File _patchinfo of Package patchinfo.27633
<patchinfo incident="27633"> <issue id="1204167" tracker="bnc"></issue> <issue id="1205186" tracker="bnc"></issue> <issue id="1206373" tracker="bnc"></issue> <issue id="2022-2602" tracker="cve" /> <issue id="2022-3424" tracker="cve" /> <issue id="2022-4379" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>nstange</packager> <description>This update for the Linux Kernel 5.14.21-150400_24_21 fixes several issues. The following security issues were fixed: - CVE-2022-4379: A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allowed an attacker to conduct a remote denial of service attack (bsc#1206373). - CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault() and gru_handle_user_call_os() that could lead to kernel panic (bsc#1204167). - CVE-2022-2602: Fixed a local privilege escalation vulnerability involving Unix socket Garbage Collection and io_uring (bsc#1205186). </description> <summary>Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP4)</summary> </patchinfo>