[SUSE-SU-2022:1267-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
20
CVEs
20
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 SP4 kernel was updated.
The following security bugs were fixed:
- CVE-2022-0812: Fixed an incorrect header size calculations which could lead to a memory leak. (bsc#1196639)
- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free. (bnc#1196973)
- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)
- CVE-2022-28356: Fixed a refcount bug in llc_ui_bind and llc_ui_autobind which could allow an unprivileged user to execute a DoS. (bnc#1197391)
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel. (bnc#1198032)
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel. (bnc#1198031)
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device. (bsc#1196836)
- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)
The following non-security bugs were fixed:
- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).
- genirq: Use rcu in kstat_irqs_usr() (bsc#1193738).
- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).
- net: usb: ax88179_178a: fix packet alignment padding (bsc#1196018).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- sr9700: sanity check for packet length (bsc#1196836).
- tcp: add some entropy in __inet_hash_connect() (bsc#1180153).
- tcp: change source port randomizarion at connect() time (bsc#1180153).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- x86/tsc: Make calibration refinement more robust (bsc#1196573).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
- ID
- SUSE-SU-2022:1267-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2022/suse-su-20221267-1/
- Published
-
2022-04-19T13:29:43
(2 years ago) - Modified
-
2022-04-19T13:29:43
(2 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2022-1577
- ALAS-2022-1581
- ALAS-2022-1591
- ALAS-2022-1604
- ALAS2-2022-1768
- ALAS2-2022-1774
- ALAS2-2022-1793
- ALAS2-2022-1813
- ALSA-2022:5249
- ALSA-2022:5316
- ALSA-2022:7683
- ALSA-2022:8267
- ALSA-2023:2458
- ALSA-2023:7077
- DSA-5096-1
- DSA-5127-1
- DSA-5173-1
- ELSA-2022-5249
- ELSA-2022-5316
- ELSA-2022-7683
- ELSA-2022-8267
- ELSA-2022-9260
- ELSA-2022-9266
- ELSA-2022-9267
- ELSA-2022-9270
- ELSA-2022-9271
- ELSA-2022-9273
- ELSA-2022-9274
- ELSA-2022-9313
- ELSA-2022-9314
- ELSA-2022-9348
- ELSA-2022-9365
- ELSA-2022-9366
- ELSA-2022-9367
- ELSA-2022-9368
- ELSA-2022-9477
- ELSA-2022-9478
- ELSA-2022-9479
- ELSA-2022-9480
- ELSA-2022-9533
- ELSA-2022-9534
- ELSA-2022-9557
- ELSA-2022-9852
- ELSA-2023-2458
- ELSA-2023-7077
- FEDORA-2022-5cd9d787dc
- FEDORA-2022-8e3ac65667
- FEDORA-2022-91633399ff
- FEDORA-2022-9342e59a98
- FEDORA-2022-af492757d9
- FEDORA-2022-de4474b89d
- FEDORA-2022-eb323bcd80
- MS:CVE-2021-45868
- MS:CVE-2022-0850
- MS:CVE-2022-1016
- MS:CVE-2022-1048
- MS:CVE-2022-26490
- MS:CVE-2022-26966
- MS:CVE-2022-27666
- MS:CVE-2022-28356
- MS:CVE-2022-28388
- MS:CVE-2022-28389
- MS:CVE-2022-28390
- openSUSE-SU-2022:1037-1
- openSUSE-SU-2022:1039-1
- RHSA-2022:1975
- RHSA-2022:1988
- RHSA-2022:5214
- RHSA-2022:5219
- RHSA-2022:5249
- RHSA-2022:5267
- RHSA-2022:5316
- RHSA-2022:5344
- RHSA-2022:7444
- RHSA-2022:7683
- RHSA-2022:7933
- RHSA-2022:8267
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:6901
- RHSA-2023:7077
- RLSA-2022:5316
- RLSA-2022:7683
- SSA:2022-129-01
- SUSE-SU-2022:1037-1
- SUSE-SU-2022:1038-1
- SUSE-SU-2022:1039-1
- SUSE-SU-2022:1163-1
- SUSE-SU-2022:1172-1
- SUSE-SU-2022:1182-1
- SUSE-SU-2022:1183-1
- SUSE-SU-2022:1189-1
- SUSE-SU-2022:1192-1
- SUSE-SU-2022:1193-1
- SUSE-SU-2022:1194-1
- SUSE-SU-2022:1196-1
- SUSE-SU-2022:1197-1
- SUSE-SU-2022:1212-1
- SUSE-SU-2022:1215-1
- SUSE-SU-2022:1223-1
- SUSE-SU-2022:1224-1
- SUSE-SU-2022:1230-1
- SUSE-SU-2022:1242-1
- SUSE-SU-2022:1246-1
- SUSE-SU-2022:1248-1
- SUSE-SU-2022:1255-1
- SUSE-SU-2022:1256-1
- SUSE-SU-2022:1257-1
- SUSE-SU-2022:1261-1
- SUSE-SU-2022:1266-1
- SUSE-SU-2022:1268-1
- SUSE-SU-2022:1269-1
- SUSE-SU-2022:1270-1
- SUSE-SU-2022:1278-1
- SUSE-SU-2022:1283-1
- SUSE-SU-2022:1303-1
- SUSE-SU-2022:1318-1
- SUSE-SU-2022:1320-1
- SUSE-SU-2022:1322-1
- SUSE-SU-2022:1326-1
- SUSE-SU-2022:1329-1
- SUSE-SU-2022:1335-1
- SUSE-SU-2022:1369-1
- SUSE-SU-2022:1402-1
- SUSE-SU-2022:1407-1
- SUSE-SU-2022:1440-1
- SUSE-SU-2022:1453-1
- SUSE-SU-2022:1486-1
- SUSE-SU-2022:1598-1
- SUSE-SU-2022:1641-1
- SUSE-SU-2022:1668-1
- SUSE-SU-2022:1669-1
- SUSE-SU-2022:1676-1
- SUSE-SU-2022:1686-1
- SUSE-SU-2022:1687-1
- SUSE-SU-2022:1939-1
- SUSE-SU-2022:1942-1
- SUSE-SU-2022:1945-1
- SUSE-SU-2022:1947-1
- SUSE-SU-2022:1948-1
- SUSE-SU-2022:1955-1
- SUSE-SU-2022:1974-1
- SUSE-SU-2022:2000-1
- SUSE-SU-2022:2006-1
- SUSE-SU-2022:2077-1
- SUSE-SU-2022:2082-1
- SUSE-SU-2022:2268-1
- SUSE-SU-2022:2285-1
- SUSE-SU-2022:2520-1
- SUSE-SU-2022:2615-1
- SUSE-SU-2022:2699-1
- SUSE-SU-2022:2700-1
- SUSE-SU-2022:2709-1
- SUSE-SU-2022:2721-1
- SUSE-SU-2022:2726-1
- SUSE-SU-2022:2727-1
- SUSE-SU-2022:2728-1
- SUSE-SU-2022:2738-1
- SUSE-SU-2022:2745-1
- SUSE-SU-2022:2766-1
- SUSE-SU-2022:2770-1
- SUSE-SU-2022:2776-1
- SUSE-SU-2022:2780-1
- SUSE-SU-2022:2783-1
- SUSE-SU-2022:2789-1
- SUSE-SU-2022:2840-1
- SUSE-SU-2022:2854-1
- SUSE-SU-2022:3288-1
- SUSE-SU-2022:3293-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0416-1
- USN-5353-1
- USN-5357-1
- USN-5357-2
- USN-5358-1
- USN-5358-2
- USN-5368-1
- USN-5377-1
- USN-5381-1
- USN-5383-1
- USN-5390-1
- USN-5390-2
- USN-5413-1
- USN-5415-1
- USN-5416-1
- USN-5417-1
- USN-5418-1
- USN-5466-1
- USN-5467-1
- USN-5468-1
- USN-5469-1
- USN-5484-1
- USN-5493-1
- USN-5493-2
- USN-5500-1
- USN-5505-1
- USN-5513-1
- USN-5515-1
- USN-5539-1
- USN-5541-1
- USN-5560-1
- USN-5560-2
- USN-5562-1
- USN-5582-1
- USN-5650-1
- USN-5669-1
- USN-5669-2
- USN-5678-1
- USN-5679-1
- USN-5684-1
- USN-5687-1
- USN-5695-1
- USN-5856-1
- USN-6001-1
- USN-6013-1
- USN-6014-1
- XSA-396
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12&sp=4 | suse | kernel-syms | < 4.12.14-95.96.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-12&sp=4 | suse | kernel-syms | < 4.12.14-95.96.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-12&sp=4 | suse | kernel-syms | < 4.12.14-95.96.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-12&sp=4 | suse | kernel-syms | < 4.12.14-95.96.1 | sles-12 | aarch64 | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12&sp=4 | suse | kernel-source | < 4.12.14-95.96.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12&sp=4 | suse | kernel-macros | < 4.12.14-95.96.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12&sp=4 | suse | kernel-devel | < 4.12.14-95.96.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12&sp=4 | suse | kernel-default | < 4.12.14-95.96.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-12&sp=4 | suse | kernel-default | < 4.12.14-95.96.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-12&sp=4 | suse | kernel-default | < 4.12.14-95.96.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-12&sp=4 | suse | kernel-default | < 4.12.14-95.96.1 | sles-12 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default-man?arch=s390x&distro=sles-12&sp=4 | suse | kernel-default-man | < 4.12.14-95.96.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12&sp=4 | suse | kernel-default-devel | < 4.12.14-95.96.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-12&sp=4 | suse | kernel-default-devel | < 4.12.14-95.96.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-12&sp=4 | suse | kernel-default-devel | < 4.12.14-95.96.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-12&sp=4 | suse | kernel-default-devel | < 4.12.14-95.96.1 | sles-12 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12&sp=4 | suse | kernel-default-base | < 4.12.14-95.96.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-12&sp=4 | suse | kernel-default-base | < 4.12.14-95.96.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-12&sp=4 | suse | kernel-default-base | < 4.12.14-95.96.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-12&sp=4 | suse | kernel-default-base | < 4.12.14-95.96.1 | sles-12 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |