Use After Free Affecting kernel-livepatch-5_3_18-24_67-default package, versions <12-150200.2.1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES152-KERNELLIVEPATCH53182467DEFAULT-3265154
- published 16 Apr 2022
- disclosed 14 Apr 2022
Introduced: 14 Apr 2022
CVE-2021-39698 Open this link in a new tabHow to fix?
Upgrade SLES:15.2 kernel-livepatch-5_3_18-24_67-default to version 12-150200.2.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-livepatch-5_3_18-24_67-default package and not the kernel-livepatch-5_3_18-24_67-default package as distributed by SLES.
See How to fix? for SLES:15.2 relevant fixed versions and status.
In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-185125206References: Upstream kernel