Описание
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP3)
This update for the Linux Kernel 5.3.18-150300_59_46 fixes several issues.
The following security issues were fixed:
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock (bsc#1197597).
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199602).
Список пакетов
SUSE Linux Enterprise Live Patching 15 SP2
kernel-livepatch-5_3_18-24_102-default-8-150200.2.2
SUSE Linux Enterprise Live Patching 15 SP3
kernel-livepatch-5_3_18-150300_59_54-default-7-150300.2.2
kernel-livepatch-5_3_18-59_13-default-16-150300.2.2
kernel-livepatch-5_3_18-150300_59_49-default-8-150300.2.2
kernel-livepatch-5_3_18-59_10-default-16-150300.2.2
kernel-livepatch-5_3_18-150300_59_43-default-9-150300.2.2
kernel-livepatch-5_3_18-150300_59_46-default-9-150300.2.2
Ссылки
- Link for SUSE-SU-2022:1974-1
- E-Mail link for SUSE-SU-2022:1974-1
- SUSE Security Ratings
- SUSE Bug 1197597
- SUSE Bug 1199602
- SUSE CVE CVE-2022-1048 page
- SUSE CVE CVE-2022-30594 page
Описание
A use-after-free flaw was found in the Linux kernel's sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-8-150200.2.2
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-9-150300.2.2
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-9-150300.2.2
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-8-150300.2.2
Ссылки
- CVE-2022-1048
- SUSE Bug 1197331
- SUSE Bug 1197597
- SUSE Bug 1200041
- SUSE Bug 1204132
- SUSE Bug 1212325
Описание
The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.
Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-8-150200.2.2
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-9-150300.2.2
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-9-150300.2.2
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-8-150300.2.2
Ссылки
- CVE-2022-30594
- SUSE Bug 1199505
- SUSE Bug 1199602
- SUSE Bug 1201549
- SUSE Bug 1204132