File _patchinfo of Package patchinfo.21450

<patchinfo incident="21450">
  <issue id="1187054" tracker="bnc">VUL-0: CVE-2021-3573: kernel live patch: Use-After-Free vulnerability in function hci_sock_bound_ioctl()</issue>
  <issue id="1188613" tracker="bnc">VUL-0: CVE-2021-3640: kernel livepatch: Use-After-Free vulnerability in function sco_sock_sendmsg()</issue>
  <issue id="1190118" tracker="bnc">VUL-0: CVE-2021-38160: kernel live patch: data corruption or loss can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c</issue>
  <issue id="2021-3573" tracker="cve" />
  <issue id="2021-3640" tracker="cve" />
  <issue id="2021-38160" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>nstange</packager>
  <description>This update for the Linux Kernel 4.12.14-197_86 fixes several issues.

The following security issues were fixed:

- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
</description>
<summary>Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP1)</summary>
</patchinfo>
openSUSE Build Service is sponsored by