Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:0759-1

Опубликовано: 08 мар. 2022
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

Transient execution side-channel attacks attacking the Branch History Buffer (BHB), named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

  • CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
  • CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
  • CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
  • CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
  • CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
  • CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
  • CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
  • CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
  • CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
  • CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
  • CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).
  • CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
  • CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
  • CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf release (bsc#1195905).

The following non-security bugs were fixed:

  • btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
  • gve: Add RX context (jsc#SLE-23652).
  • gve: Add a jumbo-frame device option (jsc#SLE-23652).
  • gve: Add consumed counts to ethtool stats (jsc#SLE-23652).
  • gve: Add optional metadata descriptor type GVE_TXD_MTD (jsc#SLE-23652).
  • gve: Correct order of processing device options (jsc#SLE-23652).
  • gve: Fix GFP flags when allocing pages (jsc#SLE-23652).
  • gve: Implement packet continuation for RX (jsc#SLE-23652).
  • gve: Implement suspend/resume/shutdown (jsc#SLE-23652).
  • gve: Move the irq db indexes out of the ntfy block struct (jsc#SLE-23652).
  • gve: Recording rx queue before sending to napi (jsc#SLE-23652).
  • gve: Update gve_free_queue_page_list signature (jsc#SLE-23652).
  • gve: Use kvcalloc() instead of kvzalloc() (jsc#SLE-23652).
  • gve: fix for null pointer dereference (jsc#SLE-23652).
  • gve: fix the wrong AdminQ buffer queue index check (jsc#SLE-23652).
  • gve: fix unmatched u64_stats_update_end() (jsc#SLE-23652).
  • gve: remove memory barrier around seqno (jsc#SLE-23652).
  • lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
  • net: tipc: validate domain record count on input (bsc#1195254).
  • nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
  • nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
  • nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
  • nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
  • nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
  • powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
  • scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
  • scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).

Список пакетов

Image SLES15-SP2-BYOS-Azure
kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-EC2-HVM
kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-GCE
kernel-default-5.3.18-24.107.1
Image SLES15-SP2-CHOST-BYOS-Aliyun
kernel-default-5.3.18-24.107.1
Image SLES15-SP2-CHOST-BYOS-Azure
kernel-default-5.3.18-24.107.1
Image SLES15-SP2-CHOST-BYOS-EC2
kernel-default-5.3.18-24.107.1
Image SLES15-SP2-CHOST-BYOS-GCE
kernel-default-5.3.18-24.107.1
Image SLES15-SP2-HPC-BYOS-Azure
kernel-default-5.3.18-24.107.1
Image SLES15-SP2-HPC-BYOS-EC2-HVM
kernel-default-5.3.18-24.107.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure
kernel-default-5.3.18-24.107.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM
kernel-default-5.3.18-24.107.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE
kernel-default-5.3.18-24.107.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure
kernel-default-5.3.18-24.107.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM
kernel-default-5.3.18-24.107.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE
kernel-default-5.3.18-24.107.1
Image SLES15-SP2-SAP-Azure
cluster-md-kmp-default-5.3.18-24.107.1
dlm-kmp-default-5.3.18-24.107.1
gfs2-kmp-default-5.3.18-24.107.1
kernel-default-5.3.18-24.107.1
ocfs2-kmp-default-5.3.18-24.107.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
cluster-md-kmp-default-5.3.18-24.107.1
dlm-kmp-default-5.3.18-24.107.1
gfs2-kmp-default-5.3.18-24.107.1
kernel-default-5.3.18-24.107.1
ocfs2-kmp-default-5.3.18-24.107.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
cluster-md-kmp-default-5.3.18-24.107.1
dlm-kmp-default-5.3.18-24.107.1
gfs2-kmp-default-5.3.18-24.107.1
kernel-default-5.3.18-24.107.1
ocfs2-kmp-default-5.3.18-24.107.1
Image SLES15-SP2-SAP-BYOS-Azure
cluster-md-kmp-default-5.3.18-24.107.1
dlm-kmp-default-5.3.18-24.107.1
gfs2-kmp-default-5.3.18-24.107.1
kernel-default-5.3.18-24.107.1
ocfs2-kmp-default-5.3.18-24.107.1
Image SLES15-SP2-SAP-BYOS-EC2-HVM
cluster-md-kmp-default-5.3.18-24.107.1
dlm-kmp-default-5.3.18-24.107.1
gfs2-kmp-default-5.3.18-24.107.1
kernel-default-5.3.18-24.107.1
ocfs2-kmp-default-5.3.18-24.107.1
Image SLES15-SP2-SAP-BYOS-GCE
cluster-md-kmp-default-5.3.18-24.107.1
dlm-kmp-default-5.3.18-24.107.1
gfs2-kmp-default-5.3.18-24.107.1
kernel-default-5.3.18-24.107.1
ocfs2-kmp-default-5.3.18-24.107.1
Image SLES15-SP2-SAP-EC2-HVM
cluster-md-kmp-default-5.3.18-24.107.1
dlm-kmp-default-5.3.18-24.107.1
gfs2-kmp-default-5.3.18-24.107.1
kernel-default-5.3.18-24.107.1
ocfs2-kmp-default-5.3.18-24.107.1
Image SLES15-SP2-SAP-GCE
cluster-md-kmp-default-5.3.18-24.107.1
dlm-kmp-default-5.3.18-24.107.1
gfs2-kmp-default-5.3.18-24.107.1
kernel-default-5.3.18-24.107.1
ocfs2-kmp-default-5.3.18-24.107.1
SUSE Enterprise Storage 7
kernel-default-5.3.18-24.107.1
kernel-default-base-5.3.18-24.107.1.9.50.2
kernel-default-devel-5.3.18-24.107.1
kernel-devel-5.3.18-24.107.1
kernel-docs-5.3.18-24.107.1
kernel-macros-5.3.18-24.107.1
kernel-obs-build-5.3.18-24.107.1
kernel-preempt-5.3.18-24.107.1
kernel-preempt-devel-5.3.18-24.107.1
kernel-source-5.3.18-24.107.1
kernel-syms-5.3.18-24.107.1
reiserfs-kmp-default-5.3.18-24.107.1
SUSE Linux Enterprise High Availability Extension 15 SP2
cluster-md-kmp-default-5.3.18-24.107.1
dlm-kmp-default-5.3.18-24.107.1
gfs2-kmp-default-5.3.18-24.107.1
ocfs2-kmp-default-5.3.18-24.107.1
SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS
kernel-default-5.3.18-24.107.1
kernel-default-base-5.3.18-24.107.1.9.50.2
kernel-default-devel-5.3.18-24.107.1
kernel-devel-5.3.18-24.107.1
kernel-docs-5.3.18-24.107.1
kernel-macros-5.3.18-24.107.1
kernel-obs-build-5.3.18-24.107.1
kernel-preempt-5.3.18-24.107.1
kernel-preempt-devel-5.3.18-24.107.1
kernel-source-5.3.18-24.107.1
kernel-syms-5.3.18-24.107.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
kernel-default-5.3.18-24.107.1
kernel-default-base-5.3.18-24.107.1.9.50.2
kernel-default-devel-5.3.18-24.107.1
kernel-devel-5.3.18-24.107.1
kernel-docs-5.3.18-24.107.1
kernel-macros-5.3.18-24.107.1
kernel-obs-build-5.3.18-24.107.1
kernel-preempt-5.3.18-24.107.1
kernel-preempt-devel-5.3.18-24.107.1
kernel-source-5.3.18-24.107.1
kernel-syms-5.3.18-24.107.1
SUSE Linux Enterprise Live Patching 15 SP2
kernel-default-livepatch-5.3.18-24.107.1
kernel-default-livepatch-devel-5.3.18-24.107.1
kernel-livepatch-5_3_18-24_107-default-1-5.5.1
SUSE Linux Enterprise Micro 5.0
kernel-default-5.3.18-24.107.1
kernel-default-base-5.3.18-24.107.1.9.50.2
SUSE Linux Enterprise Real Time 15 SP2
kernel-default-5.3.18-24.107.1
kernel-default-base-5.3.18-24.107.1.9.50.2
kernel-default-devel-5.3.18-24.107.1
kernel-devel-5.3.18-24.107.1
kernel-docs-5.3.18-24.107.1
kernel-macros-5.3.18-24.107.1
kernel-obs-build-5.3.18-24.107.1
kernel-preempt-5.3.18-24.107.1
kernel-preempt-devel-5.3.18-24.107.1
kernel-source-5.3.18-24.107.1
kernel-syms-5.3.18-24.107.1
SUSE Linux Enterprise Server 15 SP2-BCL
kernel-default-5.3.18-24.107.1
kernel-default-base-5.3.18-24.107.1.9.50.2
kernel-default-devel-5.3.18-24.107.1
kernel-devel-5.3.18-24.107.1
kernel-docs-5.3.18-24.107.1
kernel-macros-5.3.18-24.107.1
kernel-obs-build-5.3.18-24.107.1
kernel-preempt-5.3.18-24.107.1
kernel-preempt-devel-5.3.18-24.107.1
kernel-source-5.3.18-24.107.1
kernel-syms-5.3.18-24.107.1
SUSE Linux Enterprise Server 15 SP2-LTSS
kernel-default-5.3.18-24.107.1
kernel-default-base-5.3.18-24.107.1.9.50.2
kernel-default-devel-5.3.18-24.107.1
kernel-devel-5.3.18-24.107.1
kernel-docs-5.3.18-24.107.1
kernel-macros-5.3.18-24.107.1
kernel-obs-build-5.3.18-24.107.1
kernel-preempt-5.3.18-24.107.1
kernel-preempt-devel-5.3.18-24.107.1
kernel-source-5.3.18-24.107.1
kernel-syms-5.3.18-24.107.1
reiserfs-kmp-default-5.3.18-24.107.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2
kernel-default-5.3.18-24.107.1
kernel-default-base-5.3.18-24.107.1.9.50.2
kernel-default-devel-5.3.18-24.107.1
kernel-devel-5.3.18-24.107.1
kernel-docs-5.3.18-24.107.1
kernel-macros-5.3.18-24.107.1
kernel-obs-build-5.3.18-24.107.1
kernel-preempt-5.3.18-24.107.1
kernel-preempt-devel-5.3.18-24.107.1
kernel-source-5.3.18-24.107.1
kernel-syms-5.3.18-24.107.1
reiserfs-kmp-default-5.3.18-24.107.1
SUSE Manager Proxy 4.1
kernel-default-5.3.18-24.107.1
kernel-default-base-5.3.18-24.107.1.9.50.2
kernel-default-devel-5.3.18-24.107.1
kernel-devel-5.3.18-24.107.1
kernel-docs-5.3.18-24.107.1
kernel-macros-5.3.18-24.107.1
kernel-obs-build-5.3.18-24.107.1
kernel-preempt-5.3.18-24.107.1
kernel-preempt-devel-5.3.18-24.107.1
kernel-source-5.3.18-24.107.1
kernel-syms-5.3.18-24.107.1
reiserfs-kmp-default-5.3.18-24.107.1
SUSE Manager Retail Branch Server 4.1
kernel-default-5.3.18-24.107.1
kernel-default-base-5.3.18-24.107.1.9.50.2
kernel-default-devel-5.3.18-24.107.1
kernel-devel-5.3.18-24.107.1
kernel-docs-5.3.18-24.107.1
kernel-macros-5.3.18-24.107.1
kernel-obs-build-5.3.18-24.107.1
kernel-preempt-5.3.18-24.107.1
kernel-preempt-devel-5.3.18-24.107.1
kernel-source-5.3.18-24.107.1
kernel-syms-5.3.18-24.107.1
reiserfs-kmp-default-5.3.18-24.107.1
SUSE Manager Server 4.1
kernel-default-5.3.18-24.107.1
kernel-default-base-5.3.18-24.107.1.9.50.2
kernel-default-devel-5.3.18-24.107.1
kernel-devel-5.3.18-24.107.1
kernel-docs-5.3.18-24.107.1
kernel-macros-5.3.18-24.107.1
kernel-obs-build-5.3.18-24.107.1
kernel-preempt-5.3.18-24.107.1
kernel-preempt-devel-5.3.18-24.107.1
kernel-source-5.3.18-24.107.1
kernel-syms-5.3.18-24.107.1
reiserfs-kmp-default-5.3.18-24.107.1

Описание

In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.107.1

Ссылки

Описание

Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.107.1

Ссылки

Описание

Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.107.1

Ссылки

Описание

A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.107.1

Ссылки

Описание

A vulnerability was found in the Linux kernel's cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.107.1

Ссылки

Описание

A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.107.1

Ссылки

Описание

A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.107.1

Ссылки

Описание

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.107.1

Ссылки

Описание

A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.107.1

Ссылки

Описание

An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.107.1

Ссылки

Описание

drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.107.1

Ссылки

Описание

An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.107.1

Ссылки

Описание

An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.107.1

Ссылки

Описание

An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-24.107.1
Image SLES15-SP2-CHOST-BYOS-Aliyun:kernel-default-5.3.18-24.107.1

Ссылки
Уязвимость SUSE-SU-2022:0759-1