Risk | Low |
Patch available | YES |
Number of vulnerabilities | 15 |
CVE-ID | CVE-2020-36322 CVE-2020-36385 CVE-2021-22555 CVE-2021-23133 CVE-2021-27363 CVE-2021-27364 CVE-2021-27365 CVE-2021-28660 CVE-2021-28688 CVE-2021-29154 CVE-2021-32399 CVE-2021-33034 CVE-2021-33909 CVE-2021-3444 CVE-2021-28950 |
CWE-ID | CWE-404 CWE-416 CWE-787 CWE-362 CWE-200 CWE-264 CWE-119 CWE-665 CWE-77 CWE-190 CWE-125 CWE-834 |
Exploitation vector | Local |
Public exploit |
Vulnerability #3 is being exploited in the wild. Public exploit code for vulnerability #13 is available. |
Vulnerable software |
SUSE Linux Enterprise Module for Live Patching Operating systems & Components / Operating system kernel-livepatch-SLE15-SP2_Update_15-debugsource Operating systems & Components / Operating system package or component kernel-livepatch-5_3_18-24_53_4-default-debuginfo Operating systems & Components / Operating system package or component kernel-livepatch-5_3_18-24_53_4-default Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 15 vulnerabilities.
EUVDB-ID: #VU59473
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-36322
CWE-ID:
CWE-404 - Improper Resource Shutdown or Release
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists in the FUSE filesystem implementation in the Linux kernel due to fuse_do_getattr() calls make_bad_inode() in inappropriate situations. A local user can run a specially crafted program to trigger kernel crash.
Note, the vulnerability exists due to incomplete fix for #VU58207 (CVE-2021-28950).
Update the affected package the Linux Kernel (Live Patch 15 for SLE 15 SP2) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Live Patching: 15-SP2
kernel-livepatch-SLE15-SP2_Update_15-debugsource: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default-debuginfo: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default: before 2-2.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58332
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-36385
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in drivers/infiniband/core/ucma.c, because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. A local user can run a specially crafted program to trigger the use-after-free error and execute arbitrary code with elevated privileges.
Update the affected package the Linux Kernel (Live Patch 15 for SLE 15 SP2) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Live Patching: 15-SP2
kernel-livepatch-SLE15-SP2_Update_15-debugsource: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default-debuginfo: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default: before 2-2.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU56017
Risk: Low
CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Clear]
CVE-ID: CVE-2021-22555
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: Yes
Description The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when processing untrusted input in net/netfilter/x_tables.c in Linux kernel. A local user can run a specially crafted program to trigger an out-of-bounds write and execute arbitrary code with elevated privileges.
Update the affected package the Linux Kernel (Live Patch 15 for SLE 15 SP2) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Live Patching: 15-SP2
kernel-livepatch-SLE15-SP2_Update_15-debugsource: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default-debuginfo: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default: before 2-2.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU53006
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-23133
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition in Linux kernel SCTP sockets (net/sctp/socket.c). If sctp_destroy_sock is called without
sock_net(sk)->sctp.addr_wq_lock then an element is removed from the
auto_asconf_splist list without any proper locking. This can be
exploited by a local user with network service privileges to escalate to
root or from the context of an unprivileged user directly if a
BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some
SCTP socket.
Update the affected package the Linux Kernel (Live Patch 15 for SLE 15 SP2) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Live Patching: 15-SP2
kernel-livepatch-SLE15-SP2_Update_15-debugsource: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default-debuginfo: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default: before 2-2.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU51453
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-27363
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to the show_transport_handle() shows iSCSI transport handle to non-root users. A local user can gain unauthorized access to sensitive information and use it along with another vulnerability, such as #VU51452, to escalate privileges on the system.
Update the affected package the Linux Kernel (Live Patch 15 for SLE 15 SP2) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Live Patching: 15-SP2
kernel-livepatch-SLE15-SP2_Update_15-debugsource: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default-debuginfo: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default: before 2-2.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU51452
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-27364
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to iscsi_if_recv_msg() allows non-root users to connect and send commands to the Linux kernel. A local user can escalate privileges on the system.
Update the affected package the Linux Kernel (Live Patch 15 for SLE 15 SP2) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Live Patching: 15-SP2
kernel-livepatch-SLE15-SP2_Update_15-debugsource: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default-debuginfo: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default: before 2-2.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU51451
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-27365
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when processing Netlink messages in Linux kernel through 5.11.3, as certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. A local unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message, trigger memory corruption and execute arbitrary code on the system with elevated privileges.
Update the affected package the Linux Kernel (Live Patch 15 for SLE 15 SP2) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Live Patching: 15-SP2
kernel-livepatch-SLE15-SP2_Update_15-debugsource: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default-debuginfo: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default: before 2-2.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU56817
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-28660
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a local user to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in the "rtw_wx_set_scan" in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c. A local user can trigger out-of-bounds write and execute arbitrary code on the target system.
MitigationUpdate the affected package the Linux Kernel (Live Patch 15 for SLE 15 SP2) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Live Patching: 15-SP2
kernel-livepatch-SLE15-SP2_Update_15-debugsource: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default-debuginfo: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default: before 2-2.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63658
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-28688
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service attack.
The vulnerability exists due to improper initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. A local user can perform a denial of service attack.
MitigationUpdate the affected package the Linux Kernel (Live Patch 15 for SLE 15 SP2) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Live Patching: 15-SP2
kernel-livepatch-SLE15-SP2_Update_15-debugsource: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default-debuginfo: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default: before 2-2.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU56241
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-29154
CWE-ID:
CWE-77 - Command injection
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect computation of branch displacements within the BPF JIT compilers in the Linux kernel in arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c. A local user can inject and execute arbitrary commands with elevated privileges.
Update the affected package the Linux Kernel (Live Patch 15 for SLE 15 SP2) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Live Patching: 15-SP2
kernel-livepatch-SLE15-SP2_Update_15-debugsource: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default-debuginfo: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default: before 2-2.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU55257
Risk: Low
CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-32399
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition for removal of the HCI controller within net/bluetooth/hci_request.c in the Linux kernel. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel (Live Patch 15 for SLE 15 SP2) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Live Patching: 15-SP2
kernel-livepatch-SLE15-SP2_Update_15-debugsource: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default-debuginfo: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default: before 2-2.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU54454
Risk: Low
CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-33034
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in net/bluetooth/hci_event.c when destroying an hci_chan. A local user can escalate privileges on the system.
Update the affected package the Linux Kernel (Live Patch 15 for SLE 15 SP2) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Live Patching: 15-SP2
kernel-livepatch-SLE15-SP2_Update_15-debugsource: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default-debuginfo: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default: before 2-2.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU55143
Risk: Low
CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2021-33909
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow during size_t-to-int conversion when creating, mounting, and deleting a deep directory structure whose total path length exceeds 1GB. An unprivileged local user can write up to 10-byte string to an offset of exactly -2GB-10B below the beginning of a vmalloc()ated kernel buffer.
Successful exploitation of vulnerability may allow an attacker to exploit the our-of-bounds write vulnerability to execute arbitrary code with root privileges.
Update the affected package the Linux Kernel (Live Patch 15 for SLE 15 SP2) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Live Patching: 15-SP2
kernel-livepatch-SLE15-SP2_Update_15-debugsource: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default-debuginfo: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default: before 2-2.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU90368
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-3444
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to an out-of-bounds read error within the fixup_bpf_calls() function in kernel/bpf/verifier.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel (Live Patch 15 for SLE 15 SP2) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Live Patching: 15-SP2
kernel-livepatch-SLE15-SP2_Update_15-debugsource: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default-debuginfo: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default: before 2-2.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU58207
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-28950
CWE-ID:
CWE-834 - Excessive Iteration
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to excessive iteration in fs/fuse/fuse_i.h in the Linux kernel. A local user can run a specially crafted program to perform a denial of service attack.
Update the affected package the Linux Kernel (Live Patch 15 for SLE 15 SP2) to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Live Patching: 15-SP2
kernel-livepatch-SLE15-SP2_Update_15-debugsource: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default-debuginfo: before 2-2.1
kernel-livepatch-5_3_18-24_53_4-default: before 2-2.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.