[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2022:2809-1 -- SLES kernel, reiserfs-kmp-default

ID: oval:org.secpod.oval:def:89046876Date: (C)2022-08-19   (M)2024-05-22
Class: PATCHFamily: unix




The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2020-36557: Fixed a race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys could lead to a use-after-free . - CVE-2020-36558: Fixed a race condition involving VT_RESIZEX which could lead to a NULL pointer dereference and general protection fault . - CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system . - CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage . - CVE-2021-33655: Fixed memory out of bounds write by ioctl cmd FBIOPUT_VSCREENINFO . - CVE-2021-33656: Fixed memory out of bounds write related to ioctl cmd PIO_FONT . - CVE-2022-1116: Fixed a integer overflow vulnerability in io_uring which allowed a local attacker to cause memory corruption and escalate privileges to root . - CVE-2022-1462: Fixed an out-of-bounds read flaw in the TeleTYpe subsystem. This flaw allowed a local user to crash the system or read unauthorized random data from memory. - CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages . - CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer handler in net/rose/rose_timer.c that allow attackers to crash the system without any privileges . - CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c . - CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu . - CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed . - CVE-2022-21505: Fixed kexec lockdown bypass with ima policy . - CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends . - CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information . - CVE-2022-33981: Fixed use-after-free in floppy driver - CVE-2022-36946: Fixed incorrect packet truncation in nfqnl_mangle that could lead to remote DoS . The following non-security bugs were fixed: - bcache: avoid unnecessary soft lockup in kworker update_writeback_rate . - blk-mq: Fix wrong wakeup batch configuration which will cause hang . - blk-mq: clear active_queues before clearing BLK_MQ_F_TAG_QUEUE_SHARED . - blk-mq: fix tag_get wait task can"t be awakened . - dma-direct: Fix potential NULL pointer dereference . - dma-mapping: Allow mixing bypass and mapped DMA operation . - dma-mapping: add a dma_ops_bypass flag to struct device . - dma-mapping: move the remaining DMA API calls out of line . - dma: kABI: Add back removed exports . - exec: Force single empty string when argv is empty . - fsnotify: invalidate dcache before IN_DELETE event . - kvm: emulate: Fix SETcc emulation function offsets with SLS . - kvm: emulate: do not adjust size of fastop and setcc subroutines . - powerpc/dma: Fallback to dma_ops when persistent memory present . - powerpc/pseries/iommu: Create defines for operations in ibm, ddw-applicable . - powerpc/pseries/iommu: Fix window size for direct mapping with pmem . - powerpc/pseries/iommu: Update call to ibm, query-pe-dma-windows . - powerpc: dma: kABI workaround for moving around dma_bypass bit . - powerpc: use the generic dma_ops_bypass mode . - vmxnet3: fix minimum vectors alloc issue . - x86/bugs: Remove apostrophe typo . - x86/entry: Remove skip_r11rcx . Special Instructions and Notes: Please reboot the system after installing this update.

Platform:
SUSE Linux Enterprise Server 15 SP2
Product:
kernel
reiserfs-kmp-default
Reference:
SUSE-SU-2022:2809-1
CVE-2020-36557
CVE-2020-36558
CVE-2021-26341
CVE-2021-33655
CVE-2021-33656
CVE-2021-4157
CVE-2022-1116
CVE-2022-1462
CVE-2022-1679
CVE-2022-20132
CVE-2022-20141
CVE-2022-20154
CVE-2022-21505
CVE-2022-2318
CVE-2022-26365
CVE-2022-29900
CVE-2022-29901
CVE-2022-33740
CVE-2022-33741
CVE-2022-33742
CVE-2022-33981
CVE-2022-36946
CVE    22
CVE-2022-1116
CVE-2022-20132
CVE-2021-33656
CVE-2021-33655
...

© SecPod Technologies