SUSE-SU-2021:0849-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:0849-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2021:0849-1
Related
Published
2021-03-17T16:24:20Z
Modified
2021-03-17T16:24:20Z
Summary
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2)
Details

This update for the Linux Kernel 5.3.18-22 fixes several issues.

The following security issues were fixed:

  • CVE-2020-29368: Fixed an issue in copy-on-write implementation which could have granted unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
  • Fixed an issue where NFS client filesystems got unmounted on fail-over (bsc#1182468).
  • CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
  • CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
  • CVE-2021-0342: Fixed a potential memory corruption due to a use after free which could have led to local escalation of privilege with System execution privileges required (bsc#1180859).
References

Affected packages

SUSE:Linux Enterprise Live Patching 15 SP2 / kernel-livepatch-SLE15-SP2_Update_0

Package

Name
kernel-livepatch-SLE15-SP2_Update_0
Purl
purl:rpm/suse/kernel-livepatch-SLE15-SP2_Update_0&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8-5.2

Ecosystem specific

{
    "binaries": [
        {
            "kernel-livepatch-5_3_18-22-default": "8-5.2"
        }
    ]
}