File _patchinfo of Package patchinfo.29195
<patchinfo incident="29195">
<issue id="1207188" tracker="bnc">VUL-0: CVE-2023-23454: kernel live patch: type-confusion in the CBQ network scheduler</issue>
<issue id="1209683" tracker="bnc">VUL-0: CVE-2023-1281: kernel live patch: use-after-free vulnerability inside the traffic control index filter (tcindex) allows Privilege Escalation</issue>
<issue id="1210500" tracker="bnc">VUL-0: CVE-2023-1989: kernel live patch: Use after free bug in btsdio_remove due to race condition</issue>
<issue id="1210662" tracker="bnc">VUL-0: CVE-2023-2162: kernel live patch: UAF during login when accessing the shost ipaddress</issue>
<issue id="1211111" tracker="bnc">VUL-0: CVE-2023-28464: kernel live patches: double free in hci_conn_cleanup()</issue>
<issue id="2023-1281" tracker="cve" />
<issue id="2023-1989" tracker="cve" />
<issue id="2023-2162" tracker="cve" />
<issue id="2023-23454" tracker="cve" />
<issue id="2023-28464" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>nstange</packager>
<description>This update for the Linux Kernel 4.12.14-150100_197_114 fixes several issues.
The following security issues were fixed:
- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/uetooth/hci_conn.c (bsc#1211111).
- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210500).
- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209683).
- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210662).
- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207188).
</description>
<summary>Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP1)</summary>
</patchinfo>