Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:2741-1

Опубликовано: 10 авг. 2022
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2022-36946: Fixed an incorrect packet trucation operation which could lead to denial of service (bnc#1201940).
  • CVE-2022-29581: Fixed improper update of reference count in net/sched that could cause root privilege escalation (bnc#1199665).
  • CVE-2022-20166: Fixed several possible memory safety issues due to unsafe operations (bsc#1200598).
  • CVE-2020-36558: Fixed a race condition involving VT_RESIZEX which could lead to a NULL pointer dereference and general protection fault (bnc#1200910).
  • CVE-2020-36557: Fixed a race condition between the VT_DISALLOCATE ioctl and closing/opening of TTYs that could lead to a use-after-free (bnc#1201429).
  • CVE-2021-33655: Fixed an out of bounds write by ioctl cmd FBIOPUT_VSCREENINFO (bnc#1201635).
  • CVE-2021-33656: Fixed an out of bounds write related to ioctl cmd PIO_FONT (bnc#1201636).
  • CVE-2022-21505: Fixed a kernel lockdown bypass via IMA policy (bsc#1201458).
  • CVE-2022-1462: Fixed an out-of-bounds read flaw in the TTY subsystem (bnc#1198829).
  • CVE-2022-1116: Fixed an integer overflow vulnerability in io_uring which allowed a local attacker to escalate privileges to root (bnc#1199647).- CVE-2022-2318: Fixed a use-after-free vulnerability in the timer handler in Rose subsystem that allowed unprivileged attackers to crash the system (bsc#1201251).
  • CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762).

The following non-security bugs were fixed:

  • Fixed a system crash related to the recent RETBLEED mitigation (bsc#1201644, bsc#1201664, bsc#1201672, bsc#1201673, bsc#1201676).
  • qla2xxx: drop patch which prevented nvme port discovery (bsc#1200651 bsc#1200644 bsc#1201954 bsc#1201958).
  • kvm: emulate: do not adjust size of fastop and setcc subroutines (bsc#1201930).
  • bpf, cpumap: Remove rcpu pointer from cpu_map_build_skb signature (bsc#1199364).
  • bpf: enable BPF type format (BTF) (jsc#SLE-24559).
  • nfs: avoid NULL pointer dereference when there is unflushed data (bsc#1201196).
  • hv_netvsc: Add (more) validation for untrusted Hyper-V values (bsc#1199364).
  • hv_netvsc: Add comment of netvsc_xdp_xmit() (bsc#1199364).
  • hv_netvsc: Add support for XDP_REDIRECT (bsc#1199364).
  • hv_netvsc: Copy packets sent by Hyper-V out of the receive buffer (bsc#1199364).
  • hv_netvsc: Fix validation in netvsc_linkstatus_callback() (bsc#1199364).
  • kvm/emulate: Fix SETcc emulation function offsets with SLS (bsc#1201930).
  • lkdtm: Disable return thunks in rodata.c (bsc#1178134).
  • net, xdp: Introduce __xdp_build_skb_from_frame utility routine (bsc#1199364).
  • net, xdp: Introduce xdp_build_skb_from_frame utility routine (bsc#1199364).
  • nvme: consider also host_iface when checking ip options (bsc#1199670).
  • powerpc/mobility: wait for memory transfer to complete (bsc#1201846 ltc#198761).
  • powerpc/pseries/mobility: set NMI watchdog factor during an LPM (bsc#1201846 ltc#198761).
  • powerpc/watchdog: introduce a NMI watchdog's factor (bsc#1201846 ltc#198761).
  • scsi: lpfc: Copyright updates for 14.2.0.5 patches (bsc#1201956).
  • scsi: lpfc: Fix attempted FA-PWWN usage after feature disable (bsc#1201956).
  • scsi: lpfc: Fix lost NVMe paths during LIF bounce stress test (bsc#1201956 bsc#1200521).
  • scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (bsc#1201956).
  • scsi: lpfc: Fix uninitialized cqe field in lpfc_nvme_cancel_iocb() (bsc#1201956).
  • scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (bsc#1201956).
  • scsi: lpfc: Refactor lpfc_nvmet_prep_abort_wqe() into lpfc_sli_prep_abort_xri() (bsc#1201956).
  • scsi: lpfc: Remove Menlo/Hornet related code (bsc#1201956).
  • scsi: lpfc: Remove extra atomic_inc on cmd_pending in queuecommand after VMID (bsc#1201956).
  • scsi: lpfc: Revert RSCN_MEMENTO workaround for misbehaved configuration (bsc#1201956).
  • scsi: lpfc: Set PU field when providing D_ID in XMIT_ELS_RSP64_CX iocb (bsc#1201956).
  • scsi: lpfc: Update lpfc version to 14.2.0.5 (bsc#1201956).
  • scsi: qla2xxx: Check correct variable in qla24xx_async_gffid() (bsc#1201958).
  • scsi: qla2xxx: Fix discovery issues in FC-AL topology (bsc#1201958).
  • scsi: qla2xxx: Fix imbalance vha->vref_count (bsc#1201958).
  • scsi: qla2xxx: Fix incorrect display of max frame size (bsc#1201958).
  • scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1201958).
  • scsi: qla2xxx: Fix sparse warning for dport_data (bsc#1201958).
  • scsi: qla2xxx: Update manufacturer details (bsc#1201958).
  • scsi: qla2xxx: Update version to 10.02.07.800-k (bsc#1201958).
  • scsi: qla2xxx: Zero undefined mailbox IN registers (bsc#1201958).
  • scsi: qla2xxx: edif: Fix dropped IKE message (bsc#1201958).
  • watchdog: export lockup_detector_reconfigure (bsc#1201846 ltc#198761).
  • x86/bugs: Remove apostrophe typo (bsc#1178134).
  • x86/entry: Remove skip_r11rcx (bsc#1201644).
  • x86/retbleed: Add fine grained Kconfig knobs (bsc#1178134).
  • xen/netback: avoid entering xenvif_rx_next_skb() with an empty rx queue (bsc#1201381).

Список пакетов

SUSE Linux Enterprise Module for Public Cloud 15 SP3
kernel-azure-5.3.18-150300.38.75.1
kernel-azure-devel-5.3.18-150300.38.75.1
kernel-devel-azure-5.3.18-150300.38.75.1
kernel-source-azure-5.3.18-150300.38.75.1
kernel-syms-azure-5.3.18-150300.38.75.1
openSUSE Leap 15.3
cluster-md-kmp-azure-5.3.18-150300.38.75.1
dlm-kmp-azure-5.3.18-150300.38.75.1
gfs2-kmp-azure-5.3.18-150300.38.75.1
kernel-azure-5.3.18-150300.38.75.1
kernel-azure-devel-5.3.18-150300.38.75.1
kernel-azure-extra-5.3.18-150300.38.75.1
kernel-azure-livepatch-devel-5.3.18-150300.38.75.1
kernel-azure-optional-5.3.18-150300.38.75.1
kernel-devel-azure-5.3.18-150300.38.75.1
kernel-source-azure-5.3.18-150300.38.75.1
kernel-syms-azure-5.3.18-150300.38.75.1
kselftests-kmp-azure-5.3.18-150300.38.75.1
ocfs2-kmp-azure-5.3.18-150300.38.75.1
reiserfs-kmp-azure-5.3.18-150300.38.75.1

Описание

A race condition in the Linux kernel before 5.6.2 between the VT_DISALLOCATE ioctl and closing/opening of ttys could lead to a use-after-free.


Затронутые продукты
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.75.1

Ссылки

Описание

A race condition in the Linux kernel before 5.5.7 involving VT_RESIZEX could lead to a NULL pointer dereference and general protection fault.


Затронутые продукты
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.75.1

Ссылки

Описание

When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.


Затронутые продукты
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.75.1

Ссылки

Описание

When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out of bounds.


Затронутые продукты
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.75.1

Ссылки

Описание

Integer Overflow or Wraparound vulnerability in io_uring of Linux Kernel allows local attacker to cause memory corruption and escalate privileges to root. This issue affects: Linux Kernel versions prior to 5.4.189; version 5.4.24 and later versions.


Затронутые продукты
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.75.1

Ссылки

Описание

An out-of-bounds read flaw was found in the Linux kernel's TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.


Затронутые продукты
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.75.1

Ссылки

Описание

In various methods of kernel base drivers, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182388481References: Upstream kernel


Затронутые продукты
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.75.1

Ссылки

Описание

In the linux kernel, if IMA appraisal is used with the "ima_appraise=log" boot param, lockdown can be defeated with kexec on any machine when Secure Boot is disabled or unavailable. IMA prevents setting "ima_appraise=log" from the boot param when Secure Boot is enabled, but this does not cover cases where lockdown is used without Secure Boot. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity, Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).


Затронутые продукты
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.75.1

Ссылки

Описание

There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.


Затронутые продукты
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.75.1

Ссылки

Описание

Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).


Затронутые продукты
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.75.1

Ссылки

Описание

Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.


Затронутые продукты
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.75.1

Ссылки

Описание

net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.


Затронутые продукты
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.75.1

Ссылки

Описание

Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).


Затронутые продукты
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.75.1

Ссылки

Описание

Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).


Затронутые продукты
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.75.1

Ссылки

Описание

Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).


Затронутые продукты
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.75.1

Ссылки

Описание

nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.


Затронутые продукты
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.75.1
SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.75.1

Ссылки
Уязвимость SUSE-SU-2022:2741-1