Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Leap:15.5:Update
patchinfo.23069
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.23069
<patchinfo incident="23069"> <issue id="1194463" tracker="bnc">VUL-0: CVE-2021-0920: kernel live patch: Use After Free in unix_gc() which could result in a local privilege escalation</issue> <issue id="1195307" tracker="bnc">VUL-0: CVE-2021-22600: kernel live patch: A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service</issue> <issue id="1195947" tracker="bnc">VUL-0: CVE-2022-0516: kernel live patch: KVM: s390: missing check in ioctl allows kernel memory read/write</issue> <issue id="2021-0920" tracker="cve" /> <issue id="2021-22600" tracker="cve" /> <issue id="2022-0516" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>nstange</packager> <description>This update for the Linux Kernel 5.3.18-57 fixes several issues. The following security issues were fixed: - CVE-2022-0516: Fixed KVM s390 return error on SIDA memop on normal guest (bsc#1195947). - CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463). - CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bsc#1195307). </description> <summary>Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor