Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:3648-1

Опубликовано: 18 окт. 2022
Источник: suse-cvrf

Описание

Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP3)

This update for the Linux Kernel 5.3.18-59_40 fixes several issues.

The following security issues were fixed:

  • CVE-2022-41674: Fixed buffer overflow that can be triggered by injected WLAN frames (bsc#1203994).
  • CVE-2022-42719: Fixed use-after-free in the mac80211 stack when parsing a multi-BSSID element (bsc#1204292).
  • CVE-2022-42720: Fixed refcounting bugs in the multi-BSS handling of the mac80211 stack (bsc#1204291).
  • CVE-2022-42721: Fixed list management bug in BSS handling of the mac80211 stack (bsc#1204290).
  • CVE-2022-41222: Fixed a use-after-free via a stale TLB (bsc#1203624).
  • CVE-2022-39189: Fixed mishandled TLB flush operation in certain KVM_VCPU_PREEMPTED situations (bsc#1203067).

Список пакетов

SUSE Linux Enterprise Live Patching 15 SP2
kernel-livepatch-5_3_18-150200_24_126-default-4-150200.2.1
kernel-livepatch-5_3_18-24_99-default-15-150200.2.2
kernel-livepatch-5_3_18-24_93-default-17-150200.2.2
kernel-livepatch-5_3_18-24_96-default-16-150200.2.2
kernel-livepatch-5_3_18-24_102-default-14-150200.2.2
kernel-livepatch-5_3_18-150200_24_112-default-9-150200.2.2
kernel-livepatch-5_3_18-24_107-default-13-150200.2.2
kernel-livepatch-5_3_18-150200_24_115-default-7-150200.2.1
kernel-livepatch-5_3_18-24_86-default-18-150200.2.2
SUSE Linux Enterprise Live Patching 15 SP3
kernel-livepatch-5_3_18-150300_59_60-default-12-150300.2.2
kernel-livepatch-5_3_18-150300_59_68-default-8-150300.2.2
kernel-livepatch-5_3_18-150300_59_90-default-4-150300.2.1
kernel-livepatch-5_3_18-59_37-default-16-150300.2.2
kernel-livepatch-5_3_18-150300_59_46-default-15-150300.2.2
kernel-livepatch-5_3_18-150300_59_49-default-14-150300.2.2
kernel-livepatch-5_3_18-150300_59_71-default-7-150300.2.1
kernel-livepatch-5_3_18-150300_59_76-default-6-150300.2.1
kernel-livepatch-5_3_18-150300_59_87-default-5-150300.2.1
kernel-livepatch-5_3_18-150300_59_63-default-9-150300.2.2
kernel-livepatch-5_3_18-150300_59_43-default-15-150300.2.2
kernel-livepatch-5_3_18-59_27-default-18-150300.2.2
kernel-livepatch-5_3_18-59_34-default-17-150300.2.2
kernel-livepatch-5_3_18-59_40-default-16-150300.2.2

Описание

An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-9-150200.2.2
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-7-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-4-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-14-150200.2.2

Ссылки

Описание

mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-9-150200.2.2
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-7-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-4-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-14-150200.2.2

Ссылки

Описание

An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-9-150200.2.2
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-7-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-4-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-14-150200.2.2

Ссылки

Описание

A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-9-150200.2.2
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-7-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-4-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-14-150200.2.2

Ссылки

Описание

Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-9-150200.2.2
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-7-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-4-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-14-150200.2.2

Ссылки

Описание

A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.


Затронутые продукты
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_112-default-9-150200.2.2
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_115-default-7-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-4-150200.2.1
SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_102-default-14-150200.2.2

Ссылки
Уязвимость SUSE-SU-2022:3648-1