[SUSE-SU-2022:0325-1] Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3)
Severity
Important
Affected Packages
4
CVEs
9
Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3)
This update for the Linux Kernel 4.4.180-94_141 fixes several issues.
The following security issues were fixed:
- CVE-2018-25020: Fixed an issue in the BPF subsystem in the Linux kernel mishandled situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. (bsc#1193575)
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673, CVE-2021-23134: Fixed multiple bugs in NFC subsytem (bsc#1178181, bsc#1186060).
- CVE-2019-0136: Fixed an insufficient access control which allow an unauthenticated user to execute a denial of service. (bsc#1193157)
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
- ID
- SUSE-SU-2022:0325-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2022/suse-su-20220325-1/
- Published
-
2022-02-04T08:27:37
(2 years ago) - Modified
-
2022-02-04T08:27:37
(2 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2021-1503
- ALAS-2022-1571
- ALAS2-2021-1627
- ALAS2-2022-1761
- ALSA-2022:1988
- DSA-4978-1
- DSA-5096-1
- ELSA-2021-9362
- ELSA-2021-9363
- ELSA-2021-9404
- ELSA-2021-9406
- ELSA-2021-9407
- ELSA-2021-9410
- ELSA-2021-9452
- ELSA-2021-9453
- ELSA-2022-0063
- ELSA-2022-1988
- ELSA-2022-9969
- FEDORA-2021-05152dbcf5
- FEDORA-2021-1c170a7c7c
- FEDORA-2021-21360476b6
- FEDORA-2021-286375de1e
- FEDORA-2021-7de33b7016
- FEDORA-2021-8364530ebf
- FEDORA-2021-d56567bdab
- FEDORA-2021-fdef34e26f
- MS:CVE-2020-25672
- MS:CVE-2021-23134
- MS:CVE-2021-42739
- openSUSE-SU-2021:0579-1
- openSUSE-SU-2021:0758-1
- openSUSE-SU-2021:0843-1
- openSUSE-SU-2021:0947-1
- openSUSE-SU-2021:1357-1
- openSUSE-SU-2021:1365-1
- openSUSE-SU-2021:1477-1
- openSUSE-SU-2021:1975-1
- openSUSE-SU-2021:1977-1
- openSUSE-SU-2021:3338-1
- openSUSE-SU-2021:3387-1
- openSUSE-SU-2021:3447-1
- openSUSE-SU-2021:3641-1
- openSUSE-SU-2021:3675-1
- openSUSE-SU-2021:3876-1
- openSUSE-SU-2022:0366-1
- RHSA-2020:3220
- RHSA-2022:0063
- RHSA-2022:0065
- RHSA-2022:1975
- RHSA-2022:1988
- RLSA-2022:1988
- SSA:2021-202-01
- SSA:2022-031-01
- SUSE-SU-2021:1210-1
- SUSE-SU-2021:1211-1
- SUSE-SU-2021:1238-1
- SUSE-SU-2021:1248-1
- SUSE-SU-2021:1266-1
- SUSE-SU-2021:1301-1
- SUSE-SU-2021:1573-1
- SUSE-SU-2021:1596-1
- SUSE-SU-2021:1617-1
- SUSE-SU-2021:1623-1
- SUSE-SU-2021:1624-1
- SUSE-SU-2021:1625-1
- SUSE-SU-2021:1887-1
- SUSE-SU-2021:1888-1
- SUSE-SU-2021:1889-1
- SUSE-SU-2021:1890-1
- SUSE-SU-2021:1891-1
- SUSE-SU-2021:1899-1
- SUSE-SU-2021:1912-1
- SUSE-SU-2021:1913-1
- SUSE-SU-2021:1975-1
- SUSE-SU-2021:1977-1
- SUSE-SU-2021:2020-1
- SUSE-SU-2021:2027-1
- SUSE-SU-2021:2057-1
- SUSE-SU-2021:2067-1
- SUSE-SU-2021:2208-1
- SUSE-SU-2021:2406-1
- SUSE-SU-2021:2421-1
- SUSE-SU-2021:2451-1
- SUSE-SU-2021:3337-1
- SUSE-SU-2021:3338-1
- SUSE-SU-2021:3339-1
- SUSE-SU-2021:3386-1
- SUSE-SU-2021:3387-1
- SUSE-SU-2021:3388-1
- SUSE-SU-2021:3389-1
- SUSE-SU-2021:3415-1
- SUSE-SU-2021:3447-1
- SUSE-SU-2021:3640-1
- SUSE-SU-2021:3641-1
- SUSE-SU-2021:3642-1
- SUSE-SU-2021:3658-1
- SUSE-SU-2021:3675-1
- SUSE-SU-2021:3723-1
- SUSE-SU-2021:3748-1
- SUSE-SU-2021:3754-1
- SUSE-SU-2021:3876-1
- SUSE-SU-2021:3929-1
- SUSE-SU-2021:3935-1
- SUSE-SU-2021:3969-1
- SUSE-SU-2021:3972-1
- SUSE-SU-2022:0068-1
- SUSE-SU-2022:0080-1
- SUSE-SU-2022:0234-1
- SUSE-SU-2022:0237-1
- SUSE-SU-2022:0238-1
- SUSE-SU-2022:0241-1
- SUSE-SU-2022:0242-1
- SUSE-SU-2022:0243-1
- SUSE-SU-2022:0245-1
- SUSE-SU-2022:0246-1
- SUSE-SU-2022:0254-1
- SUSE-SU-2022:0255-1
- SUSE-SU-2022:0257-1
- SUSE-SU-2022:0263-1
- SUSE-SU-2022:0267-1
- SUSE-SU-2022:0270-1
- SUSE-SU-2022:0291-1
- SUSE-SU-2022:0292-1
- SUSE-SU-2022:0293-1
- SUSE-SU-2022:0295-1
- SUSE-SU-2022:0296-1
- SUSE-SU-2022:0298-1
- SUSE-SU-2022:0327-1
- SUSE-SU-2022:0328-1
- SUSE-SU-2022:0329-1
- SUSE-SU-2022:0362-1
- SUSE-SU-2022:0366-1
- SUSE-SU-2022:0367-1
- SUSE-SU-2022:0371-1
- SUSE-SU-2022:0477-1
- SUSE-SU-2024:1454-1
- SUSE-SU-2024:1489-1
- SUSE-SU-2024:1643-1
- SUSE-SU-2024:1648-1
- SUSE-SU-2024:1870-1
- USN-4115-1
- USN-4118-1
- USN-4145-1
- USN-4147-1
- USN-4948-1
- USN-4977-1
- USN-4979-1
- USN-4982-1
- USN-4997-1
- USN-4997-2
- USN-4999-1
- USN-5000-1
- USN-5000-2
- USN-5001-1
- USN-5016-1
- USN-5018-1
- USN-5113-1
- USN-5114-1
- USN-5115-1
- USN-5116-1
- USN-5116-2
- USN-5165-1
- USN-5207-1
- USN-5265-1
- USN-5266-1
- USN-5267-1
- USN-5267-3
- USN-5268-1
- USN-5343-1
- USN-5361-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_141-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_141-default | < 13-2.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_141-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_141-default | < 13-2.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_138-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_138-default | < 14-2.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_180-94_138-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_180-94_138-default | < 14-2.2 | sles-12 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |