SUSE update for the Linux Kernel (Live Patch 12 for SLE 15 SP3)



Published: 2022-03-01 | Updated: 2024-01-18
Risk High
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2021-0920
CVE-2021-22600
CVE-2022-0516
CWE-ID CWE-416
CWE-415
CWE-787
Exploitation vector Local
Public exploit Vulnerability #1 is being exploited in the wild.
Vulnerability #2 is being exploited in the wild.
Vulnerable software
Subscribe
SUSE Linux Enterprise Server
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications
Operating systems & Components / Operating system

SUSE Linux Enterprise Module for Live Patching
Operating systems & Components / Operating system

SUSE Linux Enterprise Micro
Operating systems & Components / Operating system

kernel-livepatch-SLE15-SP2_Update_23-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP2_Update_22-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP2_Update_21-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP2_Update_20-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP2_Update_19-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP2_Update_18-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP2_Update_17-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP2_Update_16-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP2_Update_15-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP2_Update_14-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP2_Update_13-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP2_Update_12-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP2_Update_11-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_99-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_99-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_96-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_96-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_93-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_93-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_86-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_86-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_83-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_83-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_78-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_78-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_75-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_75-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_70-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_70-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_67-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_67-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_64-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_64-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_61-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_61-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_53_4-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_53_4-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_52-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-24_52-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-59_40-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP3_Update_9-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP3_Update_6-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP3_Update_5-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP3_Update_3-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP3_Update_1-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP3_Update_0-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-59_5-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-59_5-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-59_40-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-59_34-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-59_34-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-59_24-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-59_24-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-59_19-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-59_19-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-59_13-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-59_13-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-57-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-57-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-150300_59_46-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-150300_59_46-default
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-150300_59_43-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-150300_59_43-default
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Use-after-free

EUVDB-ID: #VU59811

Risk: Low

CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C]

CVE-ID: CVE-2021-0920

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the unix_scm_to_skb() function of af_unix.c in Linux kernel. A local user can run a specially crafted program to trigger a race condition and execute arbitrary code with elevated privileges.


Mitigation

Update the affected package the Linux Kernel (Live Patch 12 for SLE 15 SP3) to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server: 15-SP2 - 15-SP3-LTSS

SUSE Linux Enterprise High Performance Computing: 15-SP2 - 15-SP3-LTSS

SUSE Linux Enterprise Server for SAP Applications: 15-SP2 - 15-SP3

SUSE Linux Enterprise Module for Live Patching: 15-SP2 - 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-livepatch-SLE15-SP2_Update_23-debugsource: before 3-2.1

kernel-livepatch-SLE15-SP2_Update_22-debugsource: before 4-2.1

kernel-livepatch-SLE15-SP2_Update_21-debugsource: before 5-2.1

kernel-livepatch-SLE15-SP2_Update_20-debugsource: before 6-2.1

kernel-livepatch-SLE15-SP2_Update_19-debugsource: before 6-2.1

kernel-livepatch-SLE15-SP2_Update_18-debugsource: before 8-2.1

kernel-livepatch-SLE15-SP2_Update_17-debugsource: before 9-2.1

kernel-livepatch-SLE15-SP2_Update_16-debugsource: before 10-2.1

kernel-livepatch-SLE15-SP2_Update_15-debugsource: before 10-2.1

kernel-livepatch-SLE15-SP2_Update_14-debugsource: before 10-2.1

kernel-livepatch-SLE15-SP2_Update_13-debugsource: before 12-2.1

kernel-livepatch-SLE15-SP2_Update_12-debugsource: before 12-2.1

kernel-livepatch-SLE15-SP2_Update_11-debugsource: before 15-2.2

kernel-livepatch-5_3_18-24_99-default-debuginfo: before 3-2.1

kernel-livepatch-5_3_18-24_99-default: before 3-2.1

kernel-livepatch-5_3_18-24_96-default-debuginfo: before 4-2.1

kernel-livepatch-5_3_18-24_96-default: before 4-2.1

kernel-livepatch-5_3_18-24_93-default-debuginfo: before 5-2.1

kernel-livepatch-5_3_18-24_93-default: before 5-2.1

kernel-livepatch-5_3_18-24_86-default-debuginfo: before 6-2.1

kernel-livepatch-5_3_18-24_86-default: before 6-2.1

kernel-livepatch-5_3_18-24_83-default-debuginfo: before 6-2.1

kernel-livepatch-5_3_18-24_83-default: before 6-2.1

kernel-livepatch-5_3_18-24_78-default-debuginfo: before 8-2.1

kernel-livepatch-5_3_18-24_78-default: before 8-2.1

kernel-livepatch-5_3_18-24_75-default-debuginfo: before 9-2.1

kernel-livepatch-5_3_18-24_75-default: before 9-2.1

kernel-livepatch-5_3_18-24_70-default-debuginfo: before 10-2.1

kernel-livepatch-5_3_18-24_70-default: before 10-2.1

kernel-livepatch-5_3_18-24_67-default-debuginfo: before 10-2.1

kernel-livepatch-5_3_18-24_67-default: before 10-2.1

kernel-livepatch-5_3_18-24_64-default-debuginfo: before 12-2.1

kernel-livepatch-5_3_18-24_64-default: before 12-2.1

kernel-livepatch-5_3_18-24_61-default-debuginfo: before 12-2.1

kernel-livepatch-5_3_18-24_61-default: before 12-2.1

kernel-livepatch-5_3_18-24_53_4-default-debuginfo: before 10-2.1

kernel-livepatch-5_3_18-24_53_4-default: before 10-2.1

kernel-livepatch-5_3_18-24_52-default-debuginfo: before 15-2.2

kernel-livepatch-5_3_18-24_52-default: before 15-2.2

kernel-livepatch-5_3_18-59_40-default-debuginfo: before 4-150300.2.1

kernel-livepatch-SLE15-SP3_Update_9-debugsource: before 5-150300.2.1

kernel-livepatch-SLE15-SP3_Update_6-debugsource: before 6-150300.2.1

kernel-livepatch-SLE15-SP3_Update_5-debugsource: before 8-150300.2.1

kernel-livepatch-SLE15-SP3_Update_3-debugsource: before 10-150300.2.1

kernel-livepatch-SLE15-SP3_Update_1-debugsource: before 10-150300.2.1

kernel-livepatch-SLE15-SP3_Update_0-debugsource: before 12-3.1

kernel-livepatch-5_3_18-59_5-default-debuginfo: before 10-150300.2.1

kernel-livepatch-5_3_18-59_5-default: before 10-150300.2.1

kernel-livepatch-5_3_18-59_40-default: before 4-150300.2.1

kernel-livepatch-5_3_18-59_34-default-debuginfo: before 5-150300.2.1

kernel-livepatch-5_3_18-59_34-default: before 5-150300.2.1

kernel-livepatch-5_3_18-59_24-default-debuginfo: before 6-150300.2.1

kernel-livepatch-5_3_18-59_24-default: before 6-150300.2.1

kernel-livepatch-5_3_18-59_19-default-debuginfo: before 8-150300.2.1

kernel-livepatch-5_3_18-59_19-default: before 8-150300.2.1

kernel-livepatch-5_3_18-59_13-default-debuginfo: before 10-150300.2.1

kernel-livepatch-5_3_18-59_13-default: before 10-150300.2.1

kernel-livepatch-5_3_18-57-default-debuginfo: before 12-3.1

kernel-livepatch-5_3_18-57-default: before 12-3.1

kernel-livepatch-5_3_18-150300_59_46-default-debuginfo: before 3-150300.2.1

kernel-livepatch-5_3_18-150300_59_46-default: before 3-150300.2.1

kernel-livepatch-5_3_18-150300_59_43-default-debuginfo: before 3-150300.2.1

kernel-livepatch-5_3_18-150300_59_43-default: before 3-150300.2.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20220619-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

2) Double Free

EUVDB-ID: #VU63766

Risk: High

CVSSv3.1: 8.4 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C]

CVE-ID: CVE-2021-22600

CWE-ID: CWE-415 - Double Free

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in the packet_set_ring() function in net/packet/af_packet.c. A local user can pass specially crafted data to the application, trigger double free error and escalate privileges on the system.

Note, the vulnerability is being actively exploited in the wild against Android users.

Mitigation

Update the affected package the Linux Kernel (Live Patch 12 for SLE 15 SP3) to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server: 15-SP2 - 15-SP3-LTSS

SUSE Linux Enterprise High Performance Computing: 15-SP2 - 15-SP3-LTSS

SUSE Linux Enterprise Server for SAP Applications: 15-SP2 - 15-SP3

SUSE Linux Enterprise Module for Live Patching: 15-SP2 - 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-livepatch-SLE15-SP2_Update_23-debugsource: before 3-2.1

kernel-livepatch-SLE15-SP2_Update_22-debugsource: before 4-2.1

kernel-livepatch-SLE15-SP2_Update_21-debugsource: before 5-2.1

kernel-livepatch-SLE15-SP2_Update_20-debugsource: before 6-2.1

kernel-livepatch-SLE15-SP2_Update_19-debugsource: before 6-2.1

kernel-livepatch-SLE15-SP2_Update_18-debugsource: before 8-2.1

kernel-livepatch-SLE15-SP2_Update_17-debugsource: before 9-2.1

kernel-livepatch-SLE15-SP2_Update_16-debugsource: before 10-2.1

kernel-livepatch-SLE15-SP2_Update_15-debugsource: before 10-2.1

kernel-livepatch-SLE15-SP2_Update_14-debugsource: before 10-2.1

kernel-livepatch-SLE15-SP2_Update_13-debugsource: before 12-2.1

kernel-livepatch-SLE15-SP2_Update_12-debugsource: before 12-2.1

kernel-livepatch-SLE15-SP2_Update_11-debugsource: before 15-2.2

kernel-livepatch-5_3_18-24_99-default-debuginfo: before 3-2.1

kernel-livepatch-5_3_18-24_99-default: before 3-2.1

kernel-livepatch-5_3_18-24_96-default-debuginfo: before 4-2.1

kernel-livepatch-5_3_18-24_96-default: before 4-2.1

kernel-livepatch-5_3_18-24_93-default-debuginfo: before 5-2.1

kernel-livepatch-5_3_18-24_93-default: before 5-2.1

kernel-livepatch-5_3_18-24_86-default-debuginfo: before 6-2.1

kernel-livepatch-5_3_18-24_86-default: before 6-2.1

kernel-livepatch-5_3_18-24_83-default-debuginfo: before 6-2.1

kernel-livepatch-5_3_18-24_83-default: before 6-2.1

kernel-livepatch-5_3_18-24_78-default-debuginfo: before 8-2.1

kernel-livepatch-5_3_18-24_78-default: before 8-2.1

kernel-livepatch-5_3_18-24_75-default-debuginfo: before 9-2.1

kernel-livepatch-5_3_18-24_75-default: before 9-2.1

kernel-livepatch-5_3_18-24_70-default-debuginfo: before 10-2.1

kernel-livepatch-5_3_18-24_70-default: before 10-2.1

kernel-livepatch-5_3_18-24_67-default-debuginfo: before 10-2.1

kernel-livepatch-5_3_18-24_67-default: before 10-2.1

kernel-livepatch-5_3_18-24_64-default-debuginfo: before 12-2.1

kernel-livepatch-5_3_18-24_64-default: before 12-2.1

kernel-livepatch-5_3_18-24_61-default-debuginfo: before 12-2.1

kernel-livepatch-5_3_18-24_61-default: before 12-2.1

kernel-livepatch-5_3_18-24_53_4-default-debuginfo: before 10-2.1

kernel-livepatch-5_3_18-24_53_4-default: before 10-2.1

kernel-livepatch-5_3_18-24_52-default-debuginfo: before 15-2.2

kernel-livepatch-5_3_18-24_52-default: before 15-2.2

kernel-livepatch-5_3_18-59_40-default-debuginfo: before 4-150300.2.1

kernel-livepatch-SLE15-SP3_Update_9-debugsource: before 5-150300.2.1

kernel-livepatch-SLE15-SP3_Update_6-debugsource: before 6-150300.2.1

kernel-livepatch-SLE15-SP3_Update_5-debugsource: before 8-150300.2.1

kernel-livepatch-SLE15-SP3_Update_3-debugsource: before 10-150300.2.1

kernel-livepatch-SLE15-SP3_Update_1-debugsource: before 10-150300.2.1

kernel-livepatch-SLE15-SP3_Update_0-debugsource: before 12-3.1

kernel-livepatch-5_3_18-59_5-default-debuginfo: before 10-150300.2.1

kernel-livepatch-5_3_18-59_5-default: before 10-150300.2.1

kernel-livepatch-5_3_18-59_40-default: before 4-150300.2.1

kernel-livepatch-5_3_18-59_34-default-debuginfo: before 5-150300.2.1

kernel-livepatch-5_3_18-59_34-default: before 5-150300.2.1

kernel-livepatch-5_3_18-59_24-default-debuginfo: before 6-150300.2.1

kernel-livepatch-5_3_18-59_24-default: before 6-150300.2.1

kernel-livepatch-5_3_18-59_19-default-debuginfo: before 8-150300.2.1

kernel-livepatch-5_3_18-59_19-default: before 8-150300.2.1

kernel-livepatch-5_3_18-59_13-default-debuginfo: before 10-150300.2.1

kernel-livepatch-5_3_18-59_13-default: before 10-150300.2.1

kernel-livepatch-5_3_18-57-default-debuginfo: before 12-3.1

kernel-livepatch-5_3_18-57-default: before 12-3.1

kernel-livepatch-5_3_18-150300_59_46-default-debuginfo: before 3-150300.2.1

kernel-livepatch-5_3_18-150300_59_46-default: before 3-150300.2.1

kernel-livepatch-5_3_18-150300_59_43-default-debuginfo: before 3-150300.2.1

kernel-livepatch-5_3_18-150300_59_43-default: before 3-150300.2.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20220619-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

3) Out-of-bounds write

EUVDB-ID: #VU61247

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-0516

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in kvm_s390_guest_sida_op() function in the arch/s390/kvm/kvm-s390.c in KVM for s390 in the Linux kernel. A local user can trigger an out-of-bounds write and escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel (Live Patch 12 for SLE 15 SP3) to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server: 15-SP2 - 15-SP3-LTSS

SUSE Linux Enterprise High Performance Computing: 15-SP2 - 15-SP3-LTSS

SUSE Linux Enterprise Server for SAP Applications: 15-SP2 - 15-SP3

SUSE Linux Enterprise Module for Live Patching: 15-SP2 - 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-livepatch-SLE15-SP2_Update_23-debugsource: before 3-2.1

kernel-livepatch-SLE15-SP2_Update_22-debugsource: before 4-2.1

kernel-livepatch-SLE15-SP2_Update_21-debugsource: before 5-2.1

kernel-livepatch-SLE15-SP2_Update_20-debugsource: before 6-2.1

kernel-livepatch-SLE15-SP2_Update_19-debugsource: before 6-2.1

kernel-livepatch-SLE15-SP2_Update_18-debugsource: before 8-2.1

kernel-livepatch-SLE15-SP2_Update_17-debugsource: before 9-2.1

kernel-livepatch-SLE15-SP2_Update_16-debugsource: before 10-2.1

kernel-livepatch-SLE15-SP2_Update_15-debugsource: before 10-2.1

kernel-livepatch-SLE15-SP2_Update_14-debugsource: before 10-2.1

kernel-livepatch-SLE15-SP2_Update_13-debugsource: before 12-2.1

kernel-livepatch-SLE15-SP2_Update_12-debugsource: before 12-2.1

kernel-livepatch-SLE15-SP2_Update_11-debugsource: before 15-2.2

kernel-livepatch-5_3_18-24_99-default-debuginfo: before 3-2.1

kernel-livepatch-5_3_18-24_99-default: before 3-2.1

kernel-livepatch-5_3_18-24_96-default-debuginfo: before 4-2.1

kernel-livepatch-5_3_18-24_96-default: before 4-2.1

kernel-livepatch-5_3_18-24_93-default-debuginfo: before 5-2.1

kernel-livepatch-5_3_18-24_93-default: before 5-2.1

kernel-livepatch-5_3_18-24_86-default-debuginfo: before 6-2.1

kernel-livepatch-5_3_18-24_86-default: before 6-2.1

kernel-livepatch-5_3_18-24_83-default-debuginfo: before 6-2.1

kernel-livepatch-5_3_18-24_83-default: before 6-2.1

kernel-livepatch-5_3_18-24_78-default-debuginfo: before 8-2.1

kernel-livepatch-5_3_18-24_78-default: before 8-2.1

kernel-livepatch-5_3_18-24_75-default-debuginfo: before 9-2.1

kernel-livepatch-5_3_18-24_75-default: before 9-2.1

kernel-livepatch-5_3_18-24_70-default-debuginfo: before 10-2.1

kernel-livepatch-5_3_18-24_70-default: before 10-2.1

kernel-livepatch-5_3_18-24_67-default-debuginfo: before 10-2.1

kernel-livepatch-5_3_18-24_67-default: before 10-2.1

kernel-livepatch-5_3_18-24_64-default-debuginfo: before 12-2.1

kernel-livepatch-5_3_18-24_64-default: before 12-2.1

kernel-livepatch-5_3_18-24_61-default-debuginfo: before 12-2.1

kernel-livepatch-5_3_18-24_61-default: before 12-2.1

kernel-livepatch-5_3_18-24_53_4-default-debuginfo: before 10-2.1

kernel-livepatch-5_3_18-24_53_4-default: before 10-2.1

kernel-livepatch-5_3_18-24_52-default-debuginfo: before 15-2.2

kernel-livepatch-5_3_18-24_52-default: before 15-2.2

kernel-livepatch-5_3_18-59_40-default-debuginfo: before 4-150300.2.1

kernel-livepatch-SLE15-SP3_Update_9-debugsource: before 5-150300.2.1

kernel-livepatch-SLE15-SP3_Update_6-debugsource: before 6-150300.2.1

kernel-livepatch-SLE15-SP3_Update_5-debugsource: before 8-150300.2.1

kernel-livepatch-SLE15-SP3_Update_3-debugsource: before 10-150300.2.1

kernel-livepatch-SLE15-SP3_Update_1-debugsource: before 10-150300.2.1

kernel-livepatch-SLE15-SP3_Update_0-debugsource: before 12-3.1

kernel-livepatch-5_3_18-59_5-default-debuginfo: before 10-150300.2.1

kernel-livepatch-5_3_18-59_5-default: before 10-150300.2.1

kernel-livepatch-5_3_18-59_40-default: before 4-150300.2.1

kernel-livepatch-5_3_18-59_34-default-debuginfo: before 5-150300.2.1

kernel-livepatch-5_3_18-59_34-default: before 5-150300.2.1

kernel-livepatch-5_3_18-59_24-default-debuginfo: before 6-150300.2.1

kernel-livepatch-5_3_18-59_24-default: before 6-150300.2.1

kernel-livepatch-5_3_18-59_19-default-debuginfo: before 8-150300.2.1

kernel-livepatch-5_3_18-59_19-default: before 8-150300.2.1

kernel-livepatch-5_3_18-59_13-default-debuginfo: before 10-150300.2.1

kernel-livepatch-5_3_18-59_13-default: before 10-150300.2.1

kernel-livepatch-5_3_18-57-default-debuginfo: before 12-3.1

kernel-livepatch-5_3_18-57-default: before 12-3.1

kernel-livepatch-5_3_18-150300_59_46-default-debuginfo: before 3-150300.2.1

kernel-livepatch-5_3_18-150300_59_46-default: before 3-150300.2.1

kernel-livepatch-5_3_18-150300_59_43-default-debuginfo: before 3-150300.2.1

kernel-livepatch-5_3_18-150300_59_43-default: before 3-150300.2.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20220619-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###