14 lines
1.2 KiB
JSON
14 lines
1.2 KiB
JSON
{
|
||
"id": "openEuler-SA-2022-1730",
|
||
"url": "https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2022-1730",
|
||
"title": "An update for kernel is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS",
|
||
"severity": "Moderate",
|
||
"description": "The Linux Kernel, the operating system core itself.\r\n\r\n\r\n\r\nSecurity Fix(es):\r\n\r\nNFC: netlink: fix sleep in atomic bug when firmware download timeout(CVE-2022-1975)\r\n\r\nIn various methods of kernel base drivers, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182388481References: Upstream kernel(CVE-2022-20166)\r\n\r\nA NULL pointer dereference flaw was found in the Linux kernel’s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.(CVE-2022-1852)",
|
||
"cves": [
|
||
{
|
||
"id": "CVE-2022-1852",
|
||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1852",
|
||
"severity": "Moderate"
|
||
}
|
||
]
|
||
} |