[SUSE-SU-2021:0870-1] Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3)
Severity
Important
Affected Packages
22
CVEs
3
Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3)
This update for the Linux Kernel 4.4.180-94_116 fixes several issues.
The following security issues were fixed:
- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
- ID
- SUSE-SU-2021:0870-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2021/suse-su-20210870-1/
- Published
-
2021-03-17T16:16:01
(3 years ago) - Modified
-
2021-03-17T16:16:01
(3 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2021-1480
- ALAS2-2021-1600
- ALSA-2021:1093
- ALSA-2021:1578
- ASA-202101-30
- ASA-202101-31
- ASA-202101-32
- ASA-202101-33
- ASA-202102-23
- ASB-A-171705902
- DSA-4843-1
- ELSA-2021-0856
- ELSA-2021-1093
- ELSA-2021-1578
- ELSA-2021-2314
- ELSA-2021-9005
- ELSA-2021-9006
- ELSA-2021-9007
- ELSA-2021-9008
- ELSA-2021-9009
- ELSA-2021-9023
- ELSA-2021-9024
- ELSA-2021-9025
- ELSA-2021-9030
- ELSA-2021-9035
- ELSA-2021-9037
- ELSA-2021-9038
- ELSA-2021-9039
- ELSA-2021-9084
- ELSA-2021-9085
- ELSA-2021-9086
- ELSA-2021-9087
- ELSA-2021-9306
- ELSA-2021-9307
- ELSA-2021-9434
- FEDORA-2021-082e638d02
- FEDORA-2021-4a91649cf3
- FEDORA-2021-620fb40359
- FEDORA-2021-6e805a5051
- FEDORA-2021-879c756377
- MS:CVE-2020-28374
- MS:CVE-2021-3347
- openSUSE-SU-2021:0060-1
- openSUSE-SU-2021:0075-1
- openSUSE-SU-2021:0241-1
- openSUSE-SU-2021:0242-1
- RHSA-2021:0856
- RHSA-2021:0857
- RHSA-2021:0862
- RHSA-2021:1081
- RHSA-2021:1093
- RHSA-2021:1578
- RHSA-2021:1739
- RHSA-2021:2285
- RHSA-2021:2314
- RHSA-2021:2316
- SUSE-SU-2020:3764-1
- SUSE-SU-2020:3766-1
- SUSE-SU-2020:3798-1
- SUSE-SU-2021:0096-1
- SUSE-SU-2021:0097-1
- SUSE-SU-2021:0098-1
- SUSE-SU-2021:0117-1
- SUSE-SU-2021:0118-1
- SUSE-SU-2021:0133-1
- SUSE-SU-2021:0347-1
- SUSE-SU-2021:0348-1
- SUSE-SU-2021:0353-1
- SUSE-SU-2021:0354-1
- SUSE-SU-2021:0427-1
- SUSE-SU-2021:0433-1
- SUSE-SU-2021:0434-1
- SUSE-SU-2021:0437-1
- SUSE-SU-2021:0438-1
- SUSE-SU-2021:0452-1
- SUSE-SU-2021:0532-1
- SUSE-SU-2021:0743-1
- SUSE-SU-2021:0744-1
- SUSE-SU-2021:0808-1
- SUSE-SU-2021:0809-1
- SUSE-SU-2021:0818-1
- SUSE-SU-2021:0823-1
- SUSE-SU-2021:0826-1
- SUSE-SU-2021:0835-1
- SUSE-SU-2021:0840-1
- SUSE-SU-2021:0841-1
- SUSE-SU-2021:0842-1
- SUSE-SU-2021:0849-1
- SUSE-SU-2021:0853-1
- SUSE-SU-2021:0859-1
- SUSE-SU-2021:0868-1
- USN-4694-1
- USN-4709-1
- USN-4711-1
- USN-4713-1
- USN-4713-2
- USN-4753-1
- USN-4878-1
- USN-4884-1
- USN-4901-1
- USN-4907-1
- USN-4910-1
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0870-1.json | |
Suse | URL for SUSE-SU-2021:0870-1 | https://www.suse.com/support/update/announcement/2021/suse-su-20210870-1/ | |
Suse | E-Mail link for SUSE-SU-2021:0870-1 | https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html | |
Bugzilla | SUSE Bug 1178684 | https://bugzilla.suse.com/1178684 | |
Bugzilla | SUSE Bug 1179616 | https://bugzilla.suse.com/1179616 | |
Bugzilla | SUSE Bug 1181553 | https://bugzilla.suse.com/1181553 | |
CVE | SUSE CVE CVE-2020-27786 page | https://www.suse.com/security/cve/CVE-2020-27786/ | |
CVE | SUSE CVE CVE-2020-28374 page | https://www.suse.com/security/cve/CVE-2020-28374/ | |
CVE | SUSE CVE CVE-2021-3347 page | https://www.suse.com/security/cve/CVE-2021-3347/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_135-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_135-default | < 4-2.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_135-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_135-default | < 4-2.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_130-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_130-default | < 6-2.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_130-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_130-default | < 6-2.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_127-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_127-default | < 7-2.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_127-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_127-default | < 7-2.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_124-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_124-default | < 7-2.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_124-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_124-default | < 7-2.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_121-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_121-default | < 7-2.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_121-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_121-default | < 7-2.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_116-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_116-default | < 8-2.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_116-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_116-default | < 8-2.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_146-default?arch=x86_64&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_146-default | < 4-2.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_146-default?arch=ppc64le&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_146-default | < 4-2.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_141-default?arch=x86_64&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_141-default | < 6-2.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_141-default?arch=ppc64le&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_141-default | < 6-2.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_138-default?arch=x86_64&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_138-default | < 7-2.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_138-default?arch=ppc64le&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_138-default | < 7-2.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_135-default?arch=x86_64&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_135-default | < 7-2.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_135-default?arch=ppc64le&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_135-default | < 7-2.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_129-default?arch=x86_64&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_129-default | < 9-2.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_129-default?arch=ppc64le&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_129-default | < 9-2.2 | sles-12 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |