SUSE-SU-2021:2846-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:2846-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2021:2846-1
Related
Published
2021-08-25T15:15:54Z
Modified
2021-08-25T15:15:54Z
Summary
Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3)
Details

This update for the Linux Kernel 4.4.180-94_147 fixes several issues.

The following security issues were fixed:

  • CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
  • CVE-2021-28688: The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. (bsc#1183646)
  • CVE-2020-0429: Fixed a potential local privilege escalation in l2tpsessiondelete and related functions of l2tp_core.c (bsc#1176724).
References

Affected packages

SUSE:Linux Enterprise Server for SAP Applications 12 SP3 / kgraft-patch-SLE12-SP3_Update_40

Package

Name
kgraft-patch-SLE12-SP3_Update_40
Purl
purl:rpm/suse/kgraft-patch-SLE12-SP3_Update_40&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2-2.1

Ecosystem specific

{
    "binaries": [
        {
            "kgraft-patch-4_4_180-94_147-default": "2-2.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP3-LTSS / kgraft-patch-SLE12-SP3_Update_40

Package

Name
kgraft-patch-SLE12-SP3_Update_40
Purl
purl:rpm/suse/kgraft-patch-SLE12-SP3_Update_40&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2-2.1

Ecosystem specific

{
    "binaries": [
        {
            "kgraft-patch-4_4_180-94_147-default": "2-2.1"
        }
    ]
}