File _patchinfo of Package patchinfo.21441

<patchinfo incident="21441">
  <issue id="1187054" tracker="bnc">VUL-0: CVE-2021-3573: kernel live patch: Use-After-Free vulnerability in function hci_sock_bound_ioctl()</issue>
  <issue id="1188613" tracker="bnc">VUL-0: CVE-2021-3640: kernel livepatch: Use-After-Free vulnerability in function sco_sock_sendmsg()</issue>
  <issue id="1190118" tracker="bnc">VUL-0: CVE-2021-38160: kernel live patch: data corruption or loss can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c</issue>
  <issue id="1190350" tracker="bnc">VUL-0: CVE-2021-3715: kernel live patch: use-after-free in route4_change() in net/sched/cls_route.c</issue>
  <issue id="2021-3573" tracker="cve" />
  <issue id="2021-3640" tracker="cve" />
  <issue id="2021-3715" tracker="cve" />
  <issue id="2021-38160" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>nstange</packager>
  <description>This update for the Linux Kernel 4.12.14-150_72 fixes several issues.

The following security issues were fixed:

- CVE-2021-3715: Fixed a user-after-free in the Linux kernel's Traffic Control networking subsystem which could lead to local privilege escalation. (bsc#1190350).
- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
</description>
<summary>Security update for the Linux Kernel (Live Patch 24 for SLE 15)</summary>
</patchinfo>
openSUSE Build Service is sponsored by