[SUSE-SU-2023:2431-1] Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP4)
Severity
Important
CVEs
7
Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP4)
This update for the Linux Kernel 5.14.21-150400_24_38 fixes several issues.
The following security issues were fixed:
- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/uetooth/hci_conn.c (bsc#1211111).
- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210500).
- CVE-2023-0386: Fixed privileges escalation for low-privileged users in the OverlayFS subsystem (bsc#1210499).
- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209683).
- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210662).
- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208911).
- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207188).
- ID
- SUSE-SU-2023:2431-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2023/suse-su-20232431-1/
- Published
-
2023-06-06T21:04:43
(15 months ago) - Modified
-
2023-06-06T21:04:43
(15 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2023-1701
- ALAS-2023-1706
- ALAS-2023-1735
- ALAS2-2023-1932
- ALAS2-2023-1987
- ALAS2-2023-2027
- ALSA-2023:1566
- ALSA-2023:1703
- ALSA-2023:2458
- ALSA-2023:2951
- ALSA-2023:4517
- ALSA-2023:7077
- ALSA-2024:0113
- ALSA-2024:3138
- DSA-5324-1
- DSA-5402-1
- DSA-5492-1
- ELSA-2023-12196
- ELSA-2023-12206
- ELSA-2023-12207
- ELSA-2023-12375
- ELSA-2023-12974
- ELSA-2023-13001
- ELSA-2023-13005
- ELSA-2023-1566
- ELSA-2023-1703
- ELSA-2023-2458
- ELSA-2023-2951
- ELSA-2023-4517
- ELSA-2023-6583
- ELSA-2023-7077
- ELSA-2024-12069
- ELSA-2024-12354
- ELSA-2024-2394
- ELSA-2024-3138
- MS:CVE-2023-0461
- MS:CVE-2023-23454
- RHSA-2023:1566
- RHSA-2023:1584
- RHSA-2023:1659
- RHSA-2023:1681
- RHSA-2023:1691
- RHSA-2023:1703
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:2736
- RHSA-2023:2951
- RHSA-2023:4517
- RHSA-2023:4531
- RHSA-2023:4541
- RHSA-2023:6901
- RHSA-2023:7077
- RHSA-2024:0113
- RHSA-2024:0134
- RHSA-2024:2950
- RHSA-2024:3138
- RLSA-2023:1566
- RLSA-2023:4517
- RLSA-2024:3138
- SSA:2023-048-01
- SSA:2023-172-02
- SUSE-SU-2023:0145-1
- SUSE-SU-2023:0152-1
- SUSE-SU-2023:0406-1
- SUSE-SU-2023:0407-1
- SUSE-SU-2023:0410-1
- SUSE-SU-2023:0420-1
- SUSE-SU-2023:0433-1
- SUSE-SU-2023:0485-1
- SUSE-SU-2023:0488-1
- SUSE-SU-2023:0591-1
- SUSE-SU-2023:0618-1
- SUSE-SU-2023:0749-1
- SUSE-SU-2023:0749-2
- SUSE-SU-2023:0774-1
- SUSE-SU-2023:0796-1
- SUSE-SU-2023:1608-1
- SUSE-SU-2023:1609-1
- SUSE-SU-2023:1710-1
- SUSE-SU-2023:1800-1
- SUSE-SU-2023:1801-1
- SUSE-SU-2023:1802-1
- SUSE-SU-2023:1803-1
- SUSE-SU-2023:1811-1
- SUSE-SU-2023:1848-1
- SUSE-SU-2023:1892-1
- SUSE-SU-2023:1894-1
- SUSE-SU-2023:1897-1
- SUSE-SU-2023:1992-1
- SUSE-SU-2023:2140-1
- SUSE-SU-2023:2141-1
- SUSE-SU-2023:2146-1
- SUSE-SU-2023:2147-1
- SUSE-SU-2023:2148-1
- SUSE-SU-2023:2151-1
- SUSE-SU-2023:2156-1
- SUSE-SU-2023:2162-1
- SUSE-SU-2023:2163-1
- SUSE-SU-2023:2231-1
- SUSE-SU-2023:2232-1
- SUSE-SU-2023:2367-1
- SUSE-SU-2023:2368-1
- SUSE-SU-2023:2369-1
- SUSE-SU-2023:2371-1
- SUSE-SU-2023:2376-1
- SUSE-SU-2023:2384-1
- SUSE-SU-2023:2385-1
- SUSE-SU-2023:2386-1
- SUSE-SU-2023:2389-1
- SUSE-SU-2023:2395-1
- SUSE-SU-2023:2399-1
- SUSE-SU-2023:2401-1
- SUSE-SU-2023:2405-1
- SUSE-SU-2023:2413-1
- SUSE-SU-2023:2415-1
- SUSE-SU-2023:2416-1
- SUSE-SU-2023:2420-1
- SUSE-SU-2023:2422-1
- SUSE-SU-2023:2423-1
- SUSE-SU-2023:2425-1
- SUSE-SU-2023:2428-1
- SUSE-SU-2023:2429-1
- SUSE-SU-2023:2442-1
- SUSE-SU-2023:2443-1
- SUSE-SU-2023:2448-1
- SUSE-SU-2023:2450-1
- SUSE-SU-2023:2453-1
- SUSE-SU-2023:2455-1
- SUSE-SU-2023:2459-1
- SUSE-SU-2023:2468-1
- SUSE-SU-2023:2500-1
- SUSE-SU-2023:2506-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2653-1
- SUSE-SU-2023:2782-1
- SUSE-SU-2023:2805-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:4030-1
- SUSE-SU-2023:4095-1
- SUSE-SU-2023:4273-1
- SUSE-SU-2023:4280-1
- SUSE-SU-2023:4319-1
- SUSE-SU-2023:4735-1
- SUSE-SU-2023:4784-1
- SUSE-SU-2023:4882-1
- SUSE-SU-2023:4883-1
- SUSE-SU-2024:1039-1
- SUSE-SU-2024:1097-1
- USN-5883-1
- USN-5911-1
- USN-5912-1
- USN-5913-1
- USN-5914-1
- USN-5915-1
- USN-5917-1
- USN-5919-1
- USN-5920-1
- USN-5924-1
- USN-5925-1
- USN-5927-1
- USN-5929-1
- USN-5934-1
- USN-5935-1
- USN-5938-1
- USN-5939-1
- USN-5940-1
- USN-5941-1
- USN-5950-1
- USN-5951-1
- USN-5962-1
- USN-5975-1
- USN-5976-1
- USN-5977-1
- USN-5978-1
- USN-5982-1
- USN-5987-1
- USN-6000-1
- USN-6004-1
- USN-6007-1
- USN-6024-1
- USN-6025-1
- USN-6027-1
- USN-6029-1
- USN-6030-1
- USN-6031-1
- USN-6033-1
- USN-6040-1
- USN-6043-1
- USN-6057-1
- USN-6071-1
- USN-6072-1
- USN-6079-1
- USN-6080-1
- USN-6081-1
- USN-6084-1
- USN-6085-1
- USN-6090-1
- USN-6091-1
- USN-6092-1
- USN-6093-1
- USN-6094-1
- USN-6095-1
- USN-6096-1
- USN-6109-1
- USN-6118-1
- USN-6132-1
- USN-6133-1
- USN-6134-1
- USN-6175-1
- USN-6186-1
- USN-6222-1
- USN-6254-1
- USN-6256-1
- USN-6385-1
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |