Описание
Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP2)
This update for the Linux Kernel 5.3.18-24_83 fixes several issues.
The following security issues were fixed:
- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
Список пакетов
SUSE Linux Enterprise Live Patching 15 SP2
Ссылки
- Link for SUSE-SU-2022:0238-1
- E-Mail link for SUSE-SU-2022:0238-1
- SUSE Security Ratings
- SUSE Bug 1192036
- SUSE Bug 1194737
- SUSE CVE CVE-2021-42739 page
- SUSE CVE CVE-2022-0185 page
Описание
The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.
Затронутые продукты
Ссылки
- CVE-2021-42739
- SUSE Bug 1184673
- SUSE Bug 1192036
- SUSE Bug 1196722
- SUSE Bug 1196914
Описание
A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.
Затронутые продукты
Ссылки
- CVE-2022-0185
- SUSE Bug 1194517
- SUSE Bug 1194737