Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-4159 (GCVE-0-2021-4159)
Vulnerability from cvelistv5
Published
2022-08-24 15:10
Modified
2024-08-03 17:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-202 - - Exposure of Sensitive Information Through Data Queries
Summary
A vulnerability was found in the Linux kernel's EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:16:04.247Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036024" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2021-4159" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2021-4159" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd" }, { "name": "[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "kernel", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Fixed in v5.7-rc1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in the Linux kernel\u0027s EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-202", "description": "CWE-202 - Exposure of Sensitive Information Through Data Queries", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-02T18:06:18", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036024" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/CVE-2021-4159" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2021-4159" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd" }, { "name": "[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2021-4159", "datePublished": "2022-08-24T15:10:57", "dateReserved": "2021-12-23T00:00:00", "dateUpdated": "2024-08-03T17:16:04.247Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-4159\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2022-08-24T16:15:09.713\",\"lastModified\":\"2024-11-21T06:37:02.127\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability was found in the Linux kernel\u0027s EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una vulnerabilidad en el verificador EBPF del kernel de Linux cuando son manejadas estructuras de datos internas. Las ubicaciones de memoria interna pod\u00edan ser devueltas al espacio de usuario. Un atacante local con permisos para insertar c\u00f3digo eBPF en el kernel puede usar esto para filtrar detalles de la memoria interna del kernel derrotando algunas de las mitigaciones de explotaci\u00f3n en el lugar para el kernel.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-202\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.7\",\"matchCriteriaId\":\"C3821E00-CCBB-4CD4-AD2C-D47DFF2F5A34\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/security/cve/CVE-2021-4159\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2036024\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security-tracker.debian.org/tracker/CVE-2021-4159\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/CVE-2021-4159\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2036024\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security-tracker.debian.org/tracker/CVE-2021-4159\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
opensuse-su-2022:0363-1
Vulnerability from csaf_opensuse
Published
2022-02-10 16:01
Modified
2022-02-10 16:01
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).
- CVE-2022-0286: Fixed null pointer dereference in bond_ipsec_add_sa() that may have lead to local denial of service (bnc#1195371).
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).
- CVE-2020-28097: Fixed out-of-bounds read in vgacon subsystem that mishandled software scrollback (bnc#1187723).
- CVE-2021-4159: Fixed kernel ptr leak vulnerability via BPF in coerce_reg_to_size (bsc#1194227).
The following security references were added to already fixed issues:
- CVE-2021-39685: Fixed USB gadget buffer overflow caused by too large endpoint 0 requests (bsc#1193802).
The following non-security bugs were fixed:
- ACPI: battery: Add the ThinkPad 'Not Charging' quirk (git-fixes).
- ACPICA: Executer: Fix the REFCLASS_REFOF case in acpi_ex_opcode_1A_0T_1R() (git-fixes).
- ACPICA: Fix wrong interpretation of PCC address (git-fixes).
- ACPICA: Hardware: Do not flush CPU cache when entering S4 and S5 (git-fixes).
- ACPICA: Utilities: Avoid deleting the same object twice in a row (git-fixes).
- ACPICA: actypes.h: Expand the ACPI_ACCESS_ definitions (git-fixes).
- ALSA: seq: Set upper limit of processed events (git-fixes).
- ASoC: mediatek: mt8173: fix device_node leak (git-fixes).
- Bluetooth: Fix debugfs entry leak in hci_register_dev() (git-fixes).
- Documentation: fix firewire.rst ABI file path error (git-fixes).
- HID: apple: Do not reset quirks when the Fn key is not found (git-fixes).
- HID: quirks: Allow inverting the absolute X/Y values (git-fixes).
- HID: uhid: Fix worker destroying device without any protection (git-fixes).
- HID: wacom: Reset expected and received contact counts at the same time (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).
- RDMA/core: Clean up cq pool mechanism (jsc#SLE-15176).
- RDMA/rxe: Remove the unnecessary variable (jsc#SLE-15176).
- ar5523: Fix null-ptr-deref with unexpected WDCMSG_TARGET_START reply (git-fixes).
- arm64: Kconfig: add a choice for endianness (jsc#SLE-23432).
- asix: fix wrong return value in asix_check_host_enable() (git-fixes).
- ata: pata_platform: Fix a NULL pointer dereference in __pata_platform_probe() (git-fixes).
- ath10k: Fix tx hanging (git-fixes).
- ath9k: Fix out-of-bound memcpy in ath9k_hif_usb_rx_stream (git-fixes).
- batman-adv: allow netlink usage in unprivileged containers (git-fixes).
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).
- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).
- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).
- cgroup/cpuset: Fix a partition bug with hotplug (bsc#1194291).
- clk: si5341: Fix clock HW provider cleanup (git-fixes).
- crypto: qat - fix undetected PFVF timeout in ACK loop (git-fixes).
- drm/amdgpu: fixup bad vram size on gmc v8 (git-fixes).
- drm/bridge: megachips: Ensure both bridges are probed before registration (git-fixes).
- drm/etnaviv: limit submit sizes (git-fixes).
- drm/etnaviv: relax submit size limits (git-fixes).
- drm/lima: fix warning when CONFIG_DEBUG_SG=y & CONFIG_DMA_API_DEBUG=y (git-fixes).
- drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc (git-fixes).
- drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (git-fixes).
- drm/msm/hdmi: Fix missing put_device() call in msm_hdmi_get_phy (git-fixes).
- drm/msm: Fix wrong size calculation (git-fixes).
- drm/nouveau/kms/nv04: use vzalloc for nv04_display (git-fixes).
- drm/nouveau/pmu/gm200-: avoid touching PMU outside of DEVINIT/PREOS/ACR (git-fixes).
- drm/radeon: fix error handling in radeon_driver_open_kms (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the Lenovo Yoga Book X91F/L (git-fixes).
- ext4: set csum seed in tmp inode while migrating to extents (bsc#1195267).
- floppy: Add max size check for user space request (git-fixes).
- gpio: aspeed: Convert aspeed_gpio.lock to raw_spinlock (git-fixes).
- gpiolib: acpi: Do not set the IRQ type if the IRQ is already in use (git-fixes).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
- hwmom: (lm90) Fix citical alarm status for MAX6680/MAX6681 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6646/6647/6649 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6654 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6680 (git-fixes).
- hwmon: (lm90) Reduce maximum conversion rate for G781 (git-fixes).
- i2c: designware-pci: Fix to change data types of hcnt and lcnt parameters (git-fixes).
- i2c: i801: Do not silently correct invalid transfer size (git-fixes).
- i2c: mpc: Correct I2C reset procedure (git-fixes).
- ibmvnic: Allow extra failures before disabling (bsc#1195073 ltc#195713).
- ibmvnic: Update driver return codes (bsc#1195293 ltc#196198).
- ibmvnic: do not spin in tasklet (bsc#1195073 ltc#195713).
- ibmvnic: init ->running_cap_crqs early (bsc#1195073 ltc#195713).
- ibmvnic: remove unused ->wait_capability (bsc#1195073 ltc#195713).
- ibmvnic: remove unused defines (bsc#1195293 ltc#196198).
- igc: Fix TX timestamp support for non-MSI-X platforms (bsc#1160634).
- iwlwifi: fix leaks/bad data after failed firmware load (git-fixes).
- iwlwifi: mvm: Fix calculation of frame length (git-fixes).
- iwlwifi: mvm: Increase the scan timeout guard to 30 seconds (git-fixes).
- iwlwifi: mvm: synchronize with FW after multicast commands (git-fixes).
- iwlwifi: remove module loading failure message (git-fixes).
- lib82596: Fix IRQ check in sni_82596_probe (git-fixes).
- lightnvm: Remove lightnvm implemenation (bsc#1191881).
- mac80211: allow non-standard VHT MCS-10/11 (git-fixes).
- media: b2c2: Add missing check in flexcop_pci_isr: (git-fixes).
- media: coda/imx-vdoa: Handle dma_set_coherent_mask error codes (git-fixes).
- media: igorplugusb: receiver overflow should be reported (git-fixes).
- media: m920x: do not use stack on USB reads (git-fixes).
- media: saa7146: hexium_gemini: Fix a NULL pointer dereference in hexium_attach() (git-fixes).
- media: saa7146: hexium_orion: Fix a NULL pointer dereference in hexium_attach() (git-fixes).
- media: uvcvideo: Increase UVC_CTRL_CONTROL_TIMEOUT to 5 seconds (git-fixes).
- mlxsw: Only advertise link modes supported by both driver and device (bsc#1154488).
- mmc: core: Fixup storing of OCR for MMC_QUIRK_NONSTD_SDIO (git-fixes).
- mtd: nand: bbt: Fix corner case in bad block table handling (git-fixes).
- mtd: rawnand: gpmi: Add ERR007117 protection for nfc_apply_timings (git-fixes).
- mtd: rawnand: gpmi: Remove explicit default gpmi clock setting for i.MX6 (git-fixes).
- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
- net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering (jsc#SLE-8464).
- net/mlx5: E-Switch, fix changing vf VLANID (jsc#SLE-15172).
- net/mlx5e: Protect encap route dev from concurrent release (jsc#SLE-8464).
- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).
- net: bonding: fix bond_xmit_broadcast return value error bug (bsc#1176447).
- net: bridge: vlan: fix memory leak in __allowed_ingress (bsc#1176447).
- net: bridge: vlan: fix single net device option dumping (bsc#1176447).
- net: mana: Add RX fencing (bsc#1193506).
- net: mana: Add XDP support (bsc#1193506).
- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).
- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).
- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).
- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).
- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).
- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).
- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).
- net: sfp: fix high power modules without diagnostic monitoring (bsc#1154353).
- netdevsim: set .owner to THIS_MODULE (bsc#1154353).
- nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind() (git-fixes).
- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).
- phy: uniphier-usb3ss: fix unintended writing zeros to PHY register (git-fixes).
- phylib: fix potential use-after-free (git-fixes).
- pinctrl: bcm2835: Add support for wake-up interrupts (git-fixes).
- pinctrl: bcm2835: Match BCM7211 compatible string (git-fixes).
- powerpc/book3s64/radix: make tlb_single_page_flush_ceiling a debugfs entry (bsc#1195183 ltc#193865).
- regulator: qcom_smd: Align probe function with rpmh-regulator (git-fixes).
- rsi: Fix use-after-free in rsi_rx_done_handler() (git-fixes).
- sched/fair: Fix detection of per-CPU kthreads waking a task (git fixes (sched/fair)).
- sched/numa: Fix is_core_idle() (git fixes (sched/numa)).
- scripts/dtc: dtx_diff: remove broken example from help text (git-fixes).
- serial: 8250: of: Fix mapped region size when using reg-offset property (git-fixes).
- serial: Fix incorrect rs485 polarity on uart open (git-fixes).
- serial: amba-pl011: do not request memory region twice (git-fixes).
- serial: core: Keep mctrl register state and cached copy in sync (git-fixes).
- serial: pl010: Drop CR register reset on set_termios (git-fixes).
- serial: stm32: fix software flow control transfer (git-fixes).
- supported.conf: mark rtw88 modules as supported (jsc#SLE-22690)
- tty: n_gsm: fix SW flow control encoding/handling (git-fixes).
- ucsi_ccg: Check DEV_INT bit only when starting CCG4 (git-fixes).
- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).
- usb: gadget: f_fs: Use stream_open() for endpoint files (git-fixes).
- usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS (git-fixes).
- usb: hub: Add delay for SuperSpeed hub resume to let links transit to U0 (git-fixes).
- usb: roles: fix include/linux/usb/role.h compile issue (git-fixes).
- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).
- usb: uhci: add aspeed ast2600 uhci support (git-fixes).
- vfio/iommu_type1: replace kfree with kvfree (git-fixes).
- video: hyperv_fb: Fix validation of screen resolution (git-fixes).
- vxlan: fix error return code in __vxlan_dev_create() (bsc#1154353).
- workqueue: Fix unbind_workers() VS wq_worker_running() race (bsc#1195062).
- x86/gpu: Reserve stolen memory for first integrated Intel GPU (git-fixes).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
Patchnames
openSUSE-SLE-15.3-2022-363
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).\n- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).\n- CVE-2022-0286: Fixed null pointer dereference in bond_ipsec_add_sa() that may have lead to local denial of service (bnc#1195371).\n- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).\n- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).\n- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).\n- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).\n- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).\n- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).\n- CVE-2020-28097: Fixed out-of-bounds read in vgacon subsystem that mishandled software scrollback (bnc#1187723).\n- CVE-2021-4159: Fixed kernel ptr leak vulnerability via BPF in coerce_reg_to_size (bsc#1194227).\n\n\nThe following security references were added to already fixed issues:\n\n- CVE-2021-39685: Fixed USB gadget buffer overflow caused by too large endpoint 0 requests (bsc#1193802).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI: battery: Add the ThinkPad \u0027Not Charging\u0027 quirk (git-fixes).\n- ACPICA: Executer: Fix the REFCLASS_REFOF case in acpi_ex_opcode_1A_0T_1R() (git-fixes).\n- ACPICA: Fix wrong interpretation of PCC address (git-fixes).\n- ACPICA: Hardware: Do not flush CPU cache when entering S4 and S5 (git-fixes).\n- ACPICA: Utilities: Avoid deleting the same object twice in a row (git-fixes).\n- ACPICA: actypes.h: Expand the ACPI_ACCESS_ definitions (git-fixes).\n- ALSA: seq: Set upper limit of processed events (git-fixes).\n- ASoC: mediatek: mt8173: fix device_node leak (git-fixes).\n- Bluetooth: Fix debugfs entry leak in hci_register_dev() (git-fixes).\n- Documentation: fix firewire.rst ABI file path error (git-fixes).\n- HID: apple: Do not reset quirks when the Fn key is not found (git-fixes).\n- HID: quirks: Allow inverting the absolute X/Y values (git-fixes).\n- HID: uhid: Fix worker destroying device without any protection (git-fixes).\n- HID: wacom: Reset expected and received contact counts at the same time (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).\n- RDMA/core: Clean up cq pool mechanism (jsc#SLE-15176).\n- RDMA/rxe: Remove the unnecessary variable (jsc#SLE-15176).\n- ar5523: Fix null-ptr-deref with unexpected WDCMSG_TARGET_START reply (git-fixes).\n- arm64: Kconfig: add a choice for endianness (jsc#SLE-23432).\n- asix: fix wrong return value in asix_check_host_enable() (git-fixes).\n- ata: pata_platform: Fix a NULL pointer dereference in __pata_platform_probe() (git-fixes).\n- ath10k: Fix tx hanging (git-fixes).\n- ath9k: Fix out-of-bound memcpy in ath9k_hif_usb_rx_stream (git-fixes).\n- batman-adv: allow netlink usage in unprivileged containers (git-fixes).\n- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).\n- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).\n- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).\n- cgroup/cpuset: Fix a partition bug with hotplug (bsc#1194291).\n- clk: si5341: Fix clock HW provider cleanup (git-fixes).\n- crypto: qat - fix undetected PFVF timeout in ACK loop (git-fixes).\n- drm/amdgpu: fixup bad vram size on gmc v8 (git-fixes).\n- drm/bridge: megachips: Ensure both bridges are probed before registration (git-fixes).\n- drm/etnaviv: limit submit sizes (git-fixes).\n- drm/etnaviv: relax submit size limits (git-fixes).\n- drm/lima: fix warning when CONFIG_DEBUG_SG=y \u0026 CONFIG_DMA_API_DEBUG=y (git-fixes).\n- drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc (git-fixes).\n- drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (git-fixes).\n- drm/msm/hdmi: Fix missing put_device() call in msm_hdmi_get_phy (git-fixes).\n- drm/msm: Fix wrong size calculation (git-fixes).\n- drm/nouveau/kms/nv04: use vzalloc for nv04_display (git-fixes).\n- drm/nouveau/pmu/gm200-: avoid touching PMU outside of DEVINIT/PREOS/ACR (git-fixes).\n- drm/radeon: fix error handling in radeon_driver_open_kms (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for the Lenovo Yoga Book X91F/L (git-fixes).\n- ext4: set csum seed in tmp inode while migrating to extents (bsc#1195267).\n- floppy: Add max size check for user space request (git-fixes).\n- gpio: aspeed: Convert aspeed_gpio.lock to raw_spinlock (git-fixes).\n- gpiolib: acpi: Do not set the IRQ type if the IRQ is already in use (git-fixes).\n- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).\n- hwmom: (lm90) Fix citical alarm status for MAX6680/MAX6681 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6646/6647/6649 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6654 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6680 (git-fixes).\n- hwmon: (lm90) Reduce maximum conversion rate for G781 (git-fixes).\n- i2c: designware-pci: Fix to change data types of hcnt and lcnt parameters (git-fixes).\n- i2c: i801: Do not silently correct invalid transfer size (git-fixes).\n- i2c: mpc: Correct I2C reset procedure (git-fixes).\n- ibmvnic: Allow extra failures before disabling (bsc#1195073 ltc#195713).\n- ibmvnic: Update driver return codes (bsc#1195293 ltc#196198).\n- ibmvnic: do not spin in tasklet (bsc#1195073 ltc#195713).\n- ibmvnic: init -\u003erunning_cap_crqs early (bsc#1195073 ltc#195713).\n- ibmvnic: remove unused -\u003ewait_capability (bsc#1195073 ltc#195713).\n- ibmvnic: remove unused defines (bsc#1195293 ltc#196198).\n- igc: Fix TX timestamp support for non-MSI-X platforms (bsc#1160634).\n- iwlwifi: fix leaks/bad data after failed firmware load (git-fixes).\n- iwlwifi: mvm: Fix calculation of frame length (git-fixes).\n- iwlwifi: mvm: Increase the scan timeout guard to 30 seconds (git-fixes).\n- iwlwifi: mvm: synchronize with FW after multicast commands (git-fixes).\n- iwlwifi: remove module loading failure message (git-fixes).\n- lib82596: Fix IRQ check in sni_82596_probe (git-fixes).\n- lightnvm: Remove lightnvm implemenation (bsc#1191881).\n- mac80211: allow non-standard VHT MCS-10/11 (git-fixes).\n- media: b2c2: Add missing check in flexcop_pci_isr: (git-fixes).\n- media: coda/imx-vdoa: Handle dma_set_coherent_mask error codes (git-fixes).\n- media: igorplugusb: receiver overflow should be reported (git-fixes).\n- media: m920x: do not use stack on USB reads (git-fixes).\n- media: saa7146: hexium_gemini: Fix a NULL pointer dereference in hexium_attach() (git-fixes).\n- media: saa7146: hexium_orion: Fix a NULL pointer dereference in hexium_attach() (git-fixes).\n- media: uvcvideo: Increase UVC_CTRL_CONTROL_TIMEOUT to 5 seconds (git-fixes).\n- mlxsw: Only advertise link modes supported by both driver and device (bsc#1154488).\n- mmc: core: Fixup storing of OCR for MMC_QUIRK_NONSTD_SDIO (git-fixes).\n- mtd: nand: bbt: Fix corner case in bad block table handling (git-fixes).\n- mtd: rawnand: gpmi: Add ERR007117 protection for nfc_apply_timings (git-fixes).\n- mtd: rawnand: gpmi: Remove explicit default gpmi clock setting for i.MX6 (git-fixes).\n- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).\n- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).\n- net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering (jsc#SLE-8464).\n- net/mlx5: E-Switch, fix changing vf VLANID (jsc#SLE-15172).\n- net/mlx5e: Protect encap route dev from concurrent release (jsc#SLE-8464).\n- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).\n- net: bonding: fix bond_xmit_broadcast return value error bug (bsc#1176447).\n- net: bridge: vlan: fix memory leak in __allowed_ingress (bsc#1176447).\n- net: bridge: vlan: fix single net device option dumping (bsc#1176447).\n- net: mana: Add RX fencing (bsc#1193506).\n- net: mana: Add XDP support (bsc#1193506).\n- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).\n- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).\n- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).\n- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).\n- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).\n- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).\n- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).\n- net: sfp: fix high power modules without diagnostic monitoring (bsc#1154353).\n- netdevsim: set .owner to THIS_MODULE (bsc#1154353).\n- nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind() (git-fixes).\n- nvme: add \u0027iopolicy\u0027 module parameter (bsc#1177599 bsc#1193096).\n- phy: uniphier-usb3ss: fix unintended writing zeros to PHY register (git-fixes).\n- phylib: fix potential use-after-free (git-fixes).\n- pinctrl: bcm2835: Add support for wake-up interrupts (git-fixes).\n- pinctrl: bcm2835: Match BCM7211 compatible string (git-fixes).\n- powerpc/book3s64/radix: make tlb_single_page_flush_ceiling a debugfs entry (bsc#1195183 ltc#193865).\n- regulator: qcom_smd: Align probe function with rpmh-regulator (git-fixes).\n- rsi: Fix use-after-free in rsi_rx_done_handler() (git-fixes).\n- sched/fair: Fix detection of per-CPU kthreads waking a task (git fixes (sched/fair)).\n- sched/numa: Fix is_core_idle() (git fixes (sched/numa)).\n- scripts/dtc: dtx_diff: remove broken example from help text (git-fixes).\n- serial: 8250: of: Fix mapped region size when using reg-offset property (git-fixes).\n- serial: Fix incorrect rs485 polarity on uart open (git-fixes).\n- serial: amba-pl011: do not request memory region twice (git-fixes).\n- serial: core: Keep mctrl register state and cached copy in sync (git-fixes).\n- serial: pl010: Drop CR register reset on set_termios (git-fixes).\n- serial: stm32: fix software flow control transfer (git-fixes).\n- supported.conf: mark rtw88 modules as supported (jsc#SLE-22690)\n- tty: n_gsm: fix SW flow control encoding/handling (git-fixes).\n- ucsi_ccg: Check DEV_INT bit only when starting CCG4 (git-fixes).\n- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).\n- usb: gadget: f_fs: Use stream_open() for endpoint files (git-fixes).\n- usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS (git-fixes).\n- usb: hub: Add delay for SuperSpeed hub resume to let links transit to U0 (git-fixes).\n- usb: roles: fix include/linux/usb/role.h compile issue (git-fixes).\n- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).\n- usb: uhci: add aspeed ast2600 uhci support (git-fixes).\n- vfio/iommu_type1: replace kfree with kvfree (git-fixes).\n- video: hyperv_fb: Fix validation of screen resolution (git-fixes).\n- vxlan: fix error return code in __vxlan_dev_create() (bsc#1154353).\n- workqueue: Fix unbind_workers() VS wq_worker_running() race (bsc#1195062).\n- x86/gpu: Reserve stolen memory for first integrated Intel GPU (git-fixes).\n- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-SLE-15.3-2022-363", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0363-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2022:0363-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2022:0363-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1154488", "url": "https://bugzilla.suse.com/1154488" }, { "category": "self", "summary": "SUSE Bug 1160634", "url": "https://bugzilla.suse.com/1160634" }, { "category": "self", "summary": "SUSE Bug 1176447", "url": "https://bugzilla.suse.com/1176447" }, { "category": "self", "summary": "SUSE Bug 1177599", "url": "https://bugzilla.suse.com/1177599" }, { "category": "self", "summary": "SUSE Bug 1183405", "url": "https://bugzilla.suse.com/1183405" }, { "category": "self", "summary": "SUSE Bug 1185377", "url": "https://bugzilla.suse.com/1185377" }, { "category": "self", "summary": "SUSE Bug 1187428", "url": "https://bugzilla.suse.com/1187428" }, { "category": "self", "summary": "SUSE Bug 1187723", "url": "https://bugzilla.suse.com/1187723" }, { "category": "self", "summary": "SUSE Bug 1188605", "url": "https://bugzilla.suse.com/1188605" }, { "category": "self", "summary": "SUSE Bug 1191881", "url": "https://bugzilla.suse.com/1191881" }, { "category": "self", "summary": "SUSE Bug 1193096", "url": "https://bugzilla.suse.com/1193096" }, { "category": "self", "summary": "SUSE Bug 1193506", "url": "https://bugzilla.suse.com/1193506" }, { "category": "self", "summary": "SUSE Bug 1193767", "url": "https://bugzilla.suse.com/1193767" }, { "category": "self", "summary": "SUSE Bug 1193802", "url": "https://bugzilla.suse.com/1193802" }, { "category": "self", "summary": "SUSE Bug 1193861", "url": "https://bugzilla.suse.com/1193861" }, { "category": "self", "summary": "SUSE Bug 1193864", "url": "https://bugzilla.suse.com/1193864" }, { "category": "self", "summary": "SUSE Bug 1193867", "url": "https://bugzilla.suse.com/1193867" }, { "category": "self", "summary": "SUSE Bug 1194048", "url": "https://bugzilla.suse.com/1194048" }, { "category": "self", "summary": "SUSE Bug 1194227", "url": "https://bugzilla.suse.com/1194227" }, { "category": "self", "summary": "SUSE Bug 1194291", "url": "https://bugzilla.suse.com/1194291" }, { "category": "self", "summary": "SUSE Bug 1194880", "url": "https://bugzilla.suse.com/1194880" }, { "category": "self", "summary": "SUSE Bug 1195009", "url": "https://bugzilla.suse.com/1195009" }, { "category": "self", "summary": "SUSE Bug 1195062", "url": "https://bugzilla.suse.com/1195062" }, { "category": "self", "summary": "SUSE Bug 1195065", "url": "https://bugzilla.suse.com/1195065" }, { "category": "self", "summary": "SUSE Bug 1195073", "url": "https://bugzilla.suse.com/1195073" }, { "category": "self", "summary": "SUSE Bug 1195183", "url": "https://bugzilla.suse.com/1195183" }, { "category": "self", "summary": "SUSE Bug 1195184", "url": "https://bugzilla.suse.com/1195184" }, { "category": "self", "summary": "SUSE Bug 1195254", "url": "https://bugzilla.suse.com/1195254" }, { "category": "self", "summary": "SUSE Bug 1195267", "url": "https://bugzilla.suse.com/1195267" }, { "category": "self", "summary": "SUSE Bug 1195293", "url": "https://bugzilla.suse.com/1195293" }, { "category": "self", "summary": "SUSE Bug 1195371", "url": "https://bugzilla.suse.com/1195371" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28097 page", "url": "https://www.suse.com/security/cve/CVE-2020-28097/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-22600 page", "url": "https://www.suse.com/security/cve/CVE-2021-22600/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39648 page", "url": "https://www.suse.com/security/cve/CVE-2021-39648/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39657 page", "url": "https://www.suse.com/security/cve/CVE-2021-39657/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39685 page", "url": "https://www.suse.com/security/cve/CVE-2021-39685/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4159 page", "url": "https://www.suse.com/security/cve/CVE-2021-4159/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44733 page", "url": "https://www.suse.com/security/cve/CVE-2021-44733/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-45095 page", "url": "https://www.suse.com/security/cve/CVE-2021-45095/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0286 page", "url": "https://www.suse.com/security/cve/CVE-2022-0286/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0330 page", "url": "https://www.suse.com/security/cve/CVE-2022-0330/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0435 page", "url": "https://www.suse.com/security/cve/CVE-2022-0435/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-22942 page", "url": "https://www.suse.com/security/cve/CVE-2022-22942/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-02-10T16:01:36Z", "generator": { "date": "2022-02-10T16:01:36Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2022:0363-1", "initial_release_date": "2022-02-10T16:01:36Z", "revision_history": [ { "date": "2022-02-10T16:01:36Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "product": { "name": "kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "product_id": "kernel-devel-azure-5.3.18-150300.38.40.4.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-5.3.18-150300.38.40.4.noarch", "product": { "name": "kernel-source-azure-5.3.18-150300.38.40.4.noarch", "product_id": "kernel-source-azure-5.3.18-150300.38.40.4.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product": { "name": "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product_id": "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product": { "name": "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product_id": "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product": { "name": "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product_id": "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64" } }, { "category": "product_version", "name": "kernel-azure-5.3.18-150300.38.40.4.x86_64", "product": { "name": "kernel-azure-5.3.18-150300.38.40.4.x86_64", "product_id": "kernel-azure-5.3.18-150300.38.40.4.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "product": { "name": "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "product_id": "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "product": { "name": "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "product_id": "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "product": { "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "product_id": "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64" } }, { "category": "product_version", "name": "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "product": { "name": "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "product_id": "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "product": { "name": "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "product_id": "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product": { "name": "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product_id": "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product": { "name": "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product_id": "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product": { "name": "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product_id": "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64" }, "product_reference": "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64" }, "product_reference": "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64" }, "product_reference": "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64" }, "product_reference": "kernel-azure-5.3.18-150300.38.40.4.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64" }, "product_reference": "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64" }, "product_reference": "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64" }, "product_reference": "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64" }, "product_reference": "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-5.3.18-150300.38.40.4.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch" }, "product_reference": "kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-5.3.18-150300.38.40.4.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch" }, "product_reference": "kernel-source-azure-5.3.18-150300.38.40.4.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" }, "product_reference": "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64" }, "product_reference": "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64" }, "product_reference": "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" }, "product_reference": "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-28097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28097" } ], "notes": [ { "category": "general", "text": "The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28097", "url": "https://www.suse.com/security/cve/CVE-2020-28097" }, { "category": "external", "summary": "SUSE Bug 1187723 for CVE-2020-28097", "url": "https://bugzilla.suse.com/1187723" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:36Z", "details": "moderate" } ], "title": "CVE-2020-28097" }, { "cve": "CVE-2021-22600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-22600" } ], "notes": [ { "category": "general", "text": "A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-22600", "url": "https://www.suse.com/security/cve/CVE-2021-22600" }, { "category": "external", "summary": "SUSE Bug 1195184 for CVE-2021-22600", "url": "https://bugzilla.suse.com/1195184" }, { "category": "external", "summary": "SUSE Bug 1195307 for CVE-2021-22600", "url": "https://bugzilla.suse.com/1195307" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:36Z", "details": "important" } ], "title": "CVE-2021-22600" }, { "cve": "CVE-2021-39648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39648" } ], "notes": [ { "category": "general", "text": "In gadget_dev_desc_UDC_show of configfs.c, there is a possible disclosure of kernel heap memory due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-160822094References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39648", "url": "https://www.suse.com/security/cve/CVE-2021-39648" }, { "category": "external", "summary": "SUSE Bug 1193861 for CVE-2021-39648", "url": "https://bugzilla.suse.com/1193861" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:36Z", "details": "moderate" } ], "title": "CVE-2021-39648" }, { "cve": "CVE-2021-39657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39657" } ], "notes": [ { "category": "general", "text": "In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194696049References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39657", "url": "https://www.suse.com/security/cve/CVE-2021-39657" }, { "category": "external", "summary": "SUSE Bug 1193864 for CVE-2021-39657", "url": "https://bugzilla.suse.com/1193864" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:36Z", "details": "low" } ], "title": "CVE-2021-39657" }, { "cve": "CVE-2021-39685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39685" } ], "notes": [ { "category": "general", "text": "In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39685", "url": "https://www.suse.com/security/cve/CVE-2021-39685" }, { "category": "external", "summary": "SUSE Bug 1193802 for CVE-2021-39685", "url": "https://bugzilla.suse.com/1193802" }, { "category": "external", "summary": "SUSE Bug 1194459 for CVE-2021-39685", "url": "https://bugzilla.suse.com/1194459" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:36Z", "details": "important" } ], "title": "CVE-2021-39685" }, { "cve": "CVE-2021-4159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-4159" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-4159", "url": "https://www.suse.com/security/cve/CVE-2021-4159" }, { "category": "external", "summary": "SUSE Bug 1194227 for CVE-2021-4159", "url": "https://bugzilla.suse.com/1194227" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:36Z", "details": "moderate" } ], "title": "CVE-2021-4159" }, { "cve": "CVE-2021-44733", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44733" } ], "notes": [ { "category": "general", "text": "A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44733", "url": "https://www.suse.com/security/cve/CVE-2021-44733" }, { "category": "external", "summary": "SUSE Bug 1193767 for CVE-2021-44733", "url": "https://bugzilla.suse.com/1193767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:36Z", "details": "moderate" } ], "title": "CVE-2021-44733" }, { "cve": "CVE-2021-45095", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-45095" } ], "notes": [ { "category": "general", "text": "pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-45095", "url": "https://www.suse.com/security/cve/CVE-2021-45095" }, { "category": "external", "summary": "SUSE Bug 1193867 for CVE-2021-45095", "url": "https://bugzilla.suse.com/1193867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:36Z", "details": "moderate" } ], "title": "CVE-2021-45095" }, { "cve": "CVE-2022-0286", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0286" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A null pointer dereference in bond_ipsec_add_sa() may lead to local denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0286", "url": "https://www.suse.com/security/cve/CVE-2022-0286" }, { "category": "external", "summary": "SUSE Bug 1195371 for CVE-2022-0286", "url": "https://bugzilla.suse.com/1195371" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:36Z", "details": "moderate" } ], "title": "CVE-2022-0286" }, { "cve": "CVE-2022-0330", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0330" } ], "notes": [ { "category": "general", "text": "A random memory access flaw was found in the Linux kernel\u0027s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0330", "url": "https://www.suse.com/security/cve/CVE-2022-0330" }, { "category": "external", "summary": "SUSE Bug 1194880 for CVE-2022-0330", "url": "https://bugzilla.suse.com/1194880" }, { "category": "external", "summary": "SUSE Bug 1195950 for CVE-2022-0330", "url": "https://bugzilla.suse.com/1195950" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:36Z", "details": "moderate" } ], "title": "CVE-2022-0330" }, { "cve": "CVE-2022-0435", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0435" } ], "notes": [ { "category": "general", "text": "A stack overflow flaw was found in the Linux kernel\u0027s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0435", "url": "https://www.suse.com/security/cve/CVE-2022-0435" }, { "category": "external", "summary": "SUSE Bug 1195254 for CVE-2022-0435", "url": "https://bugzilla.suse.com/1195254" }, { "category": "external", "summary": "SUSE Bug 1195308 for CVE-2022-0435", "url": "https://bugzilla.suse.com/1195308" }, { "category": "external", "summary": "SUSE Bug 1226672 for CVE-2022-0435", "url": "https://bugzilla.suse.com/1226672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:36Z", "details": "important" } ], "title": "CVE-2022-0435" }, { "cve": "CVE-2022-22942", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-22942" } ], "notes": [ { "category": "general", "text": "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling \u0027file\u0027 pointer.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-22942", "url": "https://www.suse.com/security/cve/CVE-2022-22942" }, { "category": "external", "summary": "SUSE Bug 1195065 for CVE-2022-22942", "url": "https://bugzilla.suse.com/1195065" }, { "category": "external", "summary": "SUSE Bug 1195951 for CVE-2022-22942", "url": "https://bugzilla.suse.com/1195951" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:36Z", "details": "moderate" } ], "title": "CVE-2022-22942" } ] }
wid-sec-w-2022-1207
Vulnerability from csaf_certbund
Published
2022-08-29 22:00
Modified
2023-04-26 22:00
Summary
Linux Kernel: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein entfernter, anonymer oder lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um Informationen offenzulegen.
Betroffene Betriebssysteme
- UNIX
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1207 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1207.json" }, { "category": "self", "summary": "WID-SEC-2022-1207 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1207" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5791-2 vom 2023-04-26", "url": "https://ubuntu.com/security/notices/USN-6045-1" }, { "category": "external", "summary": "National Vulnerability Database - CVE-2021-3714 vom 2022-08-29", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3714" }, { "category": "external", "summary": "National Vulnerability Database - CVE-2021-4159 vom 2022-08-29", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4159" }, { "category": "external", "summary": "Red Hat Customer Portal vom 2022-08-29", "url": "https://access.redhat.com/security/cve/CVE-2021-3714" }, { "category": "external", "summary": "Red Hat Customer Portal vom 2022-08-29", "url": "https://access.redhat.com/security/cve/CVE-2021-4159" }, { "category": "external", "summary": "Debian Security Advisory DLA-3131 vom 2022-10-03", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2022-1852 vom 2022-10-11", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1852.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1636 vom 2022-10-11", "url": "https://alas.aws.amazon.com/ALAS-2022-1636.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5668-1 vom 2022-10-11", "url": "https://ubuntu.com/security/notices/USN-5668-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5677-1 vom 2022-10-13", "url": "https://ubuntu.com/security/notices/USN-5677-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-036 vom 2022-10-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-036.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5682-1 vom 2022-10-14", "url": "https://ubuntu.com/security/notices/USN-5682-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5706-1 vom 2022-10-27", "url": "https://ubuntu.com/security/notices/USN-5706-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5790-1 vom 2023-01-07", "url": "https://ubuntu.com/security/notices/USN-5790-1" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Offenlegung von Informationen", "tracking": { "current_release_date": "2023-04-26T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:34:06.088+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-1207", "initial_release_date": "2022-08-29T22:00:00.000+00:00", "revision_history": [ { "date": "2022-08-29T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-10-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-10-10T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Amazon und Ubuntu aufgenommen" }, { "date": "2022-10-13T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu und Amazon aufgenommen" }, { "date": "2022-10-16T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-10-27T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-01-08T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-04-26T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "8" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "6368", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3714", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle im Linux Kernel. Der Fehler besteht im Mechanismus der Speicherdeduplizierung. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, indem er seitengro\u00dfe Dateien hochl\u00e4dt und die \u00c4nderung der Zugriffszeit von einem Netzwerkdienst erkennt, um festzustellen, ob die Seite zusammengef\u00fchrt wurde." } ], "product_status": { "known_affected": [ "2951", "6368", "T000126", "398363" ] }, "release_date": "2022-08-29T22:00:00.000+00:00", "title": "CVE-2021-3714" }, { "cve": "CVE-2021-4159", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle im Linux Kernel. Der Fehler besteht im EBPF-Verifizierer beim Umgang mit internen Datenstrukturen. Ein lokaler Angreifer mit der Berechtigung, eBPF-Code in den Kernel einzuf\u00fcgen, kann diese Schwachstelle ausnutzen, um Details des internen Kernelspeichers zu erfahren." } ], "product_status": { "known_affected": [ "2951", "6368", "T000126", "398363" ] }, "release_date": "2022-08-29T22:00:00.000+00:00", "title": "CVE-2021-4159" } ] }
WID-SEC-W-2022-1207
Vulnerability from csaf_certbund
Published
2022-08-29 22:00
Modified
2023-04-26 22:00
Summary
Linux Kernel: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein entfernter, anonymer oder lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um Informationen offenzulegen.
Betroffene Betriebssysteme
- UNIX
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1207 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1207.json" }, { "category": "self", "summary": "WID-SEC-2022-1207 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1207" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5791-2 vom 2023-04-26", "url": "https://ubuntu.com/security/notices/USN-6045-1" }, { "category": "external", "summary": "National Vulnerability Database - CVE-2021-3714 vom 2022-08-29", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3714" }, { "category": "external", "summary": "National Vulnerability Database - CVE-2021-4159 vom 2022-08-29", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4159" }, { "category": "external", "summary": "Red Hat Customer Portal vom 2022-08-29", "url": "https://access.redhat.com/security/cve/CVE-2021-3714" }, { "category": "external", "summary": "Red Hat Customer Portal vom 2022-08-29", "url": "https://access.redhat.com/security/cve/CVE-2021-4159" }, { "category": "external", "summary": "Debian Security Advisory DLA-3131 vom 2022-10-03", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2022-1852 vom 2022-10-11", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1852.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1636 vom 2022-10-11", "url": "https://alas.aws.amazon.com/ALAS-2022-1636.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5668-1 vom 2022-10-11", "url": "https://ubuntu.com/security/notices/USN-5668-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5677-1 vom 2022-10-13", "url": "https://ubuntu.com/security/notices/USN-5677-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-036 vom 2022-10-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-036.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5682-1 vom 2022-10-14", "url": "https://ubuntu.com/security/notices/USN-5682-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5706-1 vom 2022-10-27", "url": "https://ubuntu.com/security/notices/USN-5706-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5790-1 vom 2023-01-07", "url": "https://ubuntu.com/security/notices/USN-5790-1" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Offenlegung von Informationen", "tracking": { "current_release_date": "2023-04-26T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:34:06.088+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-1207", "initial_release_date": "2022-08-29T22:00:00.000+00:00", "revision_history": [ { "date": "2022-08-29T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-10-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-10-10T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Amazon und Ubuntu aufgenommen" }, { "date": "2022-10-13T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu und Amazon aufgenommen" }, { "date": "2022-10-16T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-10-27T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-01-08T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-04-26T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "8" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "6368", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3714", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle im Linux Kernel. Der Fehler besteht im Mechanismus der Speicherdeduplizierung. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, indem er seitengro\u00dfe Dateien hochl\u00e4dt und die \u00c4nderung der Zugriffszeit von einem Netzwerkdienst erkennt, um festzustellen, ob die Seite zusammengef\u00fchrt wurde." } ], "product_status": { "known_affected": [ "2951", "6368", "T000126", "398363" ] }, "release_date": "2022-08-29T22:00:00.000+00:00", "title": "CVE-2021-3714" }, { "cve": "CVE-2021-4159", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle im Linux Kernel. Der Fehler besteht im EBPF-Verifizierer beim Umgang mit internen Datenstrukturen. Ein lokaler Angreifer mit der Berechtigung, eBPF-Code in den Kernel einzuf\u00fcgen, kann diese Schwachstelle ausnutzen, um Details des internen Kernelspeichers zu erfahren." } ], "product_status": { "known_affected": [ "2951", "6368", "T000126", "398363" ] }, "release_date": "2022-08-29T22:00:00.000+00:00", "title": "CVE-2021-4159" } ] }
suse-su-2022:0363-1
Vulnerability from csaf_suse
Published
2022-02-10 16:01
Modified
2022-02-10 16:01
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).
- CVE-2022-0286: Fixed null pointer dereference in bond_ipsec_add_sa() that may have lead to local denial of service (bnc#1195371).
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).
- CVE-2020-28097: Fixed out-of-bounds read in vgacon subsystem that mishandled software scrollback (bnc#1187723).
- CVE-2021-4159: Fixed kernel ptr leak vulnerability via BPF in coerce_reg_to_size (bsc#1194227).
The following security references were added to already fixed issues:
- CVE-2021-39685: Fixed USB gadget buffer overflow caused by too large endpoint 0 requests (bsc#1193802).
The following non-security bugs were fixed:
- ACPI: battery: Add the ThinkPad 'Not Charging' quirk (git-fixes).
- ACPICA: Executer: Fix the REFCLASS_REFOF case in acpi_ex_opcode_1A_0T_1R() (git-fixes).
- ACPICA: Fix wrong interpretation of PCC address (git-fixes).
- ACPICA: Hardware: Do not flush CPU cache when entering S4 and S5 (git-fixes).
- ACPICA: Utilities: Avoid deleting the same object twice in a row (git-fixes).
- ACPICA: actypes.h: Expand the ACPI_ACCESS_ definitions (git-fixes).
- ALSA: seq: Set upper limit of processed events (git-fixes).
- ASoC: mediatek: mt8173: fix device_node leak (git-fixes).
- Bluetooth: Fix debugfs entry leak in hci_register_dev() (git-fixes).
- Documentation: fix firewire.rst ABI file path error (git-fixes).
- HID: apple: Do not reset quirks when the Fn key is not found (git-fixes).
- HID: quirks: Allow inverting the absolute X/Y values (git-fixes).
- HID: uhid: Fix worker destroying device without any protection (git-fixes).
- HID: wacom: Reset expected and received contact counts at the same time (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).
- RDMA/core: Clean up cq pool mechanism (jsc#SLE-15176).
- RDMA/rxe: Remove the unnecessary variable (jsc#SLE-15176).
- ar5523: Fix null-ptr-deref with unexpected WDCMSG_TARGET_START reply (git-fixes).
- arm64: Kconfig: add a choice for endianness (jsc#SLE-23432).
- asix: fix wrong return value in asix_check_host_enable() (git-fixes).
- ata: pata_platform: Fix a NULL pointer dereference in __pata_platform_probe() (git-fixes).
- ath10k: Fix tx hanging (git-fixes).
- ath9k: Fix out-of-bound memcpy in ath9k_hif_usb_rx_stream (git-fixes).
- batman-adv: allow netlink usage in unprivileged containers (git-fixes).
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).
- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).
- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).
- cgroup/cpuset: Fix a partition bug with hotplug (bsc#1194291).
- clk: si5341: Fix clock HW provider cleanup (git-fixes).
- crypto: qat - fix undetected PFVF timeout in ACK loop (git-fixes).
- drm/amdgpu: fixup bad vram size on gmc v8 (git-fixes).
- drm/bridge: megachips: Ensure both bridges are probed before registration (git-fixes).
- drm/etnaviv: limit submit sizes (git-fixes).
- drm/etnaviv: relax submit size limits (git-fixes).
- drm/lima: fix warning when CONFIG_DEBUG_SG=y & CONFIG_DMA_API_DEBUG=y (git-fixes).
- drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc (git-fixes).
- drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (git-fixes).
- drm/msm/hdmi: Fix missing put_device() call in msm_hdmi_get_phy (git-fixes).
- drm/msm: Fix wrong size calculation (git-fixes).
- drm/nouveau/kms/nv04: use vzalloc for nv04_display (git-fixes).
- drm/nouveau/pmu/gm200-: avoid touching PMU outside of DEVINIT/PREOS/ACR (git-fixes).
- drm/radeon: fix error handling in radeon_driver_open_kms (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the Lenovo Yoga Book X91F/L (git-fixes).
- ext4: set csum seed in tmp inode while migrating to extents (bsc#1195267).
- floppy: Add max size check for user space request (git-fixes).
- gpio: aspeed: Convert aspeed_gpio.lock to raw_spinlock (git-fixes).
- gpiolib: acpi: Do not set the IRQ type if the IRQ is already in use (git-fixes).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
- hwmom: (lm90) Fix citical alarm status for MAX6680/MAX6681 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6646/6647/6649 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6654 (git-fixes).
- hwmon: (lm90) Mark alert as broken for MAX6680 (git-fixes).
- hwmon: (lm90) Reduce maximum conversion rate for G781 (git-fixes).
- i2c: designware-pci: Fix to change data types of hcnt and lcnt parameters (git-fixes).
- i2c: i801: Do not silently correct invalid transfer size (git-fixes).
- i2c: mpc: Correct I2C reset procedure (git-fixes).
- ibmvnic: Allow extra failures before disabling (bsc#1195073 ltc#195713).
- ibmvnic: Update driver return codes (bsc#1195293 ltc#196198).
- ibmvnic: do not spin in tasklet (bsc#1195073 ltc#195713).
- ibmvnic: init ->running_cap_crqs early (bsc#1195073 ltc#195713).
- ibmvnic: remove unused ->wait_capability (bsc#1195073 ltc#195713).
- ibmvnic: remove unused defines (bsc#1195293 ltc#196198).
- igc: Fix TX timestamp support for non-MSI-X platforms (bsc#1160634).
- iwlwifi: fix leaks/bad data after failed firmware load (git-fixes).
- iwlwifi: mvm: Fix calculation of frame length (git-fixes).
- iwlwifi: mvm: Increase the scan timeout guard to 30 seconds (git-fixes).
- iwlwifi: mvm: synchronize with FW after multicast commands (git-fixes).
- iwlwifi: remove module loading failure message (git-fixes).
- lib82596: Fix IRQ check in sni_82596_probe (git-fixes).
- lightnvm: Remove lightnvm implemenation (bsc#1191881).
- mac80211: allow non-standard VHT MCS-10/11 (git-fixes).
- media: b2c2: Add missing check in flexcop_pci_isr: (git-fixes).
- media: coda/imx-vdoa: Handle dma_set_coherent_mask error codes (git-fixes).
- media: igorplugusb: receiver overflow should be reported (git-fixes).
- media: m920x: do not use stack on USB reads (git-fixes).
- media: saa7146: hexium_gemini: Fix a NULL pointer dereference in hexium_attach() (git-fixes).
- media: saa7146: hexium_orion: Fix a NULL pointer dereference in hexium_attach() (git-fixes).
- media: uvcvideo: Increase UVC_CTRL_CONTROL_TIMEOUT to 5 seconds (git-fixes).
- mlxsw: Only advertise link modes supported by both driver and device (bsc#1154488).
- mmc: core: Fixup storing of OCR for MMC_QUIRK_NONSTD_SDIO (git-fixes).
- mtd: nand: bbt: Fix corner case in bad block table handling (git-fixes).
- mtd: rawnand: gpmi: Add ERR007117 protection for nfc_apply_timings (git-fixes).
- mtd: rawnand: gpmi: Remove explicit default gpmi clock setting for i.MX6 (git-fixes).
- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
- net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering (jsc#SLE-8464).
- net/mlx5: E-Switch, fix changing vf VLANID (jsc#SLE-15172).
- net/mlx5e: Protect encap route dev from concurrent release (jsc#SLE-8464).
- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).
- net: bonding: fix bond_xmit_broadcast return value error bug (bsc#1176447).
- net: bridge: vlan: fix memory leak in __allowed_ingress (bsc#1176447).
- net: bridge: vlan: fix single net device option dumping (bsc#1176447).
- net: mana: Add RX fencing (bsc#1193506).
- net: mana: Add XDP support (bsc#1193506).
- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).
- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).
- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).
- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).
- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).
- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).
- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).
- net: sfp: fix high power modules without diagnostic monitoring (bsc#1154353).
- netdevsim: set .owner to THIS_MODULE (bsc#1154353).
- nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind() (git-fixes).
- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).
- phy: uniphier-usb3ss: fix unintended writing zeros to PHY register (git-fixes).
- phylib: fix potential use-after-free (git-fixes).
- pinctrl: bcm2835: Add support for wake-up interrupts (git-fixes).
- pinctrl: bcm2835: Match BCM7211 compatible string (git-fixes).
- powerpc/book3s64/radix: make tlb_single_page_flush_ceiling a debugfs entry (bsc#1195183 ltc#193865).
- regulator: qcom_smd: Align probe function with rpmh-regulator (git-fixes).
- rsi: Fix use-after-free in rsi_rx_done_handler() (git-fixes).
- sched/fair: Fix detection of per-CPU kthreads waking a task (git fixes (sched/fair)).
- sched/numa: Fix is_core_idle() (git fixes (sched/numa)).
- scripts/dtc: dtx_diff: remove broken example from help text (git-fixes).
- serial: 8250: of: Fix mapped region size when using reg-offset property (git-fixes).
- serial: Fix incorrect rs485 polarity on uart open (git-fixes).
- serial: amba-pl011: do not request memory region twice (git-fixes).
- serial: core: Keep mctrl register state and cached copy in sync (git-fixes).
- serial: pl010: Drop CR register reset on set_termios (git-fixes).
- serial: stm32: fix software flow control transfer (git-fixes).
- supported.conf: mark rtw88 modules as supported (jsc#SLE-22690)
- tty: n_gsm: fix SW flow control encoding/handling (git-fixes).
- ucsi_ccg: Check DEV_INT bit only when starting CCG4 (git-fixes).
- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).
- usb: gadget: f_fs: Use stream_open() for endpoint files (git-fixes).
- usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS (git-fixes).
- usb: hub: Add delay for SuperSpeed hub resume to let links transit to U0 (git-fixes).
- usb: roles: fix include/linux/usb/role.h compile issue (git-fixes).
- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).
- usb: uhci: add aspeed ast2600 uhci support (git-fixes).
- vfio/iommu_type1: replace kfree with kvfree (git-fixes).
- video: hyperv_fb: Fix validation of screen resolution (git-fixes).
- vxlan: fix error return code in __vxlan_dev_create() (bsc#1154353).
- workqueue: Fix unbind_workers() VS wq_worker_running() race (bsc#1195062).
- x86/gpu: Reserve stolen memory for first integrated Intel GPU (git-fixes).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
Patchnames
SUSE-2022-363,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-363
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).\n- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).\n- CVE-2022-0286: Fixed null pointer dereference in bond_ipsec_add_sa() that may have lead to local denial of service (bnc#1195371).\n- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).\n- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).\n- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).\n- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).\n- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).\n- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).\n- CVE-2020-28097: Fixed out-of-bounds read in vgacon subsystem that mishandled software scrollback (bnc#1187723).\n- CVE-2021-4159: Fixed kernel ptr leak vulnerability via BPF in coerce_reg_to_size (bsc#1194227).\n\n\nThe following security references were added to already fixed issues:\n\n- CVE-2021-39685: Fixed USB gadget buffer overflow caused by too large endpoint 0 requests (bsc#1193802).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI: battery: Add the ThinkPad \u0027Not Charging\u0027 quirk (git-fixes).\n- ACPICA: Executer: Fix the REFCLASS_REFOF case in acpi_ex_opcode_1A_0T_1R() (git-fixes).\n- ACPICA: Fix wrong interpretation of PCC address (git-fixes).\n- ACPICA: Hardware: Do not flush CPU cache when entering S4 and S5 (git-fixes).\n- ACPICA: Utilities: Avoid deleting the same object twice in a row (git-fixes).\n- ACPICA: actypes.h: Expand the ACPI_ACCESS_ definitions (git-fixes).\n- ALSA: seq: Set upper limit of processed events (git-fixes).\n- ASoC: mediatek: mt8173: fix device_node leak (git-fixes).\n- Bluetooth: Fix debugfs entry leak in hci_register_dev() (git-fixes).\n- Documentation: fix firewire.rst ABI file path error (git-fixes).\n- HID: apple: Do not reset quirks when the Fn key is not found (git-fixes).\n- HID: quirks: Allow inverting the absolute X/Y values (git-fixes).\n- HID: uhid: Fix worker destroying device without any protection (git-fixes).\n- HID: wacom: Reset expected and received contact counts at the same time (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).\n- RDMA/core: Clean up cq pool mechanism (jsc#SLE-15176).\n- RDMA/rxe: Remove the unnecessary variable (jsc#SLE-15176).\n- ar5523: Fix null-ptr-deref with unexpected WDCMSG_TARGET_START reply (git-fixes).\n- arm64: Kconfig: add a choice for endianness (jsc#SLE-23432).\n- asix: fix wrong return value in asix_check_host_enable() (git-fixes).\n- ata: pata_platform: Fix a NULL pointer dereference in __pata_platform_probe() (git-fixes).\n- ath10k: Fix tx hanging (git-fixes).\n- ath9k: Fix out-of-bound memcpy in ath9k_hif_usb_rx_stream (git-fixes).\n- batman-adv: allow netlink usage in unprivileged containers (git-fixes).\n- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).\n- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).\n- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).\n- cgroup/cpuset: Fix a partition bug with hotplug (bsc#1194291).\n- clk: si5341: Fix clock HW provider cleanup (git-fixes).\n- crypto: qat - fix undetected PFVF timeout in ACK loop (git-fixes).\n- drm/amdgpu: fixup bad vram size on gmc v8 (git-fixes).\n- drm/bridge: megachips: Ensure both bridges are probed before registration (git-fixes).\n- drm/etnaviv: limit submit sizes (git-fixes).\n- drm/etnaviv: relax submit size limits (git-fixes).\n- drm/lima: fix warning when CONFIG_DEBUG_SG=y \u0026 CONFIG_DMA_API_DEBUG=y (git-fixes).\n- drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc (git-fixes).\n- drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (git-fixes).\n- drm/msm/hdmi: Fix missing put_device() call in msm_hdmi_get_phy (git-fixes).\n- drm/msm: Fix wrong size calculation (git-fixes).\n- drm/nouveau/kms/nv04: use vzalloc for nv04_display (git-fixes).\n- drm/nouveau/pmu/gm200-: avoid touching PMU outside of DEVINIT/PREOS/ACR (git-fixes).\n- drm/radeon: fix error handling in radeon_driver_open_kms (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for the Lenovo Yoga Book X91F/L (git-fixes).\n- ext4: set csum seed in tmp inode while migrating to extents (bsc#1195267).\n- floppy: Add max size check for user space request (git-fixes).\n- gpio: aspeed: Convert aspeed_gpio.lock to raw_spinlock (git-fixes).\n- gpiolib: acpi: Do not set the IRQ type if the IRQ is already in use (git-fixes).\n- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).\n- hwmom: (lm90) Fix citical alarm status for MAX6680/MAX6681 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6646/6647/6649 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6654 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6680 (git-fixes).\n- hwmon: (lm90) Reduce maximum conversion rate for G781 (git-fixes).\n- i2c: designware-pci: Fix to change data types of hcnt and lcnt parameters (git-fixes).\n- i2c: i801: Do not silently correct invalid transfer size (git-fixes).\n- i2c: mpc: Correct I2C reset procedure (git-fixes).\n- ibmvnic: Allow extra failures before disabling (bsc#1195073 ltc#195713).\n- ibmvnic: Update driver return codes (bsc#1195293 ltc#196198).\n- ibmvnic: do not spin in tasklet (bsc#1195073 ltc#195713).\n- ibmvnic: init -\u003erunning_cap_crqs early (bsc#1195073 ltc#195713).\n- ibmvnic: remove unused -\u003ewait_capability (bsc#1195073 ltc#195713).\n- ibmvnic: remove unused defines (bsc#1195293 ltc#196198).\n- igc: Fix TX timestamp support for non-MSI-X platforms (bsc#1160634).\n- iwlwifi: fix leaks/bad data after failed firmware load (git-fixes).\n- iwlwifi: mvm: Fix calculation of frame length (git-fixes).\n- iwlwifi: mvm: Increase the scan timeout guard to 30 seconds (git-fixes).\n- iwlwifi: mvm: synchronize with FW after multicast commands (git-fixes).\n- iwlwifi: remove module loading failure message (git-fixes).\n- lib82596: Fix IRQ check in sni_82596_probe (git-fixes).\n- lightnvm: Remove lightnvm implemenation (bsc#1191881).\n- mac80211: allow non-standard VHT MCS-10/11 (git-fixes).\n- media: b2c2: Add missing check in flexcop_pci_isr: (git-fixes).\n- media: coda/imx-vdoa: Handle dma_set_coherent_mask error codes (git-fixes).\n- media: igorplugusb: receiver overflow should be reported (git-fixes).\n- media: m920x: do not use stack on USB reads (git-fixes).\n- media: saa7146: hexium_gemini: Fix a NULL pointer dereference in hexium_attach() (git-fixes).\n- media: saa7146: hexium_orion: Fix a NULL pointer dereference in hexium_attach() (git-fixes).\n- media: uvcvideo: Increase UVC_CTRL_CONTROL_TIMEOUT to 5 seconds (git-fixes).\n- mlxsw: Only advertise link modes supported by both driver and device (bsc#1154488).\n- mmc: core: Fixup storing of OCR for MMC_QUIRK_NONSTD_SDIO (git-fixes).\n- mtd: nand: bbt: Fix corner case in bad block table handling (git-fixes).\n- mtd: rawnand: gpmi: Add ERR007117 protection for nfc_apply_timings (git-fixes).\n- mtd: rawnand: gpmi: Remove explicit default gpmi clock setting for i.MX6 (git-fixes).\n- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).\n- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).\n- net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering (jsc#SLE-8464).\n- net/mlx5: E-Switch, fix changing vf VLANID (jsc#SLE-15172).\n- net/mlx5e: Protect encap route dev from concurrent release (jsc#SLE-8464).\n- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).\n- net: bonding: fix bond_xmit_broadcast return value error bug (bsc#1176447).\n- net: bridge: vlan: fix memory leak in __allowed_ingress (bsc#1176447).\n- net: bridge: vlan: fix single net device option dumping (bsc#1176447).\n- net: mana: Add RX fencing (bsc#1193506).\n- net: mana: Add XDP support (bsc#1193506).\n- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).\n- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).\n- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).\n- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).\n- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).\n- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).\n- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).\n- net: sfp: fix high power modules without diagnostic monitoring (bsc#1154353).\n- netdevsim: set .owner to THIS_MODULE (bsc#1154353).\n- nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind() (git-fixes).\n- nvme: add \u0027iopolicy\u0027 module parameter (bsc#1177599 bsc#1193096).\n- phy: uniphier-usb3ss: fix unintended writing zeros to PHY register (git-fixes).\n- phylib: fix potential use-after-free (git-fixes).\n- pinctrl: bcm2835: Add support for wake-up interrupts (git-fixes).\n- pinctrl: bcm2835: Match BCM7211 compatible string (git-fixes).\n- powerpc/book3s64/radix: make tlb_single_page_flush_ceiling a debugfs entry (bsc#1195183 ltc#193865).\n- regulator: qcom_smd: Align probe function with rpmh-regulator (git-fixes).\n- rsi: Fix use-after-free in rsi_rx_done_handler() (git-fixes).\n- sched/fair: Fix detection of per-CPU kthreads waking a task (git fixes (sched/fair)).\n- sched/numa: Fix is_core_idle() (git fixes (sched/numa)).\n- scripts/dtc: dtx_diff: remove broken example from help text (git-fixes).\n- serial: 8250: of: Fix mapped region size when using reg-offset property (git-fixes).\n- serial: Fix incorrect rs485 polarity on uart open (git-fixes).\n- serial: amba-pl011: do not request memory region twice (git-fixes).\n- serial: core: Keep mctrl register state and cached copy in sync (git-fixes).\n- serial: pl010: Drop CR register reset on set_termios (git-fixes).\n- serial: stm32: fix software flow control transfer (git-fixes).\n- supported.conf: mark rtw88 modules as supported (jsc#SLE-22690)\n- tty: n_gsm: fix SW flow control encoding/handling (git-fixes).\n- ucsi_ccg: Check DEV_INT bit only when starting CCG4 (git-fixes).\n- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).\n- usb: gadget: f_fs: Use stream_open() for endpoint files (git-fixes).\n- usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS (git-fixes).\n- usb: hub: Add delay for SuperSpeed hub resume to let links transit to U0 (git-fixes).\n- usb: roles: fix include/linux/usb/role.h compile issue (git-fixes).\n- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).\n- usb: uhci: add aspeed ast2600 uhci support (git-fixes).\n- vfio/iommu_type1: replace kfree with kvfree (git-fixes).\n- video: hyperv_fb: Fix validation of screen resolution (git-fixes).\n- vxlan: fix error return code in __vxlan_dev_create() (bsc#1154353).\n- workqueue: Fix unbind_workers() VS wq_worker_running() race (bsc#1195062).\n- x86/gpu: Reserve stolen memory for first integrated Intel GPU (git-fixes).\n- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-363,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-363", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0363-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0363-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220363-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0363-1", "url": "https://lists.suse.com/pipermail/sle-updates/2022-February/021670.html" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1154488", "url": "https://bugzilla.suse.com/1154488" }, { "category": "self", "summary": "SUSE Bug 1160634", "url": "https://bugzilla.suse.com/1160634" }, { "category": "self", "summary": "SUSE Bug 1176447", "url": "https://bugzilla.suse.com/1176447" }, { "category": "self", "summary": "SUSE Bug 1177599", "url": "https://bugzilla.suse.com/1177599" }, { "category": "self", "summary": "SUSE Bug 1183405", "url": "https://bugzilla.suse.com/1183405" }, { "category": "self", "summary": "SUSE Bug 1185377", "url": "https://bugzilla.suse.com/1185377" }, { "category": "self", "summary": "SUSE Bug 1187428", "url": "https://bugzilla.suse.com/1187428" }, { "category": "self", "summary": "SUSE Bug 1187723", "url": "https://bugzilla.suse.com/1187723" }, { "category": "self", "summary": "SUSE Bug 1188605", "url": "https://bugzilla.suse.com/1188605" }, { "category": "self", "summary": "SUSE Bug 1191881", "url": "https://bugzilla.suse.com/1191881" }, { "category": "self", "summary": "SUSE Bug 1193096", "url": "https://bugzilla.suse.com/1193096" }, { "category": "self", "summary": "SUSE Bug 1193506", "url": "https://bugzilla.suse.com/1193506" }, { "category": "self", "summary": "SUSE Bug 1193767", "url": "https://bugzilla.suse.com/1193767" }, { "category": "self", "summary": "SUSE Bug 1193802", "url": "https://bugzilla.suse.com/1193802" }, { "category": "self", "summary": "SUSE Bug 1193861", "url": "https://bugzilla.suse.com/1193861" }, { "category": "self", "summary": "SUSE Bug 1193864", "url": "https://bugzilla.suse.com/1193864" }, { "category": "self", "summary": "SUSE Bug 1193867", "url": "https://bugzilla.suse.com/1193867" }, { "category": "self", "summary": "SUSE Bug 1194048", "url": "https://bugzilla.suse.com/1194048" }, { "category": "self", "summary": "SUSE Bug 1194227", "url": "https://bugzilla.suse.com/1194227" }, { "category": "self", "summary": "SUSE Bug 1194291", "url": "https://bugzilla.suse.com/1194291" }, { "category": "self", "summary": "SUSE Bug 1194880", "url": "https://bugzilla.suse.com/1194880" }, { "category": "self", "summary": "SUSE Bug 1195009", "url": "https://bugzilla.suse.com/1195009" }, { "category": "self", "summary": "SUSE Bug 1195062", "url": "https://bugzilla.suse.com/1195062" }, { "category": "self", "summary": "SUSE Bug 1195065", "url": "https://bugzilla.suse.com/1195065" }, { "category": "self", "summary": "SUSE Bug 1195073", "url": "https://bugzilla.suse.com/1195073" }, { "category": "self", "summary": "SUSE Bug 1195183", "url": "https://bugzilla.suse.com/1195183" }, { "category": "self", "summary": "SUSE Bug 1195184", "url": "https://bugzilla.suse.com/1195184" }, { "category": "self", "summary": "SUSE Bug 1195254", "url": "https://bugzilla.suse.com/1195254" }, { "category": "self", "summary": "SUSE Bug 1195267", "url": "https://bugzilla.suse.com/1195267" }, { "category": "self", "summary": "SUSE Bug 1195293", "url": "https://bugzilla.suse.com/1195293" }, { "category": "self", "summary": "SUSE Bug 1195371", "url": "https://bugzilla.suse.com/1195371" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28097 page", "url": "https://www.suse.com/security/cve/CVE-2020-28097/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-22600 page", "url": "https://www.suse.com/security/cve/CVE-2021-22600/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39648 page", "url": "https://www.suse.com/security/cve/CVE-2021-39648/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39657 page", "url": "https://www.suse.com/security/cve/CVE-2021-39657/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39685 page", "url": "https://www.suse.com/security/cve/CVE-2021-39685/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4159 page", "url": "https://www.suse.com/security/cve/CVE-2021-4159/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44733 page", "url": "https://www.suse.com/security/cve/CVE-2021-44733/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-45095 page", "url": "https://www.suse.com/security/cve/CVE-2021-45095/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0286 page", "url": "https://www.suse.com/security/cve/CVE-2022-0286/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0330 page", "url": "https://www.suse.com/security/cve/CVE-2022-0330/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0435 page", "url": "https://www.suse.com/security/cve/CVE-2022-0435/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-22942 page", "url": "https://www.suse.com/security/cve/CVE-2022-22942/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-02-10T16:01:35Z", "generator": { "date": "2022-02-10T16:01:35Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0363-1", "initial_release_date": "2022-02-10T16:01:35Z", "revision_history": [ { "date": "2022-02-10T16:01:35Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "product": { "name": "kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "product_id": "kernel-devel-azure-5.3.18-150300.38.40.4.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-5.3.18-150300.38.40.4.noarch", "product": { "name": "kernel-source-azure-5.3.18-150300.38.40.4.noarch", "product_id": "kernel-source-azure-5.3.18-150300.38.40.4.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product": { "name": "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product_id": "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product": { "name": "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product_id": "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product": { "name": "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product_id": "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64" } }, { "category": "product_version", "name": "kernel-azure-5.3.18-150300.38.40.4.x86_64", "product": { "name": "kernel-azure-5.3.18-150300.38.40.4.x86_64", "product_id": "kernel-azure-5.3.18-150300.38.40.4.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "product": { "name": "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "product_id": "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "product": { "name": "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64", "product_id": "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "product": { "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64", "product_id": "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64" } }, { "category": "product_version", "name": "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "product": { "name": "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64", "product_id": "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "product": { "name": "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "product_id": "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product": { "name": "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product_id": "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product": { "name": "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product_id": "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product": { "name": "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64", "product_id": "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-5.3.18-150300.38.40.4.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64" }, "product_reference": "kernel-azure-5.3.18-150300.38.40.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64" }, "product_reference": "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-5.3.18-150300.38.40.4.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch" }, "product_reference": "kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-5.3.18-150300.38.40.4.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch" }, "product_reference": "kernel-source-azure-5.3.18-150300.38.40.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" }, "product_reference": "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-28097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28097" } ], "notes": [ { "category": "general", "text": "The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28097", "url": "https://www.suse.com/security/cve/CVE-2020-28097" }, { "category": "external", "summary": "SUSE Bug 1187723 for CVE-2020-28097", "url": "https://bugzilla.suse.com/1187723" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:35Z", "details": "moderate" } ], "title": "CVE-2020-28097" }, { "cve": "CVE-2021-22600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-22600" } ], "notes": [ { "category": "general", "text": "A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-22600", "url": "https://www.suse.com/security/cve/CVE-2021-22600" }, { "category": "external", "summary": "SUSE Bug 1195184 for CVE-2021-22600", "url": "https://bugzilla.suse.com/1195184" }, { "category": "external", "summary": "SUSE Bug 1195307 for CVE-2021-22600", "url": "https://bugzilla.suse.com/1195307" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:35Z", "details": "important" } ], "title": "CVE-2021-22600" }, { "cve": "CVE-2021-39648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39648" } ], "notes": [ { "category": "general", "text": "In gadget_dev_desc_UDC_show of configfs.c, there is a possible disclosure of kernel heap memory due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-160822094References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39648", "url": "https://www.suse.com/security/cve/CVE-2021-39648" }, { "category": "external", "summary": "SUSE Bug 1193861 for CVE-2021-39648", "url": "https://bugzilla.suse.com/1193861" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:35Z", "details": "moderate" } ], "title": "CVE-2021-39648" }, { "cve": "CVE-2021-39657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39657" } ], "notes": [ { "category": "general", "text": "In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194696049References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39657", "url": "https://www.suse.com/security/cve/CVE-2021-39657" }, { "category": "external", "summary": "SUSE Bug 1193864 for CVE-2021-39657", "url": "https://bugzilla.suse.com/1193864" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:35Z", "details": "low" } ], "title": "CVE-2021-39657" }, { "cve": "CVE-2021-39685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39685" } ], "notes": [ { "category": "general", "text": "In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39685", "url": "https://www.suse.com/security/cve/CVE-2021-39685" }, { "category": "external", "summary": "SUSE Bug 1193802 for CVE-2021-39685", "url": "https://bugzilla.suse.com/1193802" }, { "category": "external", "summary": "SUSE Bug 1194459 for CVE-2021-39685", "url": "https://bugzilla.suse.com/1194459" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:35Z", "details": "important" } ], "title": "CVE-2021-39685" }, { "cve": "CVE-2021-4159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-4159" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-4159", "url": "https://www.suse.com/security/cve/CVE-2021-4159" }, { "category": "external", "summary": "SUSE Bug 1194227 for CVE-2021-4159", "url": "https://bugzilla.suse.com/1194227" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:35Z", "details": "moderate" } ], "title": "CVE-2021-4159" }, { "cve": "CVE-2021-44733", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44733" } ], "notes": [ { "category": "general", "text": "A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44733", "url": "https://www.suse.com/security/cve/CVE-2021-44733" }, { "category": "external", "summary": "SUSE Bug 1193767 for CVE-2021-44733", "url": "https://bugzilla.suse.com/1193767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:35Z", "details": "moderate" } ], "title": "CVE-2021-44733" }, { "cve": "CVE-2021-45095", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-45095" } ], "notes": [ { "category": "general", "text": "pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-45095", "url": "https://www.suse.com/security/cve/CVE-2021-45095" }, { "category": "external", "summary": "SUSE Bug 1193867 for CVE-2021-45095", "url": "https://bugzilla.suse.com/1193867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:35Z", "details": "moderate" } ], "title": "CVE-2021-45095" }, { "cve": "CVE-2022-0286", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0286" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A null pointer dereference in bond_ipsec_add_sa() may lead to local denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0286", "url": "https://www.suse.com/security/cve/CVE-2022-0286" }, { "category": "external", "summary": "SUSE Bug 1195371 for CVE-2022-0286", "url": "https://bugzilla.suse.com/1195371" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:35Z", "details": "moderate" } ], "title": "CVE-2022-0286" }, { "cve": "CVE-2022-0330", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0330" } ], "notes": [ { "category": "general", "text": "A random memory access flaw was found in the Linux kernel\u0027s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0330", "url": "https://www.suse.com/security/cve/CVE-2022-0330" }, { "category": "external", "summary": "SUSE Bug 1194880 for CVE-2022-0330", "url": "https://bugzilla.suse.com/1194880" }, { "category": "external", "summary": "SUSE Bug 1195950 for CVE-2022-0330", "url": "https://bugzilla.suse.com/1195950" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:35Z", "details": "moderate" } ], "title": "CVE-2022-0330" }, { "cve": "CVE-2022-0435", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0435" } ], "notes": [ { "category": "general", "text": "A stack overflow flaw was found in the Linux kernel\u0027s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0435", "url": "https://www.suse.com/security/cve/CVE-2022-0435" }, { "category": "external", "summary": "SUSE Bug 1195254 for CVE-2022-0435", "url": "https://bugzilla.suse.com/1195254" }, { "category": "external", "summary": "SUSE Bug 1195308 for CVE-2022-0435", "url": "https://bugzilla.suse.com/1195308" }, { "category": "external", "summary": "SUSE Bug 1226672 for CVE-2022-0435", "url": "https://bugzilla.suse.com/1226672" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:35Z", "details": "important" } ], "title": "CVE-2022-0435" }, { "cve": "CVE-2022-22942", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-22942" } ], "notes": [ { "category": "general", "text": "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling \u0027file\u0027 pointer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-22942", "url": "https://www.suse.com/security/cve/CVE-2022-22942" }, { "category": "external", "summary": "SUSE Bug 1195065 for CVE-2022-22942", "url": "https://bugzilla.suse.com/1195065" }, { "category": "external", "summary": "SUSE Bug 1195951 for CVE-2022-22942", "url": "https://bugzilla.suse.com/1195951" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.40.4.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-10T16:01:35Z", "details": "moderate" } ], "title": "CVE-2022-22942" } ] }
gsd-2021-4159
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
A vulnerability was found in the Linux kernel's EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-4159", "description": "A vulnerability was found in the Linux kernel\u0027s EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel.", "id": "GSD-2021-4159", "references": [ "https://www.suse.com/security/cve/CVE-2021-4159.html", "https://alas.aws.amazon.com/cve/html/CVE-2021-4159.html", "https://ubuntu.com/security/CVE-2021-4159" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-4159" ], "details": "A vulnerability was found in the Linux kernel\u0027s EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel.", "id": "GSD-2021-4159", "modified": "2023-12-13T01:23:11.785448Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2021-4159", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "kernel", "version": { "version_data": [ { "version_affected": "=", "version_value": "Fixed in v5.7-rc1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was found in the Linux kernel\u0027s EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-202", "lang": "eng", "value": "CWE-202 - Exposure of Sensitive Information Through Data Queries" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2036024", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036024" }, { "name": "https://access.redhat.com/security/cve/CVE-2021-4159", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/CVE-2021-4159" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2021-4159", "refsource": "MISC", "url": "https://security-tracker.debian.org/tracker/CVE-2021-4159" }, { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd", "refsource": "MISC", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd" }, { "name": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html", "refsource": "MISC", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.7", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2021-4159" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A vulnerability was found in the Linux kernel\u0027s EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://access.redhat.com/security/cve/CVE-2021-4159", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-4159" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2036024", "refsource": "MISC", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036024" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2021-4159", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2021-4159" }, { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd", "refsource": "MISC", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd" }, { "name": "[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6 } }, "lastModifiedDate": "2022-10-06T15:30Z", "publishedDate": "2022-08-24T16:15Z" } } }
ghsa-4f4x-m5ww-4mcw
Vulnerability from github
Published
2022-08-25 00:00
Modified
2022-08-29 20:06
Severity ?
VLAI Severity ?
Details
A vulnerability was found in the Linux kernel's EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel.
{ "affected": [], "aliases": [ "CVE-2021-4159" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-08-24T16:15:00Z", "severity": "MODERATE" }, "details": "A vulnerability was found in the Linux kernel\u0027s EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel.", "id": "GHSA-4f4x-m5ww-4mcw", "modified": "2022-08-29T20:06:54Z", "published": "2022-08-25T00:00:27Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4159" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2021-4159" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036024" }, { "type": "WEB", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html" }, { "type": "WEB", "url": "https://security-tracker.debian.org/tracker/CVE-2021-4159" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ] }
cnvd-2022-68595
Vulnerability from cnvd
Title: Linux kernel信息泄露漏洞(CNVD-2022-68595)
Description:
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。
Linux kernel存在安全漏洞,攻击者可利用该漏洞获取内部内核内存信息。
Severity: 中
Formal description:
目前没有详细的解决方案提供: https://access.redhat.com/security/cve/cve-2021-4159
Reference: https://nvd.nist.gov/vuln/detail/CVE-2021-4159
Impacted products
Name | Linux Linux kernel <5.7 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2021-4159", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-4159" } }, "description": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\n\nLinux kernel\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u5185\u90e8\u5185\u6838\u5185\u5b58\u4fe1\u606f\u3002", "formalWay": "\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u89e3\u51b3\u65b9\u6848\u63d0\u4f9b\uff1a\r\nhttps://access.redhat.com/security/cve/cve-2021-4159", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2022-68595", "openTime": "2022-10-13", "products": { "product": "Linux Linux kernel \u003c5.7" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-4159", "serverity": "\u4e2d", "submitTime": "2022-02-09", "title": "Linux kernel\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff08CNVD-2022-68595\uff09" }
fkie_cve-2021-4159
Vulnerability from fkie_nvd
Published
2022-08-24 16:15
Modified
2024-11-21 06:37
Severity ?
Summary
A vulnerability was found in the Linux kernel's EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
redhat | enterprise_linux | 8.0 | |
debian | debian_linux | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3821E00-CCBB-4CD4-AD2C-D47DFF2F5A34", "versionEndExcluding": "5.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in the Linux kernel\u0027s EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel." }, { "lang": "es", "value": "Se encontr\u00f3 una vulnerabilidad en el verificador EBPF del kernel de Linux cuando son manejadas estructuras de datos internas. Las ubicaciones de memoria interna pod\u00edan ser devueltas al espacio de usuario. Un atacante local con permisos para insertar c\u00f3digo eBPF en el kernel puede usar esto para filtrar detalles de la memoria interna del kernel derrotando algunas de las mitigaciones de explotaci\u00f3n en el lugar para el kernel." } ], "id": "CVE-2021-4159", "lastModified": "2024-11-21T06:37:02.127", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-24T16:15:09.713", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-4159" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036024" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2021-4159" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-4159" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036024" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2021-4159" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-202" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…