Описание
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB), named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).
- CVE-2016-10905: Fixed a use-after-free is gfs2_clear_rgrpd() and read_rindex_entry() (bsc#1146312).
The following non-security bug was fixed:
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
Список пакетов
SUSE Linux Enterprise Server 12 SP2-BCL
Ссылки
- Link for SUSE-SU-2022:0756-1
- E-Mail link for SUSE-SU-2022:0756-1
- SUSE Security Ratings
- SUSE Bug 1146312
- SUSE Bug 1190717
- SUSE Bug 1191580
- SUSE Bug 1193731
- SUSE Bug 1194463
- SUSE Bug 1195543
- SUSE Bug 1195612
- SUSE Bug 1195908
- SUSE Bug 1195939
- SUSE Bug 1196079
- SUSE Bug 1196612
- SUSE CVE CVE-2016-10905 page
- SUSE CVE CVE-2021-0920 page
- SUSE CVE CVE-2022-0001 page
- SUSE CVE CVE-2022-0002 page
- SUSE CVE CVE-2022-0492 page
- SUSE CVE CVE-2022-0617 page
Описание
An issue was discovered in fs/gfs2/rgrp.c in the Linux kernel before 4.8. A use-after-free is caused by the functions gfs2_clear_rgrpd and read_rindex_entry.
Затронутые продукты
Ссылки
- CVE-2016-10905
- SUSE Bug 1146312
Описание
In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel
Затронутые продукты
Ссылки
- CVE-2021-0920
- SUSE Bug 1193731
- SUSE Bug 1194463
- SUSE Bug 1195939
- SUSE Bug 1199255
- SUSE Bug 1200084
Описание
Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
Затронутые продукты
Ссылки
- CVE-2022-0001
- SUSE Bug 1191580
- SUSE Bug 1196901
Описание
Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
Затронутые продукты
Ссылки
- CVE-2022-0002
- SUSE Bug 1191580
- SUSE Bug 1196901
Описание
A vulnerability was found in the Linux kernel's cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
Затронутые продукты
Ссылки
- CVE-2022-0492
- SUSE Bug 1195543
- SUSE Bug 1195908
- SUSE Bug 1196612
- SUSE Bug 1196776
- SUSE Bug 1198615
- SUSE Bug 1199255
- SUSE Bug 1199615
- SUSE Bug 1200084
Описание
A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.
Затронутые продукты
Ссылки
- CVE-2022-0617
- SUSE Bug 1196079
Описание
An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.
Затронутые продукты
Ссылки
- CVE-2022-24448
- SUSE Bug 1195612