Revision Date: | 2022-02-17 | Version: | 1 |
Title: | Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP3) (Critical) |
Description: |
This update for the Linux Kernel 5.3.18-59_27 fixes several issues.
The following security issues were fixed:
- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533). - CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195308). - CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1186922 1186923 1186924 1187017 1187040 1187174 1194460 1194533 1195308 CVE-2020-13950 CVE-2020-35452 CVE-2021-26690 CVE-2021-26691 CVE-2021-30641 CVE-2021-31618 CVE-2021-4083 CVE-2021-4202 CVE-2022-0435
|
Platform(s): | SUSE Linux Enterprise High Performance Computing 15 SP3 SUSE Linux Enterprise Micro 5.1 SUSE Linux Enterprise Micro 5.2 SUSE Linux Enterprise Module for Live Patching 15 SP3 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP2 SUSE Linux Enterprise Server 15 SP3 SUSE Linux Enterprise Server for SAP Applications 15 SP3
| Product(s): | |
Definition Synopsis |
Release Information SUSE Linux Enterprise High Performance Computing 15 SP3 is installed
OR SUSE Linux Enterprise Micro 5.1 is installed
OR SUSE Linux Enterprise Micro 5.2 is installed
OR SUSE Linux Enterprise Module for Live Patching 15 SP3 is installed
OR SUSE Linux Enterprise Server 15 SP3 is installed
OR SUSE Linux Enterprise Server for SAP Applications 15 SP3 is installed
AND kernel-livepatch-5_3_18-59_27-default-5-150300.2.2 is installed
|