SUSE Linux Kernel Multiple Vulnerabilities
RISK: Medium Risk
TYPE: Operating Systems - Linux
Multiple vulnerabilities were identified in SUSE Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, information disclosure and remote code execution on the targeted system.
[Updated on 2023-11-07]
Updated System / Technologies affected, Solutions, Vulnerability Identifier and Related Links.
[Updated on 2023-11-14]
Updated System / Technologies affected, Solutions, Vulnerability Identifier and Related Links.
Impact
- Denial of Service
- Elevation of Privilege
- Remote Code Execution
- Information Disclosure
System / Technologies affected
- openSUSE Leap 15.3
- openSUSE Leap 15.4
- openSUSE Leap 15.5
- openSUSE Leap Micro 5.3
- openSUSE Leap Micro 5.4
- Public Cloud Module 15-SP4
- Public Cloud Module 15-SP5
- SUSE CaaS Platform 4.0
- SUSE Enterprise Storage 7.1
- SUSE Linux Enterprise High Availability Extension 12 SP5
- SUSE Linux Enterprise High Availability Extension 15 SP1
- SUSE Linux Enterprise High Availability Extension 15 SP3
- SUSE Linux Enterprise High Performance Computing 12 SP5
- SUSE Linux Enterprise High Performance Computing 15 SP1
- SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
- SUSE Linux Enterprise High Performance Computing 15 SP3
- SUSE Linux Enterprise High Performance Computing 15 SP4
- SUSE Linux Enterprise High Performance Computing 15 SP5
- SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
- SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
- SUSE Linux Enterprise Live Patching 12-SP5
- SUSE Linux Enterprise Live Patching 15-SP1
- SUSE Linux Enterprise Live Patching 15-SP3
- SUSE Linux Enterprise Live Patching 15-SP4
- SUSE Linux Enterprise Live Patching 15-SP5
- SUSE Linux Enterprise Micro 5.1
- SUSE Linux Enterprise Micro 5.2
- SUSE Linux Enterprise Micro 5.3
- SUSE Linux Enterprise Micro 5.4
- SUSE Linux Enterprise Micro 5.5
- SUSE Linux Enterprise Micro for Rancher 5.2
- SUSE Linux Enterprise Micro for Rancher 5.3
- SUSE Linux Enterprise Micro for Rancher 5.4
- SUSE Linux Enterprise Real Time 12 SP5
- SUSE Linux Enterprise Real Time 15 SP4
- SUSE Linux Enterprise Real Time 15 SP5
- SUSE Linux Enterprise Server 12 SP5
- SUSE Linux Enterprise Server 15 SP1
- SUSE Linux Enterprise Server 15 SP1 Business Critical Linux 15-SP1
- SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
- SUSE Linux Enterprise Server 15 SP3
- SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3
- SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
- SUSE Linux Enterprise Server 15 SP4
- SUSE Linux Enterprise Server 15 SP5
- SUSE Linux Enterprise Server for SAP Applications 12 SP5
- SUSE Linux Enterprise Server for SAP Applications 15 SP1
- SUSE Linux Enterprise Server for SAP Applications 15 SP3
- SUSE Linux Enterprise Server for SAP Applications 15 SP4
- SUSE Linux Enterprise Server for SAP Applications 15 SP5
- SUSE Linux Enterprise Software Development Kit 12 SP5
- SUSE Linux Enterprise Workstation Extension 12 12-SP5
- SUSE Manager Proxy 4.0
- SUSE Manager Proxy 4.2
- SUSE Manager Proxy 4.3
- SUSE Manager Retail Branch Server 4.0
- SUSE Manager Retail Branch Server 4.2
- SUSE Manager Retail Branch Server 4.3
- SUSE Manager Server 4.0
- SUSE Manager Server 4.2
- SUSE Manager Server 4.3
- SUSE Real Time Module 15-SP4
- SUSE Real Time Module 15-SP5
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- https://www.suse.com/support/update/announcement/2023/suse-su-20234267-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234322-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234319-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234326-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234328-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234313-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234273-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234308-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234325-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234321-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234347-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234359-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234348-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234358-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234343-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234346-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234349-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234345-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234351-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234414-1/
Vulnerability Identifier
- CVE-2020-36766
- CVE-2023-1192
- CVE-2023-1206
- CVE-2023-1281
- CVE-2023-1829
- CVE-2023-1859
- CVE-2023-2163
- CVE-2023-2860
- CVE-2023-3111
- CVE-2023-3390
- CVE-2023-3777
- CVE-2023-4004
- CVE-2023-4147
- CVE-2023-4622
- CVE-2023-4623
- CVE-2023-4881
- CVE-2023-4921
- CVE-2023-5178
- CVE-2023-31085
- CVE-2023-34324
- CVE-2023-39189
- CVE-2023-39191
- CVE-2023-39192
- CVE-2023-39193
- CVE-2023-39194
- CVE-2023-40283
- CVE-2023-42754
- CVE-2023-45862
- CVE-2023-46813
- CVE-2023-2163
- CVE-2023-2860
- CVE-2023-3777
- CVE-2023-5178
- CVE-2023-31085
- CVE-2023-34324
- CVE-2023-39189
- CVE-2023-39191
- CVE-2023-39193
- CVE-2023-45862
- CVE-2023-46813
Source
Related Link
- https://www.auscert.org.au/bulletins/ESB-2023.6405
- https://www.auscert.org.au/bulletins/ESB-2023.6404
- https://www.auscert.org.au/bulletins/ESB-2023.6401
- https://www.auscert.org.au/bulletins/ESB-2023.6399
- https://www.auscert.org.au/bulletins/ESB-2023.6397
- https://www.auscert.org.au/bulletins/ESB-2023.6396
- https://www.auscert.org.au/bulletins/ESB-2023.6395
- https://www.auscert.org.au/bulletins/ESB-2023.6394
- https://www.auscert.org.au/bulletins/ESB-2023.6392
- https://www.auscert.org.au/bulletins/ESB-2023.6391
- https://www.suse.com/support/update/announcement/2023/suse-su-20234267-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234322-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234319-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234326-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234328-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234313-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234273-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234308-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234325-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234321-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234347-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234359-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234348-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234358-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234343-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234346-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234349-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234345-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234351-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20234414-1/
Related Tags
Share with