Linux Kernel Multiple Vulnerabilities
Release Date:
30 Jan 2023
4973
Views
RISK: Medium Risk
TYPE: Operating Systems - Linux
Multiple vulnerabilities were identified in Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution and sensitive information disclosure on the targeted system.
Impact
- Denial of Service
- Information Disclosure
- Remote Code Execution
- Elevation of Privilege
System / Technologies affected
- SUSE Enterprise Storage 7.1
- SUSE Manager Proxy 4.2
- SUSE Manager Proxy 4.3
- SUSE Manager Retail Branch Server 4.2
- SUSE Manager Retail Branch Server 4.3
- SUSE Manager Server 4.2
- SUSE Manager Server 4.3
- SUSE Linux Enterprise Desktop 12-SP5
- SUSE Linux Enterprise Desktop 15-SP4
- SUSE Linux Enterprise High Availability 12-SP5
- SUSE Linux Enterprise High Availability 15-SP3
- SUSE Linux Enterprise High Availability 15-SP4
- SUSE Linux Enterprise High Performance Computing
- SUSE Linux Enterprise High Performance Computing 15-SP3
- SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS
- SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS
- SUSE Linux Enterprise High Performance Computing 15-SP4
- SUSE Linux Enterprise High Performance Computing 12-SP5
- SUSE Linux Enterprise Live Patching 12-SP5
- SUSE Linux Enterprise Micro 5.1
- SUSE Linux Enterprise Micro 5.2
- SUSE Linux Enterprise Micro 5.3
- SUSE Linux Enterprise Module for Basesystem 15-SP4
- SUSE Linux Enterprise Module for Development Tools 15-SP4
- SUSE Linux Enterprise Module for Legacy Software 15-SP4
- SUSE Linux Enterprise Module for Live Patching 15-SP3
- SUSE Linux Enterprise Module for Live Patching 15-SP4
- SUSE Linux Enterprise Module for Realtime 15-SP3
- SUSE Linux Enterprise Module for Realtime 15-SP4
- SUSE Linux Enterprise Real Time 15-SP3
- SUSE Linux Enterprise Real Time 15-SP4
- SUSE Linux Enterprise Real Time Extension 12-SP5
- SUSE Linux Enterprise Real Time Extension 15-SP3
- SUSE Linux Enterprise Server
- SUSE Linux Enterprise Server 12-SP5
- SUSE Linux Enterprise Server 15-SP3
- SUSE Linux Enterprise Server 15-SP3-LTSS
- SUSE Linux Enterprise Server 15-SP4
- SUSE Linux Enterprise Server for SAP 15-SP3
- SUSE Linux Enterprise Server for SAP Applications
- SUSE Linux Enterprise Server for SAP Applications 12-SP5
- SUSE Linux Enterprise Server for SAP Applications 15-SP3
- SUSE Linux Enterprise Server for SAP Applications 15-SP4
- SUSE Linux Enterprise Software Development Kit 12-SP5
- SUSE Linux Enterprise Workstation Extension 12-SP5
- SUSE Linux Enterprise Workstation Extension 15-SP4
- SUSE Linux Enterprise High Performance Computing 15-SP4
- SUSE Linux Enterprise Module for Public Cloud 15-SP4
- SUSE Linux Enterprise Server 15-SP4
- SUSE Linux Enterprise Server for SAP Applications 15-SP4
- openSUSE Leap 15.4
- openSUSE Leap Micro 5.2
- openSUSE Leap Micro 5.3
- Ubuntu 18.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 22.04 LTS
Solutions
Before installation of the software, please visit the vendor web-site for more details.
For SUSE
Apply fixes issued by the vendor:
- https://www.suse.com/support/update/announcement/2023/suse-su-20230134-1/
- https://www.suse.com/support/update/announcement/2023/suse-su-20230145-1/
- https://www.suse.com/support/update/announcement/2023/suse-su-20230146-1/
- https://www.suse.com/support/update/announcement/2023/suse-su-20230147-1/
- https://www.suse.com/support/update/announcement/2023/suse-su-20230148-1/
- https://www.suse.com/support/update/announcement/2023/suse-su-20230149-1/
- https://www.suse.com/support/update/announcement/2023/suse-su-20230152-1/
For Ubuntu
Apply fixes issued by the vendor:
- https://ubuntu.com/security/notices/USN-5829-1
- https://ubuntu.com/security/notices/USN-5830-1
- https://ubuntu.com/security/notices/USN-5831-1
Vulnerability Identifier
- CVE-2019-19083
- CVE-2022-3104
- CVE-2022-3105
- CVE-2022-3106
- CVE-2022-3107
- CVE-2022-3108
- CVE-2022-3111
- CVE-2022-3112
- CVE-2022-3113
- CVE-2022-3114
- CVE-2022-3115
- CVE-2022-3344
- CVE-2022-3435
- CVE-2022-3564
- CVE-2022-3643
- CVE-2022-4378
- CVE-2022-4379
- CVE-2022-4662
- CVE-2022-42328
- CVE-2022-42329
- CVE-2022-42896
- CVE-2022-43945
- CVE-2022-45934
- CVE-2022-47520
- CVE-2022-47929
- CVE-2023-0266
- CVE-2023-23454
- CVE-2023-23455
Source
Related Link
- https://www.suse.com/support/update/announcement/2023/suse-su-20230134-1/
- https://www.suse.com/support/update/announcement/2023/suse-su-20230145-1/
- https://www.suse.com/support/update/announcement/2023/suse-su-20230146-1/
- https://www.suse.com/support/update/announcement/2023/suse-su-20230147-1/
- https://www.suse.com/support/update/announcement/2023/suse-su-20230148-1/
- https://www.suse.com/support/update/announcement/2023/suse-su-20230149-1/
- https://www.suse.com/support/update/announcement/2023/suse-su-20230152-1/
- https://ubuntu.com/security/notices/USN-5829-1
- https://ubuntu.com/security/notices/USN-5830-1
- https://ubuntu.com/security/notices/USN-5831-1
Related Tags
Share with