[SUSE-SU-2022:2407-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
33
CVEs
15
Security update for the Linux Kernel
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).
- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)
- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).
- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).
- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).
- CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer handler in net/rose/rose_timer.c that allow attackers to crash the system without any privileges (bsc#1201251).
- CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762).
- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).
- CVE-2020-26541: Enforce the secure boot forbidden signature database (aka dbx) protection mechanism. (bsc#1177282)
The following non-security bugs were fixed:
- exec: Force single empty string when argv is empty (bsc#1200571).
- ID
- SUSE-SU-2022:2407-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2022/suse-su-20222407-1/
- Published
-
2022-07-15T09:51:14
(2 years ago) - Modified
-
2022-07-15T09:51:14
(2 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2021-1539
- ALAS-2022-1571
- ALAS-2022-1624
- ALAS-2022-1636
- ALAS2-2021-1712
- ALAS2-2022-1761
- ALAS2-2022-1825
- ALAS2-2022-1838
- ALAS2-2022-1852
- ALPINE:CVE-2022-26365
- ALPINE:CVE-2022-29900
- ALPINE:CVE-2022-33740
- ALPINE:CVE-2022-33741
- ALPINE:CVE-2022-33742
- ALSA-2021:2570
- ALSA-2022:1988
- ALSA-2022:7110
- ALSA-2022:8267
- ALSA-2023:2458
- ALSA-2023:2951
- DSA-5173-1
- DSA-5184-1
- DSA-5191-1
- DSA-5207-1
- ELSA-2020-5912
- ELSA-2020-5913
- ELSA-2021-2570
- ELSA-2022-1988
- ELSA-2022-7110
- ELSA-2022-7337
- ELSA-2022-8267
- ELSA-2022-9198
- ELSA-2022-9199
- ELSA-2022-9200
- ELSA-2022-9201
- ELSA-2022-9273
- ELSA-2022-9274
- ELSA-2022-9348
- ELSA-2022-9590
- ELSA-2022-9591
- ELSA-2022-9667
- ELSA-2022-9709
- ELSA-2022-9710
- ELSA-2023-12565
- ELSA-2023-12566
- ELSA-2023-2458
- ELSA-2023-2951
- ELSA-2024-12150
- ELSA-2024-12151
- ELSA-2024-12153
- ELSA-2024-12154
- ELSA-2024-12433
- FEDORA-2022-2c9f8224f8
- FEDORA-2022-3e6ce58029
- FEDORA-2022-8aab5b5cde
- FEDORA-2022-a0d7a5eaf2
- FEDORA-2022-c4ec706488
- FEDORA-2022-c69ef9c1dd
- GLSA-202402-07
- MS:CVE-2020-26541
- MS:CVE-2021-4157
- MS:CVE-2022-2318
- MS:CVE-2022-29900
- MS:CVE-2022-33981
- openSUSE-SU-2022:2173-1
- openSUSE-SU-2022:2177-1
- openSUSE-SU-2022:2549-1
- RHSA-2021:2570
- RHSA-2021:2599
- RHSA-2022:1975
- RHSA-2022:1988
- RHSA-2022:7110
- RHSA-2022:7134
- RHSA-2022:7337
- RHSA-2022:7338
- RHSA-2022:7933
- RHSA-2022:8267
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:2736
- RHSA-2023:2951
- RLSA-2021:2570
- RLSA-2022:1988
- RLSA-2022:7110
- SSA:2022-237-02
- SUSE-SU-2022:2104-1
- SUSE-SU-2022:2111-1
- SUSE-SU-2022:2172-1
- SUSE-SU-2022:2173-1
- SUSE-SU-2022:2177-1
- SUSE-SU-2022:2376-1
- SUSE-SU-2022:2377-1
- SUSE-SU-2022:2379-1
- SUSE-SU-2022:2382-1
- SUSE-SU-2022:2393-1
- SUSE-SU-2022:2411-1
- SUSE-SU-2022:2424-1
- SUSE-SU-2022:2424-2
- SUSE-SU-2022:2435-1
- SUSE-SU-2022:2438-1
- SUSE-SU-2022:2443-1
- SUSE-SU-2022:2444-1
- SUSE-SU-2022:2445-1
- SUSE-SU-2022:2446-1
- SUSE-SU-2022:2460-1
- SUSE-SU-2022:2461-1
- SUSE-SU-2022:2478-1
- SUSE-SU-2022:2482-1
- SUSE-SU-2022:2515-1
- SUSE-SU-2022:2516-1
- SUSE-SU-2022:2520-1
- SUSE-SU-2022:2549-1
- SUSE-SU-2022:2557-1
- SUSE-SU-2022:2560-1
- SUSE-SU-2022:2569-1
- SUSE-SU-2022:2574-1
- SUSE-SU-2022:2591-1
- SUSE-SU-2022:2597-1
- SUSE-SU-2022:2599-1
- SUSE-SU-2022:2599-2
- SUSE-SU-2022:2600-1
- SUSE-SU-2022:2601-1
- SUSE-SU-2022:2615-1
- SUSE-SU-2022:2629-1
- SUSE-SU-2022:2696-1
- SUSE-SU-2022:2697-1
- SUSE-SU-2022:2699-1
- SUSE-SU-2022:2700-1
- SUSE-SU-2022:2709-1
- SUSE-SU-2022:2710-1
- SUSE-SU-2022:2721-1
- SUSE-SU-2022:2723-1
- SUSE-SU-2022:2726-1
- SUSE-SU-2022:2727-1
- SUSE-SU-2022:2728-1
- SUSE-SU-2022:2732-1
- SUSE-SU-2022:2738-1
- SUSE-SU-2022:2741-1
- SUSE-SU-2022:2745-1
- SUSE-SU-2022:2750-1
- SUSE-SU-2022:2759-1
- SUSE-SU-2022:2762-1
- SUSE-SU-2022:2766-1
- SUSE-SU-2022:2770-1
- SUSE-SU-2022:2776-1
- SUSE-SU-2022:2779-1
- SUSE-SU-2022:2780-1
- SUSE-SU-2022:2781-1
- SUSE-SU-2022:2783-1
- SUSE-SU-2022:2789-1
- SUSE-SU-2022:2808-1
- SUSE-SU-2022:2809-1
- SUSE-SU-2022:2840-1
- SUSE-SU-2022:2854-1
- SUSE-SU-2022:2875-1
- SUSE-SU-2022:2875-2
- SUSE-SU-2022:2892-1
- SUSE-SU-2022:2892-2
- SUSE-SU-2022:3665-1
- SUSE-SU-2022:3728-1
- SUSE-SU-2022:3928-1
- SUSE-SU-2022:3998-1
- SUSE-SU-2022:4072-1
- SUSE-SU-2022:4561-1
- SUSE-SU-2022:4573-1
- SUSE-SU-2022:4611-1
- SUSE-SU-2022:4616-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0416-1
- SUSE-SU-2024:0856-1
- SUSE-SU-2024:0857-1
- SUSE-SU-2024:0925-1
- SUSE-SU-2024:0926-1
- SUSE-SU-2024:0975-1
- SUSE-SU-2024:1321-1
- SUSE-SU-2024:2010-1
- SUSE-SU-2024:2183-1
- SUSE-SU-2024:2185-1
- USN-5070-1
- USN-5106-1
- USN-5120-1
- USN-5210-1
- USN-5413-1
- USN-5500-1
- USN-5505-1
- USN-5513-1
- USN-5514-1
- USN-5517-1
- USN-5518-1
- USN-5529-1
- USN-5539-1
- USN-5540-1
- USN-5544-1
- USN-5560-1
- USN-5560-2
- USN-5562-1
- USN-5564-1
- USN-5565-1
- USN-5566-1
- USN-5572-1
- USN-5572-2
- USN-5579-1
- USN-5582-1
- USN-5623-1
- USN-5624-1
- USN-5633-1
- USN-5635-1
- USN-5640-1
- USN-5644-1
- USN-5648-1
- USN-5655-1
- USN-5668-1
- USN-5669-1
- USN-5669-2
- USN-5677-1
- USN-5678-1
- USN-5679-1
- USN-5682-1
- USN-5683-1
- USN-5684-1
- USN-5687-1
- USN-5693-1
- USN-5695-1
- USN-5706-1
- USN-5728-1
- USN-5728-2
- USN-5728-3
- USN-5773-1
- USN-5789-1
- USN-5854-1
- USN-5861-1
- USN-5862-1
- USN-5865-1
- USN-5883-1
- USN-5924-1
- USN-5975-1
- USN-6001-1
- USN-6007-1
- USN-6013-1
- USN-6014-1
- USN-6221-1
- VMSA-2022-0020.2
- XSA-403
- XSA-407
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=x86_64&distro=sles-15 | suse | reiserfs-kmp-default | < 4.12.14-150000.150.95.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=s390x&distro=sles-15 | suse | reiserfs-kmp-default | < 4.12.14-150000.150.95.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=ppc64le&distro=sles-15 | suse | reiserfs-kmp-default | < 4.12.14-150000.150.95.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/reiserfs-kmp-default?arch=aarch64&distro=sles-15 | suse | reiserfs-kmp-default | < 4.12.14-150000.150.95.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-vanilla-base?arch=x86_64&distro=sles-15 | suse | kernel-vanilla-base | < 4.12.14-150000.150.95.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-vanilla-base?arch=s390x&distro=sles-15 | suse | kernel-vanilla-base | < 4.12.14-150000.150.95.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-vanilla-base?arch=ppc64le&distro=sles-15 | suse | kernel-vanilla-base | < 4.12.14-150000.150.95.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-vanilla-base?arch=aarch64&distro=sles-15 | suse | kernel-vanilla-base | < 4.12.14-150000.150.95.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-15 | suse | kernel-syms | < 4.12.14-150000.150.95.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-15 | suse | kernel-syms | < 4.12.14-150000.150.95.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-15 | suse | kernel-syms | < 4.12.14-150000.150.95.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-15 | suse | kernel-syms | < 4.12.14-150000.150.95.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-15 | suse | kernel-source | < 4.12.14-150000.150.95.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=x86_64&distro=sles-15 | suse | kernel-obs-build | < 4.12.14-150000.150.95.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=s390x&distro=sles-15 | suse | kernel-obs-build | < 4.12.14-150000.150.95.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=ppc64le&distro=sles-15 | suse | kernel-obs-build | < 4.12.14-150000.150.95.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-obs-build?arch=aarch64&distro=sles-15 | suse | kernel-obs-build | < 4.12.14-150000.150.95.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-15 | suse | kernel-macros | < 4.12.14-150000.150.95.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-docs?arch=noarch&distro=sles-15 | suse | kernel-docs | < 4.12.14-150000.150.95.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-15 | suse | kernel-devel | < 4.12.14-150000.150.95.1 | sles-15 | noarch | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-15 | suse | kernel-default | < 4.12.14-150000.150.95.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-15 | suse | kernel-default | < 4.12.14-150000.150.95.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-15 | suse | kernel-default | < 4.12.14-150000.150.95.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-15 | suse | kernel-default | < 4.12.14-150000.150.95.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default-man?arch=s390x&distro=sles-15 | suse | kernel-default-man | < 4.12.14-150000.150.95.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-15 | suse | kernel-default-devel | < 4.12.14-150000.150.95.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-15 | suse | kernel-default-devel | < 4.12.14-150000.150.95.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-15 | suse | kernel-default-devel | < 4.12.14-150000.150.95.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-15 | suse | kernel-default-devel | < 4.12.14-150000.150.95.1 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-15 | suse | kernel-default-base | < 4.12.14-150000.150.95.1 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-15 | suse | kernel-default-base | < 4.12.14-150000.150.95.1 | sles-15 | s390x | |
Affected | pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-15 | suse | kernel-default-base | < 4.12.14-150000.150.95.1 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-15 | suse | kernel-default-base | < 4.12.14-150000.150.95.1 | sles-15 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |