Lucene search

K
suseSuseSUSE-SU-2022:2827-1
HistoryAug 16, 2022 - 12:00 a.m.

Security update for the Linux Kernel (important)

2022-08-1600:00:00
lists.opensuse.org
30
suse linux enterprise
kernel update
security bugs
race condition
out of bounds write
privilege escalation
remote dos
cifs
memory leak
hostname resolution
kvm
rpm
reboot system
patch instructions

EPSS

0.009

Percentile

82.8%

An update that solves 7 vulnerabilities and has 7 fixes is
now available.

Description:

The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various
security and bugfixes.

The following security bugs were fixed:

  • CVE-2020-36557: Fixed race condition between the VT_DISALLOCATE ioctl
    and closing/opening of ttys that could lead to a use-after-free
    (bnc#1201429).
  • CVE-2020-36558: Fixed race condition involving VT_RESIZEX that could
    lead to a NULL pointer dereference and general protection fault
    (bnc#1200910).
  • CVE-2021-33655: Fixed out of bounds write with ioctl FBIOPUT_VSCREENINFO
    (bnc#1201635).
  • CVE-2021-33656: Fixed out of bounds write with ioctl PIO_FONT
    (bnc#1201636).
  • CVE-2022-1462: Fixed an out-of-bounds read flaw in the TeleTYpe
    subsystem (bnc#1198829).
  • CVE-2022-20166: Fixed possible out of bounds write due to sprintf
    unsafety that could cause local escalation of privilege (bnc#1200598).
  • CVE-2022-36946: Fixed incorrect packet truncation in nfqnl_mangle() that
    could lead to remote DoS (bnc#1201940).

The following non-security bugs were fixed:

  • cifs: On cifs_reconnect, resolve the hostname again (bsc#1201926).
  • cifs: Simplify reconnect code when dfs upcall is enabled (bsc#1201926).
  • cifs: To match file servers, make sure the server hostname matches
    (bsc#1201926).
  • cifs: fix memory leak of smb3_fs_context_dup::server_hostname
    (bsc#1201926).
  • cifs: set a minimum of 120s for next dns resolution (bsc#1201926).
  • cifs: use the expiry output of dns_query to schedule next resolution
    (bsc#1201926).
  • kvm: emulate: Fix SETcc emulation function offsets with SLS
    (bsc#1201930).
  • kvm: emulate: do not adjust size of fastop and setcc subroutines
    (bsc#1201930).
  • rpm/*.spec.in: remove backtick usage
  • rpm/constraints.in: skip SLOW_DISK workers for kernel-source
  • rpm/kernel-obs-build.spec.in: Also depend on dracut-systemd (bsc#1195775)
  • rpm/kernel-obs-build.spec.in: add systemd-initrd and terminfo dracut
    module (bsc#1195775)
  • rpm/kernel-obs-build.spec.in: use default dracut modules (bsc#1195926,
    bsc#1198484)
  • x86/entry: Remove skip_r11rcx (bsc#1201644).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.4:

    zypper in -t patch openSUSE-SLE-15.4-2022-2827=1

  • openSUSE Leap 15.3:

    zypper in -t patch openSUSE-SLE-15.3-2022-2827=1

  • SUSE Linux Enterprise Server for SAP 15-SP1:

    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2827=1

  • SUSE Linux Enterprise Server 15-SP1-LTSS:

    zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2827=1

  • SUSE Linux Enterprise Server 15-SP1-BCL:

    zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2827=1

  • SUSE Linux Enterprise Module for Live Patching 15-SP1:

    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2022-2827=1

    Please note that this is the initial kernel livepatch without fixes
    itself, this livepatch package is later updated by seperate standalone
    livepatch updates.

  • SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:

    zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2827=1

  • SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:

    zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2827=1

  • SUSE Linux Enterprise High Availability 15-SP1:

    zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2022-2827=1

  • SUSE Enterprise Storage 6:

    zypper in -t patch SUSE-Storage-6-2022-2827=1

  • SUSE CaaS Platform 4.0:

    To install this update, use the SUSE CaaS Platform ‘skuba’ tool. It
    will inform you if it detects new updates and let you then trigger
    updating of the complete cluster in a controlled way.

Rows per page:
1-10 of 441