SUSE Security Update: Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2) ______________________________________________________________________________
Affected Products: SUSE Linux Enterprise Module for Live Patching 15-SP2 ______________________________________________________________________________
An update that fixes 9 vulnerabilities is now available.
Description:
This update for the Linux Kernel 5.3.18-24_52 fixes several issues.
The following security issues were fixed:
- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517). - CVE-2021-4154: Fixed option parsing with cgroups version 1 (bsc#1193842). - CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193) - CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673, CVE-2021-23134: Fixed multiple bugs in NFC subsytem (bsc#1178181, bsc#1186060). - CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Module for Live Patching 15-SP2:
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2022-290=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-291=1
Package List:
- SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le s390x x86_64):