Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP3)

SUSE Security Update: Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP3)
Announcement ID: SUSE-SU-2022:0463-1
Rating: critical
References: #1194460 #1194533 #1195308
Cross-References:CVE-2021-4083 CVE-2021-4202 CVE-2022-0435
Affected Products:
  • SUSE Linux Enterprise High Performance Computing 15-SP2
  • SUSE Linux Enterprise High Performance Computing 15-SP3
  • SUSE Linux Enterprise Micro 5.1
  • SUSE Linux Enterprise Module for Live Patching 15-SP2
  • SUSE Linux Enterprise Module for Live Patching 15-SP3
  • SUSE Linux Enterprise Server 15-SP2
  • SUSE Linux Enterprise Server 15-SP3
  • SUSE Linux Enterprise Server for SAP Applications 15-SP2
  • SUSE Linux Enterprise Server for SAP Applications 15-SP3

An update that fixes three vulnerabilities is now available.

Description:

This update for the Linux Kernel 5.3.18-59_24 fixes several issues.
The following security issues were fixed:

  • CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
  • CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195308).
  • CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Module for Live Patching 15-SP3:
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2022-461=1 SUSE-SLE-Module-Live-Patching-15-SP3-2022-462=1 SUSE-SLE-Module-Live-Patching-15-SP3-2022-463=1 SUSE-SLE-Module-Live-Patching-15-SP3-2022-464=1
  • SUSE Linux Enterprise Module for Live Patching 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2022-460=1

Package List:

  • SUSE Linux Enterprise Module for Live Patching 15-SP3 (ppc64le s390x x86_64):
    • kernel-livepatch-5_3_18-59_10-default-9-150300.2.2
    • kernel-livepatch-5_3_18-59_10-default-debuginfo-9-150300.2.2
    • kernel-livepatch-5_3_18-59_24-default-5-150300.2.2
    • kernel-livepatch-5_3_18-59_24-default-debuginfo-5-150300.2.2
    • kernel-livepatch-5_3_18-59_27-default-5-150300.2.2
    • kernel-livepatch-5_3_18-59_27-default-debuginfo-5-150300.2.2
    • kernel-livepatch-5_3_18-59_5-default-9-150300.2.2
    • kernel-livepatch-5_3_18-59_5-default-debuginfo-9-150300.2.2
    • kernel-livepatch-SLE15-SP3_Update_1-debugsource-9-150300.2.2
    • kernel-livepatch-SLE15-SP3_Update_2-debugsource-9-150300.2.2
    • kernel-livepatch-SLE15-SP3_Update_6-debugsource-5-150300.2.2
    • kernel-livepatch-SLE15-SP3_Update_7-debugsource-5-150300.2.2
  • SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le s390x x86_64):
    • kernel-livepatch-5_3_18-24_52-default-14-2.2
    • kernel-livepatch-5_3_18-24_52-default-debuginfo-14-2.2
    • kernel-livepatch-SLE15-SP2_Update_11-debugsource-14-2.2

References: