[SUSE-SU-2022:2516-1] Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP3)
Severity
Important
CVEs
3
Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP3)
This update for the Linux Kernel 5.3.18-150300_59_76 fixes several issues.
The following security issues were fixed:
- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).
- CVE-2022-1116: Fixed an integer overflow in io_uring which may lead to local privilege escalation (bsc#1199647).
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- ID
- SUSE-SU-2022:2516-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2022/suse-su-20222516-1/
- Published
-
2022-07-21T15:37:24
(2 years ago) - Modified
-
2022-07-21T15:37:24
(2 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ASB-A-185125206
- DSA-5096-1
- openSUSE-SU-2022:1039-1
- openSUSE-SU-2022:2549-1
- SUSE-SU-2022:1038-1
- SUSE-SU-2022:1039-1
- SUSE-SU-2022:1163-1
- SUSE-SU-2022:1194-1
- SUSE-SU-2022:1197-1
- SUSE-SU-2022:1223-1
- SUSE-SU-2022:1224-1
- SUSE-SU-2022:1246-1
- SUSE-SU-2022:1257-1
- SUSE-SU-2022:1269-1
- SUSE-SU-2022:1573-1
- SUSE-SU-2022:1634-1
- SUSE-SU-2022:1989-1
- SUSE-SU-2022:2214-1
- SUSE-SU-2022:2216-1
- SUSE-SU-2022:2230-1
- SUSE-SU-2022:2237-1
- SUSE-SU-2022:2239-1
- SUSE-SU-2022:2245-1
- SUSE-SU-2022:2262-1
- SUSE-SU-2022:2268-1
- SUSE-SU-2022:2376-1
- SUSE-SU-2022:2377-1
- SUSE-SU-2022:2382-1
- SUSE-SU-2022:2393-1
- SUSE-SU-2022:2407-1
- SUSE-SU-2022:2411-1
- SUSE-SU-2022:2424-1
- SUSE-SU-2022:2424-2
- SUSE-SU-2022:2435-1
- SUSE-SU-2022:2438-1
- SUSE-SU-2022:2443-1
- SUSE-SU-2022:2444-1
- SUSE-SU-2022:2445-1
- SUSE-SU-2022:2446-1
- SUSE-SU-2022:2460-1
- SUSE-SU-2022:2461-1
- SUSE-SU-2022:2482-1
- SUSE-SU-2022:2515-1
- SUSE-SU-2022:2520-1
- SUSE-SU-2022:2549-1
- SUSE-SU-2022:2615-1
- SUSE-SU-2022:2629-1
- SUSE-SU-2022:2741-1
- SUSE-SU-2022:2761-1
- SUSE-SU-2022:2809-1
- SUSE-SU-2022:2875-1
- SUSE-SU-2022:2875-2
- SUSE-SU-2022:2892-1
- SUSE-SU-2022:2892-2
- SUSE-SU-2022:3072-1
- SUSE-SU-2022:3080-1
- SUSE-SU-2022:3088-1
- SUSE-SU-2022:3123-1
- SUSE-SU-2022:3411-1
- SUSE-SU-2022:3415-1
- SUSE-SU-2022:3465-1
- SUSE-SU-2022:3607-1
- SUSE-SU-2022:4036-1
- SUSE-SU-2022:4038-1
- SUSE-SU-2022:4542-1
- SUSE-SU-2024:0856-1
- SUSE-SU-2024:0857-1
- SUSE-SU-2024:0925-1
- SUSE-SU-2024:0926-1
- SUSE-SU-2024:0975-1
- SUSE-SU-2024:1321-1
- SUSE-SU-2024:2008-1
- SUSE-SU-2024:2010-1
- SUSE-SU-2024:2019-1
- SUSE-SU-2024:2183-1
- SUSE-SU-2024:2185-1
- SUSE-SU-2024:2189-1
- USN-5337-1
- USN-5368-1
- USN-5442-1
- USN-5442-2
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2516-1.json | |
Suse | URL for SUSE-SU-2022:2516-1 | https://www.suse.com/support/update/announcement/2022/suse-su-20222516-1/ | |
Suse | E-Mail link for SUSE-SU-2022:2516-1 | https://lists.suse.com/pipermail/sle-security-updates/2022-July/011614.html | |
Bugzilla | SUSE Bug 1196959 | https://bugzilla.suse.com/1196959 | |
Bugzilla | SUSE Bug 1199648 | https://bugzilla.suse.com/1199648 | |
Bugzilla | SUSE Bug 1200608 | https://bugzilla.suse.com/1200608 | |
CVE | SUSE CVE CVE-2021-39698 page | https://www.suse.com/security/cve/CVE-2021-39698/ | |
CVE | SUSE CVE CVE-2022-1116 page | https://www.suse.com/security/cve/CVE-2022-1116/ | |
CVE | SUSE CVE CVE-2022-20154 page | https://www.suse.com/security/cve/CVE-2022-20154/ |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |