[SUSE-SU-2022:2840-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
7
CVEs
14
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 SP3 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-15393: CVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).
- CVE-2020-36557: Fixed race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys that could lead to a use-after-free (bnc#1201429).
- CVE-2020-36558: Fixed race condition involving VT_RESIZEX that could lead to a NULL pointer dereference and general protection fault (bnc#1200910).
- CVE-2021-33655: Fixed out of bounds write with ioctl FBIOPUT_VSCREENINFO (bnc#1201635).
- CVE-2021-33656: Fixed out of bounds write with ioctl PIO_FONT (bnc#1201636).
- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free. (bnc#1196973)
- CVE-2022-1462: Fixed an out-of-bounds read flaw in the TeleTYpe subsystem (bnc#1198829).
- CVE-2022-20166: Fixed possible out of bounds write due to sprintf unsafety that could cause local escalation of privilege (bnc#1200598).
- CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer handler in net/rose/rose_timer.c that allow attackers to crash the system without any privileges (bsc#1201251).
- CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762).
- CVE-2022-36946: Fixed incorrect packet truncation in nfqnl_mangle() that could lead to remote DoS (bnc#1201940).
The following non-security bugs were fixed:
- kvm: emulate: do not adjust size of fastop and setcc subroutines (bsc#1201930).
- kvm: emulate: Fix SETcc emulation function offsets with SLS (bsc#1201930).
Package | Affected Version |
---|---|
pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12&sp=3 | < 4.4.180-94.171.1 |
pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12&sp=3 | < 4.4.180-94.171.1 |
pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12&sp=3 | < 4.4.180-94.171.1 |
pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12&sp=3 | < 4.4.180-94.171.1 |
pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12&sp=3 | < 4.4.180-94.171.1 |
pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12&sp=3 | < 4.4.180-94.171.1 |
pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12&sp=3 | < 4.4.180-94.171.1 |
- ID
- SUSE-SU-2022:2840-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2022/suse-su-20222840-1/
- Published
-
2022-08-18T07:51:29
(2 years ago) - Modified
-
2022-08-18T07:51:29
(2 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2022-1624
- ALAS-2022-1636
- ALAS2-2020-1480
- ALAS2-2022-1825
- ALAS2-2022-1833
- ALAS2-2022-1838
- ALAS2-2022-1852
- ALPINE:CVE-2022-26365
- ALPINE:CVE-2022-33740
- ALPINE:CVE-2022-33741
- ALPINE:CVE-2022-33742
- ALSA-2022:7683
- ALSA-2022:8267
- ALSA-2023:2458
- ALSA-2023:2951
- DSA-5096-1
- DSA-5191-1
- DSA-5207-1
- ELSA-2022-7683
- ELSA-2022-8267
- ELSA-2022-9761
- ELSA-2022-9969
- ELSA-2023-2458
- ELSA-2023-2951
- ELSA-2024-2004
- FEDORA-2022-2c9f8224f8
- FEDORA-2022-c4ec706488
- MS:CVE-2020-15393
- MS:CVE-2021-33655
- MS:CVE-2021-33656
- MS:CVE-2022-2318
- MS:CVE-2022-36946
- openSUSE-SU-2020:1062-1
- openSUSE-SU-2020:1153-1
- openSUSE-SU-2021:0242-1
- RHSA-2021:1578
- RHSA-2021:4140
- RHSA-2021:4356
- RHSA-2022:7444
- RHSA-2022:7683
- RHSA-2022:7933
- RHSA-2022:8267
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:2736
- RHSA-2023:2951
- RHSA-2024:2003
- RHSA-2024:2004
- RLSA-2022:7683
- SSA:2020-295-01
- SSA:2022-237-02
- SUSE-SU-2020:2027-1
- SUSE-SU-2020:2103-1
- SUSE-SU-2020:2105-1
- SUSE-SU-2020:2106-1
- SUSE-SU-2020:2107-1
- SUSE-SU-2020:2119-1
- SUSE-SU-2020:2121-1
- SUSE-SU-2020:2122-1
- SUSE-SU-2020:2478-1
- SUSE-SU-2020:2487-1
- SUSE-SU-2022:1196-1
- SUSE-SU-2022:1255-1
- SUSE-SU-2022:1256-1
- SUSE-SU-2022:1266-1
- SUSE-SU-2022:1267-1
- SUSE-SU-2022:1318-1
- SUSE-SU-2022:1320-1
- SUSE-SU-2022:1329-1
- SUSE-SU-2022:1402-1
- SUSE-SU-2022:1440-1
- SUSE-SU-2022:1486-1
- SUSE-SU-2022:1598-1
- SUSE-SU-2022:1641-1
- SUSE-SU-2022:2285-1
- SUSE-SU-2022:2377-1
- SUSE-SU-2022:2382-1
- SUSE-SU-2022:2393-1
- SUSE-SU-2022:2407-1
- SUSE-SU-2022:2411-1
- SUSE-SU-2022:2520-1
- SUSE-SU-2022:2615-1
- SUSE-SU-2022:2629-1
- SUSE-SU-2022:2719-1
- SUSE-SU-2022:2720-1
- SUSE-SU-2022:2721-1
- SUSE-SU-2022:2722-1
- SUSE-SU-2022:2723-1
- SUSE-SU-2022:2741-1
- SUSE-SU-2022:2803-1
- SUSE-SU-2022:2808-1
- SUSE-SU-2022:2809-1
- SUSE-SU-2022:2827-1
- SUSE-SU-2022:2875-1
- SUSE-SU-2022:2875-2
- SUSE-SU-2022:2892-1
- SUSE-SU-2022:2892-2
- SUSE-SU-2022:2910-1
- SUSE-SU-2022:3061-1
- SUSE-SU-2022:3072-1
- SUSE-SU-2022:3108-1
- SUSE-SU-2022:3123-1
- SUSE-SU-2022:3274-1
- SUSE-SU-2022:3288-1
- SUSE-SU-2022:3293-1
- SUSE-SU-2022:3450-1
- SUSE-SU-2022:3665-1
- SUSE-SU-2022:3728-1
- SUSE-SU-2022:3928-1
- SUSE-SU-2022:4024-1
- SUSE-SU-2022:4027-1
- SUSE-SU-2022:4033-1
- SUSE-SU-2022:4035-1
- SUSE-SU-2022:4100-1
- SUSE-SU-2022:4112-1
- SUSE-SU-2022:4113-1
- SUSE-SU-2022:4129-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0416-1
- USN-4463-1
- USN-4465-1
- USN-4483-1
- USN-4485-1
- USN-5413-1
- USN-5484-1
- USN-5572-1
- USN-5572-2
- USN-5577-1
- USN-5579-1
- USN-5580-1
- USN-5589-1
- USN-5590-1
- USN-5591-1
- USN-5591-2
- USN-5591-3
- USN-5591-4
- USN-5592-1
- USN-5595-1
- USN-5596-1
- USN-5597-1
- USN-5598-1
- USN-5600-1
- USN-5603-1
- USN-5605-1
- USN-5621-1
- USN-5622-1
- USN-5623-1
- USN-5624-1
- USN-5630-1
- USN-5633-1
- USN-5634-1
- USN-5635-1
- USN-5639-1
- USN-5640-1
- USN-5644-1
- USN-5647-1
- USN-5648-1
- USN-5650-1
- USN-5652-1
- USN-5654-1
- USN-5655-1
- USN-5660-1
- USN-5668-1
- USN-5669-1
- USN-5669-2
- USN-5677-1
- USN-5678-1
- USN-5679-1
- USN-5682-1
- USN-5683-1
- USN-5684-1
- USN-5687-1
- USN-5693-1
- USN-5695-1
- USN-5706-1
- USN-5773-1
- USN-5789-1
- USN-6001-1
- USN-6013-1
- USN-6014-1
- XSA-403
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12&sp=3 | suse | kernel-syms | < 4.4.180-94.171.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12&sp=3 | suse | kernel-source | < 4.4.180-94.171.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12&sp=3 | suse | kernel-macros | < 4.4.180-94.171.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12&sp=3 | suse | kernel-devel | < 4.4.180-94.171.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12&sp=3 | suse | kernel-default | < 4.4.180-94.171.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12&sp=3 | suse | kernel-default-devel | < 4.4.180-94.171.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12&sp=3 | suse | kernel-default-base | < 4.4.180-94.171.1 | sles-12 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |