File _patchinfo of Package patchinfo.31301
<patchinfo incident="31301">
<issue id="1210778" tracker="bnc">VUL-0: CVE-2023-31085: kernel: drivers/mtd/ubi/cdev.c has a divide-by-zero error in do_div(sz,mtd->erasesize)</issue>
<issue id="1210853" tracker="bnc">[NDA] [RFE] SLES15 launch issue on new instance</issue>
<issue id="1212051" tracker="bnc">VUL-0: CVE-2023-3111: kernel: Use after free in prepare_to_relocate in fs/btrfs/relocation.c</issue>
<issue id="1214842" tracker="bnc">kernel NULL pointer dereference from nvme_fc_io_getuuid+0xc/0x30 [nvme_fc]</issue>
<issue id="1215095" tracker="bnc">VUL-0: CVE-2023-3777: kernel-source-azure,kernel-source,kernel-source-rt: netfilter: nf_tables use-after-free via nf_tables_delrule()</issue>
<issue id="1215467" tracker="bnc">VUL-0: CVE-2023-42754: kernel: null pointer dereference in Linux kernel ipv4 stack</issue>
<issue id="1215518" tracker="bnc">VUL-0: CVE-2023-2163: kernel-source-rt,kernel-source-azure,kernel-source: Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memor</issue>
<issue id="1215745" tracker="bnc">VUL-0: CVE-2023-34324: xen: Possible deadlock in Linux kernel event handling (XSA-441)</issue>
<issue id="1215858" tracker="bnc">VUL-0: CVE-2023-39192: kernel-source,kernel-source-azure,kernel-source-rt: out of bounds read in u32_match_it()</issue>
<issue id="1215860" tracker="bnc">VUL-0: CVE-2023-39193: kernel: Linux Kernel Netfilter Xtables Out-Of-Bounds Read Information Disclosure Vulnerability</issue>
<issue id="1215861" tracker="bnc">VUL-0: CVE-2023-39194: kernel: Linux Kernel XFRM Out-Of-Bounds Read Information Disclosure Vulnerability</issue>
<issue id="1216046" tracker="bnc">VUL-0: CVE-2023-39189: kernel: nftables out-of-bounds read in nf_osf_match_one()</issue>
<issue id="1216051" tracker="bnc">VUL-0: CVE-2023-45862: kernel: malicious USB storage device can overwrite a buffer on the heap, upstream ce33e64c1788</issue>
<issue id="1216134" tracker="bnc">[PED-5906] Enable 7i instance types</issue>
<issue id="2023-31085" tracker="cve" />
<issue id="2023-45862" tracker="cve" />
<issue id="2023-2163" tracker="cve" />
<issue id="2023-3777" tracker="cve" />
<issue id="2023-34324" tracker="cve" />
<issue id="2023-39189" tracker="cve" />
<issue id="2023-3111" tracker="cve" />
<issue id="2023-39194" tracker="cve" />
<issue id="2023-39193" tracker="cve" />
<issue id="2023-39192" tracker="cve" />
<issue id="2023-42754" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>vkarasulli</packager>
<reboot_needed/>
<description>
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd->erasesize) that could cause a local DoS. (bsc#1210778)
- CVE-2023-45862: Fixed an issue in the ENE UB6250 reader driver whwere an object could potentially extend beyond the end of an allocation causing. (bsc#1216051)
- CVE-2023-2163: Fixed an incorrect verifier pruning in BPF that could lead to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape. (bsc#1215518)
- CVE-2023-3777: Fixed a use-after-free vulnerability in netfilter: nf_tables component can be exploited to achieve local privilege escalation. (bsc#1215095)
- CVE-2023-34324: Fixed a possible deadlock in Linux kernel event handling. (bsc#1215745).
- CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. (bsc#1216046)
- CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051).
- CVE-2023-39194: Fixed an out of bounds read in the XFRM subsystem (bsc#1215861).
- CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).
- CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858).
- CVE-2023-42754: Fixed a NULL pointer dereference in the IPv4 stack that could lead to denial of service (bsc#1215467).
The following non-security bugs were fixed:
- bpf: propagate precision in ALU/ALU64 operations (git-fixes).
- KVM: x86: fix sending PV IPI (git-fixes, bsc#1210853, bsc#1216134).
- nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() (bsc#1214842).
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>