<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:4358-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-11-03T12:46:24Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-11-03T12:46:24Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-11-03T12:46:24Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2023-2163: Fixed an incorrect verifier pruning in BPF that could lead to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape. (bsc#1215518)
- CVE-2023-3777: Fixed a use-after-free vulnerability in netfilter: nf_tables component can be exploited to achieve local privilege escalation. (bsc#1215095)
- CVE-2023-34324: Fixed a possible deadlock in Linux kernel event handling. (bsc#1215745).
- CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. (bsc#1216046)
- CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051).
- CVE-2023-39194: Fixed an out of bounds read in the XFRM subsystem (bsc#1215861).
- CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).
- CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858).
- CVE-2023-42754: Fixed a NULL pointer dereference in the IPv4 stack that could lead to denial of service (bsc#1215467).

The following non-security bugs were fixed:

- nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() (bsc#1214842).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2023-4358,SUSE-SUSE-MicroOS-5.1-2023-4358,SUSE-SUSE-MicroOS-5.2-2023-4358</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20234358-1/</URL>
      <Description>Link for SUSE-SU-2023:4358-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:4358-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1212051</URL>
      <Description>SUSE Bug 1212051</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1214842</URL>
      <Description>SUSE Bug 1214842</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215095</URL>
      <Description>SUSE Bug 1215095</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215467</URL>
      <Description>SUSE Bug 1215467</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215518</URL>
      <Description>SUSE Bug 1215518</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215745</URL>
      <Description>SUSE Bug 1215745</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215858</URL>
      <Description>SUSE Bug 1215858</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215860</URL>
      <Description>SUSE Bug 1215860</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215861</URL>
      <Description>SUSE Bug 1215861</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1216046</URL>
      <Description>SUSE Bug 1216046</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-2163/</URL>
      <Description>SUSE CVE CVE-2023-2163 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-3111/</URL>
      <Description>SUSE CVE CVE-2023-3111 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-34324/</URL>
      <Description>SUSE CVE CVE-2023-34324 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-3777/</URL>
      <Description>SUSE CVE CVE-2023-3777 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-39189/</URL>
      <Description>SUSE CVE CVE-2023-39189 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-39192/</URL>
      <Description>SUSE CVE CVE-2023-39192 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-39193/</URL>
      <Description>SUSE CVE CVE-2023-39193 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-39194/</URL>
      <Description>SUSE CVE CVE-2023-39194 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-42754/</URL>
      <Description>SUSE CVE CVE-2023-42754 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.1">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.1" CPE="cpe:/o:suse:suse-microos:5.1">SUSE Linux Enterprise Micro 5.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.2">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2" CPE="cpe:/o:suse:suse-microos:5.2">SUSE Linux Enterprise Micro 5.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-rt-5.3.18-150300.149.1">
      <FullProductName ProductID="cluster-md-kmp-rt-5.3.18-150300.149.1">cluster-md-kmp-rt-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-rt_debug-5.3.18-150300.149.1">
      <FullProductName ProductID="cluster-md-kmp-rt_debug-5.3.18-150300.149.1">cluster-md-kmp-rt_debug-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-rt-5.3.18-150300.149.1">
      <FullProductName ProductID="dlm-kmp-rt-5.3.18-150300.149.1">dlm-kmp-rt-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-rt_debug-5.3.18-150300.149.1">
      <FullProductName ProductID="dlm-kmp-rt_debug-5.3.18-150300.149.1">dlm-kmp-rt_debug-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-rt-5.3.18-150300.149.1">
      <FullProductName ProductID="gfs2-kmp-rt-5.3.18-150300.149.1">gfs2-kmp-rt-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-rt_debug-5.3.18-150300.149.1">
      <FullProductName ProductID="gfs2-kmp-rt_debug-5.3.18-150300.149.1">gfs2-kmp-rt_debug-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-rt-5.3.18-150300.149.1">
      <FullProductName ProductID="kernel-devel-rt-5.3.18-150300.149.1">kernel-devel-rt-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-5.3.18-150300.149.1">
      <FullProductName ProductID="kernel-rt-5.3.18-150300.149.1">kernel-rt-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-devel-5.3.18-150300.149.1">
      <FullProductName ProductID="kernel-rt-devel-5.3.18-150300.149.1">kernel-rt-devel-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-extra-5.3.18-150300.149.1">
      <FullProductName ProductID="kernel-rt-extra-5.3.18-150300.149.1">kernel-rt-extra-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-livepatch-devel-5.3.18-150300.149.1">
      <FullProductName ProductID="kernel-rt-livepatch-devel-5.3.18-150300.149.1">kernel-rt-livepatch-devel-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-optional-5.3.18-150300.149.1">
      <FullProductName ProductID="kernel-rt-optional-5.3.18-150300.149.1">kernel-rt-optional-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-5.3.18-150300.149.1">
      <FullProductName ProductID="kernel-rt_debug-5.3.18-150300.149.1">kernel-rt_debug-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-devel-5.3.18-150300.149.1">
      <FullProductName ProductID="kernel-rt_debug-devel-5.3.18-150300.149.1">kernel-rt_debug-devel-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-extra-5.3.18-150300.149.1">
      <FullProductName ProductID="kernel-rt_debug-extra-5.3.18-150300.149.1">kernel-rt_debug-extra-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-livepatch-devel-5.3.18-150300.149.1">
      <FullProductName ProductID="kernel-rt_debug-livepatch-devel-5.3.18-150300.149.1">kernel-rt_debug-livepatch-devel-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-optional-5.3.18-150300.149.1">
      <FullProductName ProductID="kernel-rt_debug-optional-5.3.18-150300.149.1">kernel-rt_debug-optional-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-rt-5.3.18-150300.149.1">
      <FullProductName ProductID="kernel-source-rt-5.3.18-150300.149.1">kernel-source-rt-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-rt-5.3.18-150300.149.1">
      <FullProductName ProductID="kernel-syms-rt-5.3.18-150300.149.1">kernel-syms-rt-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-rt-5.3.18-150300.149.1">
      <FullProductName ProductID="kselftests-kmp-rt-5.3.18-150300.149.1">kselftests-kmp-rt-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-rt_debug-5.3.18-150300.149.1">
      <FullProductName ProductID="kselftests-kmp-rt_debug-5.3.18-150300.149.1">kselftests-kmp-rt_debug-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-rt-5.3.18-150300.149.1">
      <FullProductName ProductID="ocfs2-kmp-rt-5.3.18-150300.149.1">ocfs2-kmp-rt-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-rt_debug-5.3.18-150300.149.1">
      <FullProductName ProductID="ocfs2-kmp-rt_debug-5.3.18-150300.149.1">ocfs2-kmp-rt_debug-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="reiserfs-kmp-rt-5.3.18-150300.149.1">
      <FullProductName ProductID="reiserfs-kmp-rt-5.3.18-150300.149.1">reiserfs-kmp-rt-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="reiserfs-kmp-rt_debug-5.3.18-150300.149.1">
      <FullProductName ProductID="reiserfs-kmp-rt_debug-5.3.18-150300.149.1">reiserfs-kmp-rt_debug-5.3.18-150300.149.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-rt-5.3.18-150300.149.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.1">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1">kernel-rt-5.3.18-150300.149.1 as a component of SUSE Linux Enterprise Micro 5.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-5.3.18-150300.149.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.2">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1">kernel-rt-5.3.18-150300.149.1 as a component of SUSE Linux Enterprise Micro 5.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect verifier pruning  in BPF in Linux Kernel  &gt;=5.4  leads to unsafe
code paths being incorrectly marked as safe, resulting in  arbitrary read/write in
kernel memory, lateral privilege escalation, and container escape.</Note>
    </Notes>
    <CVE>CVE-2023-2163</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20234358-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-2163.html</URL>
        <Description>CVE-2023-2163</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215518</URL>
        <Description>SUSE Bug 1215518</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215519</URL>
        <Description>SUSE Bug 1215519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().</Note>
    </Notes>
    <CVE>CVE-2023-3111</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20234358-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-3111.html</URL>
        <Description>CVE-2023-3111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1212051</URL>
        <Description>SUSE Bug 1212051</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220015</URL>
        <Description>SUSE Bug 1220015</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Closing of an event channel in the Linux kernel can result in a deadlock.
This happens when the close is being performed in parallel to an unrelated
Xen console action and the handling of a Xen console interrupt in an
unprivileged guest.

The closing of an event channel is e.g. triggered by removal of a
paravirtual device on the other side. As this action will cause console
messages to be issued on the other side quite often, the chance of
triggering the deadlock is not neglectable.

Note that 32-bit Arm-guests are not affected, as the 32-bit Linux kernel
on Arm doesn't use queued-RW-locks, which are required to trigger the
issue (on Arm32 a waiting writer doesn't block further readers to get
the lock).
</Note>
    </Notes>
    <CVE>CVE-2023-34324</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20234358-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-34324.html</URL>
        <Description>CVE-2023-34324</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215745</URL>
        <Description>SUSE Bug 1215745</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances.

We recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.

</Note>
    </Notes>
    <CVE>CVE-2023-3777</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20234358-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-3777.html</URL>
        <Description>CVE-2023-3777</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215095</URL>
        <Description>SUSE Bug 1215095</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215097</URL>
        <Description>SUSE Bug 1215097</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.</Note>
    </Notes>
    <CVE>CVE-2023-39189</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20234358-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-39189.html</URL>
        <Description>CVE-2023-39189</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216046</URL>
        <Description>SUSE Bug 1216046</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220015</URL>
        <Description>SUSE Bug 1220015</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.</Note>
    </Notes>
    <CVE>CVE-2023-39192</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20234358-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-39192.html</URL>
        <Description>CVE-2023-39192</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215858</URL>
        <Description>SUSE Bug 1215858</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220015</URL>
        <Description>SUSE Bug 1220015</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.</Note>
    </Notes>
    <CVE>CVE-2023-39193</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20234358-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-39193.html</URL>
        <Description>CVE-2023-39193</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215860</URL>
        <Description>SUSE Bug 1215860</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220015</URL>
        <Description>SUSE Bug 1220015</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.</Note>
    </Notes>
    <CVE>CVE-2023-39194</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20234358-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-39194.html</URL>
        <Description>CVE-2023-39194</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215861</URL>
        <Description>SUSE Bug 1215861</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.</Note>
    </Notes>
    <CVE>CVE-2023-42754</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.149.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.149.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20234358-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-42754.html</URL>
        <Description>CVE-2023-42754</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215467</URL>
        <Description>SUSE Bug 1215467</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222212</URL>
        <Description>SUSE Bug 1222212</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
