File _patchinfo of Package patchinfo.31302

<patchinfo incident="31302">
  <issue id="1208995" tracker="bnc">VUL-0: CVE-2023-1192: kernel: use-after-free in smb2_is_status_io_timeout()</issue>
  <issue id="1210169" tracker="bnc">VUL-1: CVE-2023-1859: kernel-source,kernel-source-rt,kernel-source-azure: use after free in xen_9pfs_front_remove() due to race condition</issue>
  <issue id="1210778" tracker="bnc">VUL-0: CVE-2023-31085: kernel: drivers/mtd/ubi/cdev.c has a divide-by-zero error in do_div(sz,mtd-&gt;erasesize)</issue>
  <issue id="1212703" tracker="bnc">VUL-0: CVE-2023-1206: kernel-source-rt,kernel-source,kernel-source-azure: hash collisions in the IPv6 connection lookup table</issue>
  <issue id="1214233" tracker="bnc">VUL-0: CVE-2023-40283: kernel-source,kernel-source-azure,kernel-source-rt: use after free in l2cap_sock_ready_cb() due to insufficient cleanup</issue>
  <issue id="1214380" tracker="bnc">Incorrect CONFIG_BUILTIN_RETURN_ADDRESS_STRIPS_PAC for arm64 with 6.4 kernel and gcc7</issue>
  <issue id="1214386" tracker="bnc">Cannot build KMP subpackage as unsupported</issue>
  <issue id="1215115" tracker="bnc">VUL-0: CVE-2023-4623: kernel-source-azure,kernel-source,kernel-source-rt: net/sched UAF in sch_hfsc</issue>
  <issue id="1215117" tracker="bnc">VUL-0: CVE-2023-4622: kernel-source,kernel-source-azure,kernel-source-rt: af_unix UAF</issue>
  <issue id="1215221" tracker="bnc">VUL-0: CVE-2023-4881: kernel-source: stack out-of-bounds write in nft_exthdr ip/tcp/sctp functions</issue>
  <issue id="1215275" tracker="bnc">VUL-0: CVE-2023-4921: kernel: use-after-free in net/sched: sch_qfq component</issue>
  <issue id="1215299" tracker="bnc">VUL-0: CVE-2020-36766: kernel-source,kernel-source-azure,kernel-source-rt: kernel memory leak in cec_adap_g_log_addrs()</issue>
  <issue id="1215467" tracker="bnc">VUL-0: CVE-2023-42754: kernel: null pointer dereference in Linux kernel ipv4 stack</issue>
  <issue id="1215745" tracker="bnc">VUL-0: CVE-2023-34324: xen: Possible deadlock in Linux kernel event handling (XSA-441)</issue>
  <issue id="1215858" tracker="bnc">VUL-0: CVE-2023-39192: kernel-source,kernel-source-azure,kernel-source-rt: out of bounds read in u32_match_it()</issue>
  <issue id="1215860" tracker="bnc">VUL-0: CVE-2023-39193: kernel: Linux Kernel Netfilter Xtables Out-Of-Bounds Read Information Disclosure Vulnerability</issue>
  <issue id="1215861" tracker="bnc">VUL-0: CVE-2023-39194: kernel: Linux Kernel XFRM Out-Of-Bounds Read Information Disclosure Vulnerability</issue>
  <issue id="1216046" tracker="bnc">VUL-0: CVE-2023-39189: kernel: nftables out-of-bounds read in nf_osf_match_one()</issue>
  <issue id="1216051" tracker="bnc">VUL-0: CVE-2023-45862: kernel: malicious USB storage device can overwrite a buffer on the heap, upstream ce33e64c1788</issue>
  <issue id="2023-31085" tracker="cve" />
  <issue id="2023-45862" tracker="cve" />
  <issue id="2023-34324" tracker="cve" />
  <issue id="2023-39189" tracker="cve" />
  <issue id="2023-39194" tracker="cve" />
  <issue id="2023-39193" tracker="cve" />
  <issue id="2023-39192" tracker="cve" />
  <issue id="2023-42754" tracker="cve" />
  <issue id="2023-1206" tracker="cve" />
  <issue id="2023-4921" tracker="cve" />
  <issue id="2023-4622" tracker="cve" />
  <issue id="2023-4623" tracker="cve" />
  <issue id="2020-36766" tracker="cve" />
  <issue id="2023-1859" tracker="cve" />
  <issue id="2023-4881" tracker="cve" />
  <issue id="2023-40283" tracker="cve" />
  <issue id="2023-1192" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>alix82</packager>
  <reboot_needed/>
  <description>
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd->erasesize) that could cause a local DoS. (bsc#1210778)
- CVE-2023-45862: Fixed an issue in the ENE UB6250 reader driver whwere an object could potentially extend beyond the end of an allocation causing. (bsc#1216051)
- CVE-2023-34324: Fixed a possible deadlock in Linux kernel event handling. (bsc#1215745).
- CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. (bsc#1216046)
- CVE-2023-39194: Fixed an out of bounds read in the XFRM subsystem (bsc#1215861).
- CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).
- CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858).
- CVE-2023-42754: Fixed a NULL pointer dereference in the IPv4 stack that could lead to denial of service (bsc#1215467).
- CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table which could be exploited by network adjacent attackers, increasing CPU usage by 95% (bsc#1212703).
- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).
- CVE-2023-4622: Fixed a use-after-free vulnerability in the Unix domain sockets component which could be exploited to achieve local privilege escalation (bsc#1215117).
- CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215115).
- CVE-2020-36766: Fixed a potential information leak in in the CEC driver (bsc#1215299).
- CVE-2023-1859: Fixed a use-after-free flaw in Xen transport for 9pfs which could be exploited to crash the system (bsc#1210169).
- CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).
- CVE-2023-40283: Fixed use-after-free in l2cap_sock_ready_cb (bsc#1214233).
- CVE-2023-1192: Fixed use-after-free in cifs_demultiplex_thread() (bsc#1208995).

The following non-security bugs were fixed:

- check-for-config-changes: ignore BUILTIN_RETURN_ADDRESS_STRIPS_PAC (bsc#1214380). gcc7 on SLE 15 does not support this while later gcc does.
- mkspec: Allow unsupported KMPs (bsc#1214386)
- old-flavors: Drop 2.6 kernels. 2.6 based kernels are EOL, upgrading from them is no longer suported.
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>
openSUSE Build Service is sponsored by