File _patchinfo of Package patchinfo.30811
<patchinfo incident="30811">
<issue id="1213587" tracker="bnc">VUL-0: CVE-2023-3609: kernel live patch: use-after-free in net/sched: cls_u32 can lead to local privilege escalation</issue>
<issue id="1214123" tracker="bnc">VUL-0: CVE-2023-4273: kernel live patch: exFAT: stack overflow in exfat_get_uniname_from_ext_entry</issue>
<issue id="1215119" tracker="bnc">VUL-0: CVE-2023-3776: kernel live patch: use-after-free vulnerability the cls_fw component</issue>
<issue id="2023-3609" tracker="cve" />
<issue id="2023-3776" tracker="cve" />
<issue id="2023-4273" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>nstange</packager>
<description>This update for the Linux Kernel 5.14.21-150500_55_12 fixes several issues.
The following security issues were fixed:
- CVE-2023-3776: Fixed improper refcount update in cls_fw leads to use-after-free (bsc#1215119).
- CVE-2023-4273: Fixed a flaw in the exFAT driver of the Linux kernel that alloawed a local privileged attacker to overflow the kernel stack (bsc#1214123).
- CVE-2023-3609: Fixed reference counter leak leading to overflow in net/sched (bsc#1213587).
</description>
<summary>Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP5)</summary>
</patchinfo>