Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:0365-1

Опубликовано: 10 фев. 2022
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
  • CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
  • CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).
  • CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).
  • CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
  • CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
  • CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).

The following non-security bugs were fixed:

  • bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() (bsc#1194227).
  • btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).
  • btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).
  • btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).
  • hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
  • net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
  • net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
  • net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).
  • net: mana: Add RX fencing (bsc#1193506).
  • net: mana: Add XDP support (bsc#1193506).
  • net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).
  • net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).
  • net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).
  • net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).
  • net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).
  • net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).
  • net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).
  • net_sched: avoid resetting active qdisc for multiple times (bsc#1183405).
  • net_sched: get rid of unnecessary dev_qdisc_reset() (bsc#1183405).
  • net_sched: use qdisc_reset() in qdisc_destroy() (bsc#1183405).
  • nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).
  • xfrm: fix MTU regression (bsc#1185377, bsc#1194048).

Список пакетов

Image SLES15-SP2-BYOS-Azure
kernel-default-5.3.18-24.102.1
Image SLES15-SP2-BYOS-EC2-HVM
kernel-default-5.3.18-24.102.1
Image SLES15-SP2-BYOS-GCE
kernel-default-5.3.18-24.102.1
Image SLES15-SP2-CHOST-BYOS-Aliyun
kernel-default-5.3.18-24.102.1
Image SLES15-SP2-CHOST-BYOS-Azure
kernel-default-5.3.18-24.102.1
Image SLES15-SP2-CHOST-BYOS-EC2
kernel-default-5.3.18-24.102.1
Image SLES15-SP2-CHOST-BYOS-GCE
kernel-default-5.3.18-24.102.1
Image SLES15-SP2-HPC-BYOS-Azure
kernel-default-5.3.18-24.102.1
Image SLES15-SP2-HPC-BYOS-EC2-HVM
kernel-default-5.3.18-24.102.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure
kernel-default-5.3.18-24.102.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM
kernel-default-5.3.18-24.102.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE
kernel-default-5.3.18-24.102.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure
kernel-default-5.3.18-24.102.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM
kernel-default-5.3.18-24.102.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE
kernel-default-5.3.18-24.102.1
Image SLES15-SP2-SAP-Azure
cluster-md-kmp-default-5.3.18-24.102.1
dlm-kmp-default-5.3.18-24.102.1
gfs2-kmp-default-5.3.18-24.102.1
kernel-default-5.3.18-24.102.1
ocfs2-kmp-default-5.3.18-24.102.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
cluster-md-kmp-default-5.3.18-24.102.1
dlm-kmp-default-5.3.18-24.102.1
gfs2-kmp-default-5.3.18-24.102.1
kernel-default-5.3.18-24.102.1
ocfs2-kmp-default-5.3.18-24.102.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
cluster-md-kmp-default-5.3.18-24.102.1
dlm-kmp-default-5.3.18-24.102.1
gfs2-kmp-default-5.3.18-24.102.1
kernel-default-5.3.18-24.102.1
ocfs2-kmp-default-5.3.18-24.102.1
Image SLES15-SP2-SAP-BYOS-Azure
cluster-md-kmp-default-5.3.18-24.102.1
dlm-kmp-default-5.3.18-24.102.1
gfs2-kmp-default-5.3.18-24.102.1
kernel-default-5.3.18-24.102.1
ocfs2-kmp-default-5.3.18-24.102.1
Image SLES15-SP2-SAP-BYOS-EC2-HVM
cluster-md-kmp-default-5.3.18-24.102.1
dlm-kmp-default-5.3.18-24.102.1
gfs2-kmp-default-5.3.18-24.102.1
kernel-default-5.3.18-24.102.1
ocfs2-kmp-default-5.3.18-24.102.1
Image SLES15-SP2-SAP-BYOS-GCE
cluster-md-kmp-default-5.3.18-24.102.1
dlm-kmp-default-5.3.18-24.102.1
gfs2-kmp-default-5.3.18-24.102.1
kernel-default-5.3.18-24.102.1
ocfs2-kmp-default-5.3.18-24.102.1
Image SLES15-SP2-SAP-EC2-HVM
cluster-md-kmp-default-5.3.18-24.102.1
dlm-kmp-default-5.3.18-24.102.1
gfs2-kmp-default-5.3.18-24.102.1
kernel-default-5.3.18-24.102.1
ocfs2-kmp-default-5.3.18-24.102.1
Image SLES15-SP2-SAP-GCE
cluster-md-kmp-default-5.3.18-24.102.1
dlm-kmp-default-5.3.18-24.102.1
gfs2-kmp-default-5.3.18-24.102.1
kernel-default-5.3.18-24.102.1
ocfs2-kmp-default-5.3.18-24.102.1
SUSE Enterprise Storage 7
kernel-default-5.3.18-24.102.1
kernel-default-base-5.3.18-24.102.1.9.48.1
kernel-default-devel-5.3.18-24.102.1
kernel-devel-5.3.18-24.102.1
kernel-docs-5.3.18-24.102.1
kernel-macros-5.3.18-24.102.1
kernel-obs-build-5.3.18-24.102.1
kernel-preempt-5.3.18-24.102.1
kernel-preempt-devel-5.3.18-24.102.1
kernel-source-5.3.18-24.102.1
kernel-syms-5.3.18-24.102.1
reiserfs-kmp-default-5.3.18-24.102.1
SUSE Linux Enterprise High Availability Extension 15 SP2
cluster-md-kmp-default-5.3.18-24.102.1
dlm-kmp-default-5.3.18-24.102.1
gfs2-kmp-default-5.3.18-24.102.1
ocfs2-kmp-default-5.3.18-24.102.1
SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS
kernel-default-5.3.18-24.102.1
kernel-default-base-5.3.18-24.102.1.9.48.1
kernel-default-devel-5.3.18-24.102.1
kernel-devel-5.3.18-24.102.1
kernel-docs-5.3.18-24.102.1
kernel-macros-5.3.18-24.102.1
kernel-obs-build-5.3.18-24.102.1
kernel-preempt-5.3.18-24.102.1
kernel-preempt-devel-5.3.18-24.102.1
kernel-source-5.3.18-24.102.1
kernel-syms-5.3.18-24.102.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
kernel-default-5.3.18-24.102.1
kernel-default-base-5.3.18-24.102.1.9.48.1
kernel-default-devel-5.3.18-24.102.1
kernel-devel-5.3.18-24.102.1
kernel-docs-5.3.18-24.102.1
kernel-macros-5.3.18-24.102.1
kernel-obs-build-5.3.18-24.102.1
kernel-preempt-5.3.18-24.102.1
kernel-preempt-devel-5.3.18-24.102.1
kernel-source-5.3.18-24.102.1
kernel-syms-5.3.18-24.102.1
SUSE Linux Enterprise Live Patching 15 SP2
kernel-default-livepatch-5.3.18-24.102.1
kernel-default-livepatch-devel-5.3.18-24.102.1
kernel-livepatch-5_3_18-24_102-default-1-5.3.1
SUSE Linux Enterprise Micro 5.0
kernel-default-5.3.18-24.102.1
kernel-default-base-5.3.18-24.102.1.9.48.1
SUSE Linux Enterprise Real Time 15 SP2
kernel-default-5.3.18-24.102.1
kernel-default-base-5.3.18-24.102.1.9.48.1
kernel-default-devel-5.3.18-24.102.1
kernel-devel-5.3.18-24.102.1
kernel-docs-5.3.18-24.102.1
kernel-macros-5.3.18-24.102.1
kernel-obs-build-5.3.18-24.102.1
kernel-preempt-5.3.18-24.102.1
kernel-preempt-devel-5.3.18-24.102.1
kernel-source-5.3.18-24.102.1
kernel-syms-5.3.18-24.102.1
SUSE Linux Enterprise Server 15 SP2-BCL
kernel-default-5.3.18-24.102.1
kernel-default-base-5.3.18-24.102.1.9.48.1
kernel-default-devel-5.3.18-24.102.1
kernel-devel-5.3.18-24.102.1
kernel-docs-5.3.18-24.102.1
kernel-macros-5.3.18-24.102.1
kernel-obs-build-5.3.18-24.102.1
kernel-preempt-5.3.18-24.102.1
kernel-preempt-devel-5.3.18-24.102.1
kernel-source-5.3.18-24.102.1
kernel-syms-5.3.18-24.102.1
SUSE Linux Enterprise Server 15 SP2-LTSS
kernel-default-5.3.18-24.102.1
kernel-default-base-5.3.18-24.102.1.9.48.1
kernel-default-devel-5.3.18-24.102.1
kernel-devel-5.3.18-24.102.1
kernel-docs-5.3.18-24.102.1
kernel-macros-5.3.18-24.102.1
kernel-obs-build-5.3.18-24.102.1
kernel-preempt-5.3.18-24.102.1
kernel-preempt-devel-5.3.18-24.102.1
kernel-source-5.3.18-24.102.1
kernel-syms-5.3.18-24.102.1
reiserfs-kmp-default-5.3.18-24.102.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2
kernel-default-5.3.18-24.102.1
kernel-default-base-5.3.18-24.102.1.9.48.1
kernel-default-devel-5.3.18-24.102.1
kernel-devel-5.3.18-24.102.1
kernel-docs-5.3.18-24.102.1
kernel-macros-5.3.18-24.102.1
kernel-obs-build-5.3.18-24.102.1
kernel-preempt-5.3.18-24.102.1
kernel-preempt-devel-5.3.18-24.102.1
kernel-source-5.3.18-24.102.1
kernel-syms-5.3.18-24.102.1
reiserfs-kmp-default-5.3.18-24.102.1
SUSE Manager Proxy 4.1
kernel-default-5.3.18-24.102.1
kernel-default-base-5.3.18-24.102.1.9.48.1
kernel-default-devel-5.3.18-24.102.1
kernel-devel-5.3.18-24.102.1
kernel-docs-5.3.18-24.102.1
kernel-macros-5.3.18-24.102.1
kernel-obs-build-5.3.18-24.102.1
kernel-preempt-5.3.18-24.102.1
kernel-preempt-devel-5.3.18-24.102.1
kernel-source-5.3.18-24.102.1
kernel-syms-5.3.18-24.102.1
reiserfs-kmp-default-5.3.18-24.102.1
SUSE Manager Retail Branch Server 4.1
kernel-default-5.3.18-24.102.1
kernel-default-base-5.3.18-24.102.1.9.48.1
kernel-default-devel-5.3.18-24.102.1
kernel-devel-5.3.18-24.102.1
kernel-docs-5.3.18-24.102.1
kernel-macros-5.3.18-24.102.1
kernel-obs-build-5.3.18-24.102.1
kernel-preempt-5.3.18-24.102.1
kernel-preempt-devel-5.3.18-24.102.1
kernel-source-5.3.18-24.102.1
kernel-syms-5.3.18-24.102.1
reiserfs-kmp-default-5.3.18-24.102.1
SUSE Manager Server 4.1
kernel-default-5.3.18-24.102.1
kernel-default-base-5.3.18-24.102.1.9.48.1
kernel-default-devel-5.3.18-24.102.1
kernel-devel-5.3.18-24.102.1
kernel-docs-5.3.18-24.102.1
kernel-macros-5.3.18-24.102.1
kernel-obs-build-5.3.18-24.102.1
kernel-preempt-5.3.18-24.102.1
kernel-preempt-devel-5.3.18-24.102.1
kernel-source-5.3.18-24.102.1
kernel-syms-5.3.18-24.102.1
reiserfs-kmp-default-5.3.18-24.102.1

Описание

A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.102.1

Ссылки

Описание

In gadget_dev_desc_UDC_show of configfs.c, there is a possible disclosure of kernel heap memory due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-160822094References: Upstream kernel


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.102.1

Ссылки

Описание

In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194696049References: Upstream kernel


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.102.1

Ссылки

Описание

pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.102.1

Ссылки

Описание

A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.102.1

Ссылки

Описание

A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.102.1

Ссылки

Описание

The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling 'file' pointer.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.102.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.102.1

Ссылки
Уязвимость SUSE-SU-2022:0365-1