Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:4100-1

Опубликовано: 18 нояб. 2022
Источник: suse-cvrf

Описание

Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP3)

This update for the Linux Kernel 5.3.18-150300_59_76 fixes several issues.

The following security issues were fixed:

  • CVE-2021-33655: Fixed out of bounds write with ioctl FBIOPUT_VSCREENINFO (bnc#1201635).

  • CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).

  • CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bnc#1204168).

  • CVE-2022-42722: Fixed crash in beacon protection for P2P-device. (bsc#1204125)

  • Fixed incorrect handling of empty arguments array in execve() (bsc#1200571).

Список пакетов

SUSE Linux Enterprise Live Patching 15 SP3
kernel-livepatch-5_3_18-59_34-default-18-150300.2.2
kernel-livepatch-5_3_18-59_37-default-17-150300.2.2
kernel-livepatch-5_3_18-59_40-default-17-150300.2.2
kernel-livepatch-5_3_18-150300_59_43-default-16-150300.2.2
kernel-livepatch-5_3_18-150300_59_46-default-16-150300.2.2
kernel-livepatch-5_3_18-150300_59_49-default-15-150300.2.2
kernel-livepatch-5_3_18-150300_59_54-default-14-150300.2.2
kernel-livepatch-5_3_18-150300_59_60-default-13-150300.2.2
kernel-livepatch-5_3_18-150300_59_63-default-10-150300.2.2
kernel-livepatch-5_3_18-150300_59_68-default-9-150300.2.2
kernel-livepatch-5_3_18-150300_59_71-default-8-150300.2.1
kernel-livepatch-5_3_18-150300_59_76-default-7-150300.2.1

Описание

When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-16-150300.2.2
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-16-150300.2.2
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-15-150300.2.2
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-14-150300.2.2

Ссылки

Описание

It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-16-150300.2.2
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-16-150300.2.2
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-15-150300.2.2
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-14-150300.2.2

Ссылки

Описание

mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-16-150300.2.2
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-16-150300.2.2
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-15-150300.2.2
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-14-150300.2.2

Ссылки

Описание

In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-16-150300.2.2
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-16-150300.2.2
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-15-150300.2.2
SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-14-150300.2.2

Ссылки