File _patchinfo of Package patchinfo.22589
<patchinfo incident="22589">
<issue id="1191529" tracker="bnc">VUL-0: CVE-2020-3702: kernel live patch: ath9k patches to stable</issue>
<issue id="1192036" tracker="bnc">VUL-0: CVE-2021-42739: kernel live patch: media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()</issue>
<issue id="1193529" tracker="bnc">VUL-0: CVE-2021-4028: kernel live patch: kernel: use-after-free in RDMA listen()</issue>
<issue id="1194461" tracker="bnc">VUL-0: CVE-2021-4154: kernel live patch: security issue in cgroups</issue>
<issue id="1194737" tracker="bnc">VUL-0: CVE-2022-0185: kernel live patch: overflow bug in legacy_parse_param</issue>
<issue id="2020-3702" tracker="cve" />
<issue id="2021-4028" tracker="cve" />
<issue id="2021-4154" tracker="cve" />
<issue id="2021-42739" tracker="cve" />
<issue id="2022-0185" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>nstange</packager>
<description>This update for the Linux Kernel 5.3.18-59_10 fixes several issues.
The following security issues were fixed:
- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2021-4154: Fixed option parsing with cgroups version 1 (bsc#1193842).
- CVE-2021-4028: Fixed use-after-free in RDMA listen() that could lead to DoS or privilege escalation by a local attacker (bsc#1193167).
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
</description>
<summary>Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP3)</summary>
</patchinfo>