[SUSE-SU-2022:2379-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
7
CVEs
9
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).
- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)
- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).
- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).
- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).
- CVE-2017-16525: Fixed a use-after-free after failed setup in usb/serial/console (bsc#1066618).
The following non-security bugs were fixed:
- exec: Force single empty string when argv is empty (bsc#1200571).
Package | Affected Version |
---|---|
pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12&sp=2 | < 4.4.121-92.178.1 |
pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12&sp=2 | < 4.4.121-92.178.1 |
pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12&sp=2 | < 4.4.121-92.178.1 |
pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12&sp=2 | < 4.4.121-92.178.1 |
pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12&sp=2 | < 4.4.121-92.178.1 |
pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12&sp=2 | < 4.4.121-92.178.1 |
pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12&sp=2 | < 4.4.121-92.178.1 |
- ID
- SUSE-SU-2022:2379-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2022/suse-su-20222379-1/
- Published
-
2022-07-13T08:36:03
(2 years ago) - Modified
-
2022-07-13T08:36:03
(2 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2021-1539
- ALAS-2022-1571
- ALAS-2022-1636
- ALAS2-2021-1712
- ALAS2-2022-1761
- ALAS2-2022-1838
- ALAS2-2022-1852
- ALPINE:CVE-2022-29900
- ALSA-2022:1988
- ALSA-2022:7110
- ALSA-2022:8267
- ALSA-2023:2458
- ALSA-2023:2951
- DSA-5173-1
- DSA-5184-1
- DSA-5207-1
- ELSA-2018-4001
- ELSA-2018-4040
- ELSA-2018-4041
- ELSA-2022-1988
- ELSA-2022-7110
- ELSA-2022-7337
- ELSA-2022-8267
- ELSA-2022-9198
- ELSA-2022-9199
- ELSA-2022-9200
- ELSA-2022-9201
- ELSA-2022-9273
- ELSA-2022-9274
- ELSA-2022-9348
- ELSA-2022-9590
- ELSA-2022-9591
- ELSA-2022-9667
- ELSA-2022-9709
- ELSA-2022-9710
- ELSA-2023-12565
- ELSA-2023-12566
- ELSA-2023-2458
- ELSA-2023-2951
- ELSA-2024-12150
- ELSA-2024-12151
- ELSA-2024-12153
- ELSA-2024-12154
- ELSA-2024-12433
- FEDORA-2022-3e6ce58029
- FEDORA-2022-8aab5b5cde
- FEDORA-2022-a0d7a5eaf2
- FEDORA-2022-c69ef9c1dd
- GLSA-202402-07
- MS:CVE-2021-4157
- MS:CVE-2022-29900
- MS:CVE-2022-33981
- openSUSE-SU-2022:2177-1
- openSUSE-SU-2022:2549-1
- RHSA-2022:1975
- RHSA-2022:1988
- RHSA-2022:7110
- RHSA-2022:7134
- RHSA-2022:7337
- RHSA-2022:7338
- RHSA-2022:7933
- RHSA-2022:8267
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:2736
- RHSA-2023:2951
- RLSA-2022:1988
- RLSA-2022:7110
- SSA:2022-237-02
- SUSE-SU-2017:3210-1
- SUSE-SU-2017:3249-1
- SUSE-SU-2017:3265-1
- SUSE-SU-2018:0040-1
- SUSE-SU-2018:0180-1
- SUSE-SU-2022:2172-1
- SUSE-SU-2022:2177-1
- SUSE-SU-2022:2376-1
- SUSE-SU-2022:2377-1
- SUSE-SU-2022:2382-1
- SUSE-SU-2022:2393-1
- SUSE-SU-2022:2407-1
- SUSE-SU-2022:2411-1
- SUSE-SU-2022:2424-1
- SUSE-SU-2022:2424-2
- SUSE-SU-2022:2478-1
- SUSE-SU-2022:2520-1
- SUSE-SU-2022:2549-1
- SUSE-SU-2022:2557-1
- SUSE-SU-2022:2560-1
- SUSE-SU-2022:2569-1
- SUSE-SU-2022:2574-1
- SUSE-SU-2022:2591-1
- SUSE-SU-2022:2597-1
- SUSE-SU-2022:2599-1
- SUSE-SU-2022:2599-2
- SUSE-SU-2022:2600-1
- SUSE-SU-2022:2601-1
- SUSE-SU-2022:2615-1
- SUSE-SU-2022:2629-1
- SUSE-SU-2022:2696-1
- SUSE-SU-2022:2697-1
- SUSE-SU-2022:2699-1
- SUSE-SU-2022:2700-1
- SUSE-SU-2022:2709-1
- SUSE-SU-2022:2710-1
- SUSE-SU-2022:2723-1
- SUSE-SU-2022:2726-1
- SUSE-SU-2022:2727-1
- SUSE-SU-2022:2728-1
- SUSE-SU-2022:2732-1
- SUSE-SU-2022:2738-1
- SUSE-SU-2022:2745-1
- SUSE-SU-2022:2750-1
- SUSE-SU-2022:2759-1
- SUSE-SU-2022:2762-1
- SUSE-SU-2022:2766-1
- SUSE-SU-2022:2770-1
- SUSE-SU-2022:2776-1
- SUSE-SU-2022:2779-1
- SUSE-SU-2022:2780-1
- SUSE-SU-2022:2781-1
- SUSE-SU-2022:2783-1
- SUSE-SU-2022:2789-1
- SUSE-SU-2022:2808-1
- SUSE-SU-2022:2809-1
- SUSE-SU-2022:2854-1
- SUSE-SU-2022:3998-1
- SUSE-SU-2022:4072-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0416-1
- SUSE-SU-2024:2010-1
- SUSE-SU-2024:2183-1
- SUSE-SU-2024:2185-1
- USN-3485-1
- USN-3485-2
- USN-3485-3
- USN-3487-1
- USN-3583-1
- USN-3583-2
- USN-5413-1
- USN-5500-1
- USN-5505-1
- USN-5513-1
- USN-5514-1
- USN-5517-1
- USN-5518-1
- USN-5529-1
- USN-5539-1
- USN-5540-1
- USN-5544-1
- USN-5560-1
- USN-5560-2
- USN-5562-1
- USN-5564-1
- USN-5565-1
- USN-5566-1
- USN-5582-1
- USN-5728-1
- USN-5728-2
- USN-5728-3
- USN-5854-1
- USN-5861-1
- USN-5862-1
- USN-5865-1
- USN-5883-1
- USN-5924-1
- USN-5975-1
- USN-6001-1
- USN-6007-1
- USN-6013-1
- USN-6014-1
- USN-6221-1
- VMSA-2022-0020.2
- XSA-407
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12&sp=2 | suse | kernel-syms | < 4.4.121-92.178.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12&sp=2 | suse | kernel-source | < 4.4.121-92.178.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12&sp=2 | suse | kernel-macros | < 4.4.121-92.178.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12&sp=2 | suse | kernel-devel | < 4.4.121-92.178.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12&sp=2 | suse | kernel-default | < 4.4.121-92.178.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12&sp=2 | suse | kernel-default-devel | < 4.4.121-92.178.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12&sp=2 | suse | kernel-default-base | < 4.4.121-92.178.1 | sles-12 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |