SUSE update for the Linux Kernel



Published: 2022-03-30 | Updated: 2023-12-06
Risk Medium
Patch available YES
Number of vulnerabilities 24
CVE-ID CVE-2021-0920
CVE-2021-39698
CVE-2021-44879
CVE-2021-45402
CVE-2022-0487
CVE-2022-0492
CVE-2022-0516
CVE-2022-0617
CVE-2022-0644
CVE-2022-23036
CVE-2022-23037
CVE-2022-23038
CVE-2022-23039
CVE-2022-23040
CVE-2022-23041
CVE-2022-23042
CVE-2022-24448
CVE-2022-24958
CVE-2022-24959
CVE-2022-25258
CVE-2022-25636
CVE-2022-26490
CVE-2022-26966
CVE-2022-27223
CWE-ID CWE-416
CWE-476
CWE-125
CWE-264
CWE-787
CWE-617
CWE-362
CWE-909
CWE-763
CWE-401
CWE-122
CWE-119
CWE-129
Exploitation vector Network
Public exploit Vulnerability #1 is being exploited in the wild.
Public exploit code for vulnerability #5 is available.
Public exploit code for vulnerability #6 is available.
Public exploit code for vulnerability #21 is available.
Vulnerable software
Subscribe
SUSE Linux Enterprise Real Time
Operating systems & Components / Operating system

SUSE Linux Enterprise Module for Realtime
Operating systems & Components / Operating system

SUSE Linux Enterprise Micro
Operating systems & Components / Operating system

kernel-source-rt
Operating systems & Components / Operating system package or component

kernel-devel-rt
Operating systems & Components / Operating system package or component

ocfs2-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

ocfs2-kmp-rt
Operating systems & Components / Operating system package or component

kernel-syms-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug-devel-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt_debug-devel
Operating systems & Components / Operating system package or component

kernel-rt_debug-debugsource
Operating systems & Components / Operating system package or component

kernel-rt_debug-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-devel-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-devel
Operating systems & Components / Operating system package or component

kernel-rt-debugsource
Operating systems & Components / Operating system package or component

kernel-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt
Operating systems & Components / Operating system package or component

gfs2-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

gfs2-kmp-rt
Operating systems & Components / Operating system package or component

dlm-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

dlm-kmp-rt
Operating systems & Components / Operating system package or component

cluster-md-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

cluster-md-kmp-rt
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 24 vulnerabilities.

1) Use-after-free

EUVDB-ID: #VU59811

Risk: Low

CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C]

CVE-ID: CVE-2021-0920

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the unix_scm_to_skb() function of af_unix.c in Linux kernel. A local user can run a specially crafted program to trigger a race condition and execute arbitrary code with elevated privileges.


Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

2) Use-after-free

EUVDB-ID: #VU61097

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-39698

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in Linux kernel. A local user can run a specially crafted program to trigger the use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) NULL pointer dereference

EUVDB-ID: #VU62483

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-44879

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in the gc_data_segment() function in fs/f2fs/gc.c. A local user can mount a specially crafted f2fs image, trigger a NULL pointer dereference and perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Out-of-bounds read

EUVDB-ID: #VU63567

Risk: Low

CVSSv3.1: 3.3 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-45402

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to check_alu_op() function in kernel/bpf/verifier.c does not properly update bounds while handling the mov32 instruction. A local user can obtain potentially sensitive address information.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Use-after-free

EUVDB-ID: #VU61181

Risk: Low

CVSSv3.1: 5 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2022-0487

CWE-ID: CWE-416 - Use After Free

Exploit availability: Yes

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a use-after-free error in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. A local user can trigger a use-after-free error and gain access to sensitive information.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

6) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU61245

Risk: Low

CVSSv3.1: 7.2 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C]

CVE-ID: CVE-2022-0492

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a logic error within the cgroup_release_agent_write() function in  kernel/cgroup/cgroup-v1.c. A local user can use the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.

7) Out-of-bounds write

EUVDB-ID: #VU61247

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-0516

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in kvm_s390_guest_sida_op() function in the arch/s390/kvm/kvm-s390.c in KVM for s390 in the Linux kernel. A local user can trigger an out-of-bounds write and escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) NULL pointer dereference

EUVDB-ID: #VU61210

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-0617

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in the Linux kernel UDF file system functionality. A local user can supply a malicious UDF image to the udf_file_write_iter() function and perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Reachable Assertion

EUVDB-ID: #VU63860

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-0644

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion error in the Linux kernel’s kernel_read_file_from_fd in the filesystem. A local user can attempt to read a file without read access/permission to perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Race condition

EUVDB-ID: #VU63305

Risk: Low

CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23036

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to a race condition in the blkfront ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Race condition

EUVDB-ID: #VU63306

Risk: Low

CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23037

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to a race condition in the netfront ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Race condition

EUVDB-ID: #VU63307

Risk: Low

CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23038

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to a race condition in the scsifront ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Race condition

EUVDB-ID: #VU63308

Risk: Low

CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23039

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to a race condition in the gntalloc ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Race condition

EUVDB-ID: #VU63309

Risk: Low

CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23040

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to a race condition in the xenbus ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Race condition

EUVDB-ID: #VU63310

Risk: Low

CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23041

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to a race condition in blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls ring buffers. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Reachable Assertion

EUVDB-ID: #VU63311

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23042

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to reachable assertion in the netfront ring buffer. A malicious backend can exploit the race condition and read or write data or perform a denial of service attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Missing initialization of resource

EUVDB-ID: #VU61211

Risk: Low

CVSSv3.1: 3.3 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-24448

CWE-ID: CWE-909 - Missing initialization of resource

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to missing initialization of resource within the fs/nfs/dir.c in the Linux kernel. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Release of invalid pointer or reference

EUVDB-ID: #VU63315

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-24958

CWE-ID: CWE-763 - Release of invalid pointer or reference

Exploit availability: No

Description

The vulnerability allows remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to release of illegal memory vulnerability in the drivers/usb/gadget/legacy/inode.c. A remote attacker can send specially crafted data and perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Memory leak

EUVDB-ID: #VU62482

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-24959

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the yam_siocdevprivate() function in drivers/net/hamradio/yam.c. A local user can perform a denial of service attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) NULL pointer dereference

EUVDB-ID: #VU61270

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-25258

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error drivers/usb/gadget/composite.c in the Linux kernel. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). A local user can run a specially crafted program to trigger memory corruption and perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Heap-based buffer overflow

EUVDB-ID: #VU61271

Risk: Low

CVSSv3.1: 7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2022-25636

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in net/netfilter/nf_dup_netdev.c in the Linux kernel, related to nf_tables_offload. A local user can trigger a heap-based buffer overflow and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

22) Buffer overflow

EUVDB-ID: #VU62601

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-26490

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the st21nfca_connectivity_event_received() function in drivers/nfc/st21nfca/se.c in Linux kernel. A local user can run a specially crafted program to trigger buffer overflow and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Use-after-free

EUVDB-ID: #VU63318

Risk: Low

CVSSv3.1: 5.3 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-26966

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to a use-after-free error in drivers/net/usb/sr9700.c in the Linux kernel. A remote attacker can pass specially crafted data and obtain sensitive information from heap memory.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Improper Validation of Array Index

EUVDB-ID: #VU63316

Risk: Medium

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-27223

CWE-ID: CWE-129 - Improper Validation of Array Index

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code with elevated privileges.

The vulnerability exists due to improper validation of array index in drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel. A remote attacker can send specially crafted data to the system and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Real Time: 15-SP3

SUSE Linux Enterprise Module for Realtime: 15-SP3

SUSE Linux Enterprise Micro: 5.1

kernel-source-rt: before 5.3.18-150300.82.1

kernel-devel-rt: before 5.3.18-150300.82.1

ocfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

ocfs2-kmp-rt: before 5.3.18-150300.82.1

kernel-syms-rt: before 5.3.18-150300.82.1

kernel-rt_debug-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt_debug-devel: before 5.3.18-150300.82.1

kernel-rt_debug-debugsource: before 5.3.18-150300.82.1

kernel-rt_debug-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel-debuginfo: before 5.3.18-150300.82.1

kernel-rt-devel: before 5.3.18-150300.82.1

kernel-rt-debugsource: before 5.3.18-150300.82.1

kernel-rt-debuginfo: before 5.3.18-150300.82.1

kernel-rt: before 5.3.18-150300.82.1

gfs2-kmp-rt-debuginfo: before 5.3.18-150300.82.1

gfs2-kmp-rt: before 5.3.18-150300.82.1

dlm-kmp-rt-debuginfo: before 5.3.18-150300.82.1

dlm-kmp-rt: before 5.3.18-150300.82.1

cluster-md-kmp-rt-debuginfo: before 5.3.18-150300.82.1

cluster-md-kmp-rt: before 5.3.18-150300.82.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20221038-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###