File _patchinfo of Package patchinfo.30752

<patchinfo incident="30752">
  <issue id="1210619" tracker="bnc">VUL-0: CVE-2023-1829: kernel live patch: Linux kernel: Vulnerabilities in the tcindex classifier</issue>
  <issue id="1213587" tracker="bnc">VUL-0: CVE-2023-3609: kernel live patch: use-after-free in net/sched: cls_u32 can lead to local privilege escalation</issue>
  <issue id="1213706" tracker="bnc">VUL-0: CVE-2023-3812: kernel live patch: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags</issue>
  <issue id="1215119" tracker="bnc">VUL-0: CVE-2023-3776: kernel live patch: use-after-free vulnerability the cls_fw component</issue>
  <issue id="2023-1829" tracker="cve" />
  <issue id="2023-3609" tracker="cve" />
  <issue id="2023-3776" tracker="cve" />
  <issue id="2023-3812" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>nstange</packager>
  <description>This update for the Linux Kernel 4.12.14-150100_197_126 fixes several issues.

The following security issues were fixed:

- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619).
- CVE-2023-3776: Fixed improper refcount update in cls_fw leads to use-after-free (bsc#1215119).
- CVE-2023-3609: Fixed reference counter leak leading to  overflow in net/sched (bsc#1213587).
- CVE-2023-3812: Fixed an out-of-bounds memory access flaw in the TUN/TAP device driver functionality that could allow a local user to crash or potentially escalate their privileges on the system (bsc#1213706).
</description>
<summary>Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP1)</summary>
</patchinfo>
openSUSE Build Service is sponsored by