SUSE SLES12 Security Update : kernel (SUSE-SU-2022:0765-1)

high Nessus Plugin ID 158754

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:0765-1 advisory.

- In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference. (CVE-2021-44879)

- pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.
(CVE-2021-45095)

- Amazon Linux has been made aware of a potential Branch Target Injection (BTI) issue (sometimes referred to as Spectre variant 2). This is a known cross-domain transient execution attack where a third party may seek to cause a disclosure gadget to be speculatively executed after an indirect branch prediction.
Generally, actors who attempt transient execution attacks do not have access to the data on the hosts they attempt to access (e.g. where privilege-level isolation is in place). For such attacks to succeed, actors need to be able to run code on the (virtual) machine hosting the data in which they are interested.
(CVE-2022-0001, CVE-2022-0002)

- A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1. (CVE-2022-0487)

- A vulnerability was found in the Linux kernel's cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
(CVE-2022-0492)

- A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2. (CVE-2022-0617)

- An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor. (CVE-2022-24448)

- An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c. (CVE-2022-24959)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1046306

https://bugzilla.suse.com/1050244

https://bugzilla.suse.com/1089644

https://bugzilla.suse.com/1094978

https://bugzilla.suse.com/1097583

https://bugzilla.suse.com/1097584

https://bugzilla.suse.com/1097585

https://bugzilla.suse.com/1097586

https://bugzilla.suse.com/1097587

https://bugzilla.suse.com/1097588

https://bugzilla.suse.com/1101674

https://bugzilla.suse.com/1101816

https://bugzilla.suse.com/1103991

https://bugzilla.suse.com/1109837

https://bugzilla.suse.com/1111981

https://bugzilla.suse.com/1112374

https://bugzilla.suse.com/1114648

https://bugzilla.suse.com/1114685

https://bugzilla.suse.com/1114893

https://bugzilla.suse.com/1117495

https://bugzilla.suse.com/1118661

https://bugzilla.suse.com/1119113

https://bugzilla.suse.com/1136460

https://bugzilla.suse.com/1136461

https://bugzilla.suse.com/1157038

https://bugzilla.suse.com/1157923

https://bugzilla.suse.com/1158533

https://bugzilla.suse.com/1174852

https://bugzilla.suse.com/1185377

https://bugzilla.suse.com/1185973

https://bugzilla.suse.com/1187716

https://bugzilla.suse.com/1189126

https://bugzilla.suse.com/1191271

https://bugzilla.suse.com/1191580

https://bugzilla.suse.com/1191655

https://bugzilla.suse.com/1193857

https://bugzilla.suse.com/1193867

https://bugzilla.suse.com/1194048

https://bugzilla.suse.com/1194516

https://bugzilla.suse.com/1195080

https://bugzilla.suse.com/1195377

https://bugzilla.suse.com/1195536

https://bugzilla.suse.com/1195543

https://bugzilla.suse.com/1195612

https://bugzilla.suse.com/1195638

https://bugzilla.suse.com/1195795

https://bugzilla.suse.com/1195823

https://bugzilla.suse.com/1195840

https://bugzilla.suse.com/1195897

https://bugzilla.suse.com/1195908

https://bugzilla.suse.com/1195934

https://bugzilla.suse.com/1195949

https://bugzilla.suse.com/1195987

https://bugzilla.suse.com/1195995

https://bugzilla.suse.com/1196079

https://bugzilla.suse.com/1196155

https://bugzilla.suse.com/1196400

https://bugzilla.suse.com/1196516

https://bugzilla.suse.com/1196584

https://bugzilla.suse.com/1196612

http://www.nessus.org/u?5a197f65

https://www.suse.com/security/cve/CVE-2021-44879

https://www.suse.com/security/cve/CVE-2021-45095

https://www.suse.com/security/cve/CVE-2022-0001

https://www.suse.com/security/cve/CVE-2022-0002

https://www.suse.com/security/cve/CVE-2022-0487

https://www.suse.com/security/cve/CVE-2022-0492

https://www.suse.com/security/cve/CVE-2022-0617

https://www.suse.com/security/cve/CVE-2022-0644

https://www.suse.com/security/cve/CVE-2022-24448

https://www.suse.com/security/cve/CVE-2022-24959

Plugin Details

Severity: High

ID: 158754

File Name: suse_SU-2022-0765-1.nasl

Version: 1.7

Type: local

Agent: unix

Published: 3/9/2022

Updated: 8/31/2022

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information

VPR

Risk Factor: Critical

Score: 9.8

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:H/RL:OF/RC:C

CVSS Score Source: CVE-2022-0847

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-azure, p-cpe:/a:novell:suse_linux:kernel-azure-base, p-cpe:/a:novell:suse_linux:kernel-azure-devel, p-cpe:/a:novell:suse_linux:kernel-devel-azure, p-cpe:/a:novell:suse_linux:kernel-source-azure, p-cpe:/a:novell:suse_linux:kernel-syms-azure, cpe:/o:novell:suse_linux:12

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/8/2022

Vulnerability Publication Date: 12/16/2021

CISA Known Exploited Dates: 5/16/2022

Exploitable With

CANVAS (CANVAS)

Metasploit (Dirty Pipe Local Privilege Escalation via CVE-2022-0847)

Reference Information

CVE: CVE-2021-44879, CVE-2021-45095, CVE-2022-0001, CVE-2022-0002, CVE-2022-0487, CVE-2022-0492, CVE-2022-0617, CVE-2022-0644, CVE-2022-0847, CVE-2022-24448, CVE-2022-24959

SuSE: SUSE-SU-2022:0765-1