Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:0762-1

Опубликовано: 08 мар. 2022
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

Transient execution side-channel attacks attacking the Branch History Buffer (BHB), named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

  • CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
  • CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
  • CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
  • CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
  • CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
  • CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).
  • CVE-2016-10905: Fixed a use-after-free is gfs2_clear_rgrpd() and read_rindex_entry() (bsc#1146312).

Список пакетов

HPE Helion OpenStack 8
kernel-default-4.4.180-94.156.1
kernel-default-base-4.4.180-94.156.1
kernel-default-devel-4.4.180-94.156.1
kernel-default-kgraft-4.4.180-94.156.1
kernel-devel-4.4.180-94.156.1
kernel-macros-4.4.180-94.156.1
kernel-source-4.4.180-94.156.1
kernel-syms-4.4.180-94.156.1
kgraft-patch-4_4_180-94_156-default-1-4.3.1
SUSE Linux Enterprise High Availability Extension 12 SP3
cluster-md-kmp-default-4.4.180-94.156.1
dlm-kmp-default-4.4.180-94.156.1
gfs2-kmp-default-4.4.180-94.156.1
ocfs2-kmp-default-4.4.180-94.156.1
SUSE Linux Enterprise Server 12 SP3-BCL
kernel-default-4.4.180-94.156.1
kernel-default-base-4.4.180-94.156.1
kernel-default-devel-4.4.180-94.156.1
kernel-devel-4.4.180-94.156.1
kernel-macros-4.4.180-94.156.1
kernel-source-4.4.180-94.156.1
kernel-syms-4.4.180-94.156.1
SUSE Linux Enterprise Server 12 SP3-LTSS
kernel-default-4.4.180-94.156.1
kernel-default-base-4.4.180-94.156.1
kernel-default-devel-4.4.180-94.156.1
kernel-default-kgraft-4.4.180-94.156.1
kernel-default-man-4.4.180-94.156.1
kernel-devel-4.4.180-94.156.1
kernel-macros-4.4.180-94.156.1
kernel-source-4.4.180-94.156.1
kernel-syms-4.4.180-94.156.1
kgraft-patch-4_4_180-94_156-default-1-4.3.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
kernel-default-4.4.180-94.156.1
kernel-default-base-4.4.180-94.156.1
kernel-default-devel-4.4.180-94.156.1
kernel-default-kgraft-4.4.180-94.156.1
kernel-devel-4.4.180-94.156.1
kernel-macros-4.4.180-94.156.1
kernel-source-4.4.180-94.156.1
kernel-syms-4.4.180-94.156.1
kgraft-patch-4_4_180-94_156-default-1-4.3.1
SUSE OpenStack Cloud 8
kernel-default-4.4.180-94.156.1
kernel-default-base-4.4.180-94.156.1
kernel-default-devel-4.4.180-94.156.1
kernel-default-kgraft-4.4.180-94.156.1
kernel-devel-4.4.180-94.156.1
kernel-macros-4.4.180-94.156.1
kernel-source-4.4.180-94.156.1
kernel-syms-4.4.180-94.156.1
kgraft-patch-4_4_180-94_156-default-1-4.3.1
SUSE OpenStack Cloud Crowbar 8
kernel-default-4.4.180-94.156.1
kernel-default-base-4.4.180-94.156.1
kernel-default-devel-4.4.180-94.156.1
kernel-default-kgraft-4.4.180-94.156.1
kernel-devel-4.4.180-94.156.1
kernel-macros-4.4.180-94.156.1
kernel-source-4.4.180-94.156.1
kernel-syms-4.4.180-94.156.1
kgraft-patch-4_4_180-94_156-default-1-4.3.1

Описание

An issue was discovered in fs/gfs2/rgrp.c in the Linux kernel before 4.8. A use-after-free is caused by the functions gfs2_clear_rgrpd and read_rindex_entry.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1

Ссылки

Описание

In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1

Ссылки

Описание

Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1

Ссылки

Описание

Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1

Ссылки

Описание

A vulnerability was found in the Linux kernel's cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1

Ссылки

Описание

A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1

Ссылки

Описание

An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1

Ссылки
Уязвимость SUSE-SU-2022:0762-1