File _patchinfo of Package patchinfo.20067
<patchinfo incident="20067">
<issue id="1185847" tracker="bnc">kernel live patch: Data loss/corruption occurs any time there is a write error on an md/raid array.</issue>
<issue id="1186061" tracker="bnc">VUL-0: CVE-2021-23134: kernel live patch: use-after-free in nfc sockets</issue>
<issue id="1186285" tracker="bnc">VUL-0: CVE-2021-33034: kernel live patch: use-after-free when destroying an hci_chan</issue>
<issue id="1186498" tracker="bnc">VUL-0: CVE-2021-33200: kernel live patch: enforcing incorrect limits for pointer arithmetic operations by BPF verifier can be abused to perform out-of-bounds reads and writes in kernel memory</issue>
<issue id="2021-23134" tracker="cve" />
<issue id="2021-33034" tracker="cve" />
<issue id="2021-33200" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>nstange</packager>
<description>This update for the Linux Kernel 5.3.18-24_64 fixes several issues.
The following issues were fixed:
- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).
- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges (bnc#1186060).
- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185680).
</description>
<summary>Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP2)</summary>
</patchinfo>