ALT-BU-2022-5563-1
Branch sisyphus update bulletin.
Package kernel-image-centos updated to version 5.14.0.133-alt1.el9 for branch sisyphus in task 304025.
Closed vulnerabilities
BDU:2022-02112
Уязвимость реализации функции xs_xprt_free() системы удаленного вызова процедур Sun RPC (Open Network Computing Remote Procedure Call) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02443
Уязвимость подсистемы прямого доступа к памяти DMA (Direct memory access) ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-03532
Уязвимость общих буферов системы ввода-вывода с отображением памяти (MMIO) процессоров Intel, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-03600
Уязвимость набора средств разработки Intel Software Guard Extensions SDK, микропрограммного обеспечения Intel SGX DCAP, SGX PSW, PSW связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-05155
Уязвимость системы ввода-вывода с отображением памяти (MMIO) процессоров Intel, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2022-0854
A memory leak flaw was found in the Linux kernel’s DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13
- [debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
- [debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
- DSA-5161
- DSA-5161
- DSA-5173
- DSA-5173
Modified: 2024-11-21
CVE-2022-21123
Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- [oss-security] 20220616 Xen Security Advisory 404 v2 (CVE-2022-21123,CVE-2022-21125,CVE-2022-21166) - x86: MMIO Stale Data vulnerabilities
- [oss-security] 20220616 Xen Security Advisory 404 v2 (CVE-2022-21123,CVE-2022-21125,CVE-2022-21166) - x86: MMIO Stale Data vulnerabilities
- [debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
- [debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
- FEDORA-2022-391e24517d
- FEDORA-2022-391e24517d
- FEDORA-2022-925fc688c1
- FEDORA-2022-925fc688c1
- FEDORA-2022-2c9f8224f8
- FEDORA-2022-2c9f8224f8
- FEDORA-2022-177a008b98
- FEDORA-2022-177a008b98
- GLSA-202208-23
- GLSA-202208-23
- https://security.netapp.com/advisory/ntap-20220624-0008/
- https://security.netapp.com/advisory/ntap-20220624-0008/
- DSA-5173
- DSA-5173
- DSA-5178
- DSA-5178
- DSA-5184
- DSA-5184
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
Modified: 2024-11-21
CVE-2022-21125
Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- [oss-security] 20220616 Xen Security Advisory 404 v2 (CVE-2022-21123,CVE-2022-21125,CVE-2022-21166) - x86: MMIO Stale Data vulnerabilities
- [oss-security] 20220616 Xen Security Advisory 404 v2 (CVE-2022-21123,CVE-2022-21125,CVE-2022-21166) - x86: MMIO Stale Data vulnerabilities
- http://xenbits.xen.org/xsa/advisory-404.html
- http://xenbits.xen.org/xsa/advisory-404.html
- [debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
- [debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
- FEDORA-2022-391e24517d
- FEDORA-2022-391e24517d
- FEDORA-2022-925fc688c1
- FEDORA-2022-925fc688c1
- FEDORA-2022-2c9f8224f8
- FEDORA-2022-2c9f8224f8
- FEDORA-2022-177a008b98
- FEDORA-2022-177a008b98
- GLSA-202208-23
- GLSA-202208-23
- https://security.netapp.com/advisory/ntap-20220624-0008/
- https://security.netapp.com/advisory/ntap-20220624-0008/
- DSA-5173
- DSA-5173
- DSA-5178
- DSA-5178
- DSA-5184
- DSA-5184
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
Modified: 2024-11-21
CVE-2022-21166
Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- [oss-security] 20220616 Xen Security Advisory 404 v2 (CVE-2022-21123,CVE-2022-21125,CVE-2022-21166) - x86: MMIO Stale Data vulnerabilities
- [oss-security] 20220616 Xen Security Advisory 404 v2 (CVE-2022-21123,CVE-2022-21125,CVE-2022-21166) - x86: MMIO Stale Data vulnerabilities
- [debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
- [debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
- FEDORA-2022-391e24517d
- FEDORA-2022-391e24517d
- FEDORA-2022-925fc688c1
- FEDORA-2022-925fc688c1
- FEDORA-2022-2c9f8224f8
- FEDORA-2022-2c9f8224f8
- FEDORA-2022-177a008b98
- FEDORA-2022-177a008b98
- GLSA-202208-23
- GLSA-202208-23
- https://security.netapp.com/advisory/ntap-20220624-0008/
- https://security.netapp.com/advisory/ntap-20220624-0008/
- DSA-5173
- DSA-5173
- DSA-5178
- DSA-5178
- DSA-5184
- DSA-5184
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
Modified: 2024-11-21
CVE-2022-28893
The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.
- [oss-security] 20220411 CVE-2022-28893: Linux kernel: Use after free in SUNRPC subsystem
- [oss-security] 20220411 CVE-2022-28893: Linux kernel: Use after free in SUNRPC subsystem
- [oss-security] 20220411 Re: CVE-2022-28893: Linux kernel: Use after free in SUNRPC subsystem
- [oss-security] 20220411 Re: CVE-2022-28893: Linux kernel: Use after free in SUNRPC subsystem
- [oss-security] 20220411 Re: CVE-2022-28893: Linux kernel: Use after free in SUNRPC subsystem
- [oss-security] 20220411 Re: CVE-2022-28893: Linux kernel: Use after free in SUNRPC subsystem
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a
- https://security.netapp.com/advisory/ntap-20220526-0002/
- https://security.netapp.com/advisory/ntap-20220526-0002/
- DSA-5161
- DSA-5161
Package kernel-source-lkrg updated to version 0.9.3.0.41.gitcbd4198-alt1 for branch sisyphus in task 304010.
Closed bugs
Kernel panic for 5.15.47-alt1
Package kernel-modules-lkrg-centos updated to version 0.9.3.0.41.gitcbd4198-alt1.331264.e133.1.el9 for branch sisyphus in task 304010.
Closed bugs
Kernel panic for 5.15.47-alt1
Package kernel-modules-lkrg-ovz-el7 updated to version 0.9.3.0.41.gitcbd4198-alt1.199168.4.1160.62.1.vz7.187.6 for branch sisyphus in task 304010.
Closed bugs
Kernel panic for 5.15.47-alt1
Package kernel-modules-lkrg-std-def updated to version 0.9.3.0.41.gitcbd4198-alt1.331575.1 for branch sisyphus in task 304010.
Closed bugs
Kernel panic for 5.15.47-alt1
Package kernel-modules-lkrg-un-def updated to version 0.9.3.0.41.gitcbd4198-alt1.332300.1 for branch sisyphus in task 304010.
Closed bugs
Kernel panic for 5.15.47-alt1