File _patchinfo of Package patchinfo.31839

<patchinfo incident="31839">
  <issue id="1213584" tracker="bnc">VUL-0: CVE-2023-3610: kernel live patch: use-after-free vulnerability in nf_tables can be exploited to achieve local privilege escalation</issue>
  <issue id="1215097" tracker="bnc">VUL-0: CVE-2023-3777: kernel live patch: netfilter: nf_tables use-after-free via nf_tables_delrule()</issue>
  <issue id="1215442" tracker="bnc">VUL-0: CVE-2023-4622: kernel live patch: af_unix UAF</issue>
  <issue id="1215519" tracker="bnc">VUL-0: CVE-2023-2163: kernel live patch: Incorrect verifier pruning in BPF in Linux Kernel &gt;=5.4 leads to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memor</issue>
  <issue id="1215971" tracker="bnc">VUL-0: CVE-2023-5345: kernel live patch: use-after-free in fs/smb/client</issue>
  <issue id="2023-2163" tracker="cve" />
  <issue id="2023-3610" tracker="cve" />
  <issue id="2023-3777" tracker="cve" />
  <issue id="2023-4622" tracker="cve" />
  <issue id="2023-5345" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>nstange</packager>
  <description>This update for the Linux Kernel 5.14.21-150400_24_66 fixes several issues.

The following security issues were fixed:

- CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be exploited to achieve local privilege escalation (bsc#1213584).
- CVE-2023-3777: Fixed a use-after-free vulnerability in netfilter: nf_tables component can be exploited to achieve local privilege escalation. (bsc#1215097)
- CVE-2023-5345: Fixed an use-after-free vulnerability in the fs/smb/client component which could be exploited to achieve local privilege escalation. (bsc#1215971)
- CVE-2023-4622: Fixed a use-after-free vulnerability in the Unix domain sockets component which could be exploited to achieve local privilege escalation (bsc#1215442).
- CVE-2023-2163: Fixed an incorrect verifier pruning in BPF that could lead to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape. (bsc#1215519)
</description>
<summary>Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP4)</summary>
</patchinfo>
openSUSE Build Service is sponsored by