Revision Date: | 2021-10-12 | Version: | 1 |
Title: | Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP2) (Important) |
Description: |
This update for the Linux Kernel 5.3.18-24_64 fixes several issues.
The following security issues were fixed:
- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118) - CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613) - CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1157763 1176179 1187054 1188613 1190118 CVE-2019-15961 CVE-2020-24977 CVE-2021-3573 CVE-2021-3640 CVE-2021-38160 SUSE-SU-2019:3176-1 SUSE-SU-2020:2612-1
|
Platform(s): | SUSE Linux Enterprise High Performance Computing 15 SP2 SUSE Linux Enterprise Module for Basesystem 15 SP1 SUSE Linux Enterprise Module for Live Patching 15 SP2 SUSE Linux Enterprise Server 15 SP2 SUSE Linux Enterprise Server for SAP Applications 15 SP2
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Module for Basesystem 15 SP1 is installed AND Package Information
clamav-0.100.3-3.17 is installed
OR clamav-devel-0.100.3-3.17 is installed
OR libclamav7-0.100.3-3.17 is installed
OR libclammspack0-0.100.3-3.17 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed
AND kernel-livepatch-5_3_18-24_64-default-7-2.1 is installed
|