File _patchinfo of Package patchinfo.27630

<patchinfo incident="27630">
  <issue id="1204167" tracker="bnc"></issue>
  <issue id="1205186" tracker="bnc"></issue>
  <issue id="1206373" tracker="bnc"></issue>
  <issue id="2022-2602" tracker="cve" />
  <issue id="2022-3424" tracker="cve" />
  <issue id="2022-4379" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>nstange</packager>
  <description>This update for the Linux Kernel 5.14.21-150400_22 fixes several issues.

The following security issues were fixed:

- CVE-2022-4379: A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allowed an attacker to conduct a remote denial of service attack (bsc#1206373).
- CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault() and gru_handle_user_call_os() that could lead to kernel panic  (bsc#1204167).
- CVE-2022-2602: Fixed a local privilege escalation vulnerability involving Unix socket Garbage Collection and io_uring (bsc#1205186).
</description>
<summary>Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP4)</summary>
</patchinfo>
openSUSE Build Service is sponsored by