SUSE Linux Kernel Multiple Vulnerabilities
Release Date: 11 May 2023
RISK: Medium Risk
TYPE: Operating Systems - Linux

Multiple vulnerabilities were identified in SUSE Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution and sensitive information disclosure on the targeted system.
Impact
- Denial of Service
- Elevation of Privilege
- Remote Code Execution
- Information Disclosure
System / Technologies affected
- Basesystem Module 15-SP4
- Development Tools Module 15-SP4
- Legacy Module 15-SP4
- Public Cloud Module 15-SP4
- SUSE CaaS Platform 4.0
- SUSE Enterprise Storage 7
- SUSE Enterprise Storage 7.1
- SUSE Linux Enterprise Desktop 15 SP4
- SUSE Linux Enterprise High Availability Extension 15 SP1
- SUSE Linux Enterprise High Availability Extension 15 SP2
- SUSE Linux Enterprise High Availability Extension 15 SP3
- SUSE Linux Enterprise High Availability Extension 15 SP4
- SUSE Linux Enterprise High Performance Computing 15 SP1
- SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
- SUSE Linux Enterprise High Performance Computing 15 SP2
- SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
- SUSE Linux Enterprise High Performance Computing 15 SP3
- SUSE Linux Enterprise High Performance Computing 15 SP4
- SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
- SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
- SUSE Linux Enterprise Live Patching 15-SP1
- SUSE Linux Enterprise Live Patching 15-SP2
- SUSE Linux Enterprise Live Patching 15-SP3
- SUSE Linux Enterprise Live Patching 15-SP4
- SUSE Linux Enterprise Micro 5.1
- SUSE Linux Enterprise Micro 5.2
- SUSE Linux Enterprise Micro 5.3
- SUSE Linux Enterprise Micro 5.4
- SUSE Linux Enterprise Micro for Rancher 5.2
- SUSE Linux Enterprise Micro for Rancher 5.3
- SUSE Linux Enterprise Micro for Rancher 5.4
- SUSE Linux Enterprise Real Time 15 SP3
- SUSE Linux Enterprise Real Time 15 SP4
- SUSE Linux Enterprise Server 15 SP1
- SUSE Linux Enterprise Server 15 SP1 Business Critical Linux 15-SP1
- SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
- SUSE Linux Enterprise Server 15 SP2
- SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2
- SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
- SUSE Linux Enterprise Server 15 SP3
- SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3
- SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
- SUSE Linux Enterprise Server 15 SP4
- SUSE Linux Enterprise Server for SAP Applications 15 SP1
- SUSE Linux Enterprise Server for SAP Applications 15 SP2
- SUSE Linux Enterprise Server for SAP Applications 15 SP3
- SUSE Linux Enterprise Server for SAP Applications 15 SP4
- SUSE Linux Enterprise Workstation Extension 15 SP4
- SUSE Manager Proxy 4.0
- SUSE Manager Proxy 4.1
- SUSE Manager Proxy 4.2
- SUSE Manager Proxy 4.3
- SUSE Manager Proxy 4.3
- SUSE Manager Retail Branch Server 4.0
- SUSE Manager Retail Branch Server 4.1
- SUSE Manager Retail Branch Server 4.2
- SUSE Manager Retail Branch Server 4.3
- SUSE Manager Server 4.0
- SUSE Manager Server 4.1
- SUSE Manager Server 4.2
- SUSE Manager Server 4.3
- SUSE Real Time Module 15-SP3
- openSUSE Leap 15.4
- openSUSE Leap Micro 5.3
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- https://www.suse.com/support/update/announcement/2023/suse-su-20232148-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20232146-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20232141-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20232147-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20232140-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20232151-1
Vulnerability Identifier
- CVE-2020-36691
- CVE-2022-2196
- CVE-2022-43945
- CVE-2023-0386
- CVE-2023-1611
- CVE-2023-1670
- CVE-2023-1838
- CVE-2023-1855
- CVE-2023-1872
- CVE-2023-1989
- CVE-2023-1990
- CVE-2023-1998
- CVE-2023-2008
- CVE-2023-2019
- CVE-2023-2124
- CVE-2023-2162
- CVE-2023-2176
- CVE-2023-2235
- CVE-2023-23006
- CVE-2023-30772
Source
Related Link
- https://www.auscert.org.au/bulletins/ESB-2023.2618
- https://www.auscert.org.au/bulletins/ESB-2023.2617
- https://www.auscert.org.au/bulletins/ESB-2023.2615
- https://www.auscert.org.au/bulletins/ESB-2023.2613
- https://www.auscert.org.au/bulletins/ESB-2023.2610
- https://www.auscert.org.au/bulletins/ESB-2023.2608
- https://www.suse.com/support/update/announcement/2023/suse-su-20232148-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20232146-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20232141-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20232147-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20232140-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20232151-1
沒有留言:
發佈留言