SUSE: 2022:4112-1 important: the Linux Kernel (Live Patch 31 for SL...

   SUSE Security Update: Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP1)
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:4112-1
Rating:             important
References:         #1202087 #1203613 #1204170 #1204381 
Cross-References:   CVE-2021-33655 CVE-2022-2588 CVE-2022-42703
                   
CVSS scores:
                    CVE-2021-33655 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-33655 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-2588 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-42703 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-42703 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:
                    SUSE Linux Enterprise High Performance Computing 15-SP1
                    SUSE Linux Enterprise High Performance Computing 15-SP2
                    SUSE Linux Enterprise Live Patching 12-SP4
                    SUSE Linux Enterprise Live Patching 12-SP5
                    SUSE Linux Enterprise Module for Live Patching 15-SP1
                    SUSE Linux Enterprise Module for Live Patching 15-SP2
                    SUSE Linux Enterprise Server 15-SP1
                    SUSE Linux Enterprise Server 15-SP2
                    SUSE Linux Enterprise Server for SAP Applications 15-SP1
                    SUSE Linux Enterprise Server for SAP Applications 15-SP2
______________________________________________________________________________

   An update that solves three vulnerabilities and has one
   errata is now available.

Description:

   This update for the Linux Kernel 4.12.14-150100_197_114 fixes several
   issues.

   The following security issues were fixed:

   - CVE-2021-33655: Fixed out of bounds write with ioctl FBIOPUT_VSCREENINFO
     (bnc#1201635).
   - CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
   - CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf
     anon_vma double reuse (bnc#1204168).

   - Fixed incorrect handling of empty arguments array in execve()
     (bsc#1200571).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Live Patching 15-SP2:

      zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2022-4092=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-4093=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-4094=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-4095=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-4096=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-4097=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-4098=1

   - SUSE Linux Enterprise Module for Live Patching 15-SP1:

      zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2022-4086=1 SUSE-SLE-Module-Live-Patching-15-SP1-2022-4087=1 SUSE-SLE-Module-Live-Patching-15-SP1-2022-4088=1 SUSE-SLE-Module-Live-Patching-15-SP1-2022-4089=1 SUSE-SLE-Module-Live-Patching-15-SP1-2022-4090=1

   - SUSE Linux Enterprise Live Patching 12-SP5:

      zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2022-4091=1 SUSE-SLE-Live-Patching-12-SP5-2022-4111=1 SUSE-SLE-Live-Patching-12-SP5-2022-4112=1 SUSE-SLE-Live-Patching-12-SP5-2022-4119=1 SUSE-SLE-Live-Patching-12-SP5-2022-4120=1 SUSE-SLE-Live-Patching-12-SP5-2022-4121=1 SUSE-SLE-Live-Patching-12-SP5-2022-4122=1 SUSE-SLE-Live-Patching-12-SP5-2022-4123=1

   - SUSE Linux Enterprise Live Patching 12-SP4:

      zypper in -t patch SUSE-SLE-Live-Patching-12-SP4-2022-4114=1 SUSE-SLE-Live-Patching-12-SP4-2022-4115=1 SUSE-SLE-Live-Patching-12-SP4-2022-4116=1 SUSE-SLE-Live-Patching-12-SP4-2022-4117=1 SUSE-SLE-Live-Patching-12-SP4-2022-4118=1



Package List:

   - SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le s390x x86_64):

      kernel-livepatch-5_3_18-150200_24_112-default-10-150200.2.2
      kernel-livepatch-5_3_18-150200_24_112-default-debuginfo-10-150200.2.2
      kernel-livepatch-5_3_18-150200_24_115-default-8-150200.2.1
      kernel-livepatch-5_3_18-150200_24_115-default-debuginfo-8-150200.2.1
      kernel-livepatch-5_3_18-24_102-default-15-150200.2.2
      kernel-livepatch-5_3_18-24_102-default-debuginfo-15-150200.2.2
      kernel-livepatch-5_3_18-24_107-default-14-150200.2.2
      kernel-livepatch-5_3_18-24_107-default-debuginfo-14-150200.2.2
      kernel-livepatch-5_3_18-24_93-default-18-150200.2.2
      kernel-livepatch-5_3_18-24_93-default-debuginfo-18-150200.2.2
      kernel-livepatch-5_3_18-24_96-default-17-150200.2.2
      kernel-livepatch-5_3_18-24_96-default-debuginfo-17-150200.2.2
      kernel-livepatch-5_3_18-24_99-default-16-150200.2.2
      kernel-livepatch-5_3_18-24_99-default-debuginfo-16-150200.2.2
      kernel-livepatch-SLE15-SP2_Update_21-debugsource-18-150200.2.2
      kernel-livepatch-SLE15-SP2_Update_22-debugsource-17-150200.2.2
      kernel-livepatch-SLE15-SP2_Update_23-debugsource-16-150200.2.2
      kernel-livepatch-SLE15-SP2_Update_24-debugsource-15-150200.2.2
      kernel-livepatch-SLE15-SP2_Update_26-debugsource-10-150200.2.2
      kernel-livepatch-SLE15-SP2_Update_27-debugsource-8-150200.2.1

   - SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le x86_64):

      kernel-livepatch-SLE15-SP2_Update_25-debugsource-14-150200.2.2

   - SUSE Linux Enterprise Module for Live Patching 15-SP1 (ppc64le x86_64):

      kernel-livepatch-4_12_14-150100_197_111-default-9-150100.2.2
      kernel-livepatch-4_12_14-150100_197_114-default-6-150100.2.1
      kernel-livepatch-4_12_14-197_102-default-15-150100.2.2
      kernel-livepatch-4_12_14-197_105-default-11-150100.2.2
      kernel-livepatch-4_12_14-197_108-default-10-150100.2.2

   - SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64):

      kgraft-patch-4_12_14-122_103-default-16-2.2
      kgraft-patch-4_12_14-122_106-default-14-2.2
      kgraft-patch-4_12_14-122_110-default-12-2.2
      kgraft-patch-4_12_14-122_113-default-11-2.2
      kgraft-patch-4_12_14-122_116-default-9-2.2
      kgraft-patch-4_12_14-122_121-default-7-2.2
      kgraft-patch-4_12_14-122_124-default-6-2.1
      kgraft-patch-4_12_14-122_98-default-16-2.2

   - SUSE Linux Enterprise Live Patching 12-SP4 (ppc64le s390x x86_64):

      kgraft-patch-4_12_14-95_83-default-15-2.2
      kgraft-patch-4_12_14-95_88-default-11-2.2
      kgraft-patch-4_12_14-95_93-default-10-2.2
      kgraft-patch-4_12_14-95_96-default-9-2.2
      kgraft-patch-4_12_14-95_99-default-6-2.1


References:

   https://www.suse.com/security/cve/CVE-2021-33655.html
   https://www.suse.com/security/cve/CVE-2022-2588.html
   https://www.suse.com/security/cve/CVE-2022-42703.html
   https://bugzilla.suse.com/1202087
   https://bugzilla.suse.com/1203613
   https://bugzilla.suse.com/1204170
   https://bugzilla.suse.com/1204381

SUSE: 2022:4112-1 important: the Linux Kernel (Live Patch 31 for SLE 15 SP1)

November 18, 2022
An update that solves three vulnerabilities and has one errata is now available

Summary

This update for the Linux Kernel 4.12.14-150100_197_114 fixes several issues. The following security issues were fixed: - CVE-2021-33655: Fixed out of bounds write with ioctl FBIOPUT_VSCREENINFO (bnc#1201635). - CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096). - CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bnc#1204168). - Fixed incorrect handling of empty arguments array in execve() (bsc#1200571). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Live Patching 15-SP2: zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2022-4092=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-4093=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-4094=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-4095=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-4096=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-4097=1 SUSE-SLE-Module-Live-Patching-15-SP2-2022-4098=1 - SUSE Linux Enterprise Module for Live Patching 15-SP1: zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2022-4086=1 SUSE-SLE-Module-Live-Patching-15-SP1-2022-4087=1 SUSE-SLE-Module-Live-Patching-15-SP1-2022-4088=1 SUSE-SLE-Module-Live-Patching-15-SP1-2022-4089=1 SUSE-SLE-Module-Live-Patching-15-SP1-2022-4090=1 - SUSE Linux Enterprise Live Patching 12-SP5: zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2022-4091=1 SUSE-SLE-Live-Patching-12-SP5-2022-4111=1 SUSE-SLE-Live-Patching-12-SP5-2022-4112=1 SUSE-SLE-Live-Patching-12-SP5-2022-4119=1 SUSE-SLE-Live-Patching-12-SP5-2022-4120=1 SUSE-SLE-Live-Patching-12-SP5-2022-4121=1 SUSE-SLE-Live-Patching-12-SP5-2022-4122=1 SUSE-SLE-Live-Patching-12-SP5-2022-4123=1 - SUSE Linux Enterprise Live Patching 12-SP4: zypper in -t patch SUSE-SLE-Live-Patching-12-SP4-2022-4114=1 SUSE-SLE-Live-Patching-12-SP4-2022-4115=1 SUSE-SLE-Live-Patching-12-SP4-2022-4116=1 SUSE-SLE-Live-Patching-12-SP4-2022-4117=1 SUSE-SLE-Live-Patching-12-SP4-2022-4118=1 Package List: - SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le s390x x86_64): kernel-livepatch-5_3_18-150200_24_112-default-10-150200.2.2 kernel-livepatch-5_3_18-150200_24_112-default-debuginfo-10-150200.2.2 kernel-livepatch-5_3_18-150200_24_115-default-8-150200.2.1 kernel-livepatch-5_3_18-150200_24_115-default-debuginfo-8-150200.2.1 kernel-livepatch-5_3_18-24_102-default-15-150200.2.2 kernel-livepatch-5_3_18-24_102-default-debuginfo-15-150200.2.2 kernel-livepatch-5_3_18-24_107-default-14-150200.2.2 kernel-livepatch-5_3_18-24_107-default-debuginfo-14-150200.2.2 kernel-livepatch-5_3_18-24_93-default-18-150200.2.2 kernel-livepatch-5_3_18-24_93-default-debuginfo-18-150200.2.2 kernel-livepatch-5_3_18-24_96-default-17-150200.2.2 kernel-livepatch-5_3_18-24_96-default-debuginfo-17-150200.2.2 kernel-livepatch-5_3_18-24_99-default-16-150200.2.2 kernel-livepatch-5_3_18-24_99-default-debuginfo-16-150200.2.2 kernel-livepatch-SLE15-SP2_Update_21-debugsource-18-150200.2.2 kernel-livepatch-SLE15-SP2_Update_22-debugsource-17-150200.2.2 kernel-livepatch-SLE15-SP2_Update_23-debugsource-16-150200.2.2 kernel-livepatch-SLE15-SP2_Update_24-debugsource-15-150200.2.2 kernel-livepatch-SLE15-SP2_Update_26-debugsource-10-150200.2.2 kernel-livepatch-SLE15-SP2_Update_27-debugsource-8-150200.2.1 - SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le x86_64): kernel-livepatch-SLE15-SP2_Update_25-debugsource-14-150200.2.2 - SUSE Linux Enterprise Module for Live Patching 15-SP1 (ppc64le x86_64): kernel-livepatch-4_12_14-150100_197_111-default-9-150100.2.2 kernel-livepatch-4_12_14-150100_197_114-default-6-150100.2.1 kernel-livepatch-4_12_14-197_102-default-15-150100.2.2 kernel-livepatch-4_12_14-197_105-default-11-150100.2.2 kernel-livepatch-4_12_14-197_108-default-10-150100.2.2 - SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64): kgraft-patch-4_12_14-122_103-default-16-2.2 kgraft-patch-4_12_14-122_106-default-14-2.2 kgraft-patch-4_12_14-122_110-default-12-2.2 kgraft-patch-4_12_14-122_113-default-11-2.2 kgraft-patch-4_12_14-122_116-default-9-2.2 kgraft-patch-4_12_14-122_121-default-7-2.2 kgraft-patch-4_12_14-122_124-default-6-2.1 kgraft-patch-4_12_14-122_98-default-16-2.2 - SUSE Linux Enterprise Live Patching 12-SP4 (ppc64le s390x x86_64): kgraft-patch-4_12_14-95_83-default-15-2.2 kgraft-patch-4_12_14-95_88-default-11-2.2 kgraft-patch-4_12_14-95_93-default-10-2.2 kgraft-patch-4_12_14-95_96-default-9-2.2 kgraft-patch-4_12_14-95_99-default-6-2.1

References

#1202087 #1203613 #1204170 #1204381

Cross- CVE-2021-33655 CVE-2022-2588 CVE-2022-42703

CVSS scores:

CVE-2021-33655 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE-2021-33655 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2022-2588 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2022-42703 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2022-42703 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

SUSE Linux Enterprise High Performance Computing 15-SP1

SUSE Linux Enterprise High Performance Computing 15-SP2

SUSE Linux Enterprise Live Patching 12-SP4

SUSE Linux Enterprise Live Patching 12-SP5

SUSE Linux Enterprise Module for Live Patching 15-SP1

SUSE Linux Enterprise Module for Live Patching 15-SP2

SUSE Linux Enterprise Server 15-SP1

SUSE Linux Enterprise Server 15-SP2

SUSE Linux Enterprise Server for SAP Applications 15-SP1

SUSE Linux Enterprise Server for SAP Applications 15-SP2

https://www.suse.com/security/cve/CVE-2021-33655.html

https://www.suse.com/security/cve/CVE-2022-2588.html

https://www.suse.com/security/cve/CVE-2022-42703.html

https://bugzilla.suse.com/1202087

https://bugzilla.suse.com/1203613

https://bugzilla.suse.com/1204170

https://bugzilla.suse.com/1204381

Severity
Announcement ID: SUSE-SU-2022:4112-1
Rating: important

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.