File _patchinfo of Package patchinfo.31184

<patchinfo incident="31184">
  <issue id="1212934" tracker="bnc">VUL-0: CVE-2023-3390: kernel live patch: use-after-free in the netfilter subsystem in net/netfilter/nf_tables_api.c</issue>
  <issue id="1214812" tracker="bnc">VUL-0: CVE-2023-4004: kernel live patch: netfilter: nft_set_pipapo: improper element removal in function nft_pipapo_remove when insert an element without a NFT_SET_EXT_KEY_END that can lead to use-af</issue>
  <issue id="1215118" tracker="bnc">VUL-0: CVE-2023-4147: kernel live patch: netfilter: nf_tables_newrule when adding a rule with NFTA_RULE_CHAIN_ID leads to use-after-free</issue>
  <issue id="1215440" tracker="bnc">VUL-0: CVE-2023-4623: kernel live patch: net/sched UAF in sch_hfsc</issue>
  <issue id="2023-3390" tracker="cve" />
  <issue id="2023-4004" tracker="cve" />
  <issue id="2023-4147" tracker="cve" />
  <issue id="2023-4623" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>nstange</packager>
  <description>This update for the Linux Kernel 5.3.18-150300_59_98 fixes several issues.

The following security issues were fixed:

- CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215440).
- CVE-2023-4147: Fixed use-after-free in nf_tables_newrule (bsc#1215118).
- CVE-2023-4004: Fixed improper element removal netfilter nft_set_pipapo (bsc#1214812).
- CVE-2023-3390: Fixed an use-after-free vulnerability in the netfilter subsystem in net/netfilter/nf_tables_api.c that could allow a local attacker with user access to cause a privilege escalation issue (bsc#1212934).
</description>
<summary>Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP3)</summary>
</patchinfo>
openSUSE Build Service is sponsored by