Описание
Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP2)
This update for the Linux Kernel 5.3.18-24_46 fixes several issues.
The following security issues were fixed:
- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could have granted unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
Список пакетов
SUSE Linux Enterprise Live Patching 15 SP2
kernel-livepatch-5_3_18-24_46-default-3-2.2
Ссылки
- Link for SUSE-SU-2021:0840-1
- E-Mail link for SUSE-SU-2021:0840-1
- SUSE Security Ratings
- SUSE Bug 1179664
- SUSE Bug 1181553
- SUSE CVE CVE-2020-29368 page
- SUSE CVE CVE-2021-3347 page
Описание
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-3-2.2
Ссылки
- CVE-2020-29368
- SUSE Bug 1179428
- SUSE Bug 1179660
- SUSE Bug 1179664
Описание
An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.
Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-3-2.2
Ссылки
- CVE-2021-3347
- SUSE Bug 1181349
- SUSE Bug 1181553
- SUSE Bug 1190859