Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:1369-1

Опубликовано: 25 апр. 2022
Источник: suse-cvrf

Описание

Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP3)

This update for the Linux Kernel 5.3.18-150300_59_60 fixes several issues.

The following security issues were fixed:

  • CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
  • CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197705)
  • CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)

Список пакетов

SUSE Linux Enterprise Live Patching 15 SP2
kernel-livepatch-5_3_18-24_107-default-4-150200.2.1
kernel-livepatch-5_3_18-24_64-default-15-150200.2.1
kernel-livepatch-5_3_18-24_83-default-9-150200.2.1
kernel-livepatch-5_3_18-24_93-default-8-150200.2.1
kernel-livepatch-5_3_18-24_99-default-6-150200.2.1
kernel-livepatch-5_3_18-24_67-default-13-150200.2.1
kernel-livepatch-5_3_18-24_53_4-default-13-150200.2.1
kernel-livepatch-5_3_18-24_70-default-13-150200.2.1
kernel-livepatch-5_3_18-24_75-default-12-150200.2.1
kernel-livepatch-5_3_18-24_78-default-11-150200.2.1
kernel-livepatch-5_3_18-24_86-default-9-150200.2.1
kernel-livepatch-5_3_18-24_61-default-15-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP3
kernel-livepatch-5_3_18-57-default-15-150200.3.1
kernel-livepatch-5_3_18-59_24-default-9-150300.2.1
kernel-livepatch-5_3_18-59_40-default-7-150300.2.1
kernel-livepatch-5_3_18-150300_59_46-default-6-150300.2.1
kernel-livepatch-5_3_18-59_10-default-13-150300.2.1
kernel-livepatch-5_3_18-59_13-default-13-150300.2.1
kernel-livepatch-5_3_18-150300_59_43-default-6-150300.2.1
kernel-livepatch-5_3_18-59_5-default-13-150300.2.1
kernel-livepatch-5_3_18-59_16-default-12-150300.2.1
kernel-livepatch-5_3_18-59_34-default-8-150300.2.1
kernel-livepatch-5_3_18-150300_59_60-default-3-150300.2.1

Описание

A use-after-free flaw was found in the Linux kernel's FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-4-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-13-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-15-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-15-150200.2.1

Ссылки

Описание

A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-4-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-13-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-15-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-15-150200.2.1

Ссылки

Описание

A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-4-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-13-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-15-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-15-150200.2.1

Ссылки