SUSE update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)



Published: 2021-11-19
Risk Low
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2021-34866
CVE-2021-3752
CVE-2021-41864
CWE-ID CWE-843
CWE-416
CWE-787
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
SUSE Linux Enterprise Module for Live Patching
Operating systems & Components / Operating system

kernel-livepatch-SLE15-SP3_Update_0-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-57-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-57-default
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Type Confusion

EUVDB-ID: #VU57372

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-34866

CWE-ID: CWE-843 - Type confusion

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a type confusion error within the handling of eBPF programs. A local user can run a specially crafted program on the system to trigger a type confusion and execute arbitrary code with kernel privileges.

Mitigation

Update the affected package the Linux Kernel (Live Patch 0 for SLE 15 SP3) to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for Live Patching: 15-SP3

kernel-livepatch-SLE15-SP3_Update_0-debugsource: before 8-3.2

kernel-livepatch-5_3_18-57-default-debuginfo: before 8-3.2

kernel-livepatch-5_3_18-57-default: before 8-3.2

External links

http://www.suse.com/support/update/announcement/2021/suse-su-20213738-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Use-after-free

EUVDB-ID: #VU63767

Risk: Low

CVSSv3.1: 6.2 [CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-3752

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in the Linux kernel’s Bluetooth subsystem when a user calls connect to the socket and disconnect simultaneously. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel (Live Patch 0 for SLE 15 SP3) to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for Live Patching: 15-SP3

kernel-livepatch-SLE15-SP3_Update_0-debugsource: before 8-3.2

kernel-livepatch-5_3_18-57-default-debuginfo: before 8-3.2

kernel-livepatch-5_3_18-57-default: before 8-3.2

External links

http://www.suse.com/support/update/announcement/2021/suse-su-20213738-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Out-of-bounds write

EUVDB-ID: #VU63855

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-41864

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when processing untrusted input. A local user can gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.

Mitigation

Update the affected package the Linux Kernel (Live Patch 0 for SLE 15 SP3) to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for Live Patching: 15-SP3

kernel-livepatch-SLE15-SP3_Update_0-debugsource: before 8-3.2

kernel-livepatch-5_3_18-57-default-debuginfo: before 8-3.2

kernel-livepatch-5_3_18-57-default: before 8-3.2

External links

http://www.suse.com/support/update/announcement/2021/suse-su-20213738-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###