Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
home:dirkmueller:acdc:sp5-rebuild
patchinfo.21471
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.21471
<patchinfo incident="21471"> <issue id="1187054" tracker="bnc">VUL-0: CVE-2021-3573: kernel live patch: Use-After-Free vulnerability in function hci_sock_bound_ioctl()</issue> <issue id="1188613" tracker="bnc">VUL-0: CVE-2021-3640: kernel livepatch: Use-After-Free vulnerability in function sco_sock_sendmsg()</issue> <issue id="1190118" tracker="bnc">VUL-0: CVE-2021-38160: kernel live patch: data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size in drivers/char/virtio_console.c</issue> <issue id="2021-3573" tracker="cve" /> <issue id="2021-3640" tracker="cve" /> <issue id="2021-38160" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>nstange</packager> <description>This update for the Linux Kernel 5.3.18-59_10 fixes several issues. The following security issues were fixed: - CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118) - CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613) - CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054). </description> <summary>Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP3)</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor