Описание
Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP3)
This update for the Linux Kernel 5.3.18-150300_59_71 fixes several issues.
The following security issues were fixed:
- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
Список пакетов
SUSE Linux Enterprise Live Patching 15 SP3
Ссылки
- Link for SUSE-SU-2022:2515-1
- E-Mail link for SUSE-SU-2022:2515-1
- SUSE Security Ratings
- SUSE Bug 1196959
- SUSE Bug 1200608
- SUSE CVE CVE-2021-39698 page
- SUSE CVE CVE-2022-20154 page
Описание
In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-185125206References: Upstream kernel
Затронутые продукты
Ссылки
- CVE-2021-39698
- SUSE Bug 1196956
- SUSE Bug 1196959
- SUSE Bug 1209225
Описание
In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel
Затронутые продукты
Ссылки
- CVE-2022-20154
- SUSE Bug 1200599
- SUSE Bug 1200608
- SUSE Bug 1224298
- SUSE Bug 1224878