Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:2809-1

Опубликовано: 15 авг. 2022
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2020-36557: Fixed a race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys could lead to a use-after-free (bnc#1201429).
  • CVE-2020-36558: Fixed a race condition involving VT_RESIZEX which could lead to a NULL pointer dereference and general protection fault (bnc#1200910).
  • CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).
  • CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).
  • CVE-2021-33655: Fixed memory out of bounds write by ioctl cmd FBIOPUT_VSCREENINFO (bnc#1201635).
  • CVE-2021-33656: Fixed memory out of bounds write related to ioctl cmd PIO_FONT (bnc#1201636).
  • CVE-2022-1116: Fixed a integer overflow vulnerability in io_uring which allowed a local attacker to cause memory corruption and escalate privileges to root (bnc#1199647).
  • CVE-2022-1462: Fixed an out-of-bounds read flaw in the TeleTYpe subsystem. This flaw allowed a local user to crash the system or read unauthorized random data from memory. (bnc#1198829)
  • CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
  • CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer handler in net/rose/rose_timer.c that allow attackers to crash the system without any privileges (bsc#1201251).
  • CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).
  • CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).
  • CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).
  • CVE-2022-21505: Fixed kexec lockdown bypass with ima policy (bsc#1201458).
  • CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762).
  • CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).
  • CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)
  • CVE-2022-36946: Fixed incorrect packet truncation in nfqnl_mangle() that could lead to remote DoS (bnc#1201940).

The following non-security bugs were fixed:

  • bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).
  • blk-mq: Fix wrong wakeup batch configuration which will cause hang (bsc#1200263).
  • blk-mq: clear active_queues before clearing BLK_MQ_F_TAG_QUEUE_SHARED (bsc#1200263).
  • blk-mq: fix tag_get wait task can't be awakened (bsc#1200263).
  • dma-direct: Fix potential NULL pointer dereference (bsc#1196472 ltc#192278).
  • dma-mapping: Allow mixing bypass and mapped DMA operation (bsc#1196472 ltc#192278).
  • dma-mapping: add a dma_ops_bypass flag to struct device (bsc#1196472 ltc#192278).
  • dma-mapping: move the remaining DMA API calls out of line (bsc#1196472 ltc#192278).
  • dma: kABI: Add back removed exports (bsc#1196472 ltc#192278).
  • exec: Force single empty string when argv is empty (bsc#1200571).
  • fsnotify: invalidate dcache before IN_DELETE event (bsc#1195478 bsc#1200905).
  • kvm: emulate: Fix SETcc emulation function offsets with SLS (bsc#1201930).
  • kvm: emulate: do not adjust size of fastop and setcc subroutines (bsc#1201930).
  • powerpc/dma: Fallback to dma_ops when persistent memory present (bsc#1196472 ltc#192278).
  • powerpc/pseries/iommu: Create defines for operations in ibm, ddw-applicable (bsc#1196472 ltc#192278).
  • powerpc/pseries/iommu: Fix window size for direct mapping with pmem (bsc#1196472 ltc#192278).
  • powerpc/pseries/iommu: Update call to ibm, query-pe-dma-windows (bsc#1196472 ltc#192278).
  • powerpc: dma: kABI workaround for moving around dma_bypass bit (bsc#1196472 ltc#192278).
  • powerpc: use the generic dma_ops_bypass mode (bsc#1196472 ltc#192278).
  • vmxnet3: fix minimum vectors alloc issue (bsc#1199489).
  • x86/bugs: Remove apostrophe typo (bsc#1114648).
  • x86/entry: Remove skip_r11rcx (bsc#1201644).

Список пакетов

Image SLES15-SP2-BYOS-Azure
kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM
kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE
kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure
kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-EC2-HVM
kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-SAP-Azure
cluster-md-kmp-default-5.3.18-150200.24.126.1
dlm-kmp-default-5.3.18-150200.24.126.1
gfs2-kmp-default-5.3.18-150200.24.126.1
kernel-default-5.3.18-150200.24.126.1
ocfs2-kmp-default-5.3.18-150200.24.126.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
cluster-md-kmp-default-5.3.18-150200.24.126.1
dlm-kmp-default-5.3.18-150200.24.126.1
gfs2-kmp-default-5.3.18-150200.24.126.1
kernel-default-5.3.18-150200.24.126.1
ocfs2-kmp-default-5.3.18-150200.24.126.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
cluster-md-kmp-default-5.3.18-150200.24.126.1
dlm-kmp-default-5.3.18-150200.24.126.1
gfs2-kmp-default-5.3.18-150200.24.126.1
kernel-default-5.3.18-150200.24.126.1
ocfs2-kmp-default-5.3.18-150200.24.126.1
Image SLES15-SP2-SAP-BYOS-Azure
cluster-md-kmp-default-5.3.18-150200.24.126.1
dlm-kmp-default-5.3.18-150200.24.126.1
gfs2-kmp-default-5.3.18-150200.24.126.1
kernel-default-5.3.18-150200.24.126.1
ocfs2-kmp-default-5.3.18-150200.24.126.1
Image SLES15-SP2-SAP-BYOS-EC2-HVM
cluster-md-kmp-default-5.3.18-150200.24.126.1
dlm-kmp-default-5.3.18-150200.24.126.1
gfs2-kmp-default-5.3.18-150200.24.126.1
kernel-default-5.3.18-150200.24.126.1
ocfs2-kmp-default-5.3.18-150200.24.126.1
Image SLES15-SP2-SAP-BYOS-GCE
cluster-md-kmp-default-5.3.18-150200.24.126.1
dlm-kmp-default-5.3.18-150200.24.126.1
gfs2-kmp-default-5.3.18-150200.24.126.1
kernel-default-5.3.18-150200.24.126.1
ocfs2-kmp-default-5.3.18-150200.24.126.1
Image SLES15-SP2-SAP-EC2-HVM
cluster-md-kmp-default-5.3.18-150200.24.126.1
dlm-kmp-default-5.3.18-150200.24.126.1
gfs2-kmp-default-5.3.18-150200.24.126.1
kernel-default-5.3.18-150200.24.126.1
ocfs2-kmp-default-5.3.18-150200.24.126.1
Image SLES15-SP2-SAP-GCE
cluster-md-kmp-default-5.3.18-150200.24.126.1
dlm-kmp-default-5.3.18-150200.24.126.1
gfs2-kmp-default-5.3.18-150200.24.126.1
kernel-default-5.3.18-150200.24.126.1
ocfs2-kmp-default-5.3.18-150200.24.126.1
SUSE Enterprise Storage 7
kernel-default-5.3.18-150200.24.126.1
kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2
kernel-default-devel-5.3.18-150200.24.126.1
kernel-devel-5.3.18-150200.24.126.1
kernel-docs-5.3.18-150200.24.126.1
kernel-macros-5.3.18-150200.24.126.1
kernel-obs-build-5.3.18-150200.24.126.1
kernel-preempt-5.3.18-150200.24.126.1
kernel-preempt-devel-5.3.18-150200.24.126.1
kernel-source-5.3.18-150200.24.126.1
kernel-syms-5.3.18-150200.24.126.1
reiserfs-kmp-default-5.3.18-150200.24.126.1
SUSE Linux Enterprise High Availability Extension 15 SP2
cluster-md-kmp-default-5.3.18-150200.24.126.1
dlm-kmp-default-5.3.18-150200.24.126.1
gfs2-kmp-default-5.3.18-150200.24.126.1
ocfs2-kmp-default-5.3.18-150200.24.126.1
SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS
kernel-default-5.3.18-150200.24.126.1
kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2
kernel-default-devel-5.3.18-150200.24.126.1
kernel-devel-5.3.18-150200.24.126.1
kernel-docs-5.3.18-150200.24.126.1
kernel-macros-5.3.18-150200.24.126.1
kernel-obs-build-5.3.18-150200.24.126.1
kernel-preempt-5.3.18-150200.24.126.1
kernel-preempt-devel-5.3.18-150200.24.126.1
kernel-source-5.3.18-150200.24.126.1
kernel-syms-5.3.18-150200.24.126.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
kernel-default-5.3.18-150200.24.126.1
kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2
kernel-default-devel-5.3.18-150200.24.126.1
kernel-devel-5.3.18-150200.24.126.1
kernel-docs-5.3.18-150200.24.126.1
kernel-macros-5.3.18-150200.24.126.1
kernel-obs-build-5.3.18-150200.24.126.1
kernel-preempt-5.3.18-150200.24.126.1
kernel-preempt-devel-5.3.18-150200.24.126.1
kernel-source-5.3.18-150200.24.126.1
kernel-syms-5.3.18-150200.24.126.1
SUSE Linux Enterprise Live Patching 15 SP2
kernel-default-livepatch-5.3.18-150200.24.126.1
kernel-default-livepatch-devel-5.3.18-150200.24.126.1
kernel-livepatch-5_3_18-150200_24_126-default-1-150200.5.5.1
SUSE Linux Enterprise Server 15 SP2-BCL
kernel-default-5.3.18-150200.24.126.1
kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2
kernel-default-devel-5.3.18-150200.24.126.1
kernel-devel-5.3.18-150200.24.126.1
kernel-docs-5.3.18-150200.24.126.1
kernel-macros-5.3.18-150200.24.126.1
kernel-obs-build-5.3.18-150200.24.126.1
kernel-preempt-5.3.18-150200.24.126.1
kernel-preempt-devel-5.3.18-150200.24.126.1
kernel-source-5.3.18-150200.24.126.1
kernel-syms-5.3.18-150200.24.126.1
SUSE Linux Enterprise Server 15 SP2-LTSS
kernel-default-5.3.18-150200.24.126.1
kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2
kernel-default-devel-5.3.18-150200.24.126.1
kernel-devel-5.3.18-150200.24.126.1
kernel-docs-5.3.18-150200.24.126.1
kernel-macros-5.3.18-150200.24.126.1
kernel-obs-build-5.3.18-150200.24.126.1
kernel-preempt-5.3.18-150200.24.126.1
kernel-preempt-devel-5.3.18-150200.24.126.1
kernel-source-5.3.18-150200.24.126.1
kernel-syms-5.3.18-150200.24.126.1
reiserfs-kmp-default-5.3.18-150200.24.126.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2
kernel-default-5.3.18-150200.24.126.1
kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2
kernel-default-devel-5.3.18-150200.24.126.1
kernel-devel-5.3.18-150200.24.126.1
kernel-docs-5.3.18-150200.24.126.1
kernel-macros-5.3.18-150200.24.126.1
kernel-obs-build-5.3.18-150200.24.126.1
kernel-preempt-5.3.18-150200.24.126.1
kernel-preempt-devel-5.3.18-150200.24.126.1
kernel-source-5.3.18-150200.24.126.1
kernel-syms-5.3.18-150200.24.126.1
reiserfs-kmp-default-5.3.18-150200.24.126.1
SUSE Manager Proxy 4.1
kernel-default-5.3.18-150200.24.126.1
kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2
kernel-default-devel-5.3.18-150200.24.126.1
kernel-devel-5.3.18-150200.24.126.1
kernel-docs-5.3.18-150200.24.126.1
kernel-macros-5.3.18-150200.24.126.1
kernel-obs-build-5.3.18-150200.24.126.1
kernel-preempt-5.3.18-150200.24.126.1
kernel-preempt-devel-5.3.18-150200.24.126.1
kernel-source-5.3.18-150200.24.126.1
kernel-syms-5.3.18-150200.24.126.1
reiserfs-kmp-default-5.3.18-150200.24.126.1
SUSE Manager Retail Branch Server 4.1
kernel-default-5.3.18-150200.24.126.1
kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2
kernel-default-devel-5.3.18-150200.24.126.1
kernel-devel-5.3.18-150200.24.126.1
kernel-docs-5.3.18-150200.24.126.1
kernel-macros-5.3.18-150200.24.126.1
kernel-obs-build-5.3.18-150200.24.126.1
kernel-preempt-5.3.18-150200.24.126.1
kernel-preempt-devel-5.3.18-150200.24.126.1
kernel-source-5.3.18-150200.24.126.1
kernel-syms-5.3.18-150200.24.126.1
reiserfs-kmp-default-5.3.18-150200.24.126.1
SUSE Manager Server 4.1
kernel-default-5.3.18-150200.24.126.1
kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2
kernel-default-devel-5.3.18-150200.24.126.1
kernel-devel-5.3.18-150200.24.126.1
kernel-docs-5.3.18-150200.24.126.1
kernel-macros-5.3.18-150200.24.126.1
kernel-obs-build-5.3.18-150200.24.126.1
kernel-preempt-5.3.18-150200.24.126.1
kernel-preempt-devel-5.3.18-150200.24.126.1
kernel-source-5.3.18-150200.24.126.1
kernel-syms-5.3.18-150200.24.126.1
reiserfs-kmp-default-5.3.18-150200.24.126.1

Описание

A race condition in the Linux kernel before 5.6.2 between the VT_DISALLOCATE ioctl and closing/opening of ttys could lead to a use-after-free.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

A race condition in the Linux kernel before 5.5.7 involving VT_RESIZEX could lead to a NULL pointer dereference and general protection fault.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out of bounds.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

Integer Overflow or Wraparound vulnerability in io_uring of Linux Kernel allows local attacker to cause memory corruption and escalate privileges to root. This issue affects: Linux Kernel versions prior to 5.4.189; version 5.4.24 and later versions.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

An out-of-bounds read flaw was found in the Linux kernel's TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

A use-after-free flaw was found in the Linux kernel's Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

In the linux kernel, if IMA appraisal is used with the "ima_appraise=log" boot param, lockdown can be defeated with kexec on any machine when Secure Boot is disabled or unavailable. IMA prevents setting "ima_appraise=log" from the boot param when Secure Boot is enabled, but this does not cover cases where lockdown is used without Secure Boot. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity, Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки

Описание

nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-EC2-HVM:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-BYOS-GCE:kernel-default-5.3.18-150200.24.126.1
Image SLES15-SP2-HPC-BYOS-Azure:kernel-default-5.3.18-150200.24.126.1

Ссылки
Уязвимость SUSE-SU-2022:2809-1