Описание
Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP3)
This update for the Linux Kernel 5.3.18-150300_59_63 fixes several issues.
The following security issues were fixed:
-
- CVE-2022-1158: Fixed KVM x86/mmu compare-and-exchange of gPTE via the user address (bsc#1198133)
-
- CVE-2021-39698: In aio_poll_complete_work of aio.c, there was a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1196959)
Список пакетов
SUSE Linux Enterprise Live Patching 15 SP3
Ссылки
- Link for SUSE-SU-2022:1573-1
- E-Mail link for SUSE-SU-2022:1573-1
- SUSE Security Ratings
- SUSE Bug 1196959
- SUSE Bug 1198133
- SUSE CVE CVE-2021-39698 page
- SUSE CVE CVE-2022-1158 page
Описание
In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-185125206References: Upstream kernel
Затронутые продукты
Ссылки
- CVE-2021-39698
- SUSE Bug 1196956
- SUSE Bug 1196959
- SUSE Bug 1209225
Описание
A flaw was found in KVM. When updating a guest's page table entry, vm_pgoff was improperly used as the offset to get the page's pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.
Затронутые продукты
Ссылки
- CVE-2022-1158
- SUSE Bug 1197660
- SUSE Bug 1198133