Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2021:14764-1

Опубликовано: 13 июл. 2021
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2021-0512: Fixed a possible out of bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1187595)
  • CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)
  • CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)
  • CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861 bsc#1185863)
  • CVE-2021-29154: Fixed an incorrect computation of branch displacements in the BPF JIT compilers, which could allow to execute arbitrary code within the kernel context. (bsc#1184391)
  • CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)
  • CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859 bsc#1185863)
  • CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1185863 bsc#1186062)
  • CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862 bsc#1185863)

The following non-security bugs were fixed:

  • md: do not flush workqueue unconditionally in md_open (bsc#1184081).
  • md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).
  • md: md_open returns -EBUSY when entering racing area (bsc#1184081).
  • md: split mddev_find (bsc#1184081).

Список пакетов

SUSE Linux Enterprise Server 11 SP4-LTSS
kernel-bigmem-3.0.101-108.129.1
kernel-bigmem-base-3.0.101-108.129.1
kernel-bigmem-devel-3.0.101-108.129.1
kernel-default-3.0.101-108.129.1
kernel-default-base-3.0.101-108.129.1
kernel-default-devel-3.0.101-108.129.1
kernel-default-man-3.0.101-108.129.1
kernel-ec2-3.0.101-108.129.1
kernel-ec2-base-3.0.101-108.129.1
kernel-ec2-devel-3.0.101-108.129.1
kernel-pae-3.0.101-108.129.1
kernel-pae-base-3.0.101-108.129.1
kernel-pae-devel-3.0.101-108.129.1
kernel-ppc64-3.0.101-108.129.1
kernel-ppc64-base-3.0.101-108.129.1
kernel-ppc64-devel-3.0.101-108.129.1
kernel-source-3.0.101-108.129.1
kernel-syms-3.0.101-108.129.1
kernel-trace-3.0.101-108.129.1
kernel-trace-base-3.0.101-108.129.1
kernel-trace-devel-3.0.101-108.129.1
kernel-xen-3.0.101-108.129.1
kernel-xen-base-3.0.101-108.129.1
kernel-xen-devel-3.0.101-108.129.1

Описание

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1

Ссылки

Описание

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1

Ссылки

Описание

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1

Ссылки

Описание

An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1

Ссылки

Описание

An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1

Ссылки

Описание

In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1

Ссылки

Описание

BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1

Ссылки

Описание

net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1

Ссылки

Описание

net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1

Ссылки
Уязвимость SUSE-SU-2021:14764-1