Описание
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).
- CVE-2021-33655: Fixed out of bounds write with ioctl FBIOPUT_VSCREENINFO (bnc#1201635).
- CVE-2021-33656: Fixed out of bounds write with ioctl PIO_FONT (bnc#1201636).
- CVE-2022-1462: Fixed an out-of-bounds read flaw in the TeleTYpe subsystem (bnc#1198829).
The following non-security bugs were fixed:
- Add missing recommends of kernel-install-tools to kernel-source-vanilla (bsc#1200442)
- cifs: On cifs_reconnect, resolve the hostname again (bsc#1201926).
- cifs: Simplify reconnect code when dfs upcall is enabled (bsc#1201926).
- cifs: To match file servers, make sure the server hostname matches (bsc#1201926).
- cifs: fix memory leak of smb3_fs_context_dup::server_hostname (bsc#1201926).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1201926).
- cifs: set a minimum of 120s for next dns resolution (bsc#1201926).
- cifs: use the expiry output of dns_query to schedule next resolution (bsc#1201926).
- kernel-binary.spec: Support radio selection for debuginfo. To disable debuginfo on 5.18 kernel a radio selection needs to be switched to a different selection. This requires disabling the currently active option and selecting NONE as debuginfo type.
- kvm: emulate: Fix SETcc emulation function offsets with SLS (bsc#1201930).
- kvm: emulate: do not adjust size of fastop and setcc subroutines (bsc#1201930).
- pahole 1.22 required for full BTF features. also recommend pahole for kernel-source to make the kernel buildable with standard config
- rpm/*.spec.in: remove backtick usage
- rpm/constraints.in: skip SLOW_DISK workers for kernel-source
- rpm/kernel-obs-build.spec.in: Also depend on dracut-systemd (bsc#1195775)
- rpm/kernel-obs-build.spec.in: add systemd-initrd and terminfo dracut module (bsc#1195775)
- rpm/kernel-obs-build.spec.in: use default dracut modules (bsc#1195926, bsc#1198484).
Список пакетов
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production
Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production
SUSE Linux Enterprise High Availability Extension 12 SP4
SUSE Linux Enterprise Live Patching 12 SP4
SUSE Linux Enterprise Server 12 SP4-LTSS
SUSE Linux Enterprise Server for SAP Applications 12 SP4
SUSE OpenStack Cloud 9
SUSE OpenStack Cloud Crowbar 9
Ссылки
- Link for SUSE-SU-2022:2808-1
- E-Mail link for SUSE-SU-2022:2808-1
- SUSE Security Ratings
- SUSE Bug 1195775
- SUSE Bug 1195926
- SUSE Bug 1198484
- SUSE Bug 1198829
- SUSE Bug 1200442
- SUSE Bug 1201050
- SUSE Bug 1201635
- SUSE Bug 1201636
- SUSE Bug 1201926
- SUSE Bug 1201930
- SUSE CVE CVE-2021-26341 page
- SUSE CVE CVE-2021-33655 page
- SUSE CVE CVE-2021-33656 page
- SUSE CVE CVE-2022-1462 page
Описание
Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.
Затронутые продукты
Ссылки
- CVE-2021-26341
- SUSE Bug 1196901
- SUSE Bug 1201050
Описание
When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.
Затронутые продукты
Ссылки
- CVE-2021-33655
- SUSE Bug 1201635
- SUSE Bug 1202087
- SUSE Bug 1205313
- SUSE Bug 1212291
Описание
When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out of bounds.
Затронутые продукты
Ссылки
- CVE-2021-33656
- SUSE Bug 1201636
- SUSE Bug 1212286
Описание
An out-of-bounds read flaw was found in the Linux kernel's TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.
Затронутые продукты
Ссылки
- CVE-2022-1462
- SUSE Bug 1198829