SB2022101508 - SUSE update for the Linux Kernel
Published: October 15, 2022 Updated: June 26, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 9 secuirty vulnerabilities.
1) NULL pointer dereference (CVE-ID: CVE-2022-1263)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to kvm implementation in the Linux kernel does not handle releasing a virtual cpu properly. A local user can pass specially crafted data and perform a denial of service (DoS) attack.
2) Use-after-free (CVE-ID: CVE-2022-2586)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the the netfilter subsystem implementation in Linux kernel when preventing one nft object from referencing an nft set in another nft table. A local user can trigger a use-after-free error and execute arbitrary code on the system with elevated privileges.
3) NULL pointer dereference (CVE-ID: CVE-2022-3202)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in diFree in fs/jfs/inode.c in Journaled File System (JFS) in the Linux kernel. A local user can perform a denial of service (DoS) attack.
4) Use-after-free (CVE-ID: CVE-2022-3239)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the Linux kernel video4linux driver in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
5) NULL pointer dereference (CVE-ID: CVE-2022-3303)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in the Linux kernel sound subsystem due to improper locking when handling the SNDCTL_DSP_SYNC ioctl. A privileged local user can trigger a NULL pointer dereference error and perform a denial of service (DoS) attack.
6) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-39189)
The vulnerability allows a guest user to escalate privileges on the system.
The vulnerability exists due to incorrect handling of TLB flush operations in certain KVM_VCPU_PREEMPTED situations in the x86 KVM subsystem in the Linux kernel. An attacker with unprivileged access to the guest OS can escalate privileges on the guest.
7) Use-after-free (CVE-ID: CVE-2022-41218)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the dvb_demux_open() and dvb_dmxdev_release() function in drivers/media/dvb-core/dmxdev.c in Linux kernel. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
8) Race condition (CVE-ID: CVE-2022-41848)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a race condition in the drivers/char/pcmcia/synclink_cs.c in the Linux kernel. An attacker with physical proximity to the affected system can remove a PCMCIA device while calling ioctl, cause a race condition between mgslpc_ioctl and mgslpc_detach and perform a denial of service (DoS) attack.
9) Race condition (CVE-ID: CVE-2022-41849)
The vulnerability allows an attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a race condition in the drivers/video/fbdev/smscufx.c in the Linux kernel. An attacker with physical proximity to the system can remove the USB device while calling open(), cause a race condition between the ufx_ops_open and ufx_usb_disconnect and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.