File _patchinfo of Package patchinfo.31170

<patchinfo incident="31170">
  <issue id="1209683" tracker="bnc">VUL-0: CVE-2023-1281: kernel live patch: use-after-free vulnerability inside the traffic control index filter (tcindex) allows Privilege Escalation</issue>
  <issue id="1210619" tracker="bnc">VUL-0: CVE-2023-1829: kernel live patch: Linux kernel: Vulnerabilities in the tcindex classifier</issue>
  <issue id="1215440" tracker="bnc">VUL-0: CVE-2023-4623: kernel live patch: net/sched UAF in sch_hfsc</issue>
  <issue id="2023-1281" tracker="cve" />
  <issue id="2023-1829" tracker="cve" />
  <issue id="2023-4623" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>nstange</packager>
  <description>This update for the Linux Kernel 4.12.14-150100_197_157 fixes several issues.

The following security issues were fixed:

- CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215440).
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619).
- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209683).
</description>
<summary>Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP1)</summary>
</patchinfo>
openSUSE Build Service is sponsored by