Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:3409-1

Опубликовано: 26 сент. 2022
Источник: suse-cvrf

Описание

Security update for the Linux Kernel (Live Patch 27 for SLE 15)

This update for the Linux Kernel 4.12.14-150_83 fixes several issues.

The following security issues were fixed:

  • CVE-2022-39188: Fixed a race condition between unmap_mapping_range() and munmap() on VM_PFNMAP mappings leads to stale TLB entry (bsc#1203116).
  • CVE-2022-1652: Fixed a use-after-free in bad_flp_intr (bsc#1200057).

Список пакетов

SUSE Linux Enterprise Live Patching 15
kernel-livepatch-4_12_14-150_78-default-14-150000.2.2
kernel-livepatch-4_12_14-150_83-default-10-150000.2.2

Описание

Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-14-150000.2.2
SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-10-150000.2.2

Ссылки

Описание

An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-14-150000.2.2
SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_83-default-10-150000.2.2

Ссылки
Уязвимость SUSE-SU-2022:3409-1