Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP4)
| Announcement ID: | SUSE-SU-2023:2431-1 | 
|---|---|
| Rating: | important | 
| References: | |
| Cross-References: | |
| CVSS scores: | 
                    
  | 
            
| Affected Products: | 
                
  | 
        
An update that solves seven vulnerabilities can now be installed.
Description:
This update for the Linux Kernel 5.14.21-150400_24_38 fixes several issues.
The following security issues were fixed:
- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/uetooth/hci_conn.c (bsc#1211111).
 - CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210500).
 - CVE-2023-0386: Fixed privileges escalation for low-privileged users in the OverlayFS subsystem (bsc#1210499).
 - CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209683).
 - CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210662).
 - CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208911).
 - CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207188).
 
Patch Instructions:
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".
        Alternatively you can run the command listed for your product:
    
- 
                SUSE Linux Enterprise Live Patching 15-SP4
                
                    
                        
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2023-2431=1 
Package List:
- 
                    SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
                    
- kernel-livepatch-5_14_21-150400_24_38-default-debuginfo-6-150400.2.3
 - kernel-livepatch-5_14_21-150400_24_38-default-6-150400.2.3
 - kernel-livepatch-SLE15-SP4_Update_6-debugsource-6-150400.2.3
 
 
References:
- https://www.suse.com/security/cve/CVE-2023-0386.html
 - https://www.suse.com/security/cve/CVE-2023-0461.html
 - https://www.suse.com/security/cve/CVE-2023-1281.html
 - https://www.suse.com/security/cve/CVE-2023-1989.html
 - https://www.suse.com/security/cve/CVE-2023-2162.html
 - https://www.suse.com/security/cve/CVE-2023-23454.html
 - https://www.suse.com/security/cve/CVE-2023-28464.html
 - https://bugzilla.suse.com/show_bug.cgi?id=1207188
 - https://bugzilla.suse.com/show_bug.cgi?id=1208911
 - https://bugzilla.suse.com/show_bug.cgi?id=1209683
 - https://bugzilla.suse.com/show_bug.cgi?id=1210499
 - https://bugzilla.suse.com/show_bug.cgi?id=1210500
 - https://bugzilla.suse.com/show_bug.cgi?id=1210662
 - https://bugzilla.suse.com/show_bug.cgi?id=1211111