Oval Definition:oval:org.opensuse.security:def:119287
Revision Date:2022-08-15Version:1
Title:Security update for the Linux Kernel (Important)
Description:

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-36557: Fixed a race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys could lead to a use-after-free (bnc#1201429). - CVE-2020-36558: Fixed a race condition involving VT_RESIZEX which could lead to a NULL pointer dereference and general protection fault (bnc#1200910). - CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013). - CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050). - CVE-2021-33655: Fixed memory out of bounds write by ioctl cmd FBIOPUT_VSCREENINFO (bnc#1201635). - CVE-2021-33656: Fixed memory out of bounds write related to ioctl cmd PIO_FONT (bnc#1201636). - CVE-2022-1116: Fixed a integer overflow vulnerability in io_uring which allowed a local attacker to cause memory corruption and escalate privileges to root (bnc#1199647). - CVE-2022-1462: Fixed an out-of-bounds read flaw in the TeleTYpe subsystem. This flaw allowed a local user to crash the system or read unauthorized random data from memory. (bnc#1198829) - CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487). - CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer handler in net/rose/rose_timer.c that allow attackers to crash the system without any privileges (bsc#1201251). - CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619). - CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604). - CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599). - CVE-2022-21505: Fixed kexec lockdown bypass with ima policy (bsc#1201458). - CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762). - CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657). - CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692) - CVE-2022-36946: Fixed incorrect packet truncation in nfqnl_mangle() that could lead to remote DoS (bnc#1201940).

The following non-security bugs were fixed:

- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362). - blk-mq: Fix wrong wakeup batch configuration which will cause hang (bsc#1200263). - blk-mq: clear active_queues before clearing BLK_MQ_F_TAG_QUEUE_SHARED (bsc#1200263). - blk-mq: fix tag_get wait task can't be awakened (bsc#1200263). - dma-direct: Fix potential NULL pointer dereference (bsc#1196472 ltc#192278). - dma-mapping: Allow mixing bypass and mapped DMA operation (bsc#1196472 ltc#192278). - dma-mapping: add a dma_ops_bypass flag to struct device (bsc#1196472 ltc#192278). - dma-mapping: move the remaining DMA API calls out of line (bsc#1196472 ltc#192278). - dma: kABI: Add back removed exports (bsc#1196472 ltc#192278). - exec: Force single empty string when argv is empty (bsc#1200571). - fsnotify: invalidate dcache before IN_DELETE event (bsc#1195478 bsc#1200905). - kvm: emulate: Fix SETcc emulation function offsets with SLS (bsc#1201930). - kvm: emulate: do not adjust size of fastop and setcc subroutines (bsc#1201930). - powerpc/dma: Fallback to dma_ops when persistent memory present (bsc#1196472 ltc#192278). - powerpc/pseries/iommu: Create defines for operations in ibm, ddw-applicable (bsc#1196472 ltc#192278). - powerpc/pseries/iommu: Fix window size for direct mapping with pmem (bsc#1196472 ltc#192278). - powerpc/pseries/iommu: Update call to ibm, query-pe-dma-windows (bsc#1196472 ltc#192278). - powerpc: dma: kABI workaround for moving around dma_bypass bit (bsc#1196472 ltc#192278). - powerpc: use the generic dma_ops_bypass mode (bsc#1196472 ltc#192278). - vmxnet3: fix minimum vectors alloc issue (bsc#1199489). - x86/bugs: Remove apostrophe typo (bsc#1114648). - x86/entry: Remove skip_r11rcx (bsc#1201644).
Family:unixClass:patch
Status:Reference(s):1114648
1194013
1195478
1195775
1196472
1196901
1197362
1198829
1199487
1199489
1199647
1199648
1199657
1200263
1200442
1200571
1200599
1200604
1200605
1200608
1200619
1200692
1200762
1200905
1200910
1201050
1201080
1201251
1201429
1201458
1201635
1201636
1201644
1201664
1201672
1201673
1201676
1201742
1201752
1201930
1201940
CVE-2020-36557
CVE-2020-36558
CVE-2021-26341
CVE-2021-33655
CVE-2021-33656
CVE-2021-4157
CVE-2022-1116
CVE-2022-1462
CVE-2022-1679
CVE-2022-20132
CVE-2022-20141
CVE-2022-20154
CVE-2022-21505
CVE-2022-2318
CVE-2022-26365
CVE-2022-29900
CVE-2022-29901
CVE-2022-33740
CVE-2022-33741
CVE-2022-33742
CVE-2022-33981
CVE-2022-36946
SUSE-SU-2022:2809-1
Platform(s):SUSE Linux Enterprise Server 15 SP2-BCL
Product(s):
Definition Synopsis
  • SUSE Linux Enterprise Server 15 SP2-BCL is installed
  • AND Package Information
  • kernel-default-5.3.18-150200.24.126.1 is installed
  • OR kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2 is installed
  • OR kernel-default-devel-5.3.18-150200.24.126.1 is installed
  • OR kernel-devel-5.3.18-150200.24.126.1 is installed
  • OR kernel-docs-5.3.18-150200.24.126.1 is installed
  • OR kernel-macros-5.3.18-150200.24.126.1 is installed
  • OR kernel-obs-build-5.3.18-150200.24.126.1 is installed
  • OR kernel-preempt-5.3.18-150200.24.126.1 is installed
  • OR kernel-preempt-devel-5.3.18-150200.24.126.1 is installed
  • OR kernel-source-5.3.18-150200.24.126.1 is installed
  • OR kernel-syms-5.3.18-150200.24.126.1 is installed
  • BACK