Описание
Security update for the Linux Kernel
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-36557: Fixed race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys that could lead to a use-after-free (bnc#1201429).
- CVE-2020-36558: Fixed race condition involving VT_RESIZEX that could lead to a NULL pointer dereference and general protection fault (bnc#1200910).
- CVE-2021-33655: Fixed out of bounds write with ioctl FBIOPUT_VSCREENINFO (bnc#1201635).
- CVE-2021-33656: Fixed out of bounds write with ioctl PIO_FONT (bnc#1201636).
- CVE-2022-1462: Fixed an out-of-bounds read flaw in the TeleTYpe subsystem (bnc#1198829).
- CVE-2022-20166: Fixed possible out of bounds write due to sprintf unsafety that could cause local escalation of privilege (bnc#1200598).
- CVE-2022-36946: Fixed incorrect packet truncation in nfqnl_mangle() that could lead to remote DoS (bnc#1201940).
The following non-security bugs were fixed:
- cifs: On cifs_reconnect, resolve the hostname again (bsc#1201926).
- cifs: Simplify reconnect code when dfs upcall is enabled (bsc#1201926).
- cifs: To match file servers, make sure the server hostname matches (bsc#1201926).
- cifs: fix memory leak of smb3_fs_context_dup::server_hostname (bsc#1201926).
- cifs: set a minimum of 120s for next dns resolution (bsc#1201926).
- cifs: use the expiry output of dns_query to schedule next resolution (bsc#1201926).
- kvm: emulate: Fix SETcc emulation function offsets with SLS (bsc#1201930).
- kvm: emulate: do not adjust size of fastop and setcc subroutines (bsc#1201930).
- rpm/*.spec.in: remove backtick usage
- rpm/constraints.in: skip SLOW_DISK workers for kernel-source
- rpm/kernel-obs-build.spec.in: Also depend on dracut-systemd (bsc#1195775)
- rpm/kernel-obs-build.spec.in: add systemd-initrd and terminfo dracut module (bsc#1195775)
- rpm/kernel-obs-build.spec.in: use default dracut modules (bsc#1195926, bsc#1198484)
- x86/entry: Remove skip_r11rcx (bsc#1201644).
Список пакетов
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production
Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production
Image SLES15-SP1-SAPCAL-Azure
Image SLES15-SP1-SAPCAL-EC2-HVM
Image SLES15-SP1-SAPCAL-GCE
SUSE Enterprise Storage 6
SUSE Linux Enterprise High Availability Extension 15 SP1
SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS
SUSE Linux Enterprise Live Patching 15 SP1
SUSE Linux Enterprise Server 15 SP1-BCL
SUSE Linux Enterprise Server 15 SP1-LTSS
SUSE Linux Enterprise Server for SAP Applications 15 SP1
openSUSE Leap 15.3
openSUSE Leap 15.4
Ссылки
- Link for SUSE-SU-2022:2827-1
- E-Mail link for SUSE-SU-2022:2827-1
- SUSE Security Ratings
- SUSE Bug 1195775
- SUSE Bug 1195926
- SUSE Bug 1198484
- SUSE Bug 1198829
- SUSE Bug 1200442
- SUSE Bug 1200598
- SUSE Bug 1200910
- SUSE Bug 1201429
- SUSE Bug 1201635
- SUSE Bug 1201636
- SUSE Bug 1201644
- SUSE Bug 1201926
- SUSE Bug 1201930
- SUSE Bug 1201940
- SUSE CVE CVE-2020-36557 page
- SUSE CVE CVE-2020-36558 page
- SUSE CVE CVE-2021-33655 page
Описание
A race condition in the Linux kernel before 5.6.2 between the VT_DISALLOCATE ioctl and closing/opening of ttys could lead to a use-after-free.
Затронутые продукты
Ссылки
- CVE-2020-36557
- SUSE Bug 1201429
- SUSE Bug 1201742
- SUSE Bug 1202874
- SUSE Bug 1205313
Описание
A race condition in the Linux kernel before 5.5.7 involving VT_RESIZEX could lead to a NULL pointer dereference and general protection fault.
Затронутые продукты
Ссылки
- CVE-2020-36558
- SUSE Bug 1200910
- SUSE Bug 1201752
- SUSE Bug 1205313
Описание
When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.
Затронутые продукты
Ссылки
- CVE-2021-33655
- SUSE Bug 1201635
- SUSE Bug 1202087
- SUSE Bug 1205313
- SUSE Bug 1212291
Описание
When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out of bounds.
Затронутые продукты
Ссылки
- CVE-2021-33656
- SUSE Bug 1201636
- SUSE Bug 1212286
Описание
An out-of-bounds read flaw was found in the Linux kernel's TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.
Затронутые продукты
Ссылки
- CVE-2022-1462
- SUSE Bug 1198829
Описание
In various methods of kernel base drivers, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182388481References: Upstream kernel
Затронутые продукты
Ссылки
- CVE-2022-20166
- SUSE Bug 1200598
- SUSE Bug 1212284
Описание
nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.
Затронутые продукты
Ссылки
- CVE-2022-36946
- SUSE Bug 1201940
- SUSE Bug 1201941
- SUSE Bug 1202312
- SUSE Bug 1202874
- SUSE Bug 1203208
- SUSE Bug 1204132
- SUSE Bug 1205313
- SUSE Bug 1212310