[SUSE-SU-2023:3889-1] Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP2)
Severity
Important
CVEs
5
Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP2)
This update for the Linux Kernel 5.3.18-150200_24_154 fixes several issues.
The following security issues were fixed:
- CVE-2023-3776: Fixed improper refcount update in cls_fw leads to use-after-free (bsc#1215119).
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619).
- CVE-2023-4273: Fixed a flaw in the exFAT driver of the Linux kernel that alloawed a local privileged attacker to overflow the kernel stack (bsc#1214123).
- CVE-2023-3609: Fixed reference counter leak leading to overflow in net/sched (bsc#1213587).
- CVE-2023-3812: Fixed an out-of-bounds memory access flaw in the TUN/TAP device driver functionality that could allow a local user to crash or potentially escalate their privileges on the system (bsc#1213706).
- ID
- SUSE-SU-2023:3889-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2023/suse-su-20233889-1/
- Published
-
2023-09-29T04:33:49
(11 months ago) - Modified
-
2023-09-29T04:33:49
(11 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2023-1701
- ALAS-2023-1792
- ALAS2-2023-1987
- ALAS2-2023-2179
- ALSA-2023:4517
- ALSA-2023:5069
- ALSA-2023:5244
- ALSA-2023:7077
- ALSA-2023:7549
- DSA-5480-1
- DSA-5492-1
- ELSA-2023-12842
- ELSA-2023-4517
- ELSA-2023-5069
- ELSA-2023-5244
- ELSA-2023-5622
- ELSA-2023-6583
- ELSA-2023-7077
- ELSA-2023-7423
- ELSA-2023-7549
- ELSA-2024-0461
- ELSA-2024-12094
- ELSA-2024-1831
- FEDORA-2023-d9509be489
- FEDORA-2023-ee241dcf80
- MS:CVE-2023-3609
- MS:CVE-2023-3776
- MS:CVE-2023-3812
- RHSA-2023:4517
- RHSA-2023:4531
- RHSA-2023:4541
- RHSA-2023:5069
- RHSA-2023:5091
- RHSA-2023:5093
- RHSA-2023:5221
- RHSA-2023:5244
- RHSA-2023:5255
- RHSA-2023:5574
- RHSA-2023:5621
- RHSA-2023:5622
- RHSA-2023:6901
- RHSA-2023:7077
- RHSA-2023:7419
- RHSA-2023:7423
- RHSA-2023:7424
- RHSA-2023:7548
- RHSA-2023:7549
- RHSA-2023:7554
- RHSA-2024:0340
- RLSA-2023:4517
- RLSA-2023:5244
- RLSA-2023:7549
- SSA:2023-172-02
- SSA:2023-325-01
- SUSE-SU-2023:2803-1
- SUSE-SU-2023:2820-1
- SUSE-SU-2023:2831-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:2892-1
- SUSE-SU-2023:3171-1
- SUSE-SU-2023:3172-1
- SUSE-SU-2023:3180-1
- SUSE-SU-2023:3182-1
- SUSE-SU-2023:3302-1
- SUSE-SU-2023:3309-1
- SUSE-SU-2023:3311-1
- SUSE-SU-2023:3313-1
- SUSE-SU-2023:3318-1
- SUSE-SU-2023:3324-1
- SUSE-SU-2023:3329-1
- SUSE-SU-2023:3333-1
- SUSE-SU-2023:3349-1
- SUSE-SU-2023:3376-1
- SUSE-SU-2023:3377-1
- SUSE-SU-2023:3390-1
- SUSE-SU-2023:3391-1
- SUSE-SU-2023:3392-1
- SUSE-SU-2023:3421-1
- SUSE-SU-2023:3599-1
- SUSE-SU-2023:3599-2
- SUSE-SU-2023:3600-1
- SUSE-SU-2023:3600-2
- SUSE-SU-2023:3601-1
- SUSE-SU-2023:3656-1
- SUSE-SU-2023:3680-1
- SUSE-SU-2023:3681-1
- SUSE-SU-2023:3682-1
- SUSE-SU-2023:3683-1
- SUSE-SU-2023:3684-1
- SUSE-SU-2023:3687-1
- SUSE-SU-2023:3704-1
- SUSE-SU-2023:3705-1
- SUSE-SU-2023:3748-1
- SUSE-SU-2023:3749-1
- SUSE-SU-2023:3768-1
- SUSE-SU-2023:3772-1
- SUSE-SU-2023:3773-1
- SUSE-SU-2023:3783-1
- SUSE-SU-2023:3784-1
- SUSE-SU-2023:3785-1
- SUSE-SU-2023:3786-1
- SUSE-SU-2023:3788-1
- SUSE-SU-2023:3806-1
- SUSE-SU-2023:3809-1
- SUSE-SU-2023:3811-1
- SUSE-SU-2023:3812-1
- SUSE-SU-2023:3838-1
- SUSE-SU-2023:3844-1
- SUSE-SU-2023:3846-1
- SUSE-SU-2023:3891-1
- SUSE-SU-2023:3892-1
- SUSE-SU-2023:3893-1
- SUSE-SU-2023:3912-1
- SUSE-SU-2023:3922-1
- SUSE-SU-2023:3923-1
- SUSE-SU-2023:3924-1
- SUSE-SU-2023:3928-1
- SUSE-SU-2023:3929-1
- SUSE-SU-2023:3964-1
- SUSE-SU-2023:3969-1
- SUSE-SU-2023:3971-1
- SUSE-SU-2023:3988-1
- SUSE-SU-2023:4097-1
- SUSE-SU-2023:4135-1
- SUSE-SU-2023:4136-1
- SUSE-SU-2023:4158-1
- SUSE-SU-2023:4159-1
- SUSE-SU-2023:4160-1
- SUSE-SU-2023:4243-1
- SUSE-SU-2023:4261-1
- SUSE-SU-2023:4264-1
- SUSE-SU-2023:4273-1
- SUSE-SU-2023:4280-1
- SUSE-SU-2023:4319-1
- SUSE-SU-2023:4774-1
- SUSE-SU-2023:4804-1
- SUSE-SU-2023:4845-1
- SUSE-SU-2024:0155-1
- SUSE-SU-2024:0376-1
- SUSE-SU-2024:0377-1
- SUSE-SU-2024:0393-1
- SUSE-SU-2024:0394-1
- SUSE-SU-2024:0410-1
- SUSE-SU-2024:0665-1
- SUSE-SU-2024:0695-1
- SUSE-SU-2024:1275-1
- SUSE-SU-2024:1276-1
- SUSE-SU-2024:1694-1
- SUSE-SU-2024:1708-1
- SUSE-SU-2024:1719-1
- SUSE-SU-2024:1730-1
- SUSE-SU-2024:1738-1
- SUSE-SU-2024:1979-1
- SUSE-SU-2024:1983-1
- SUSE-SU-2024:2008-1
- SUSE-SU-2024:2010-1
- SUSE-SU-2024:2019-1
- SUSE-SU-2024:2120-1
- SUSE-SU-2024:2121-1
- SUSE-SU-2024:2130-1
- SUSE-SU-2024:2139-1
- SUSE-SU-2024:2147-1
- SUSE-SU-2024:2148-1
- SUSE-SU-2024:2149-1
- SUSE-SU-2024:2183-1
- SUSE-SU-2024:2184-1
- SUSE-SU-2024:2185-1
- SUSE-SU-2024:2189-1
- SUSE-SU-2024:2190-1
- SUSE-SU-2024:2343-1
- SUSE-SU-2024:2344-1
- SUSE-SU-2024:2351-1
- SUSE-SU-2024:2357-1
- SUSE-SU-2024:2369-1
- SUSE-SU-2024:2373-1
- SUSE-SU-2024:2558-1
- SUSE-SU-2024:2559-1
- SUSE-SU-2024:2740-1
- SUSE-SU-2024:2755-1
- SUSE-SU-2024:2758-1
- SUSE-SU-2024:2759-1
- SUSE-SU-2024:2773-1
- SUSE-SU-2024:2792-1
- SUSE-SU-2024:2821-1
- SUSE-SU-2024:2822-1
- SUSE-SU-2024:3015-1
- SUSE-SU-2024:3034-1
- SUSE-SU-2024:3037-1
- SUSE-SU-2024:3039-1
- SUSE-SU-2024:3043-1
- SUSE-SU-2024:3044-1
- SUSE-SU-2024:3048-1
- USN-6033-1
- USN-6043-1
- USN-6044-1
- USN-6045-1
- USN-6047-1
- USN-6051-1
- USN-6052-1
- USN-6058-1
- USN-6069-1
- USN-6070-1
- USN-6071-1
- USN-6072-1
- USN-6093-1
- USN-6107-1
- USN-6133-1
- USN-6134-1
- USN-6222-1
- USN-6256-1
- USN-6285-1
- USN-6309-1
- USN-6315-1
- USN-6317-1
- USN-6318-1
- USN-6321-1
- USN-6324-1
- USN-6325-1
- USN-6327-1
- USN-6328-1
- USN-6329-1
- USN-6330-1
- USN-6331-1
- USN-6332-1
- USN-6341-1
- USN-6342-1
- USN-6342-2
- USN-6343-1
- USN-6346-1
- USN-6348-1
- USN-6357-1
- USN-6385-1
- USN-6397-1
- USN-6412-1
- USN-6416-1
- USN-6416-2
- USN-6416-3
- USN-6445-1
- USN-6445-2
- USN-6466-1
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |