SUSE SLED15 / SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2023:4071-1)

high Nessus Plugin ID 183072

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2023:4071-1 advisory.

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2023-39194: Fixed a flaw in the processing of state filters which could allow a local attackers to disclose sensitive information. (bsc#1215861)
- CVE-2023-39193: Fixed a flaw in the processing of state filters which could allow a local attackers to disclose sensitive information. (bsc#1215860)
- CVE-2023-39192: Fixed a flaw in the u32_match_it function which could allow a local attackers to disclose sensitive information. (bsc#1215858)
- CVE-2023-42754: Fixed a null pointer dereference in ipv4_link_failure which could lead an authenticated attacker to trigger a DoS. (bsc#1215467)
- CVE-2023-5345: fixed an use-after-free vulnerability in the fs/smb/client component which could be exploited to achieve local privilege escalation. (bsc#1215899)
- CVE-2023-4155: Fixed a flaw in KVM AMD Secure Encrypted Virtualization (SEV). An attacker can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages. (bsc#1214022)
- CVE-2023-4389: Fixed a reference counting issue in the Btrfs filesystem that could be exploited in order to leak internal kernel information or crash the system (bsc#1214351).
- CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter subsystem. This issue may have allowed a local user to crash the system or potentially escalate their privileges (bsc#1215150).
- CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95% (bsc#1212703).
- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalatio (bsc#1215275).
- CVE-2023-4622: Fixed a use-after-free vulnerability in the Unix domain sockets component which could be exploited to achieve local privilege escalation (bsc#1215117).
- CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215115).
- CVE-2023-1859: Fixed a use-after-free flaw in Xen transport for 9pfs which could be exploited to crash the system (bsc#1210169).
- CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).
- CVE-2023-2177: Fixed a null pointer dereference issue in the sctp network protocol which could allow a user to crash the system (bsc#1210643).
- CVE-2023-1192: Fixed use-after-free in cifs_demultiplex_thread() (bsc#1208995).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1152472

https://bugzilla.suse.com/1187236

https://bugzilla.suse.com/1201284

https://bugzilla.suse.com/1202845

https://bugzilla.suse.com/1206453

https://bugzilla.suse.com/1208995

https://bugzilla.suse.com/1210169

https://bugzilla.suse.com/1210643

https://bugzilla.suse.com/1210658

https://bugzilla.suse.com/1212639

https://bugzilla.suse.com/1212703

https://bugzilla.suse.com/1213534

https://bugzilla.suse.com/1213808

https://bugzilla.suse.com/1214022

https://bugzilla.suse.com/1214037

https://bugzilla.suse.com/1214040

https://bugzilla.suse.com/1214351

https://bugzilla.suse.com/1214479

https://bugzilla.suse.com/1214543

https://bugzilla.suse.com/1214635

https://bugzilla.suse.com/1214813

https://bugzilla.suse.com/1214873

https://bugzilla.suse.com/1214928

https://bugzilla.suse.com/1214940

https://bugzilla.suse.com/1214941

https://bugzilla.suse.com/1214942

https://bugzilla.suse.com/1214943

https://bugzilla.suse.com/1214944

https://bugzilla.suse.com/1214945

https://bugzilla.suse.com/1214946

https://bugzilla.suse.com/1214947

https://bugzilla.suse.com/1214948

https://bugzilla.suse.com/1214949

https://bugzilla.suse.com/1214950

https://bugzilla.suse.com/1214951

https://bugzilla.suse.com/1214952

https://bugzilla.suse.com/1214953

https://bugzilla.suse.com/1214954

https://bugzilla.suse.com/1214955

https://bugzilla.suse.com/1214957

https://bugzilla.suse.com/1214958

https://bugzilla.suse.com/1214959

https://bugzilla.suse.com/1214961

https://bugzilla.suse.com/1214962

https://bugzilla.suse.com/1214963

https://bugzilla.suse.com/1214964

https://bugzilla.suse.com/1214965

https://bugzilla.suse.com/1214966

https://bugzilla.suse.com/1214967

https://bugzilla.suse.com/1214986

https://bugzilla.suse.com/1214988

https://bugzilla.suse.com/1214990

https://bugzilla.suse.com/1214991

https://bugzilla.suse.com/1214992

https://bugzilla.suse.com/1214993

https://bugzilla.suse.com/1214995

https://bugzilla.suse.com/1214997

https://bugzilla.suse.com/1214998

https://bugzilla.suse.com/1215115

https://bugzilla.suse.com/1215117

https://bugzilla.suse.com/1215123

https://bugzilla.suse.com/1215124

https://bugzilla.suse.com/1215148

https://bugzilla.suse.com/1215150

https://bugzilla.suse.com/1215221

https://bugzilla.suse.com/1215275

https://bugzilla.suse.com/1215322

https://bugzilla.suse.com/1215467

https://bugzilla.suse.com/1215581

https://bugzilla.suse.com/1215752

https://bugzilla.suse.com/1215858

https://bugzilla.suse.com/1215860

https://bugzilla.suse.com/1215861

https://bugzilla.suse.com/1215875

https://bugzilla.suse.com/1215877

https://bugzilla.suse.com/1215894

https://bugzilla.suse.com/1215895

https://bugzilla.suse.com/1215896

https://bugzilla.suse.com/1215899

https://bugzilla.suse.com/1215911

https://bugzilla.suse.com/1215915

https://bugzilla.suse.com/1215916

https://bugzilla.suse.com/1215941

http://www.nessus.org/u?3831a50b

https://bugzilla.suse.com/1065729

https://www.suse.com/security/cve/CVE-2023-1192

https://www.suse.com/security/cve/CVE-2023-1206

https://www.suse.com/security/cve/CVE-2023-1859

https://www.suse.com/security/cve/CVE-2023-2177

https://www.suse.com/security/cve/CVE-2023-4155

https://www.suse.com/security/cve/CVE-2023-4389

https://www.suse.com/security/cve/CVE-2023-4622

https://www.suse.com/security/cve/CVE-2023-4623

https://www.suse.com/security/cve/CVE-2023-4921

https://www.suse.com/security/cve/CVE-2023-5345

https://www.suse.com/security/cve/CVE-2023-39192

https://www.suse.com/security/cve/CVE-2023-39193

https://www.suse.com/security/cve/CVE-2023-39194

https://www.suse.com/security/cve/CVE-2023-42753

https://www.suse.com/security/cve/CVE-2023-42754

Plugin Details

Severity: High

ID: 183072

File Name: suse_SU-2023-4071-1.nasl

Version: 1.2

Type: local

Agent: unix

Published: 10/14/2023

Updated: 9/24/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2023-5345

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default-extra, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150500_55_31-default, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-64kb

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/13/2023

Vulnerability Publication Date: 8/15/2022

Reference Information

CVE: CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-2177, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-4155, CVE-2023-42753, CVE-2023-42754, CVE-2023-4389, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-5345

SuSE: SUSE-SU-2023:4071-1