<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP3)</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:4839-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-12-14T10:34:45Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-12-14T10:34:45Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-12-14T10:34:45Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP3)</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for the Linux Kernel 5.3.18-150300_59_138 fixes several issues.

The following security issues were fixed:

- CVE-2023-3777: Fixed a use-after-free vulnerability in netfilter: nf_tables component can be exploited to achieve local privilege escalation. (bsc#1215097)
- CVE-2023-2163: Fixed an incorrect verifier pruning in BPF that could lead to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape. (bsc#1215519)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2023-4839,SUSE-SLE-Module-Live-Patching-15-SP3-2023-4839</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20234839-1/</URL>
      <Description>Link for SUSE-SU-2023:4839-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2023-December/017355.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:4839-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215097</URL>
      <Description>SUSE Bug 1215097</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215519</URL>
      <Description>SUSE Bug 1215519</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-2163/</URL>
      <Description>SUSE CVE CVE-2023-2163 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-3777/</URL>
      <Description>SUSE CVE CVE-2023-3777 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 15 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 15 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP3" CPE="cpe:/o:suse:sle-module-live-patching:15:sp3">SUSE Linux Enterprise Live Patching 15 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-livepatch-5_3_18-150300_59_138-default-3-150300.2.1">
      <FullProductName ProductID="kernel-livepatch-5_3_18-150300_59_138-default-3-150300.2.1">kernel-livepatch-5_3_18-150300_59_138-default-3-150300.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-livepatch-5_3_18-150300_59_138-preempt-3-150300.2.1">
      <FullProductName ProductID="kernel-livepatch-5_3_18-150300_59_138-preempt-3-150300.2.1">kernel-livepatch-5_3_18-150300_59_138-preempt-3-150300.2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-livepatch-5_3_18-150300_59_138-default-3-150300.2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_138-default-3-150300.2.1">kernel-livepatch-5_3_18-150300_59_138-default-3-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect verifier pruning  in BPF in Linux Kernel  &gt;=5.4  leads to unsafe
code paths being incorrectly marked as safe, resulting in  arbitrary read/write in
kernel memory, lateral privilege escalation, and container escape.</Note>
    </Notes>
    <CVE>CVE-2023-2163</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_138-default-3-150300.2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20234839-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-2163.html</URL>
        <Description>CVE-2023-2163</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215518</URL>
        <Description>SUSE Bug 1215518</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215519</URL>
        <Description>SUSE Bug 1215519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances.

We recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.

</Note>
    </Notes>
    <CVE>CVE-2023-3777</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_138-default-3-150300.2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20234839-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-3777.html</URL>
        <Description>CVE-2023-3777</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215095</URL>
        <Description>SUSE Bug 1215095</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215097</URL>
        <Description>SUSE Bug 1215097</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
