SUSE SLES15 Security Update : kernel (SUSE-SU-2022:3585-1)

high Nessus Plugin ID 166146

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:3585-1 advisory.

- A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled.
This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service. (CVE-2022-1263)

- kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586)

- A NULL pointer dereference flaw in diFree in fs/jfs/inode.c in Journaled File System (JFS)in the Linux kernel. This could allow a local attacker to crash the system or leak kernel internal information.
(CVE-2022-3202)

- A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system. (CVE-2022-3239)

- A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition (CVE-2022-3303)

- An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations. (CVE-2022-39189)

- In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release. (CVE-2022-41218)

- drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach. (CVE-2022-41848)

- drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use- after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect. (CVE-2022-41849)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1152472

https://bugzilla.suse.com/1152489

https://bugzilla.suse.com/1185032

https://bugzilla.suse.com/1190497

https://bugzilla.suse.com/1194023

https://bugzilla.suse.com/1194869

https://bugzilla.suse.com/1195917

https://bugzilla.suse.com/1196444

https://bugzilla.suse.com/1196869

https://bugzilla.suse.com/1197659

https://bugzilla.suse.com/1198189

https://bugzilla.suse.com/1200622

https://bugzilla.suse.com/1201309

https://bugzilla.suse.com/1201310

https://bugzilla.suse.com/1201987

https://bugzilla.suse.com/1202095

https://bugzilla.suse.com/1202960

https://bugzilla.suse.com/1203039

https://bugzilla.suse.com/1203066

https://bugzilla.suse.com/1203101

https://bugzilla.suse.com/1203197

https://bugzilla.suse.com/1203263

https://bugzilla.suse.com/1203338

https://bugzilla.suse.com/1203360

https://bugzilla.suse.com/1203361

https://bugzilla.suse.com/1203389

https://bugzilla.suse.com/1203410

https://bugzilla.suse.com/1203505

https://bugzilla.suse.com/1203552

https://bugzilla.suse.com/1203664

https://bugzilla.suse.com/1203693

https://bugzilla.suse.com/1203699

https://bugzilla.suse.com/1203701

https://bugzilla.suse.com/1203767

https://bugzilla.suse.com/1203769

https://bugzilla.suse.com/1203794

https://bugzilla.suse.com/1203798

https://bugzilla.suse.com/1203893

https://bugzilla.suse.com/1203902

https://bugzilla.suse.com/1203906

https://bugzilla.suse.com/1203908

https://bugzilla.suse.com/1203933

https://bugzilla.suse.com/1203935

https://bugzilla.suse.com/1203939

https://bugzilla.suse.com/1203969

https://bugzilla.suse.com/1203987

https://bugzilla.suse.com/1203992

https://www.suse.com/security/cve/CVE-2022-1263

https://www.suse.com/security/cve/CVE-2022-2586

https://www.suse.com/security/cve/CVE-2022-3202

https://www.suse.com/security/cve/CVE-2022-3239

https://www.suse.com/security/cve/CVE-2022-3303

https://www.suse.com/security/cve/CVE-2022-39189

https://www.suse.com/security/cve/CVE-2022-41218

https://www.suse.com/security/cve/CVE-2022-41848

https://www.suse.com/security/cve/CVE-2022-41849

http://www.nessus.org/u?22c0a977

Plugin Details

Severity: High

ID: 166146

File Name: suse_SU-2022-3585-1.nasl

Version: 1.8

Type: local

Agent: unix

Published: 10/15/2022

Updated: 6/26/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2022-39189

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.2

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-source-azure, p-cpe:/a:novell:suse_linux:kernel-syms-azure, p-cpe:/a:novell:suse_linux:kernel-azure-devel, p-cpe:/a:novell:suse_linux:kernel-devel-azure, p-cpe:/a:novell:suse_linux:kernel-azure, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/14/2022

Vulnerability Publication Date: 8/31/2022

CISA Known Exploited Vulnerability Due Dates: 7/17/2024

Reference Information

CVE: CVE-2022-1263, CVE-2022-2586, CVE-2022-3202, CVE-2022-3239, CVE-2022-3303, CVE-2022-39189, CVE-2022-41218, CVE-2022-41848, CVE-2022-41849

SuSE: SUSE-SU-2022:3585-1