Описание
Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP3)
This update for the Linux Kernel 5.3.18-150300_59_87 fixes several issues.
The following security issues were fixed:
- CVE-2022-1116: Fixed a integer overflow vulnerability in io_uring which allowed a local attacker to cause memory corruption and escalate privileges to root (bnc#1199647).
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
Список пакетов
SUSE Linux Enterprise Live Patching 15 SP3
Ссылки
- Link for SUSE-SU-2022:2761-1
- E-Mail link for SUSE-SU-2022:2761-1
- SUSE Security Ratings
- SUSE Bug 1196959
- SUSE Bug 1199648
- SUSE CVE CVE-2021-39698 page
- SUSE CVE CVE-2022-1116 page
Описание
In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-185125206References: Upstream kernel
Затронутые продукты
Ссылки
- CVE-2021-39698
- SUSE Bug 1196956
- SUSE Bug 1196959
- SUSE Bug 1209225
Описание
Integer Overflow or Wraparound vulnerability in io_uring of Linux Kernel allows local attacker to cause memory corruption and escalate privileges to root. This issue affects: Linux Kernel versions prior to 5.4.189; version 5.4.24 and later versions.
Затронутые продукты
Ссылки
- CVE-2022-1116
- SUSE Bug 1199647
- SUSE Bug 1199648
- SUSE Bug 1209225