SUSE SLES15 Security Update : kernel (SUSE-SU-2022:1163-1)

high Nessus Plugin ID 159698

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:1163-1 advisory.

- In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID:
A-185125206References: Upstream kernel (CVE-2021-39698)

- The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a pointer leak. (CVE-2021-45402)

- In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file. (CVE-2021-45868)

- A vulnerability was found in linux kernel, where an information leak occurs via ext4_extent_header to userspace. (CVE-2022-0850)

- A memory leak flaw was found in the Linux kernel's DMA subsystem, in the way a user calls DMA_FROM_DEVICE.
This flaw allows a local user to read random memory from the kernel space. (CVE-2022-0854)

- A use-after-free flaw was found in the Linux kernel's FUSE filesystem in the way a user triggers write().
This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation. (CVE-2022-1011)

- A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker. (CVE-2022-1016)

- A use-after-free flaw was found in the Linux kernel's sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system. (CVE-2022-1048)

- A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 (CVE-2022-1055)

- A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early. (CVE-2022-1195)

- A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space.
(CVE-2022-1198)

- A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability. (CVE-2022-1199)

- A NULL pointer dereference flaw was found in the Linux kernel's Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.
(CVE-2022-1205)

- Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished.
The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042 (CVE-2022-23036, CVE-2022-23037, CVE-2022-23038, CVE-2022-23039, CVE-2022-23040, CVE-2022-23041, CVE-2022-23042)

- In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access. (CVE-2022-27223)

- A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat. (CVE-2022-27666)

- usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free. (CVE-2022-28388)

- mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free. (CVE-2022-28389)

- ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.
(CVE-2022-28390)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1065729

https://bugzilla.suse.com/1156395

https://bugzilla.suse.com/1175667

https://bugzilla.suse.com/1177028

https://bugzilla.suse.com/1178134

https://bugzilla.suse.com/1179639

https://bugzilla.suse.com/1180153

https://bugzilla.suse.com/1189562

https://bugzilla.suse.com/1194589

https://bugzilla.suse.com/1194625

https://bugzilla.suse.com/1194649

https://bugzilla.suse.com/1194943

https://bugzilla.suse.com/1195051

https://bugzilla.suse.com/1195353

https://bugzilla.suse.com/1195640

https://bugzilla.suse.com/1195926

https://bugzilla.suse.com/1196018

https://bugzilla.suse.com/1196130

https://bugzilla.suse.com/1196196

https://bugzilla.suse.com/1196478

https://bugzilla.suse.com/1196488

https://bugzilla.suse.com/1196761

https://bugzilla.suse.com/1196823

https://bugzilla.suse.com/1196956

https://bugzilla.suse.com/1197227

https://bugzilla.suse.com/1197243

https://bugzilla.suse.com/1197245

https://bugzilla.suse.com/1197300

https://bugzilla.suse.com/1197302

https://bugzilla.suse.com/1197331

https://bugzilla.suse.com/1197343

https://bugzilla.suse.com/1197366

https://bugzilla.suse.com/1197389

https://bugzilla.suse.com/1197460

https://bugzilla.suse.com/1197462

https://bugzilla.suse.com/1197501

https://bugzilla.suse.com/1197534

https://bugzilla.suse.com/1197661

https://bugzilla.suse.com/1197675

https://bugzilla.suse.com/1197677

https://bugzilla.suse.com/1197702

https://bugzilla.suse.com/1197811

https://bugzilla.suse.com/1197812

https://bugzilla.suse.com/1197815

https://bugzilla.suse.com/1197817

https://bugzilla.suse.com/1197819

https://bugzilla.suse.com/1197820

https://bugzilla.suse.com/1197888

https://bugzilla.suse.com/1197889

https://bugzilla.suse.com/1197894

https://bugzilla.suse.com/1198027

https://bugzilla.suse.com/1198028

https://bugzilla.suse.com/1198029

https://bugzilla.suse.com/1198030

https://bugzilla.suse.com/1198031

https://bugzilla.suse.com/1198032

https://bugzilla.suse.com/1198033

https://bugzilla.suse.com/1198077

https://www.suse.com/security/cve/CVE-2021-39698

https://www.suse.com/security/cve/CVE-2021-45402

https://www.suse.com/security/cve/CVE-2021-45868

https://www.suse.com/security/cve/CVE-2022-0850

https://www.suse.com/security/cve/CVE-2022-0854

https://www.suse.com/security/cve/CVE-2022-1011

https://www.suse.com/security/cve/CVE-2022-1016

https://www.suse.com/security/cve/CVE-2022-1048

https://www.suse.com/security/cve/CVE-2022-1055

https://www.suse.com/security/cve/CVE-2022-1195

https://www.suse.com/security/cve/CVE-2022-1198

https://www.suse.com/security/cve/CVE-2022-1199

https://www.suse.com/security/cve/CVE-2022-1205

https://www.suse.com/security/cve/CVE-2022-23036

https://www.suse.com/security/cve/CVE-2022-23037

https://www.suse.com/security/cve/CVE-2022-23038

https://www.suse.com/security/cve/CVE-2022-23039

https://www.suse.com/security/cve/CVE-2022-23040

https://www.suse.com/security/cve/CVE-2022-23041

https://www.suse.com/security/cve/CVE-2022-23042

https://www.suse.com/security/cve/CVE-2022-27223

https://www.suse.com/security/cve/CVE-2022-27666

https://www.suse.com/security/cve/CVE-2022-28388

https://www.suse.com/security/cve/CVE-2022-28389

https://www.suse.com/security/cve/CVE-2022-28390

http://www.nessus.org/u?09b2530e

Plugin Details

Severity: High

ID: 159698

File Name: suse_SU-2022-1163-1.nasl

Version: 1.10

Type: local

Agent: unix

Published: 4/13/2022

Updated: 7/13/2023

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2021-39698

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

CVSS Score Source: CVE-2022-27223

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-source-azure, p-cpe:/a:novell:suse_linux:kernel-syms-azure, p-cpe:/a:novell:suse_linux:kernel-azure-devel, p-cpe:/a:novell:suse_linux:kernel-devel-azure, p-cpe:/a:novell:suse_linux:kernel-azure, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/12/2022

Vulnerability Publication Date: 2/11/2022

Exploitable With

CANVAS (CANVAS)

Reference Information

CVE: CVE-2021-39698, CVE-2021-45402, CVE-2021-45868, CVE-2022-0850, CVE-2022-0854, CVE-2022-1011, CVE-2022-1016, CVE-2022-1048, CVE-2022-1055, CVE-2022-1195, CVE-2022-1198, CVE-2022-1199, CVE-2022-1205, CVE-2022-23036, CVE-2022-23037, CVE-2022-23038, CVE-2022-23039, CVE-2022-23040, CVE-2022-23041, CVE-2022-23042, CVE-2022-27223, CVE-2022-27666, CVE-2022-28388, CVE-2022-28389, CVE-2022-28390

SuSE: SUSE-SU-2022:1163-1