Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP5)

SUSE Security Update: Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP5)
Announcement ID: SUSE-SU-2021:3735-1
Rating: important
References: #1190432 #1191318 #1192042
Cross-References:CVE-2021-0935 CVE-2021-3752 CVE-2021-41864
Affected Products:
  • SUSE Linux Enterprise Module for Live Patching 15
  • SUSE Linux Enterprise Live Patching 12-SP5
  • SUSE Linux Enterprise Live Patching 12-SP4

An update that fixes three vulnerabilities is now available.

Description:

This update for the Linux Kernel 4.12.14-122_60 fixes several issues.
The following security issues were fixed:

  • CVE-2021-0935: Fixed use after free that could lead to local escalation of privilege in ip6_xmit of ip6_output.c (bsc#1192042).
  • CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module (bsc#1190432).
  • CVE-2021-41864: Fixed an integer overflow with a resultant out-of-bounds write in prealloc_elems_and_freelist in kernel/bpf/stackmap.c (bsc#1191318).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Module for Live Patching 15:
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-2021-3736=1
  • SUSE Linux Enterprise Live Patching 12-SP5:
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2021-3735=1
  • SUSE Linux Enterprise Live Patching 12-SP4:
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP4-2021-3734=1

Package List:

  • SUSE Linux Enterprise Module for Live Patching 15 (ppc64le x86_64):
    • kernel-livepatch-4_12_14-150_66-default-12-2.2
    • kernel-livepatch-4_12_14-150_66-default-debuginfo-12-2.2
  • SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64):
    • kgraft-patch-4_12_14-122_60-default-12-2.2
  • SUSE Linux Enterprise Live Patching 12-SP4 (ppc64le s390x x86_64):
    • kgraft-patch-4_12_14-95_74-default-8-2.2

References: