Revision Date: | 2021-10-12 | Version: | 1 |
Title: | Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP2) (Important) |
Description: |
This update for the Linux Kernel 5.3.18-24_67 fixes several issues.
The following security issues were fixed:
- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118) - CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613) - CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1187054 1188613 1190118 CVE-2021-3573 CVE-2021-3640 CVE-2021-38160
|
Platform(s): | SUSE Linux Enterprise High Performance Computing 15 SP2 SUSE Linux Enterprise Module for Live Patching 15 SP2 SUSE Linux Enterprise Server 15 SP2 SUSE Linux Enterprise Server for SAP Applications 15 SP2
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed AND kernel-livepatch-5_3_18-24_67-default-5-2.1 is installed
|