File _patchinfo of Package patchinfo.21450
<patchinfo incident="21450">
<issue id="1187054" tracker="bnc">VUL-0: CVE-2021-3573: kernel live patch: Use-After-Free vulnerability in function hci_sock_bound_ioctl()</issue>
<issue id="1188613" tracker="bnc">VUL-0: CVE-2021-3640: kernel livepatch: Use-After-Free vulnerability in function sco_sock_sendmsg()</issue>
<issue id="1190118" tracker="bnc">VUL-0: CVE-2021-38160: kernel live patch: data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size in drivers/char/virtio_console.c</issue>
<issue id="2021-3573" tracker="cve" />
<issue id="2021-3640" tracker="cve" />
<issue id="2021-38160" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>nstange</packager>
<description>This update for the Linux Kernel 4.12.14-197_86 fixes several issues.
The following security issues were fixed:
- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
</description>
<summary>Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP1)</summary>
</patchinfo>