[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2023:3684-1 -- SLES kernel, reiserfs-kmp-default

ID: oval:org.secpod.oval:def:89050977Date: (C)2023-10-19   (M)2024-04-29
Class: PATCHFamily: unix




The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2022-36402: Fixed an integer overflow vulnerability in vmwgfx driver in that allowed a local attacker with a user account on the system to gain privilege, causing a denial of service . * CVE-2023-2007: Fixed a flaw in the DPT I2O Controller driver that could allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel . * CVE-2023-3772: Fixed a flaw in XFRM subsystem that may have allowed a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer leading to a possible kernel crash and denial of service . * CVE-2023-3863: Fixed a use-after-free flaw was found in nfc_llcp_find_local that allowed a local user with special privileges to impact a kernel information leak issue . * CVE-2023-4128: Fixed a use-after-free flaw in net/sched/cls_fw.c that allowed a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue . * CVE-2023-4132: Fixed use-after-free vulnerability was found in the siano smsusb module that allowed a local user to crash the system, causing a denial of service condition . * CVE-2023-4133: Fixed use after free bugs caused by circular dependency problem in cxgb4 . * CVE-2023-4134: Fixed use-after-free in cyttsp4_watchdog_work . * CVE-2023-4147: Fixed use-after-free in nf_tables_newrule . * CVE-2023-4194: Fixed a type confusion in net tun_chr_open . * CVE-2023-4273: Fixed a flaw in the exFAT driver of the Linux kernel that alloawed a local privileged attacker to overflow the kernel stack . * CVE-2023-4385: Fixed a NULL pointer dereference flaw in dbFree that may have allowed a local attacker to crash the system due to a missing sanity check . * CVE-2023-4387: Fixed use-after-free flaw in vmxnet3_rq_alloc_rx_buf that could allow a local attacker to crash the system due to a double-free . * CVE-2023-4459: Fixed a NULL pointer dereference flaw in vmxnet3_rq_cleanup that may have allowed a local attacker with normal user privilege to cause a denial of service . * CVE-2023-20588: Fixed a division-by-zero error on some AMD processors that can potentially return speculative data resulting in loss of confidentiality . * CVE-2023-21400: Fixed several memory corruptions due to improper locking in io_uring . * CVE-2023-34319: Fixed buffer overrun triggered by unusual packet in xen/netback . The following non-security bugs were fixed: * ARM: spear: Do not use timer namespace for timer_shutdown function . * Do not add and remove genksyms ifdefs * clocksource/drivers/arm_arch_timer: Do not use timer namespace for timer_shutdown function . * clocksource/drivers/sp804: Do not use timer namespace for timer_shutdown function . * e1000: Fix fall-through warnings for Clang . * e1000: Fix typos in comments . * e1000: Remove unnecessary use of kmap_atomic . * e1000: drop unneeded assignment in e1000_set_itr . * e1000: switch to napi_consume_skb . * intel/e1000:fix repeated words in comments . * intel: remove checker warning . * kabi/severities: Ignore newly added SRSO mitigation functions * md/raid0: Factor out helper for mapping and submitting a bio . * md/raid0: Fix performance regression for large sequential writes . * net: e1000: remove repeated word "slot" for e1000_main.c . * net: e1000: remove repeated words for e1000_hw.c . * powerpc/rtas: block error injection when locked down . * powerpc/rtas: mandate RTAS syscall filtering . * powerpc/rtas: move syscall filter setup into separate function . * powerpc/rtas: remove ibm_suspend_me_token . * powerpc: Move DMA64_PROPNAME define to a header . * pseries/iommu/ddw: Fix kdump to work in absence of ibm,dma-window . * timers: Add shutdown mechanism to the internal functions . * timers: Provide timer_shutdown_sync . * timers: Rename del_timer to timer_delete . * timers: Rename del_timer_sync to timer_delete_sync . * timers: Replace BUG_ONs . * timers: Silently ignore timers with a NULL function . * timers: Split [try_to_]del_timer_sync to prepare for shutdown mode . * timers: Update kernel-doc for various functions . * timers: Use del_timer_sync even on UP . * x86/cpu/kvm: Provide UNTRAIN_RET_VM . * x86/cpu: Cleanup the untrain mess . * x86/cpu: Rename original retbleed methods . * x86/cpu: Rename srso_ _alias to srso_alias_ \1 . * x86/retpoline: Do not clobber RFLAGS during srso_safe_ret . * x86/speculation: Add cpu_show_gds prototype . * x86/speculation: Mark all Skylake CPUs as vulnerable to GDS . * x86/srso: Correct the mitigation status when SMT is disabled . * x86/srso: Disable the mitigation on unaffected configurations . * x86/srso: Explain the untraining sequences a bit more . * x86: Move gds_ucode_mitigated declaration to header . * xfs: fix sb write verify for lazysbcount . * xfs: gut error handling in xfs_trans_unreserve_and_mod_sb . * xfs: update superblock counters correctly for !lazysbcount . ## Special Instructions and Notes: * Please reboot the system after installing this update.

Platform:
SUSE Linux Enterprise Server 15 SP3
Product:
kernel
reiserfs-kmp-default
Reference:
SUSE-SU-2023:3684-1
CVE-2022-36402
CVE-2023-2007
CVE-2023-20588
CVE-2023-21400
CVE-2023-34319
CVE-2023-3772
CVE-2023-3863
CVE-2023-4206
CVE-2023-4207
CVE-2023-4208
CVE-2023-4132
CVE-2023-4133
CVE-2023-4134
CVE-2023-4147
CVE-2023-4194
CVE-2023-4273
CVE-2023-4385
CVE-2023-4387
CVE-2023-4459
CVE    19
CVE-2023-4134
CVE-2023-2007
CVE-2022-36402
CVE-2023-21400
...

© SecPod Technologies