Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:0367-1

Опубликовано: 10 фев. 2022
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
  • CVE-2021-3564: Fixed double-free memory corruption in the Linux kernel HCI device initialization subsystem that could have been used by attaching malicious HCI TTY Bluetooth devices. A local user could use this flaw to crash the system (bnc#1186207).
  • CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
  • CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
  • CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
  • CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
  • CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).
  • CVE-2022-0322: Fixed SCTP issue with account stream padding length for reconf chunk (bsc#1194985).
  • CVE-2021-4197: Use cgroup open-time credentials for process migraton perm checks (bsc#1194302).
  • CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194529).
  • CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1193727).
  • CVE-2021-4149: Fixed btrfs unlock newly allocated extent buffer after error (bsc#1194001).
  • CVE-2021-45486: Fixed an information leak because the hash table is very small in net/ipv4/route.c (bnc#1194087).
  • CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1193731).
  • CVE-2021-28711: Fixed issue with xen/blkfront to harden blkfront against event channel storms (XSA-391) (bsc#1193440).
  • CVE-2021-28712: Fixed issue with xen/netfront to harden netfront against event channel storms (XSA-391) (bsc#1193440).
  • CVE-2021-28713: Fixed issue with xen/console to harden hvc_xen against event channel storms (XSA-391) (bsc#1193440).
  • CVE-2021-28714: Fixed issue with xen/netback to handle rx queue stall detection (XSA-392) (bsc#1193442).
  • CVE-2021-28715: Fixed issue with xen/netback to do not queue unlimited number of packages (XSA-392) (bsc#1193442).
  • CVE-2018-25020: Fixed an overflow in the BPF subsystem due to a mishandling of a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions. This affects kernel/bpf/core.c and net/core/filter.c (bnc#1193575).
  • CVE-2021-0935: Fixed possible out of bounds write in ip6_xmit of ip6_output.c due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192032).
  • CVE-2020-27820: Fixed a vulnerability where a use-after-frees in nouveau's postclose() handler could happen if removing device (bsc#1179599).
  • CVE-2021-4002: Fixed incorrect TLBs flush in hugetlbfs after huge_pmd_unshare (bsc#1192946).
  • CVE-2021-43975: hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allowed an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value (bnc#1192845).
  • CVE-2021-33098: Improper input validation in the Intel(R) Ethernet ixgbe driver for Linux before version 3.17.3 may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1192877).
  • CVE-2021-43976: mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allowed an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic) (bnc#1192847).
  • CVE-2019-15126: Fixed a vulnerability in Broadcom and Cypress Wi-Fi chips, used in RPi family of devices aka 'Kr00k' (bsc#1167162).
  • CVE-2021-4159: Fixed kernel ptr leak vulnerability via BPF in coerce_reg_to_size (bsc#1194227).

The following non-security bugs were fixed:

  • Bluetooth: fix the erroneous flush_work() order (git-fixes).
  • Build: Add obsolete_rebuilds_subpackage (boo#1172073 bsc#1191731).
  • ICMPv6: Add ICMPv6 Parameter Problem, code 3 definition (bsc#1191241).
  • IPv6: reply ICMP error if the first fragment do not include all headers (bsc#1191241 bsc#1195166).
  • elfcore: fix building with clang (bsc#1169514).
  • fget: clarify and improve __fget_files() implementation (bsc#1193727).
  • hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (bsc#1193506).
  • hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
  • ipv6/netfilter: Discard first fragment not including all headers (bsc#1191241 bsc#1195166).
  • kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).
  • kernel-binary.spec.in: add zstd to BuildRequires if used
  • kernel-binary.spec.in: make sure zstd is supported by kmod if used
  • kernel-binary.spec: Check for no kernel signing certificates. Also remove unused variable.
  • kernel-binary.spec: Define $image as rpm macro (bsc#1189841).
  • kernel-binary.spec: Do not fail silently when KMP is empty (bsc#1190358).
  • kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167).
  • kernel-binary.spec: Fix kernel-default-base scriptlets after packaging merge.
  • kernel-binary.spec: Require dwarves for kernel-binary-devel when BTF is enabled (jsc#SLE-17288).
  • kernel-binary.spec: suse-kernel-rpm-scriptlets required for uninstall as well.
  • kernel-cert-subpackage: Fix certificate location in scriptlets (bsc#1189841).
  • kernel-source.spec: install-kernel-tools also required on 15.4
  • kernel-spec-macros: Since rpm 4.17 %verbose is unusable (bsc#1191229).
  • kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
  • livepatch: Avoid CPU hogging with cond_resched (bsc#1071995).
  • memstick: rtsx_usb_ms: fix UAF (bsc#1194516).
  • moxart: fix potential use-after-free on remove path (bsc#1194516).
  • net: Using proper atomic helper (bsc#1186222).
  • net: ipv6: Discard next-hop MTU less than minimum link MTU (bsc#1191241 bsc#1195166).
  • net: mana: Add RX fencing (bsc#1193506).
  • net: mana: Add XDP support (bsc#1193506).
  • net: mana: Allow setting the number of queues while the NIC is down (bsc#1193506).
  • net: mana: Fix spelling mistake 'calledd' -> 'called' (bsc#1193506).
  • net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (bsc#1193506).
  • net: mana: Improve the HWC error handling (bsc#1193506).
  • net: mana: Support hibernation and kexec (bsc#1193506).
  • net: mana: Use kcalloc() instead of kzalloc() (bsc#1193506).
  • objtool: Support Clang non-section symbols in ORC generation (bsc#1169514).
  • post.sh: detect /usr mountpoint too
  • recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
  • recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#1192267).
  • rpm/kernel-binary.spec.in: Use kmod-zstd provide. This makes it possible to use kmod with ZSTD support on non-Tumbleweed.
  • rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release had arbitrary values in staging, we can't use it for dependencies. The filesystem one has to be enough (boo#1184804).
  • rpm/kernel-binary.spec.in: do not strip vmlinux again (bsc#1193306) After usrmerge, vmlinux file is not named vmlinux-<version>, but simply vmlinux. And this is not reflected in STRIP_KEEP_SYMTAB we set. So fix this by removing the dash...
  • rpm/kernel-binary.spec: Use only non-empty certificates.
  • rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305)
  • rpm: fix kmp install path
  • rpm: fixup support gz and zst compression methods (bsc#1190428, bsc#1190358).
  • rpm: use _rpmmacrodir (boo#1191384)
  • tty: hvc: replace BUG_ON() with negative return value (git-fixes).
  • vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888).
  • x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (bsc#1169514).
  • xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
  • xen/blkfront: do not trust the backend response data blindly (git-fixes).
  • xen/blkfront: read response from backend only once (git-fixes).
  • xen/netfront: disentangle tx_skb_freelist (git-fixes).
  • xen/netfront: do not read data from request on the ring page (git-fixes).
  • xen/netfront: do not trust the backend response data blindly (git-fixes).
  • xen/netfront: read response from backend only once (git-fixes).
  • xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
  • xfrm: fix MTU regression (bsc#1185377, bsc#1194048).

Список пакетов

Image SLES15-Azure-BYOS
kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS
cluster-md-kmp-default-4.12.14-150.83.1
dlm-kmp-default-4.12.14-150.83.1
gfs2-kmp-default-4.12.14-150.83.1
kernel-default-4.12.14-150.83.1
ocfs2-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-LI-BYOS-Production
cluster-md-kmp-default-4.12.14-150.83.1
dlm-kmp-default-4.12.14-150.83.1
gfs2-kmp-default-4.12.14-150.83.1
kernel-default-4.12.14-150.83.1
ocfs2-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-VLI-BYOS-Production
cluster-md-kmp-default-4.12.14-150.83.1
dlm-kmp-default-4.12.14-150.83.1
gfs2-kmp-default-4.12.14-150.83.1
kernel-default-4.12.14-150.83.1
ocfs2-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-EC2-HVM
cluster-md-kmp-default-4.12.14-150.83.1
dlm-kmp-default-4.12.14-150.83.1
gfs2-kmp-default-4.12.14-150.83.1
kernel-default-4.12.14-150.83.1
ocfs2-kmp-default-4.12.14-150.83.1
SUSE Linux Enterprise High Availability Extension 15
cluster-md-kmp-default-4.12.14-150.83.1
dlm-kmp-default-4.12.14-150.83.1
gfs2-kmp-default-4.12.14-150.83.1
ocfs2-kmp-default-4.12.14-150.83.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS
kernel-default-4.12.14-150.83.1
kernel-default-base-4.12.14-150.83.1
kernel-default-devel-4.12.14-150.83.1
kernel-devel-4.12.14-150.83.1
kernel-docs-4.12.14-150.83.1
kernel-macros-4.12.14-150.83.1
kernel-obs-build-4.12.14-150.83.1
kernel-source-4.12.14-150.83.1
kernel-syms-4.12.14-150.83.1
kernel-vanilla-base-4.12.14-150.83.1
SUSE Linux Enterprise High Performance Computing 15-LTSS
kernel-default-4.12.14-150.83.1
kernel-default-base-4.12.14-150.83.1
kernel-default-devel-4.12.14-150.83.1
kernel-devel-4.12.14-150.83.1
kernel-docs-4.12.14-150.83.1
kernel-macros-4.12.14-150.83.1
kernel-obs-build-4.12.14-150.83.1
kernel-source-4.12.14-150.83.1
kernel-syms-4.12.14-150.83.1
kernel-vanilla-base-4.12.14-150.83.1
SUSE Linux Enterprise Live Patching 15
kernel-default-livepatch-4.12.14-150.83.1
kernel-livepatch-4_12_14-150_83-default-1-1.5.1
SUSE Linux Enterprise Server 15-LTSS
kernel-default-4.12.14-150.83.1
kernel-default-base-4.12.14-150.83.1
kernel-default-devel-4.12.14-150.83.1
kernel-default-man-4.12.14-150.83.1
kernel-devel-4.12.14-150.83.1
kernel-docs-4.12.14-150.83.1
kernel-macros-4.12.14-150.83.1
kernel-obs-build-4.12.14-150.83.1
kernel-source-4.12.14-150.83.1
kernel-syms-4.12.14-150.83.1
kernel-vanilla-base-4.12.14-150.83.1
reiserfs-kmp-default-4.12.14-150.83.1
SUSE Linux Enterprise Server for SAP Applications 15
kernel-default-4.12.14-150.83.1
kernel-default-base-4.12.14-150.83.1
kernel-default-devel-4.12.14-150.83.1
kernel-devel-4.12.14-150.83.1
kernel-docs-4.12.14-150.83.1
kernel-macros-4.12.14-150.83.1
kernel-obs-build-4.12.14-150.83.1
kernel-source-4.12.14-150.83.1
kernel-syms-4.12.14-150.83.1
kernel-vanilla-base-4.12.14-150.83.1
reiserfs-kmp-default-4.12.14-150.83.1

Описание

The BPF subsystem in the Linux kernel before 4.17 mishandles situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. This affects kernel/bpf/core.c and net/core/filter.c.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

An issue was discovered on Broadcom Wi-Fi client devices. Specifically timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic, a different vulnerability than CVE-2019-9500, CVE-2019-9501, CVE-2019-9502, and CVE-2019-9503.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

A vulnerability was found in Linux kernel, where a use-after-frees in nouveau's postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if "unbind" the driver).


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

In ip6_xmit of ip6_output.c, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-168607263References: Upstream kernel


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. There are three affected backends: * blkfront patch 1, CVE-2021-28711 * netfront patch 2, CVE-2021-28712 * hvc_xen (console) patch 3, CVE-2021-28713


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. There are three affected backends: * blkfront patch 1, CVE-2021-28711 * netfront patch 2, CVE-2021-28712 * hvc_xen (console) patch 3, CVE-2021-28713


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. There are three affected backends: * blkfront patch 1, CVE-2021-28711 * netfront patch 2, CVE-2021-28712 * hvc_xen (console) patch 3, CVE-2021-28713


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714)


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714)


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

Improper input validation in the Intel(R) Ethernet ixgbe driver for Linux before version 3.17.3 may allow an authenticated user to potentially enable denial of service via local access.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system. This flaw affects all the Linux kernel versions starting from 3.13.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

In gadget_dev_desc_UDC_show of configfs.c, there is a possible disclosure of kernel heap memory due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-160822094References: Upstream kernel


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194696049References: Upstream kernel


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

A vulnerability was found in btrfs_alloc_tree_b in fs/btrfs/extent-tree.c in the Linux kernel due to an improper lock operation in btrfs. In this flaw, a user with a local privilege may cause a denial of service (DOS) due to a deadlock problem.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

An unprivileged write to the file handler flaw in the Linux kernel's control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

A use-after-free flaw was found in nci_request in net/nfc/nci/core.c in NFC Controller Interface (NCI) in the Linux kernel. This flaw could allow a local attacker with user privileges to cause a data race problem while the device is getting removed, leading to a privilege escalation problem.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

In the IPv4 implementation in the Linux kernel before 5.12.4, net/ipv4/route.c has an information leak because the hash table is very small.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

A flaw was found in the sctp_make_strreset_req function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUG_ON issue, leading to a denial of service (DOS).


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки

Описание

A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:cluster-md-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:dlm-kmp-default-4.12.14-150.83.1
Image SLES15-SAP-Azure-BYOS:gfs2-kmp-default-4.12.14-150.83.1

Ссылки
Уязвимость SUSE-SU-2022:0367-1