Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:2077-1

Опубликовано: 14 июн. 2022
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 12 SP2 kernel was updated.

The following security bugs were fixed:

  • CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).
  • CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel (bnc#1198032).
  • CVE-2018-20784: Fixed a denial of service (infinite loop in update_blocked_averages) by mishandled leaf cfs_rq in kernel/sched/fair.c (bnc#1126703).
  • CVE-2018-7755: Fixed an issue in the fd_locked_ioctl function in drivers/block/floppy.c. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR (bnc#1084513).
  • CVE-2020-10769: Fixed a buffer over-read flaw in the IPsec Cryptographic algorithm's module. This flaw allowed a local attacker with user privileges to cause a denial of service. (bnc#1173265)
  • CVE-2021-28688: Fixed XSA-365 that includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains (bnc#1183646).
  • CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
  • CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
  • CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
  • CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
  • CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
  • CVE-2022-1975: Fixed a bug that allows an attacker to crash the linux kernel by simulating nfc device from user-space. (bsc#1200143)
  • CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)
  • CVE-2019-19377: Fixed an user-after-free that could be triggered when an attacker mounts a crafted btrfs filesystem image. (bnc#1158266)
  • CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)
  • CVE-2017-13695: Fixed a bug that caused a stack dump allowing local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted ACPI table. (bnc#1055710)
  • CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).
  • CVE-2022-21499: Reinforce the kernel lockdown feature, until now it's been trivial to break out of it with kgdb or kdb. (bsc#1199426)
  • CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).
  • CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
  • CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).
  • CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).
  • CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012).
  • CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647).
  • CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).
  • CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055).
  • CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c. (bnc#1198516)
  • CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723).
  • CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bnc#1197343)

The following non-security bugs were fixed:

  • btrfs: tree-checker: fix incorrect printk format (bsc#1200249).
  • powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900 bsc#1198660 ltc#197803).
  • powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729 bsc#1198660 ltc#197803).
  • x86/speculation: Fix redundant MDS mitigation message (bsc#1199650).

Список пакетов

SUSE Linux Enterprise Server 12 SP2-BCL
kernel-default-4.4.121-92.175.2
kernel-default-base-4.4.121-92.175.2
kernel-default-devel-4.4.121-92.175.2
kernel-devel-4.4.121-92.175.2
kernel-macros-4.4.121-92.175.2
kernel-source-4.4.121-92.175.2
kernel-syms-4.4.121-92.175.2

Описание

The acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq's, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and unmounting can lead to a use-after-free in btrfs_queue_work in fs/btrfs/async-thread.c.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker with a local account with a root privilege, can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

A race condition accessing file object in the Linux kernel OverlayFS subsystem was found in the way users do rename in specific way with OverlayFS. A local user could use this flaw to crash the system.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

Insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

A use-after-free flaw was found in the Linux kernel's FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel's filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

The root cause of this vulnerability is that the ioctl$DRM_IOCTL_MODE_DESTROY_DUMB can decrease refcount of *drm_vgem_gem_object *(created in *vgem_gem_dumb_create*) concurrently, and *vgem_gem_dumb_create *will access the freed drm_vgem_gem_object.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

A NULL pointer dereference flaw was found in the Linux kernel's X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

A use-after-free flaw was found in the Linux kernel's NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

There is a sleep-in-atomic bug in /net/nfc/netlink.c that allows an attacker to crash the Linux kernel by simulating a nfc device from user-space.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

Improper input validation for some Intel(R) Processors may allow an authenticated user to potentially cause a denial of service via local access.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки

Описание

The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.175.2
SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.175.2

Ссылки
Уязвимость SUSE-SU-2022:2077-1