QID 751155
Date Published: 2021-09-24
QID 751155: SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:3192-1)
The suse linux enterprise 12 sp5 azure kernel was updated to receive various security and bugfixes.
the following security bugs were fixed: - cve-2018-9517: fixed possible memory corruption due to a use after free in pppol2tp_connect (bsc#1108488).
- cve-2019-3874: fixed possible denial of service attack via sctp socket buffer used by a userspace applications (bnc#1129898).
- cve-2019-3900: fixed an infinite loop issue while handling incoming packets in handle_rx() (bnc#1133374).
- cve-2021-3640: fixed a use-after-free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- cve-2021-3653: missing validation of the `int_ctl` vmcb field and allows a malicious l1 guest to enable avic support for the l2 guest.
(bsc#1189399).
- cve-2021-3656: missing validation of the the `virt_ext` vmcb field and allows a malicious l1 guest to disable both vmload/vmsave intercepts and vls for the l2 guest (bsc#1189400).
- cve-2021-3679: a lack of cpu resource in tracing module functionality was found in the way user uses trace ring buffer in a specific way.
Only privileged local users (with cap_sys_admin capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
- cve-2021-3732: mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).
- cve-2021-3753: fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
- cve-2021-3759: unaccounted ipc objects in linux kernel could have lead to breaking memcg limits and dos attacks (bsc#1190115).
- cve-2021-38160: data corruption or loss could be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117) - cve-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).
- cve-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a max-3421 usb device in certain situations (bnc#1189291).
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation allows attacker to compromise the system.
- SUSE-SU-2021:3192-1 -
lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html
CVEs related to QID 751155
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| SUSE-SU-2021:3192-1 | SUSE Enterprise Linux |
|