Details
-
Improvement
-
Resolution: Won't Fix
-
Minor
-
None
-
None
-
None
-
9223372036854775807
Description
The following security bugs were fixed:
- CVE-2021-22555: A heap out-of-bounds write was discovered in
net/netfilter/x_tables.c (bnc#1188116). - CVE-2021-33909: Extremely large seq buffer allocations in seq_file could
lead to buffer underruns and code execution (bsc#1188062). - CVE-2021-3609: A use-after-free in can/bcm could have led to privilege
escalation (bsc#1187215). - CVE-2021-3612: An out-of-bounds memory write flaw was found in the
joystick devices subsystem in the way the user calls ioctl JSIOCSBTNMAP.
This flaw allowed a local user to crash the system or possibly escalate
their privileges on the system. The highest threat from this
vulnerability is to confidentiality, integrity, as well as system
availability (bnc#1187585 ). - CVE-2021-35039: kernel/module.c mishandled Signature Verification, aka
CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel
module is signed, for loading via init_module, did not occur for a
module.sig_enforce=1 command-line argument (bnc#1188080). NOTE that SUSE
kernels are configured with CONFIG_MODULE_SIG=y, so are not affected.
The following non-security bugs were fixed:
https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html