Revision Date: | 2022-02-16 | Version: | 1 |
Title: | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3) (Critical) |
Description: |
This update for the Linux Kernel 5.3.18-57 fixes several issues.
The following security issues were fixed:
- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533). - CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195308). - CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1186253 1194460 1194533 1195308 CVE-2021-3500 CVE-2021-4083 CVE-2021-4202 CVE-2022-0435 SUSE-SU-2022:0418-1
|
Platform(s): | SUSE Linux Enterprise High Performance Computing 15 SP3 SUSE Linux Enterprise Micro 5.1 SUSE Linux Enterprise Micro 5.2 SUSE Linux Enterprise Module for Live Patching 15 SP3 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP2 SUSE Linux Enterprise Server 15 SP3 SUSE Linux Enterprise Server for SAP Applications 15 SP3
| Product(s): | |
Definition Synopsis |
Release Information SUSE Linux Enterprise High Performance Computing 15 SP3 is installed
OR SUSE Linux Enterprise Micro 5.1 is installed
OR SUSE Linux Enterprise Micro 5.2 is installed
OR SUSE Linux Enterprise Module for Live Patching 15 SP3 is installed
OR SUSE Linux Enterprise Server 15 SP3 is installed
OR SUSE Linux Enterprise Server for SAP Applications 15 SP3 is installed
AND kernel-livepatch-5_3_18-57-default-11-3.2 is installed
|