[SUSE-SU-2022:0291-1] Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2)
Severity
Important
CVEs
9
Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2)
This update for the Linux Kernel 5.3.18-24_52 fixes several issues.
The following security issues were fixed:
- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2021-4154: Fixed option parsing with cgroups version 1 (bsc#1193842).
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673, CVE-2021-23134: Fixed multiple bugs in NFC subsytem (bsc#1178181, bsc#1186060).
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
- ID
- SUSE-SU-2022:0291-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2022/suse-su-20220291-1/
- Published
-
2022-02-02T09:02:38
(2 years ago) - Modified
-
2022-02-02T09:02:38
(2 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2021-1503
- ALAS2-2021-1627
- ALSA-2022:0188
- ALSA-2022:0825
- ALSA-2022:1988
- ASB-A-218836280
- CISA-2024:0821
- DSA-4978-1
- DSA-5050-1
- DSA-5096-1
- ELSA-2021-9362
- ELSA-2021-9363
- ELSA-2021-9404
- ELSA-2021-9406
- ELSA-2021-9407
- ELSA-2021-9410
- ELSA-2021-9452
- ELSA-2021-9453
- ELSA-2022-0063
- ELSA-2022-0188
- ELSA-2022-0825
- ELSA-2022-1988
- ELSA-2022-9028
- ELSA-2022-9029
- ELSA-2022-9147
- ELSA-2022-9148
- ELSA-2022-9969
- FEDORA-2021-05152dbcf5
- FEDORA-2021-1c170a7c7c
- FEDORA-2021-21360476b6
- FEDORA-2021-286375de1e
- FEDORA-2021-7de33b7016
- FEDORA-2021-8364530ebf
- FEDORA-2021-d56567bdab
- FEDORA-2021-fdef34e26f
- FEDORA-2022-6352c313b7
- FEDORA-2022-6d4082d590
- MS:CVE-2020-25672
- MS:CVE-2021-23134
- MS:CVE-2021-4154
- MS:CVE-2021-42739
- MS:CVE-2022-0185
- openSUSE-SU-2021:0579-1
- openSUSE-SU-2021:0758-1
- openSUSE-SU-2021:0843-1
- openSUSE-SU-2021:0947-1
- openSUSE-SU-2021:1357-1
- openSUSE-SU-2021:1365-1
- openSUSE-SU-2021:1477-1
- openSUSE-SU-2021:1975-1
- openSUSE-SU-2021:1977-1
- openSUSE-SU-2021:3338-1
- openSUSE-SU-2021:3387-1
- openSUSE-SU-2021:3447-1
- openSUSE-SU-2021:3641-1
- openSUSE-SU-2021:3675-1
- openSUSE-SU-2021:3876-1
- openSUSE-SU-2022:0169-1
- openSUSE-SU-2022:0198-1
- RHSA-2022:0063
- RHSA-2022:0065
- RHSA-2022:0176
- RHSA-2022:0188
- RHSA-2022:0232
- RHSA-2022:0819
- RHSA-2022:0825
- RHSA-2022:0849
- RHSA-2022:1975
- RHSA-2022:1988
- RLSA-2022:176
- RLSA-2022:1988
- SSA:2021-202-01
- SSA:2022-031-01
- SUSE-SU-2021:1210-1
- SUSE-SU-2021:1211-1
- SUSE-SU-2021:1238-1
- SUSE-SU-2021:1248-1
- SUSE-SU-2021:1266-1
- SUSE-SU-2021:1301-1
- SUSE-SU-2021:1573-1
- SUSE-SU-2021:1596-1
- SUSE-SU-2021:1617-1
- SUSE-SU-2021:1623-1
- SUSE-SU-2021:1624-1
- SUSE-SU-2021:1625-1
- SUSE-SU-2021:1887-1
- SUSE-SU-2021:1888-1
- SUSE-SU-2021:1889-1
- SUSE-SU-2021:1890-1
- SUSE-SU-2021:1891-1
- SUSE-SU-2021:1899-1
- SUSE-SU-2021:1912-1
- SUSE-SU-2021:1913-1
- SUSE-SU-2021:1975-1
- SUSE-SU-2021:1977-1
- SUSE-SU-2021:2020-1
- SUSE-SU-2021:2027-1
- SUSE-SU-2021:2057-1
- SUSE-SU-2021:2067-1
- SUSE-SU-2021:2208-1
- SUSE-SU-2021:2406-1
- SUSE-SU-2021:2421-1
- SUSE-SU-2021:2451-1
- SUSE-SU-2021:3337-1
- SUSE-SU-2021:3338-1
- SUSE-SU-2021:3339-1
- SUSE-SU-2021:3386-1
- SUSE-SU-2021:3387-1
- SUSE-SU-2021:3388-1
- SUSE-SU-2021:3389-1
- SUSE-SU-2021:3415-1
- SUSE-SU-2021:3447-1
- SUSE-SU-2021:3640-1
- SUSE-SU-2021:3641-1
- SUSE-SU-2021:3642-1
- SUSE-SU-2021:3658-1
- SUSE-SU-2021:3675-1
- SUSE-SU-2021:3723-1
- SUSE-SU-2021:3748-1
- SUSE-SU-2021:3754-1
- SUSE-SU-2021:3876-1
- SUSE-SU-2021:3929-1
- SUSE-SU-2021:3935-1
- SUSE-SU-2021:3969-1
- SUSE-SU-2021:3972-1
- SUSE-SU-2022:0169-1
- SUSE-SU-2022:0197-1
- SUSE-SU-2022:0198-1
- SUSE-SU-2022:0234-1
- SUSE-SU-2022:0237-1
- SUSE-SU-2022:0238-1
- SUSE-SU-2022:0239-1
- SUSE-SU-2022:0241-1
- SUSE-SU-2022:0242-1
- SUSE-SU-2022:0243-1
- SUSE-SU-2022:0246-1
- SUSE-SU-2022:0254-1
- SUSE-SU-2022:0255-1
- SUSE-SU-2022:0257-1
- SUSE-SU-2022:0262-1
- SUSE-SU-2022:0263-1
- SUSE-SU-2022:0267-1
- SUSE-SU-2022:0270-1
- SUSE-SU-2022:0288-1
- SUSE-SU-2022:0289-1
- SUSE-SU-2022:0292-1
- SUSE-SU-2022:0293-1
- SUSE-SU-2022:0295-1
- SUSE-SU-2022:0296-1
- SUSE-SU-2022:0298-1
- SUSE-SU-2022:0325-1
- SUSE-SU-2022:0327-1
- SUSE-SU-2022:0328-1
- SUSE-SU-2022:1669-1
- SUSE-SU-2022:1676-1
- SUSE-SU-2022:1687-1
- SUSE-SU-2024:1454-1
- SUSE-SU-2024:1489-1
- SUSE-SU-2024:1643-1
- SUSE-SU-2024:1648-1
- SUSE-SU-2024:1870-1
- USN-4948-1
- USN-4977-1
- USN-4979-1
- USN-4982-1
- USN-4997-1
- USN-4997-2
- USN-4999-1
- USN-5000-1
- USN-5000-2
- USN-5001-1
- USN-5016-1
- USN-5018-1
- USN-5113-1
- USN-5114-1
- USN-5115-1
- USN-5116-1
- USN-5116-2
- USN-5165-1
- USN-5207-1
- USN-5240-1
- USN-5265-1
- USN-5266-1
- USN-5267-1
- USN-5267-3
- USN-5268-1
- USN-5343-1
- USN-5361-1
- USN-5362-1
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |