Uploaded image for project: 'Lustre'
  1. Lustre
  2. LU-14933

kernel update [SLES15 SP2 5.3.18-24.75.3]

    XMLWordPrintable

Details

    • Improvement
    • Resolution: Won't Fix
    • Minor
    • None
    • None
    • None
    • 9223372036854775807

    Description

      The following security bugs were fixed:

      • CVE-2021-22555: A heap out-of-bounds write was discovered in
        net/netfilter/x_tables.c (bnc#1188116).
      • CVE-2021-33909: Extremely large seq buffer allocations in seq_file could
        lead to buffer underruns and code execution (bsc#1188062).
      • CVE-2021-3609: A use-after-free in can/bcm could have led to privilege
        escalation (bsc#1187215).
      • CVE-2021-3612: An out-of-bounds memory write flaw was found in the
        joystick devices subsystem in the way the user calls ioctl JSIOCSBTNMAP.
        This flaw allowed a local user to crash the system or possibly escalate
        their privileges on the system. The highest threat from this
        vulnerability is to confidentiality, integrity, as well as system
        availability (bnc#1187585 ).
      • CVE-2021-35039: kernel/module.c mishandled Signature Verification, aka
        CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel
        module is signed, for loading via init_module, did not occur for a
        module.sig_enforce=1 command-line argument (bnc#1188080). NOTE that SUSE
        kernels are configured with CONFIG_MODULE_SIG=y, so are not affected.

      The following non-security bugs were fixed:
      https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html

      Attachments

        Issue Links

          Activity

            People

              yujian Jian Yu
              yujian Jian Yu
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: