46
Modified
2023-11-03 12:46
Summary
Security update for the Linux Kernel

Notes

Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2023-2163: Fixed an incorrect verifier pruning in BPF that could lead to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape. (bsc#1215518) - CVE-2023-3777: Fixed a use-after-free vulnerability in netfilter: nf_tables component can be exploited to achieve local privilege escalation. (bsc#1215095) - CVE-2023-34324: Fixed a possible deadlock in Linux kernel event handling. (bsc#1215745). - CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. (bsc#1216046) - CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051). - CVE-2023-39194: Fixed an out of bounds read in the XFRM subsystem (bsc#1215861). - CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860). - CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858). - CVE-2023-42754: Fixed a NULL pointer dereference in the IPv4 stack that could lead to denial of service (bsc#1215467). The following non-security bugs were fixed: - nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() (bsc#1214842).
Patchnames
SUSE-2023-4358,SUSE-SUSE-MicroOS-5.1-2023-4358,SUSE-SUSE-MicroOS-5.2-2023-4358
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2023-2163: Fixed an incorrect verifier pruning in BPF that could lead to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape. (bsc#1215518)\n- CVE-2023-3777: Fixed a use-after-free vulnerability in netfilter: nf_tables component can be exploited to achieve local privilege escalation. (bsc#1215095)\n- CVE-2023-34324: Fixed a possible deadlock in Linux kernel event handling. (bsc#1215745).\n- CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. (bsc#1216046)\n- CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051).\n- CVE-2023-39194: Fixed an out of bounds read in the XFRM subsystem (bsc#1215861).\n- CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).\n- CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858).\n- CVE-2023-42754: Fixed a NULL pointer dereference in the IPv4 stack that could lead to denial of service (bsc#1215467).\n\nThe following non-security bugs were fixed:\n\n- nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() (bsc#1214842).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2023-4358,SUSE-SUSE-MicroOS-5.1-2023-4358,SUSE-SUSE-MicroOS-5.2-2023-4358",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4358-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2023:4358-1",
        "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234358-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2023:4358-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1212051",
        "url": "https://bugzilla.suse.com/1212051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1214842",
        "url": "https://bugzilla.suse.com/1214842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215095",
        "url": "https://bugzilla.suse.com/1215095"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215467",
        "url": "https://bugzilla.suse.com/1215467"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215518",
        "url": "https://bugzilla.suse.com/1215518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215745",
        "url": "https://bugzilla.suse.com/1215745"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215858",
        "url": "https://bugzilla.suse.com/1215858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215860",
        "url": "https://bugzilla.suse.com/1215860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1215861",
        "url": "https://bugzilla.suse.com/1215861"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1216046",
        "url": "https://bugzilla.suse.com/1216046"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-2163 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-2163/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-3111 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-3111/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-34324 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-34324/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-3777 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-3777/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-39189 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-39189/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-39192 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-39192/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-39193 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-39193/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-39194 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-39194/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-42754 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-42754/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2023-11-03T12:46:24Z",
      "generator": {
        "date": "2023-11-03T12:46:24Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2023:4358-1",
      "initial_release_date": "2023-11-03T12:46:24Z",
      "revision_history": [
        {
          "date": "2023-11-03T12:46:24Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-rt-5.3.18-150300.149.1.noarch",
                "product": {
                  "name": "kernel-devel-rt-5.3.18-150300.149.1.noarch",
                  "product_id": "kernel-devel-rt-5.3.18-150300.149.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-rt-5.3.18-150300.149.1.noarch",
                "product": {
                  "name": "kernel-source-rt-5.3.18-150300.149.1.noarch",
                  "product_id": "kernel-source-rt-5.3.18-150300.149.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt-5.3.18-150300.149.1.x86_64",
                  "product_id": "cluster-md-kmp-rt-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt_debug-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt_debug-5.3.18-150300.149.1.x86_64",
                  "product_id": "cluster-md-kmp-rt_debug-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt-5.3.18-150300.149.1.x86_64",
                  "product_id": "dlm-kmp-rt-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt_debug-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt_debug-5.3.18-150300.149.1.x86_64",
                  "product_id": "dlm-kmp-rt_debug-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt-5.3.18-150300.149.1.x86_64",
                  "product_id": "gfs2-kmp-rt-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt_debug-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt_debug-5.3.18-150300.149.1.x86_64",
                  "product_id": "gfs2-kmp-rt_debug-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "kernel-rt-5.3.18-150300.149.1.x86_64",
                  "product_id": "kernel-rt-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "kernel-rt-devel-5.3.18-150300.149.1.x86_64",
                  "product_id": "kernel-rt-devel-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-extra-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "kernel-rt-extra-5.3.18-150300.149.1.x86_64",
                  "product_id": "kernel-rt-extra-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-livepatch-devel-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "kernel-rt-livepatch-devel-5.3.18-150300.149.1.x86_64",
                  "product_id": "kernel-rt-livepatch-devel-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-optional-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "kernel-rt-optional-5.3.18-150300.149.1.x86_64",
                  "product_id": "kernel-rt-optional-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-5.3.18-150300.149.1.x86_64",
                  "product_id": "kernel-rt_debug-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-devel-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-devel-5.3.18-150300.149.1.x86_64",
                  "product_id": "kernel-rt_debug-devel-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-extra-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-extra-5.3.18-150300.149.1.x86_64",
                  "product_id": "kernel-rt_debug-extra-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.149.1.x86_64",
                  "product_id": "kernel-rt_debug-livepatch-devel-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-optional-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-optional-5.3.18-150300.149.1.x86_64",
                  "product_id": "kernel-rt_debug-optional-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-rt-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "kernel-syms-rt-5.3.18-150300.149.1.x86_64",
                  "product_id": "kernel-syms-rt-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt-5.3.18-150300.149.1.x86_64",
                  "product_id": "kselftests-kmp-rt-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt_debug-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt_debug-5.3.18-150300.149.1.x86_64",
                  "product_id": "kselftests-kmp-rt_debug-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt-5.3.18-150300.149.1.x86_64",
                  "product_id": "ocfs2-kmp-rt-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt_debug-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt_debug-5.3.18-150300.149.1.x86_64",
                  "product_id": "ocfs2-kmp-rt_debug-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt-5.3.18-150300.149.1.x86_64",
                  "product_id": "reiserfs-kmp-rt-5.3.18-150300.149.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt_debug-5.3.18-150300.149.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt_debug-5.3.18-150300.149.1.x86_64",
                  "product_id": "reiserfs-kmp-rt_debug-5.3.18-150300.149.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.1",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.1",
                  "product_id": "SUSE Linux Enterprise Micro 5.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.2",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.2",
                  "product_id": "SUSE Linux Enterprise Micro 5.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.3.18-150300.149.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64"
        },
        "product_reference": "kernel-rt-5.3.18-150300.149.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.3.18-150300.149.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
        },
        "product_reference": "kernel-rt-5.3.18-150300.149.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-2163",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-2163"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Incorrect verifier pruning  in BPF in Linux Kernel  \u003e=5.4  leads to unsafe\ncode paths being incorrectly marked as safe, resulting in  arbitrary read/write in\nkernel memory, lateral privilege escalation, and container escape.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-2163",
          "url": "https://www.suse.com/security/cve/CVE-2023-2163"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215518 for CVE-2023-2163",
          "url": "https://bugzilla.suse.com/1215518"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215519 for CVE-2023-2163",
          "url": "https://bugzilla.suse.com/1215519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-11-03T12:46:24Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-2163"
    },
    {
      "cve": "CVE-2023-3111",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-3111"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-3111",
          "url": "https://www.suse.com/security/cve/CVE-2023-3111"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212051 for CVE-2023-3111",
          "url": "https://bugzilla.suse.com/1212051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220015 for CVE-2023-3111",
          "url": "https://bugzilla.suse.com/1220015"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-11-03T12:46:24Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-3111"
    },
    {
      "cve": "CVE-2023-34324",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-34324"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Closing of an event channel in the Linux kernel can result in a deadlock.\nThis happens when the close is being performed in parallel to an unrelated\nXen console action and the handling of a Xen console interrupt in an\nunprivileged guest.\n\nThe closing of an event channel is e.g. triggered by removal of a\nparavirtual device on the other side. As this action will cause console\nmessages to be issued on the other side quite often, the chance of\ntriggering the deadlock is not neglectable.\n\nNote that 32-bit Arm-guests are not affected, as the 32-bit Linux kernel\non Arm doesn\u0027t use queued-RW-locks, which are required to trigger the\nissue (on Arm32 a waiting writer doesn\u0027t block further readers to get\nthe lock).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-34324",
          "url": "https://www.suse.com/security/cve/CVE-2023-34324"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215745 for CVE-2023-34324",
          "url": "https://bugzilla.suse.com/1215745"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-11-03T12:46:24Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-34324"
    },
    {
      "cve": "CVE-2023-3777",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-3777"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nWhen nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain\u0027s owner rule can also release the objects in certain circumstances.\n\nWe recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-3777",
          "url": "https://www.suse.com/security/cve/CVE-2023-3777"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215095 for CVE-2023-3777",
          "url": "https://bugzilla.suse.com/1215095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215097 for CVE-2023-3777",
          "url": "https://bugzilla.suse.com/1215097"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-11-03T12:46:24Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-3777"
    },
    {
      "cve": "CVE-2023-39189",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-39189"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-39189",
          "url": "https://www.suse.com/security/cve/CVE-2023-39189"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1216046 for CVE-2023-39189",
          "url": "https://bugzilla.suse.com/1216046"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220015 for CVE-2023-39189",
          "url": "https://bugzilla.suse.com/1220015"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-11-03T12:46:24Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-39189"
    },
    {
      "cve": "CVE-2023-39192",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-39192"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-39192",
          "url": "https://www.suse.com/security/cve/CVE-2023-39192"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215858 for CVE-2023-39192",
          "url": "https://bugzilla.suse.com/1215858"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220015 for CVE-2023-39192",
          "url": "https://bugzilla.suse.com/1220015"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-11-03T12:46:24Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-39192"
    },
    {
      "cve": "CVE-2023-39193",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-39193"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-39193",
          "url": "https://www.suse.com/security/cve/CVE-2023-39193"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215860 for CVE-2023-39193",
          "url": "https://bugzilla.suse.com/1215860"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220015 for CVE-2023-39193",
          "url": "https://bugzilla.suse.com/1220015"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-11-03T12:46:24Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-39193"
    },
    {
      "cve": "CVE-2023-39194",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-39194"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-39194",
          "url": "https://www.suse.com/security/cve/CVE-2023-39194"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215861 for CVE-2023-39194",
          "url": "https://bugzilla.suse.com/1215861"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-11-03T12:46:24Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-39194"
    },
    {
      "cve": "CVE-2023-42754",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-42754"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-42754",
          "url": "https://www.suse.com/security/cve/CVE-2023-42754"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215467 for CVE-2023-42754",
          "url": "https://bugzilla.suse.com/1215467"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222212 for CVE-2023-42754",
          "url": "https://bugzilla.suse.com/1222212"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-11-03T12:46:24Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-42754"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…