Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2021:3877-1

Опубликовано: 02 дек. 2021
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)

    You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

  • CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).

  • CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).

  • CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)

  • CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails. (bsc#1191961)

The following non-security bugs were fixed:

  • arm64: pgtable: make __pte_to_phys/__phys_to_pte_val inline functions (git-fixes).
  • arm64/sve: Use correct size when reinitialising SVE state (git-fixes).
  • bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22913)
  • bpf: Disallow unprivileged bpf by default (jsc#SLE-22913).
  • bpf: Fix potential race in tail call compatibility check (git-fixes).
  • bpf: Move owner type, jited info into array auxiliary data (bsc#1141655).
  • bpf: Use kvmalloc for map values in syscall (stable-5.14.16).
  • btrfs: fix memory ordering between normal and ordered work functions (git-fixes).
  • config: disable unprivileged BPF by default (jsc#SLE-22913)
  • drivers: base: cacheinfo: Get rid of DEFINE_SMP_CALL_CACHE_FUNCTION() (git-fixes).
  • drm: fix spectre issue in vmw_execbuf_ioctl (bsc#1192802).
  • EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell (bsc#1114648).
  • fuse: fix page stealing (bsc#1192718).
  • gigaset: fix spectre issue in do_data_b3_req (bsc#1192802).
  • hisax: fix spectre issues (bsc#1192802).
  • hysdn: fix spectre issue in hycapi_send_message (bsc#1192802).
  • i2c: synquacer: fix deferred probing (git-fixes).
  • ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
  • ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).
  • ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).
  • infiniband: fix spectre issue in ib_uverbs_write (bsc#1192802).
  • iwlwifi: fix spectre issue in iwl_dbgfs_update_pm (bsc#1192802).
  • media: dvb_ca_en50221: prevent using slot_info for Spectre attacs (bsc#1192802).
  • media: dvb_ca_en50221: sanity check slot number from userspace (bsc#1192802).
  • media: wl128x: get rid of a potential spectre issue (bsc#1192802).
  • mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).
  • mpt3sas: fix spectre issues (bsc#1192802).
  • net: sock_diag: Fix spectre v1 gadget in __sock_diag_cmd() (bsc#1192802).
  • osst: fix spectre issue in osst_verify_frame (bsc#1192802).
  • prctl: allow to setup brk for et_dyn executables (git-fixes).
  • printk/console: Allow to disable console output by using console='' or console=null (bsc#1192753).
  • printk: handle blank console arguments passed in (bsc#1192753).
  • printk: Remove printk.h inclusion in percpu.h (bsc#1192987).
  • Revert 'ibmvnic: check failover_pending in login response' (bsc#1190523 ltc#194510).
  • Revert 'x86/kvm: fix vcpu-id indexed array sizes' (git-fixes).
  • scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe() (git-fixes).
  • scsi: BusLogic: Fix missing pr_cont() use (git-fixes).
  • scsi: core: Fix error handling of scsi_host_alloc() (git-fixes).
  • scsi: core: Fix spelling in a source code comment (git-fixes).
  • scsi: core: Only put parent device if host state differs from SHOST_CREATED (git-fixes).
  • scsi: core: Put .shost_dev in failure path if host state changes to RUNNING (git-fixes).
  • scsi: core: Retry I/O for Notify (Enable Spinup) Required error (git-fixes).
  • scsi: csiostor: Add module softdep on cxgb4 (git-fixes).
  • scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn() (git-fixes).
  • scsi: dc395: Fix error case unwinding (git-fixes).
  • scsi: FlashPoint: Rename si_flags field (git-fixes).
  • scsi: iscsi: Fix iface sysfs attr detection (git-fixes).
  • scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).
  • scsi: mpt3sas: Fix error return value in _scsih_expander_add() (git-fixes).
  • scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).
  • scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).
  • scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).
  • scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() (git-fixes).
  • scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).
  • scsi: snic: Fix an error message (git-fixes).
  • scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).
  • soc: fsl: dpio: replace smp_processor_id with raw_smp_processor_id (git-fixes).
  • swiotlb-xen: avoid double free (git-fixes).
  • sysvipc/sem: mitigate semnum index against spectre v1 (bsc#1192802).
  • tracing: use %ps format string to print symbols (git-fixes).
  • tty: serial: fsl_lpuart: fix the wrong mapbase value (git-fixes).
  • Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
  • x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).
  • x86/Xen: swap NX determination and GDT setup on BSP (git-fixes).
  • xen: Fix implicit type conversion (git-fixes).
  • xen-pciback: Fix return in pm_ctrl_init() (git-fixes).
  • xen-pciback: redo VF placement in the virtual topology (git-fixes).
  • xen/x86: fix PV trap handling on secondary processors (git-fixes).

Список пакетов

Image SLES12-SP5-Azure-BYOS
kernel-default-4.12.14-122.103.1
Image SLES12-SP5-Azure-HPC-BYOS
kernel-default-4.12.14-122.103.1
Image SLES12-SP5-Azure-SAP-BYOS
cluster-md-kmp-default-4.12.14-122.103.1
dlm-kmp-default-4.12.14-122.103.1
gfs2-kmp-default-4.12.14-122.103.1
kernel-default-4.12.14-122.103.1
ocfs2-kmp-default-4.12.14-122.103.1
Image SLES12-SP5-Azure-SAP-On-Demand
cluster-md-kmp-default-4.12.14-122.103.1
dlm-kmp-default-4.12.14-122.103.1
gfs2-kmp-default-4.12.14-122.103.1
kernel-default-4.12.14-122.103.1
ocfs2-kmp-default-4.12.14-122.103.1
Image SLES12-SP5-EC2-BYOS
kernel-default-4.12.14-122.103.1
Image SLES12-SP5-EC2-ECS-On-Demand
kernel-default-4.12.14-122.103.1
Image SLES12-SP5-EC2-On-Demand
kernel-default-4.12.14-122.103.1
Image SLES12-SP5-EC2-SAP-BYOS
cluster-md-kmp-default-4.12.14-122.103.1
dlm-kmp-default-4.12.14-122.103.1
gfs2-kmp-default-4.12.14-122.103.1
kernel-default-4.12.14-122.103.1
ocfs2-kmp-default-4.12.14-122.103.1
Image SLES12-SP5-EC2-SAP-On-Demand
cluster-md-kmp-default-4.12.14-122.103.1
dlm-kmp-default-4.12.14-122.103.1
gfs2-kmp-default-4.12.14-122.103.1
kernel-default-4.12.14-122.103.1
ocfs2-kmp-default-4.12.14-122.103.1
Image SLES12-SP5-GCE-BYOS
kernel-default-4.12.14-122.103.1
Image SLES12-SP5-GCE-On-Demand
kernel-default-4.12.14-122.103.1
Image SLES12-SP5-GCE-SAP-BYOS
cluster-md-kmp-default-4.12.14-122.103.1
dlm-kmp-default-4.12.14-122.103.1
gfs2-kmp-default-4.12.14-122.103.1
kernel-default-4.12.14-122.103.1
ocfs2-kmp-default-4.12.14-122.103.1
Image SLES12-SP5-GCE-SAP-On-Demand
cluster-md-kmp-default-4.12.14-122.103.1
dlm-kmp-default-4.12.14-122.103.1
gfs2-kmp-default-4.12.14-122.103.1
kernel-default-4.12.14-122.103.1
ocfs2-kmp-default-4.12.14-122.103.1
Image SLES12-SP5-OCI-BYOS-BYOS
kernel-default-4.12.14-122.103.1
Image SLES12-SP5-OCI-BYOS-SAP-BYOS
cluster-md-kmp-default-4.12.14-122.103.1
dlm-kmp-default-4.12.14-122.103.1
gfs2-kmp-default-4.12.14-122.103.1
kernel-default-4.12.14-122.103.1
ocfs2-kmp-default-4.12.14-122.103.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
cluster-md-kmp-default-4.12.14-122.103.1
dlm-kmp-default-4.12.14-122.103.1
gfs2-kmp-default-4.12.14-122.103.1
kernel-default-4.12.14-122.103.1
ocfs2-kmp-default-4.12.14-122.103.1
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
cluster-md-kmp-default-4.12.14-122.103.1
dlm-kmp-default-4.12.14-122.103.1
gfs2-kmp-default-4.12.14-122.103.1
kernel-default-4.12.14-122.103.1
ocfs2-kmp-default-4.12.14-122.103.1
SUSE Linux Enterprise High Availability Extension 12 SP5
cluster-md-kmp-default-4.12.14-122.103.1
dlm-kmp-default-4.12.14-122.103.1
gfs2-kmp-default-4.12.14-122.103.1
ocfs2-kmp-default-4.12.14-122.103.1
SUSE Linux Enterprise Live Patching 12 SP5
kernel-default-kgraft-4.12.14-122.103.1
kernel-default-kgraft-devel-4.12.14-122.103.1
kgraft-patch-4_12_14-122_103-default-1-8.5.1
SUSE Linux Enterprise Server 12 SP5
kernel-default-4.12.14-122.103.1
kernel-default-base-4.12.14-122.103.1
kernel-default-devel-4.12.14-122.103.1
kernel-default-man-4.12.14-122.103.1
kernel-devel-4.12.14-122.103.1
kernel-macros-4.12.14-122.103.1
kernel-source-4.12.14-122.103.1
kernel-syms-4.12.14-122.103.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
kernel-default-4.12.14-122.103.1
kernel-default-base-4.12.14-122.103.1
kernel-default-devel-4.12.14-122.103.1
kernel-default-man-4.12.14-122.103.1
kernel-devel-4.12.14-122.103.1
kernel-macros-4.12.14-122.103.1
kernel-source-4.12.14-122.103.1
kernel-syms-4.12.14-122.103.1
SUSE Linux Enterprise Software Development Kit 12 SP5
kernel-docs-4.12.14-122.103.1
kernel-obs-build-4.12.14-122.103.1
SUSE Linux Enterprise Workstation Extension 12 SP5
kernel-default-extra-4.12.14-122.103.1

Описание

In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.103.1
Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.103.1
Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.103.1
Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.103.1

Ссылки

Описание

A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.103.1
Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.103.1
Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.103.1
Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.103.1

Ссылки

Описание

An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.103.1
Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.103.1
Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.103.1
Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.103.1

Ссылки

Описание

Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:kernel-default-4.12.14-122.103.1
Image SLES12-SP5-Azure-HPC-BYOS:kernel-default-4.12.14-122.103.1
Image SLES12-SP5-Azure-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.103.1
Image SLES12-SP5-Azure-SAP-BYOS:dlm-kmp-default-4.12.14-122.103.1

Ссылки