[SUSE-SU-2024:1097-1] Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5)
Severity
Important
CVEs
5
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5)
This update for the Linux Kernel 5.14.21-150500_11 fixes several issues.
The following security issues were fixed:
- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218487).
- CVE-2023-46813: Fixed a local privilege escalation with user-space programs that have access to MMIO regions (bsc#1216898).
- CVE-2023-39191: Fixed a lack of validation of dynamic pointers within user-supplied eBPF programs that may have allowed an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code. (bsc#1215863)
- CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218610).
- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208911).
- ID
- SUSE-SU-2024:1097-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2024/suse-su-20241097-1/
- Published
-
2024-04-03T07:39:28
(5 months ago) - Modified
-
2024-04-03T07:39:28
(5 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2023-1706
- ALAS2-2023-1932
- ALSA-2023:2458
- ALSA-2023:2951
- ALSA-2024:0897
- ALSA-2024:3138
- DSA-5593-1
- DSA-5594-1
- ELSA-2023-2458
- ELSA-2023-2951
- ELSA-2023-6583
- ELSA-2024-0461
- ELSA-2024-0897
- ELSA-2024-12094
- ELSA-2024-12159
- ELSA-2024-12187
- ELSA-2024-2394
- ELSA-2024-3138
- MS:CVE-2023-0461
- MS:CVE-2023-46813
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:2736
- RHSA-2023:2951
- RHSA-2024:0881
- RHSA-2024:0897
- RHSA-2024:2950
- RHSA-2024:3138
- RLSA-2024:3138
- SSA:2023-325-01
- SUSE-SU-2023:0749-1
- SUSE-SU-2023:0749-2
- SUSE-SU-2023:0774-1
- SUSE-SU-2023:0796-1
- SUSE-SU-2023:1608-1
- SUSE-SU-2023:1609-1
- SUSE-SU-2023:1710-1
- SUSE-SU-2023:1800-1
- SUSE-SU-2023:1811-1
- SUSE-SU-2023:1892-1
- SUSE-SU-2023:2371-1
- SUSE-SU-2023:2384-1
- SUSE-SU-2023:2405-1
- SUSE-SU-2023:2416-1
- SUSE-SU-2023:2423-1
- SUSE-SU-2023:2425-1
- SUSE-SU-2023:2431-1
- SUSE-SU-2023:2443-1
- SUSE-SU-2023:2448-1
- SUSE-SU-2023:2455-1
- SUSE-SU-2023:2468-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:4343-1
- SUSE-SU-2023:4345-1
- SUSE-SU-2023:4351-1
- SUSE-SU-2023:4375-1
- SUSE-SU-2023:4414-1
- SUSE-SU-2023:4732-1
- SUSE-SU-2023:4735-1
- SUSE-SU-2023:4784-1
- SUSE-SU-2023:4882-1
- SUSE-SU-2023:4883-1
- SUSE-SU-2024:0110-1
- SUSE-SU-2024:0112-1
- SUSE-SU-2024:0113-1
- SUSE-SU-2024:0115-1
- SUSE-SU-2024:0117-1
- SUSE-SU-2024:0118-1
- SUSE-SU-2024:0120-1
- SUSE-SU-2024:0129-1
- SUSE-SU-2024:0141-1
- SUSE-SU-2024:0153-1
- SUSE-SU-2024:0154-1
- SUSE-SU-2024:0156-1
- SUSE-SU-2024:0160-1
- SUSE-SU-2024:0469-1
- SUSE-SU-2024:0514-1
- SUSE-SU-2024:0516-1
- SUSE-SU-2024:0986-1
- SUSE-SU-2024:0989-1
- SUSE-SU-2024:0991-1
- SUSE-SU-2024:0995-1
- SUSE-SU-2024:1017-1
- SUSE-SU-2024:1023-1
- SUSE-SU-2024:1025-1
- SUSE-SU-2024:1028-1
- SUSE-SU-2024:1033-1
- SUSE-SU-2024:1039-1
- SUSE-SU-2024:1040-1
- SUSE-SU-2024:1045-1
- SUSE-SU-2024:1047-1
- SUSE-SU-2024:1053-1
- SUSE-SU-2024:1054-1
- SUSE-SU-2024:1063-1
- SUSE-SU-2024:1072-1
- SUSE-SU-2024:1153-1
- SUSE-SU-2024:1276-1
- SUSE-SU-2024:1454-1
- SUSE-SU-2024:1465-1
- SUSE-SU-2024:1489-1
- SUSE-SU-2024:1708-1
- SUSE-SU-2024:1719-1
- SUSE-SU-2024:2008-1
- SUSE-SU-2024:2010-1
- SUSE-SU-2024:2019-1
- SUSE-SU-2024:2120-1
- SUSE-SU-2024:2135-1
- SUSE-SU-2024:2148-1
- SUSE-SU-2024:2183-1
- SUSE-SU-2024:2185-1
- SUSE-SU-2024:2189-1
- SUSE-SU-2024:2190-1
- SUSE-SU-2024:2343-1
- SUSE-SU-2024:2373-1
- SUSE-SU-2024:2740-1
- SUSE-SU-2024:2755-1
- SUSE-SU-2024:3034-1
- SUSE-SU-2024:3043-1
- USN-5883-1
- USN-5911-1
- USN-5912-1
- USN-5913-1
- USN-5914-1
- USN-5915-1
- USN-5917-1
- USN-5919-1
- USN-5920-1
- USN-5924-1
- USN-5925-1
- USN-5927-1
- USN-5929-1
- USN-5934-1
- USN-5935-1
- USN-5938-1
- USN-5939-1
- USN-5940-1
- USN-5941-1
- USN-5950-1
- USN-5951-1
- USN-5962-1
- USN-5975-1
- USN-5976-1
- USN-6000-1
- USN-6007-1
- USN-6533-1
- USN-6606-1
- USN-6624-1
- USN-6626-1
- USN-6626-2
- USN-6626-3
- USN-6628-1
- USN-6628-2
- USN-6639-1
- USN-6652-1
- USN-6680-1
- USN-6680-2
- USN-6680-3
- USN-6681-1
- USN-6681-2
- USN-6681-3
- USN-6681-4
- USN-6686-1
- USN-6686-2
- USN-6686-3
- USN-6686-4
- USN-6686-5
- USN-6705-1
- USN-6716-1
- USN-6739-1
- USN-6740-1
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |