Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Step:15-SP4
patchinfo.26375
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.26375
<patchinfo incident="26375"> <issue id="1204292" tracker="bnc">VUL-0: CVE-2022-42719: kernel live patch: remote crash/code execution with wlan frames when parsing a multi-BSSID element</issue> <issue id="1204291" tracker="bnc">VUL-0: CVE-2022-42720: kernel live patch: remote crash/code execution due to refcounting bugs in multi-BSS handling</issue> <issue id="1204290" tracker="bnc">VUL-0: CVE-2022-42721: kernel live patch: remote crash/code execution due list corruption in the wlan stack</issue> <issue id="1203067" tracker="bnc">VUL-0: CVE-2022-39189: kernel live patch: unprivileged user can compromise guest kernel via PV TLB flush on preempted vCPU</issue> <issue id="1203624" tracker="bnc">VUL-0: CVE-2022-41222: kernel live patch: page use-after-free via stale TLB caused by rmap lock not held during PUD move</issue> <issue id="1203994" tracker="bnc">VUL-0: CVE-2022-41674: kernel live patch: remote crash/code execution with wlan frames</issue> <issue id="2022-39189" tracker="cve" /> <issue id="2022-41222" tracker="cve" /> <issue id="2022-41674" tracker="cve" /> <issue id="2022-42719" tracker="cve" /> <issue id="2022-42720" tracker="cve" /> <issue id="2022-42721" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>nstange</packager> <description>This update for the Linux Kernel 5.3.18-24_96 fixes several issues. The following security issues were fixed: - CVE-2022-41674: Fixed buffer overflow that can be triggered by injected WLAN frames (bsc#1203994). - CVE-2022-42719: Fixed use-after-free in the mac80211 stack when parsing a multi-BSSID element (bsc#1204292). - CVE-2022-42720: Fixed refcounting bugs in the multi-BSS handling of the mac80211 stack (bsc#1204291). - CVE-2022-42721: Fixed list management bug in BSS handling of the mac80211 stack (bsc#1204290). - CVE-2022-41222: Fixed a use-after-free via a stale TLB (bsc#1203624). - CVE-2022-39189: Fixed mishandled TLB flush operation in certain KVM_VCPU_PREEMPTED situations (bsc#1203067). </description> <summary>Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP2)</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor