File _patchinfo of Package patchinfo.20399
<patchinfo incident="20399">
<issue id="1185901" tracker="bnc">VUL-0: CVE-2021-23133: kernel live patch: sctp_destroy_sock list_del race condition</issue>
<issue id="1187597" tracker="bnc">VUL-0: CVE-2021-0512: kernel live patch: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c</issue>
<issue id="1187687" tracker="bnc">VUL-0: CVE-2021-0605: kernellive patch: In pfkey_dump() dplen and splen can both be specified to access the xfrm_address_t structure out of bounds</issue>
<issue id="2021-0512" tracker="cve" />
<issue id="2021-0605" tracker="cve" />
<issue id="2021-23133" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>nstange</packager>
<description>This update for the Linux Kernel 4.12.14-150_72 fixes several issues.
The following security issues were fixed:
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
</description>
<summary>Security update for the Linux Kernel (Live Patch 24 for SLE 15)</summary>
</patchinfo>