Risk | Low |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2020-0433 CVE-2020-36322 CVE-2021-28950 CVE-2021-29154 |
CWE-ID | CWE-416 CWE-404 CWE-834 CWE-77 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
SUSE Linux Enterprise Module for Live Patching Operating systems & Components / Operating system kernel-livepatch-4_12_14-150_69-default-debuginfo Operating systems & Components / Operating system package or component kernel-livepatch-4_12_14-150_69-default Operating systems & Components / Operating system package or component kernel-livepatch-4_12_14-150_66-default-debuginfo Operating systems & Components / Operating system package or component kernel-livepatch-4_12_14-150_66-default Operating systems & Components / Operating system package or component kernel-livepatch-4_12_14-150_63-default-debuginfo Operating systems & Components / Operating system package or component kernel-livepatch-4_12_14-150_63-default Operating systems & Components / Operating system package or component kernel-livepatch-4_12_14-150_58-default-debuginfo Operating systems & Components / Operating system package or component kernel-livepatch-4_12_14-150_58-default Operating systems & Components / Operating system package or component kernel-livepatch-4_12_14-150_55-default-debuginfo Operating systems & Components / Operating system package or component kernel-livepatch-4_12_14-150_55-default Operating systems & Components / Operating system package or component kernel-livepatch-4_12_14-150_52-default-debuginfo Operating systems & Components / Operating system package or component kernel-livepatch-4_12_14-150_52-default Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU47103
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-0433
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local authenticated user to execute arbitrary code.
In blk_mq_queue_tag_busy_iter of blk-mq-tag.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-151939299
MitigationUpdate the affected package the Linux Kernel (Live Patch 22 for SLE 15) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Live Patching: 15
kernel-livepatch-4_12_14-150_69-default-debuginfo: before 4-2.2
kernel-livepatch-4_12_14-150_69-default: before 4-2.2
kernel-livepatch-4_12_14-150_66-default-debuginfo: before 5-2.2
kernel-livepatch-4_12_14-150_66-default: before 5-2.2
kernel-livepatch-4_12_14-150_63-default-debuginfo: before 7-2.2
kernel-livepatch-4_12_14-150_63-default: before 7-2.2
kernel-livepatch-4_12_14-150_58-default-debuginfo: before 9-2.2
kernel-livepatch-4_12_14-150_58-default: before 9-2.2
kernel-livepatch-4_12_14-150_55-default-debuginfo: before 10-2.2
kernel-livepatch-4_12_14-150_55-default: before 10-2.2
kernel-livepatch-4_12_14-150_52-default-debuginfo: before 10-2.2
kernel-livepatch-4_12_14-150_52-default: before 10-2.2
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20211728-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU59473
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-36322
CWE-ID:
CWE-404 - Improper Resource Shutdown or Release
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists in the FUSE filesystem implementation in the Linux kernel due to fuse_do_getattr() calls make_bad_inode() in inappropriate situations. A local user can run a specially crafted program to trigger kernel crash.
Note, the vulnerability exists due to incomplete fix for #VU58207 (CVE-2021-28950).
Update the affected package the Linux Kernel (Live Patch 22 for SLE 15) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Live Patching: 15
kernel-livepatch-4_12_14-150_69-default-debuginfo: before 4-2.2
kernel-livepatch-4_12_14-150_69-default: before 4-2.2
kernel-livepatch-4_12_14-150_66-default-debuginfo: before 5-2.2
kernel-livepatch-4_12_14-150_66-default: before 5-2.2
kernel-livepatch-4_12_14-150_63-default-debuginfo: before 7-2.2
kernel-livepatch-4_12_14-150_63-default: before 7-2.2
kernel-livepatch-4_12_14-150_58-default-debuginfo: before 9-2.2
kernel-livepatch-4_12_14-150_58-default: before 9-2.2
kernel-livepatch-4_12_14-150_55-default-debuginfo: before 10-2.2
kernel-livepatch-4_12_14-150_55-default: before 10-2.2
kernel-livepatch-4_12_14-150_52-default-debuginfo: before 10-2.2
kernel-livepatch-4_12_14-150_52-default: before 10-2.2
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20211728-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58207
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-28950
CWE-ID:
CWE-834 - Excessive Iteration
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to excessive iteration in fs/fuse/fuse_i.h in the Linux kernel. A local user can run a specially crafted program to perform a denial of service attack.
Update the affected package the Linux Kernel (Live Patch 22 for SLE 15) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Live Patching: 15
kernel-livepatch-4_12_14-150_69-default-debuginfo: before 4-2.2
kernel-livepatch-4_12_14-150_69-default: before 4-2.2
kernel-livepatch-4_12_14-150_66-default-debuginfo: before 5-2.2
kernel-livepatch-4_12_14-150_66-default: before 5-2.2
kernel-livepatch-4_12_14-150_63-default-debuginfo: before 7-2.2
kernel-livepatch-4_12_14-150_63-default: before 7-2.2
kernel-livepatch-4_12_14-150_58-default-debuginfo: before 9-2.2
kernel-livepatch-4_12_14-150_58-default: before 9-2.2
kernel-livepatch-4_12_14-150_55-default-debuginfo: before 10-2.2
kernel-livepatch-4_12_14-150_55-default: before 10-2.2
kernel-livepatch-4_12_14-150_52-default-debuginfo: before 10-2.2
kernel-livepatch-4_12_14-150_52-default: before 10-2.2
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20211728-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU56241
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-29154
CWE-ID:
CWE-77 - Command injection
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect computation of branch displacements within the BPF JIT compilers in the Linux kernel in arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c. A local user can inject and execute arbitrary commands with elevated privileges.
Update the affected package the Linux Kernel (Live Patch 22 for SLE 15) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Live Patching: 15
kernel-livepatch-4_12_14-150_69-default-debuginfo: before 4-2.2
kernel-livepatch-4_12_14-150_69-default: before 4-2.2
kernel-livepatch-4_12_14-150_66-default-debuginfo: before 5-2.2
kernel-livepatch-4_12_14-150_66-default: before 5-2.2
kernel-livepatch-4_12_14-150_63-default-debuginfo: before 7-2.2
kernel-livepatch-4_12_14-150_63-default: before 7-2.2
kernel-livepatch-4_12_14-150_58-default-debuginfo: before 9-2.2
kernel-livepatch-4_12_14-150_58-default: before 9-2.2
kernel-livepatch-4_12_14-150_55-default-debuginfo: before 10-2.2
kernel-livepatch-4_12_14-150_55-default: before 10-2.2
kernel-livepatch-4_12_14-150_52-default-debuginfo: before 10-2.2
kernel-livepatch-4_12_14-150_52-default: before 10-2.2
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20211728-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.