Revision Date: | 2021-07-30 | Version: | 1 |
Title: | Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2) (Important) |
Description: |
This update for the Linux Kernel 5.3.18-24_53_4 fixes several issues.
The following security issues were fixed:
- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062) - CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116) - CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050) - CVE-2021-23133: Fixed a race condition in the SCTP sockets that could lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675) - CVE-2021-33034: Fixed a use-after-free vulnerability when destroying an hci_chan which leads to writing an arbitrary value. (bnc#1186111) - CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611) - CVE-2020-36322: Fixed an issue in the FUSE filesystem implementation. This bug was addressed with a previous fix, which turned out was incomplete, and its incompleteness is tracked as CVE-2021-28950. (bsc#1184211) - CVE-2021-29154: Fixed an incorrect computation of branch displacements in the BPF JIT compilers, which could allow to execute arbitrary code within the kernel context. (bsc#1184391) - CVE-2021-3444: The bpf verifier did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. (bsc#1184170) - CVE-2021-28660: Fixed an out-of-bounds write in rtw_wx_set_scan which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1183593) - CVE-2021-27365: Fixed an issue in certain iSCSI data structures that do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. (bsc#1182715) - CVE-2021-28688: Fixed some uninitialization pointers in Xen that could result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. (bsc#1183646) - CVE-2021-27363: Fixed a kernel pointer leak that can be used to determine the address of the iscsi_transport structure. (bsc#1182716) - CVE-2021-27364: Fixed an issue that provides an unprivileged user the ability of craft Netlink messages. (bsc#1182717)
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1150137 1168669 1173032 1182717 1183120 1183491 1183658 1184171 1184710 1184952 1185847 1185899 1185901 1186285 1187052 1188117 1188257 CVE-2019-16168 CVE-2020-12402 CVE-2020-36322 CVE-2020-36385 CVE-2021-22555 CVE-2021-23133 CVE-2021-27363 CVE-2021-27364 CVE-2021-27365 CVE-2021-28660 CVE-2021-28688 CVE-2021-29154 CVE-2021-32399 CVE-2021-33034 CVE-2021-33909 CVE-2021-3444 SUSE-SU-2019:2533-1 SUSE-SU-2020:1850-1 SUSE-SU-2021:2577-1
|
Platform(s): | SUSE Linux Enterprise High Performance Computing 15 SP2 SUSE Linux Enterprise Module for Basesystem 15 SP1 SUSE Linux Enterprise Module for Live Patching 15 SP2 SUSE Linux Enterprise Server 15 SP2 SUSE Linux Enterprise Server for SAP Applications 15 SP2
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Module for Basesystem 15 SP1 is installed AND Package Information
libsqlite3-0-3.28.0-3.9 is installed
OR libsqlite3-0-32bit-3.28.0-3.9 is installed
OR sqlite3-3.28.0-3.9 is installed
OR sqlite3-devel-3.28.0-3.9 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed
AND kernel-livepatch-5_3_18-24_53_4-default-2-2.1 is installed
|