File _patchinfo of Package patchinfo.22577

<patchinfo incident="22577">
  <issue id="1191529" tracker="bnc">VUL-0: CVE-2020-3702: kernel live patch: ath9k patches to stable</issue>
  <issue id="1192036" tracker="bnc">VUL-0: CVE-2021-42739: kernel live patch: media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()</issue>
  <issue id="1194461" tracker="bnc">VUL-0: CVE-2021-4154: kernel live patch: security issue in cgroups</issue>
  <issue id="1194737" tracker="bnc">VUL-0: CVE-2022-0185: kernel live patch: overflow bug in legacy_parse_param</issue>
  <issue id="2020-3702" tracker="cve" />
  <issue id="2021-4154" tracker="cve" />
  <issue id="2021-42739" tracker="cve" />
  <issue id="2022-0185" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>nstange</packager> 
  <description>This update for the Linux Kernel 5.3.18-24_64 fixes several issues.

The following security issues were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2021-4154: Fixed option parsing with cgroups version 1 (bsc#1193842).
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
</description>
<summary>Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP2)</summary>
</patchinfo>
openSUSE Build Service is sponsored by