File _patchinfo of Package patchinfo.22593

<patchinfo incident="22593">
  <issue id="1192036" tracker="bnc">VUL-0: CVE-2021-42739: kernel live patch: media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()</issue>
  <issue id="1193529" tracker="bnc">VUL-0: CVE-2021-4028: kernel live patch: kernel: use-after-free in RDMA listen()</issue>
  <issue id="1194737" tracker="bnc">VUL-0: CVE-2022-0185: kernel live patch: overflow bug in legacy_parse_param</issue>
  <issue id="2021-4028" tracker="cve" />
  <issue id="2021-42739" tracker="cve" />
  <issue id="2022-0185" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>nstange</packager> 
  <description>This update for the Linux Kernel 5.3.18-59_24 fixes several issues.

The following security issues were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2021-4028: Fixed use-after-free in RDMA listen() that could lead to DoS or privilege escalation by a local attacker (bsc#1193167).
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
</description>
<summary>Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP3)</summary>
</patchinfo>
openSUSE Build Service is sponsored by