[SUSE-SU-2022:0759-1] Security update for the Linux Kernel

Severity Important
Affected Packages 36
CVEs 14

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

  • CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
  • CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
  • CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
  • CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
  • CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
  • CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
  • CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
  • CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
  • CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
  • CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
  • CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).
  • CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
  • CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
  • CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf release (bsc#1195905).

The following non-security bugs were fixed:

  • btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
  • gve: Add RX context (jsc#SLE-23652).
  • gve: Add a jumbo-frame device option (jsc#SLE-23652).
  • gve: Add consumed counts to ethtool stats (jsc#SLE-23652).
  • gve: Add optional metadata descriptor type GVE_TXD_MTD (jsc#SLE-23652).
  • gve: Correct order of processing device options (jsc#SLE-23652).
  • gve: Fix GFP flags when allocing pages (jsc#SLE-23652).
  • gve: Implement packet continuation for RX (jsc#SLE-23652).
  • gve: Implement suspend/resume/shutdown (jsc#SLE-23652).
  • gve: Move the irq db indexes out of the ntfy block struct (jsc#SLE-23652).
  • gve: Recording rx queue before sending to napi (jsc#SLE-23652).
  • gve: Update gve_free_queue_page_list signature (jsc#SLE-23652).
  • gve: Use kvcalloc() instead of kvzalloc() (jsc#SLE-23652).
  • gve: fix for null pointer dereference (jsc#SLE-23652).
  • gve: fix the wrong AdminQ buffer queue index check (jsc#SLE-23652).
  • gve: fix unmatched u64_stats_update_end() (jsc#SLE-23652).
  • gve: remove memory barrier around seqno (jsc#SLE-23652).
  • lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
  • net: tipc: validate domain record count on input (bsc#1195254).
  • nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
  • nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
  • nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
  • nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
  • nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
  • powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
  • scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
  • scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
Package Affected Version
pkg:rpm/suse/reiserfs-kmp-default?arch=x86_64&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/reiserfs-kmp-default?arch=s390x&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/reiserfs-kmp-default?arch=ppc64le&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/reiserfs-kmp-default?arch=aarch64&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-preempt?arch=x86_64&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-preempt?arch=aarch64&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-preempt-devel?arch=x86_64&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-preempt-devel?arch=aarch64&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-obs-build?arch=x86_64&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-obs-build?arch=s390x&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-obs-build?arch=ppc64le&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-obs-build?arch=aarch64&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-docs?arch=noarch&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-default?arch=x86_64&distro=slem-5 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-default?arch=aarch64&distro=slem-5 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-15&sp=2 < 5.3.18-24.107.1
pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-15&sp=2 < 5.3.18-24.107.1.9.50.2
pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=slem-5 < 5.3.18-24.107.1.9.50.2
pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-15&sp=2 < 5.3.18-24.107.1.9.50.2
pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-15&sp=2 < 5.3.18-24.107.1.9.50.2
pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-15&sp=2 < 5.3.18-24.107.1.9.50.2
pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=slem-5 < 5.3.18-24.107.1.9.50.2
ID
SUSE-SU-2022:0759-1
Severity
important
URL
https://www.suse.com/support/update/announcement/2022/suse-su-20220759-1/
Published
2022-03-08T18:06:15
(2 years ago)
Modified
2022-03-08T18:06:15
(2 years ago)
Rights
Copyright 2024 SUSE LLC. All rights reserved.
Other Advisories
Source # ID Name URL
Suse SUSE ratings https://www.suse.com/support/security/rating/
Suse URL of this CSAF notice https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0759-1.json
Suse URL for SUSE-SU-2022:0759-1 https://www.suse.com/support/update/announcement/2022/suse-su-20220759-1/
Suse E-Mail link for SUSE-SU-2022:0759-1 https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html
Bugzilla SUSE Bug 1189126 https://bugzilla.suse.com/1189126
Bugzilla SUSE Bug 1191580 https://bugzilla.suse.com/1191580
Bugzilla SUSE Bug 1192483 https://bugzilla.suse.com/1192483
Bugzilla SUSE Bug 1194516 https://bugzilla.suse.com/1194516
Bugzilla SUSE Bug 1195254 https://bugzilla.suse.com/1195254
Bugzilla SUSE Bug 1195286 https://bugzilla.suse.com/1195286
Bugzilla SUSE Bug 1195516 https://bugzilla.suse.com/1195516
Bugzilla SUSE Bug 1195543 https://bugzilla.suse.com/1195543
Bugzilla SUSE Bug 1195612 https://bugzilla.suse.com/1195612
Bugzilla SUSE Bug 1195701 https://bugzilla.suse.com/1195701
Bugzilla SUSE Bug 1195897 https://bugzilla.suse.com/1195897
Bugzilla SUSE Bug 1195905 https://bugzilla.suse.com/1195905
Bugzilla SUSE Bug 1195908 https://bugzilla.suse.com/1195908
Bugzilla SUSE Bug 1195947 https://bugzilla.suse.com/1195947
Bugzilla SUSE Bug 1195949 https://bugzilla.suse.com/1195949
Bugzilla SUSE Bug 1195987 https://bugzilla.suse.com/1195987
Bugzilla SUSE Bug 1195995 https://bugzilla.suse.com/1195995
Bugzilla SUSE Bug 1196079 https://bugzilla.suse.com/1196079
Bugzilla SUSE Bug 1196095 https://bugzilla.suse.com/1196095
Bugzilla SUSE Bug 1196132 https://bugzilla.suse.com/1196132
Bugzilla SUSE Bug 1196155 https://bugzilla.suse.com/1196155
Bugzilla SUSE Bug 1196235 https://bugzilla.suse.com/1196235
Bugzilla SUSE Bug 1196584 https://bugzilla.suse.com/1196584
Bugzilla SUSE Bug 1196601 https://bugzilla.suse.com/1196601
Bugzilla SUSE Bug 1196612 https://bugzilla.suse.com/1196612
Bugzilla SUSE Bug 1196776 https://bugzilla.suse.com/1196776
CVE SUSE CVE CVE-2021-44879 page https://www.suse.com/security/cve/CVE-2021-44879/
CVE SUSE CVE CVE-2022-0001 page https://www.suse.com/security/cve/CVE-2022-0001/
CVE SUSE CVE CVE-2022-0002 page https://www.suse.com/security/cve/CVE-2022-0002/
CVE SUSE CVE CVE-2022-0487 page https://www.suse.com/security/cve/CVE-2022-0487/
CVE SUSE CVE CVE-2022-0492 page https://www.suse.com/security/cve/CVE-2022-0492/
CVE SUSE CVE CVE-2022-0516 page https://www.suse.com/security/cve/CVE-2022-0516/
CVE SUSE CVE CVE-2022-0617 page https://www.suse.com/security/cve/CVE-2022-0617/
CVE SUSE CVE CVE-2022-0644 page https://www.suse.com/security/cve/CVE-2022-0644/
CVE SUSE CVE CVE-2022-0847 page https://www.suse.com/security/cve/CVE-2022-0847/
CVE SUSE CVE CVE-2022-24448 page https://www.suse.com/security/cve/CVE-2022-24448/
CVE SUSE CVE CVE-2022-24958 page https://www.suse.com/security/cve/CVE-2022-24958/
CVE SUSE CVE CVE-2022-24959 page https://www.suse.com/security/cve/CVE-2022-24959/
CVE SUSE CVE CVE-2022-25258 page https://www.suse.com/security/cve/CVE-2022-25258/
CVE SUSE CVE CVE-2022-25375 page https://www.suse.com/security/cve/CVE-2022-25375/
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/reiserfs-kmp-default?arch=x86_64&distro=sles-15&sp=2 suse reiserfs-kmp-default < 5.3.18-24.107.1 sles-15 x86_64
Affected pkg:rpm/suse/reiserfs-kmp-default?arch=s390x&distro=sles-15&sp=2 suse reiserfs-kmp-default < 5.3.18-24.107.1 sles-15 s390x
Affected pkg:rpm/suse/reiserfs-kmp-default?arch=ppc64le&distro=sles-15&sp=2 suse reiserfs-kmp-default < 5.3.18-24.107.1 sles-15 ppc64le
Affected pkg:rpm/suse/reiserfs-kmp-default?arch=aarch64&distro=sles-15&sp=2 suse reiserfs-kmp-default < 5.3.18-24.107.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-15&sp=2 suse kernel-syms < 5.3.18-24.107.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-15&sp=2 suse kernel-syms < 5.3.18-24.107.1 sles-15 s390x
Affected pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-15&sp=2 suse kernel-syms < 5.3.18-24.107.1 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-15&sp=2 suse kernel-syms < 5.3.18-24.107.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-15&sp=2 suse kernel-source < 5.3.18-24.107.1 sles-15 noarch
Affected pkg:rpm/suse/kernel-preempt?arch=x86_64&distro=sles-15&sp=2 suse kernel-preempt < 5.3.18-24.107.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-preempt?arch=aarch64&distro=sles-15&sp=2 suse kernel-preempt < 5.3.18-24.107.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-preempt-devel?arch=x86_64&distro=sles-15&sp=2 suse kernel-preempt-devel < 5.3.18-24.107.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-preempt-devel?arch=aarch64&distro=sles-15&sp=2 suse kernel-preempt-devel < 5.3.18-24.107.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-obs-build?arch=x86_64&distro=sles-15&sp=2 suse kernel-obs-build < 5.3.18-24.107.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-obs-build?arch=s390x&distro=sles-15&sp=2 suse kernel-obs-build < 5.3.18-24.107.1 sles-15 s390x
Affected pkg:rpm/suse/kernel-obs-build?arch=ppc64le&distro=sles-15&sp=2 suse kernel-obs-build < 5.3.18-24.107.1 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-obs-build?arch=aarch64&distro=sles-15&sp=2 suse kernel-obs-build < 5.3.18-24.107.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-15&sp=2 suse kernel-macros < 5.3.18-24.107.1 sles-15 noarch
Affected pkg:rpm/suse/kernel-docs?arch=noarch&distro=sles-15&sp=2 suse kernel-docs < 5.3.18-24.107.1 sles-15 noarch
Affected pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-15&sp=2 suse kernel-devel < 5.3.18-24.107.1 sles-15 noarch
Affected pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-15&sp=2 suse kernel-default < 5.3.18-24.107.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-default?arch=x86_64&distro=slem-5 suse kernel-default < 5.3.18-24.107.1 slem-5 x86_64
Affected pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-15&sp=2 suse kernel-default < 5.3.18-24.107.1 sles-15 s390x
Affected pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-15&sp=2 suse kernel-default < 5.3.18-24.107.1 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-15&sp=2 suse kernel-default < 5.3.18-24.107.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-default?arch=aarch64&distro=slem-5 suse kernel-default < 5.3.18-24.107.1 slem-5 aarch64
Affected pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-15&sp=2 suse kernel-default-devel < 5.3.18-24.107.1 sles-15 x86_64
Affected pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-15&sp=2 suse kernel-default-devel < 5.3.18-24.107.1 sles-15 s390x
Affected pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-15&sp=2 suse kernel-default-devel < 5.3.18-24.107.1 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-15&sp=2 suse kernel-default-devel < 5.3.18-24.107.1 sles-15 aarch64
Affected pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-15&sp=2 suse kernel-default-base < 5.3.18-24.107.1.9.50.2 sles-15 x86_64
Affected pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=slem-5 suse kernel-default-base < 5.3.18-24.107.1.9.50.2 slem-5 x86_64
Affected pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-15&sp=2 suse kernel-default-base < 5.3.18-24.107.1.9.50.2 sles-15 s390x
Affected pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-15&sp=2 suse kernel-default-base < 5.3.18-24.107.1.9.50.2 sles-15 ppc64le
Affected pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-15&sp=2 suse kernel-default-base < 5.3.18-24.107.1.9.50.2 sles-15 aarch64
Affected pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=slem-5 suse kernel-default-base < 5.3.18-24.107.1.9.50.2 slem-5 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...