Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:14905-1

Опубликовано: 08 мар. 2022
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Transient execution side-channel attacks attacking the Branch History Buffer (BHB), named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

  • CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
  • CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
  • CVE-2020-12770: Fixed sg_remove_request call in a certain failure cases (bsc#1171420).
  • CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
  • CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
  • CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bsc#1193867).
  • CVE-2021-4155: Fixed a data leak flaw that allows a local attacker to leak data on the XFS filesystem (bsc#1194272).
  • CVE-2020-27820: Fixed a vulnerability where a use-after-frees in nouveau's postclose() handler could happen if removing device (bsc#1179599).
  • CVE-2019-0136: Fixed an insufficient access control which allow an unauthenticated user to execute a denial of service (bsc#1193157).
  • CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).

The following non-security bugs were fixed:

  • kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
  • md: check the return of mddev_find() (bsc#1195109).

Список пакетов

SUSE Linux Enterprise Server 11 SP4-LTSS
kernel-bigmem-3.0.101-108.135.1
kernel-bigmem-base-3.0.101-108.135.1
kernel-bigmem-devel-3.0.101-108.135.1
kernel-default-3.0.101-108.135.1
kernel-default-base-3.0.101-108.135.1
kernel-default-devel-3.0.101-108.135.1
kernel-default-man-3.0.101-108.135.1
kernel-ec2-3.0.101-108.135.1
kernel-ec2-base-3.0.101-108.135.1
kernel-ec2-devel-3.0.101-108.135.1
kernel-pae-3.0.101-108.135.1
kernel-pae-base-3.0.101-108.135.1
kernel-pae-devel-3.0.101-108.135.1
kernel-ppc64-3.0.101-108.135.1
kernel-ppc64-base-3.0.101-108.135.1
kernel-ppc64-devel-3.0.101-108.135.1
kernel-source-3.0.101-108.135.1
kernel-syms-3.0.101-108.135.1
kernel-trace-3.0.101-108.135.1
kernel-trace-base-3.0.101-108.135.1
kernel-trace-devel-3.0.101-108.135.1
kernel-xen-3.0.101-108.135.1
kernel-xen-base-3.0.101-108.135.1
kernel-xen-devel-3.0.101-108.135.1

Описание

Insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver before version 21.10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1

Ссылки

Описание

An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1

Ссылки

Описание

A vulnerability was found in Linux kernel, where a use-after-frees in nouveau's postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if "unbind" the driver).


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1

Ссылки

Описание

A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1

Ссылки

Описание

A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1

Ссылки

Описание

pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1

Ссылки

Описание

Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1

Ссылки

Описание

Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1

Ссылки

Описание

A vulnerability was found in the Linux kernel's cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1

Ссылки

Описание

A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1

Ссылки
Уязвимость SUSE-SU-2022:14905-1