Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP5:Update
patchinfo.20379
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.20379
<patchinfo incident="20379"> <issue id="1185901" tracker="bnc">VUL-0: CVE-2021-23133: kernel live patch: sctp_destroy_sock list_del race condition</issue> <issue id="1187597" tracker="bnc">VUL-0: CVE-2021-0512: kernel live patch: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c</issue> <issue id="1187687" tracker="bnc">VUL-0: CVE-2021-0605: kernellive patch: In pfkey_dump() dplen and splen can both be specified to access the xfrm_address_t structure out of bounds</issue> <issue id="2021-0512" tracker="cve" /> <issue id="2021-0605" tracker="cve" /> <issue id="2021-23133" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>nstange</packager> <description>This update for the Linux Kernel 4.12.14-95_74 fixes several issues. The following security issues were fixed: - CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687) - CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597) - CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901) </description> <summary>Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP4)</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor