[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2023:3391-1 -- SLES kernel, reiserfs-kmp-default

ID: oval:org.secpod.oval:def:89049336Date: (C)2023-08-30   (M)2024-04-29
Class: PATCHFamily: unix




The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2022-40982: Fixed transient execution attack called "Gather Data Sampling" . * CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec . * CVE-2023-20569: Fixed side channel attack 'Inception' or 'RAS Poisoning' . * CVE-2023-20593: Fixed a ZenBleed issue in "Zen 2" CPUs that could allow an attacker to potentially access sensitive information . * CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol . * CVE-2023-2985: Fixed an use-after-free vulnerability in hfsplus_put_super in fs/hfsplus/super.c that could allow a local user to cause a denial of service . * CVE-2023-3117: Fixed an use-after-free vulnerability in the netfilter subsystem when processing named and anonymous sets in batch requests that could allow a local user with CAP_NET_ADMIN capability to crash or potentially escalate their privileges on the system . * CVE-2023-31248: Fixed an use-after-free vulnerability in nft_chain_lookup_byid that could allow a local attacker to escalate their privilege . * CVE-2023-3390: Fixed an use-after-free vulnerability in the netfilter subsystem in net/netfilter/nf_tables_api.c that could allow a local attacker with user access to cause a privilege escalation issue . * CVE-2023-35001: Fixed an out-of-bounds memory access flaw in nft_byteorder that could allow a local attacker to escalate their privilege . * CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c . * CVE-2023-3609: Fixed reference counter leak leading to overflow in net/sched . * CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq. * CVE-2023-3776: Fixed improper refcount update in cls_fw leads to use-after- free . * CVE-2023-3812: Fixed an out-of-bounds memory access flaw in the TUN/TAP device driver functionality that could allow a local user to crash or potentially escalate their privileges on the system . The following non-security bugs were fixed: * arm: cpu: switch to arch_cpu_finalize_init . * block, bfq: fix division by zero error on zero wsum . * get module prefix from kmod . * init, x86: move mem_encrypt_init into arch_cpu_finalize_init . * init: invoke arch_cpu_finalize_init earlier . * init: provide arch_cpu_finalize_init . * init: remove check_bugs leftovers . * jbd2: export jbd2_journal_[grab|put]_journal_head . * kernel-binary.spec.in: remove superfluous %% in supplements fixes: 02b7735e0caf * kernel-docs: add buildrequires on python3-base when using python3 the python3 binary is provided by python3-base. * kernel-docs: use python3 together with python3-sphinx . * keys: do not cache key in task struct if key is requested from kernel thread . * lockdep: add preemption enabled/disabled assertion apis . * locking/rwsem: add __always_inline annotation to __down_read_common and inlined callers . * locking/rwsem: allow slowpath writer to ignore handoff bit if not set by first waiter . * locking/rwsem: always try to wake waiters in out_nolock path . * locking/rwsem: better collate rwsem_read_trylock . * locking/rwsem: conditionally wake waiters in reader/writer slowpaths . * locking/rwsem: disable preemption for spinning region . * locking/rwsem: disable preemption in all down_read* and up_read code paths . * locking/rwsem: disable preemption in all down_write* and up_write code paths . * locking/rwsem: disable preemption while trying for rwsem lock . * locking/rwsem: enable reader optimistic lock stealing . * locking/rwsem: fix comment typo . * locking/rwsem: fix comments about reader optimistic lock stealing conditions . * locking/rwsem: fold __down_{read,write}* . * locking/rwsem: introduce rwsem_write_trylock . * locking/rwsem: make handoff bit handling more consistent . * locking/rwsem: no need to check for handoff bit if wait queue empty . * locking/rwsem: optimize down_read_trylock under highly contended case . * locking/rwsem: pass the current atomic count to rwsem_down_read_slowpath . * locking/rwsem: prevent non-first waiter from spinning in down_write slowpath . * locking/rwsem: prevent potential lock starvation . * locking/rwsem: remove an unused parameter of rwsem_wake . * locking/rwsem: remove reader optimistic spinning . * locking: add missing __sched attributes . * locking: remove rcu_read_{,un}lock for preempt_{dis,en}able . * net/sched: sch_qfq: refactor parsing of netlink parameters . * net: mana: add support for vlan tagging . * ocfs2: fix a deadlock when commit trans . * ocfs2: fix defrag path triggering jbd2 assert . * ocfs2: fix race between searching chunks and release journal_head from buffer_head . * remove more packaging cruft for sle less than 12 sp3 * rpm/check-for-config-changes: ignore also pahole_has_* we now also have options like config_pahole_has_lang_exclude. * rpm/check-for-config-changes: ignore also riscv_isa_ _and dynamic_sigframe they depend on config_toolchain_has__. * rwsem: implement down_read_interruptible . * rwsem: implement down_read_killable_nested . * ubi: ensure that vid header offset + vid header size less than= alloc, size . * ubi: fix failure attaching when vid_hdr offset equals to page size . * usrmerge: adjust module path in the kernel sources . * x86/cpu: switch to arch_cpu_finalize_init . * x86/fpu: remove cpuinfo argument from init functions . * x86/microcode/AMD: Make stub function static inline . ## Special Instructions and Notes: * Please reboot the system after installing this update.

Platform:
SUSE Linux Enterprise Server 15 SP3
Product:
kernel
reiserfs-kmp-default
Reference:
SUSE-SU-2023:3391-1
CVE-2022-40982
CVE-2023-0459
CVE-2023-20569
CVE-2023-20593
CVE-2023-2156
CVE-2023-2985
CVE-2023-3117
CVE-2023-31248
CVE-2023-3390
CVE-2023-35001
CVE-2023-3567
CVE-2023-3609
CVE-2023-3611
CVE-2023-3776
CVE-2023-3812
CVE    15
CVE-2022-40982
CVE-2023-20593
CVE-2023-35001
CVE-2023-20569
...
CPE    4
cpe:/o:linux:linux_kernel:-
cpe:/a:kmp:reiserfs_kmp_default
cpe:/o:linux:linux_kernel
cpe:/o:suse:suse_linux_enterprise_server:15:sp3
...

© SecPod Technologies