Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:1955-1

Опубликовано: 06 июн. 2022
Источник: suse-cvrf

Описание

Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP3)

This update for the Linux Kernel 5.3.18-59_16 fixes several issues.

The following security issues were fixed:

  • CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock (bsc#1197597).
  • CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199602).
  • Add missing module_mutex lock to module notifier for previous live patches (bsc#1199834).

Список пакетов

SUSE Linux Enterprise Live Patching 12 SP4
kgraft-patch-4_12_14-95_77-default-16-2.2
SUSE Linux Enterprise Live Patching 12 SP5
kgraft-patch-4_12_14-122_74-default-16-2.2
kgraft-patch-4_12_14-122_77-default-16-2.2
kgraft-patch-4_12_14-122_80-default-15-2.2
kgraft-patch-4_12_14-122_91-default-12-2.2
kgraft-patch-4_12_14-122_106-default-8-2.2
kgraft-patch-4_12_14-122_113-default-5-2.2
kgraft-patch-4_12_14-122_110-default-6-2.2
kgraft-patch-4_12_14-122_83-default-14-2.2
kgraft-patch-4_12_14-122_88-default-12-2.2
SUSE Linux Enterprise Live Patching 15
kernel-livepatch-4_12_14-150_75-default-14-150000.2.2
kernel-livepatch-4_12_14-150_83-default-5-150000.2.2
kernel-livepatch-4_12_14-150_86-default-4-150000.2.2
kernel-livepatch-4_12_14-150_78-default-9-150000.2.2
SUSE Linux Enterprise Live Patching 15 SP1
kernel-livepatch-4_12_14-197_99-default-14-150100.2.2
kernel-livepatch-4_12_14-197_108-default-4-150100.2.2
SUSE Linux Enterprise Live Patching 15 SP2
kernel-livepatch-5_3_18-24_53_4-default-16-150200.2.2
kernel-livepatch-5_3_18-24_78-default-14-150200.2.2
kernel-livepatch-5_3_18-24_83-default-12-150200.2.2
kernel-livepatch-5_3_18-24_93-default-11-150200.2.2
kernel-livepatch-5_3_18-24_96-default-10-150200.2.2
kernel-livepatch-5_3_18-24_86-default-12-150200.2.2
kernel-livepatch-5_3_18-24_67-default-16-150200.2.2
kernel-livepatch-5_3_18-24_70-default-16-150200.2.2
kernel-livepatch-5_3_18-24_75-default-15-150200.2.2
SUSE Linux Enterprise Live Patching 15 SP3
kernel-livepatch-5_3_18-59_19-default-14-150300.2.2
kernel-livepatch-5_3_18-59_27-default-12-150300.2.2
kernel-livepatch-5_3_18-59_37-default-10-150300.2.2
kernel-livepatch-5_3_18-59_40-default-10-150300.2.2
kernel-livepatch-5_3_18-59_5-default-16-150300.2.2
kernel-livepatch-5_3_18-59_24-default-12-150300.2.2
kernel-livepatch-5_3_18-59_34-default-11-150300.2.2
kernel-livepatch-5_3_18-59_16-default-15-150300.2.2

Описание

A use-after-free flaw was found in the Linux kernel's sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-16-2.2
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-8-2.2
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-6-2.2
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-5-2.2

Ссылки

Описание

The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-16-2.2
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-8-2.2
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_110-default-6-2.2
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-5-2.2

Ссылки
Уязвимость SUSE-SU-2022:1955-1