Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:3370-1

Опубликовано: 24 сент. 2022
Источник: suse-cvrf

Описание

Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP4)

This update for the Linux Kernel 5.14.21-150400_22 fixes several issues.

The following security issues were fixed:

  • CVE-2022-29581: Fixed an improper Update of Reference Count vulnerability in net/sched that causes privilege escalation to root (bsc#1199695).
  • CVE-2022-39188: Fixed a race condition between unmap_mapping_range() and munmap() on VM_PFNMAP mappings leads to stale TLB entry (bsc#1203116).
  • CVE-2022-1652: Fixed a use-after-free in bad_flp_intr (bsc#1200057).

Список пакетов

SUSE Linux Enterprise Live Patching 12 SP5
kgraft-patch-4_12_14-122_88-default-17-2.2
kgraft-patch-4_12_14-122_103-default-15-2.2
kgraft-patch-4_12_14-122_106-default-13-2.2
kgraft-patch-4_12_14-122_116-default-8-2.2
SUSE Linux Enterprise Live Patching 15 SP4
kernel-livepatch-5_14_21-150400_22-default-6-150400.4.15.3

Описание

Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-15-2.2
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-13-2.2
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-8-2.2
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-17-2.2

Ссылки

Описание

Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-15-2.2
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-13-2.2
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-8-2.2
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-17-2.2

Ссылки

Описание

An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_103-default-15-2.2
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_106-default-13-2.2
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-8-2.2
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_88-default-17-2.2

Ссылки
Уязвимость SUSE-SU-2022:3370-1