[SUSE-SU-2022:3263-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
7
CVEs
11
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).
- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).
- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).
- CVE-2022-2991: Fixed an heap-based overflow in the lightnvm implemenation (bsc#1201420).
- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).
- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
- CVE-2022-21385: Fixed a flaw in net_rds_alloc_sgs() that allowed unprivileged local users to crash the machine (bnc#1202897).
- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).
- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bnc#1196616).
- CVE-2019-3900: Fixed infinite loop the vhost_net kernel module that could result in a DoS scenario (bnc#1133374).
The following non-security bugs were fixed:
- net_sched: cls_route: Disallowed handle of 0 (bsc#1202393).
- mm, rmap: Fixed anon_vma->degree ambiguity leading to double-reuse (bsc#1203098).
- lightnvm: Removed lightnvm implemenation (bsc#1191881).
Package | Affected Version |
---|---|
pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12&sp=3 | < 4.4.180-94.174.1 |
pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12&sp=3 | < 4.4.180-94.174.1 |
pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12&sp=3 | < 4.4.180-94.174.1 |
pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12&sp=3 | < 4.4.180-94.174.1 |
pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12&sp=3 | < 4.4.180-94.174.1 |
pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12&sp=3 | < 4.4.180-94.174.1 |
pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12&sp=3 | < 4.4.180-94.174.1 |
- ID
- SUSE-SU-2022:3263-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2022/suse-su-20223263-1/
- Published
-
2022-09-14T04:14:47
(2 years ago) - Modified
-
2022-09-14T04:14:47
(2 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2019-1232
- ALAS-2022-1577
- ALAS-2022-1636
- ALAS-2022-1645
- ALAS2-2019-1232
- ALAS2-2022-1768
- ALAS2-2022-1833
- ALAS2-2022-1838
- ALAS2-2022-1852
- ALAS2-2022-1888
- ALSA-2022:7110
- ALSA-2022:7683
- ALSA-2022:8267
- ALSA-2023:2458
- ALSA-2023:2951
- DSA-4497-1
- DSA-5207-1
- DSA-5257-1
- ELSA-2019-2029
- ELSA-2019-3517
- ELSA-2019-3836
- ELSA-2020-5845
- ELSA-2021-9459
- ELSA-2022-10065
- ELSA-2022-7110
- ELSA-2022-7337
- ELSA-2022-7683
- ELSA-2022-8267
- ELSA-2022-9260
- ELSA-2022-9273
- ELSA-2022-9274
- ELSA-2022-9313
- ELSA-2022-9314
- ELSA-2022-9689
- ELSA-2022-9690
- ELSA-2022-9691
- ELSA-2022-9692
- ELSA-2022-9693
- ELSA-2022-9694
- ELSA-2022-9699
- ELSA-2022-9709
- ELSA-2022-9710
- ELSA-2022-9726
- ELSA-2022-9727
- ELSA-2022-9728
- ELSA-2022-9729
- ELSA-2022-9730
- ELSA-2022-9731
- ELSA-2022-9761
- ELSA-2022-9787
- ELSA-2022-9788
- ELSA-2022-9827
- ELSA-2022-9828
- ELSA-2022-9829
- ELSA-2022-9830
- ELSA-2022-9852
- ELSA-2022-9870
- ELSA-2022-9871
- ELSA-2022-9926
- ELSA-2022-9927
- ELSA-2022-9930
- ELSA-2022-9931
- ELSA-2022-9998
- ELSA-2022-9999
- ELSA-2023-2458
- ELSA-2023-2951
- FEDORA-2019-021c968423
- FEDORA-2019-057d691fd4
- FEDORA-2019-124a241044
- FEDORA-2019-15e141c6a7
- FEDORA-2019-1689d3fe07
- FEDORA-2019-41e28660ae
- FEDORA-2019-48b34fc991
- FEDORA-2019-4c91a2f76e
- FEDORA-2019-5b76e711b3
- FEDORA-2019-640f8d8dd1
- FEDORA-2019-6817686c4d
- FEDORA-2019-69c132b061
- FEDORA-2019-6bda4c81f4
- FEDORA-2019-6c3d89b3d0
- FEDORA-2019-7a3fc17778
- FEDORA-2019-7aecfe1c4b
- FEDORA-2019-7ec378191e
- FEDORA-2019-8169b57f28
- FEDORA-2019-8219efa9f6
- FEDORA-2019-83858fc57b
- FEDORA-2019-87d807d7cb
- FEDORA-2019-8846a1a5a2
- FEDORA-2019-914542e05c
- FEDORA-2019-97380355ae
- FEDORA-2019-9d3fe6fd5b
- FEDORA-2019-a570a92d5a
- FEDORA-2019-a6cd583a8d
- FEDORA-2019-a95015e60f
- FEDORA-2019-b318b2c6f3
- FEDORA-2019-c03eda3cc6
- FEDORA-2019-c36afa818c
- FEDORA-2019-e3010166bd
- FEDORA-2019-e37c348348
- FEDORA-2019-e6bf55e821
- FEDORA-2019-f40bd7826f
- FEDORA-2020-2a5cdd665c
- FEDORA-2020-c2d89d14d0
- FEDORA-2020-fe00e12580
- FEDORA-2022-35c14ba5bb
- FEDORA-2022-484e226872
- FEDORA-2022-6835ddb6d8
- FEDORA-2022-9bbb1d9b7b
- FEDORA-2022-ccb0138bb6
- MS:CVE-2022-2991
- MS:CVE-2022-3028
- MS:CVE-2022-36879
- MS:CVE-2022-39188
- openSUSE-SU-2021:3876-1
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:3309
- RHSA-2019:3517
- RHSA-2019:3836
- RHSA-2022:7110
- RHSA-2022:7134
- RHSA-2022:7137
- RHSA-2022:7337
- RHSA-2022:7338
- RHSA-2022:7344
- RHSA-2022:7444
- RHSA-2022:7683
- RHSA-2022:7933
- RHSA-2022:8267
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:2736
- RHSA-2023:2951
- RLSA-2022:7110
- RLSA-2022:7683
- SSA:2019-311-01
- SSA:2022-237-02
- SSA:2022-333-01
- SUSE-SU-2021:3192-1
- SUSE-SU-2021:3206-1
- SUSE-SU-2021:3217-1
- SUSE-SU-2021:3876-1
- SUSE-SU-2021:3969-1
- SUSE-SU-2021:3972-1
- SUSE-SU-2022:2803-1
- SUSE-SU-2022:2875-1
- SUSE-SU-2022:2875-2
- SUSE-SU-2022:2892-1
- SUSE-SU-2022:2892-2
- SUSE-SU-2022:2910-1
- SUSE-SU-2022:3061-1
- SUSE-SU-2022:3064-1
- SUSE-SU-2022:3072-1
- SUSE-SU-2022:3088-1
- SUSE-SU-2022:3108-1
- SUSE-SU-2022:3123-1
- SUSE-SU-2022:3264-1
- SUSE-SU-2022:3265-1
- SUSE-SU-2022:3274-1
- SUSE-SU-2022:3282-1
- SUSE-SU-2022:3288-1
- SUSE-SU-2022:3291-1
- SUSE-SU-2022:3293-1
- SUSE-SU-2022:3294-1
- SUSE-SU-2022:3342-1
- SUSE-SU-2022:3346-1
- SUSE-SU-2022:3350-1
- SUSE-SU-2022:3359-1
- SUSE-SU-2022:3360-1
- SUSE-SU-2022:3362-1
- SUSE-SU-2022:3366-1
- SUSE-SU-2022:3368-1
- SUSE-SU-2022:3369-1
- SUSE-SU-2022:3370-1
- SUSE-SU-2022:3372-1
- SUSE-SU-2022:3373-1
- SUSE-SU-2022:3377-1
- SUSE-SU-2022:3379-1
- SUSE-SU-2022:3406-1
- SUSE-SU-2022:3407-1
- SUSE-SU-2022:3408-1
- SUSE-SU-2022:3409-1
- SUSE-SU-2022:3412-1
- SUSE-SU-2022:3415-1
- SUSE-SU-2022:3422-1
- SUSE-SU-2022:3424-1
- SUSE-SU-2022:3432-1
- SUSE-SU-2022:3433-1
- SUSE-SU-2022:3445-1
- SUSE-SU-2022:3450-1
- SUSE-SU-2022:3463-1
- SUSE-SU-2022:3464-1
- SUSE-SU-2022:3465-1
- SUSE-SU-2022:3476-1
- SUSE-SU-2022:3584-1
- SUSE-SU-2022:3586-1
- SUSE-SU-2022:3587-1
- SUSE-SU-2022:3609-1
- SUSE-SU-2022:3809-1
- SUSE-SU-2022:4024-1
- SUSE-SU-2022:4027-1
- SUSE-SU-2022:4030-1
- SUSE-SU-2022:4033-1
- SUSE-SU-2022:4034-1
- SUSE-SU-2022:4035-1
- SUSE-SU-2022:4039-1
- SUSE-SU-2022:4100-1
- SUSE-SU-2022:4112-1
- SUSE-SU-2022:4113-1
- SUSE-SU-2022:4129-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0416-1
- SUSE-SU-2023:0634-1
- SUSE-SU-2023:0768-1
- SUSE-SU-2023:0852-1
- SUSE-SU-2023:1971-1
- SUSE-SU-2023:1973-1
- SUSE-SU-2023:1983-1
- SUSE-SU-2023:2007-1
- SUSE-SU-2023:2023-1
- SUSE-SU-2024:2901-1
- SUSE-SU-2024:2929-1
- SUSE-SU-2024:2940-1
- USN-4114-1
- USN-4115-1
- USN-4116-1
- USN-4117-1
- USN-4118-1
- USN-5557-1
- USN-5560-1
- USN-5560-2
- USN-5562-1
- USN-5564-1
- USN-5565-1
- USN-5566-1
- USN-5567-1
- USN-5580-1
- USN-5582-1
- USN-5588-1
- USN-5650-1
- USN-5667-1
- USN-5668-1
- USN-5677-1
- USN-5682-1
- USN-5683-1
- USN-5693-1
- USN-5703-1
- USN-5706-1
- USN-5727-1
- USN-5727-2
- USN-5728-1
- USN-5728-2
- USN-5728-3
- USN-5729-1
- USN-5729-2
- USN-5774-1
- USN-5790-1
- USN-5791-1
- USN-5791-2
- USN-5791-3
- USN-5792-1
- USN-5792-2
- USN-5815-1
- USN-5854-1
- USN-5861-1
- USN-5862-1
- USN-5865-1
- USN-5877-1
- USN-5883-1
- USN-5913-1
- USN-5924-1
- USN-5975-1
- USN-6001-1
- USN-6007-1
- USN-6013-1
- USN-6014-1
- USN-6221-1
- VMSA-2022-0020.2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12&sp=3 | suse | kernel-syms | < 4.4.180-94.174.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12&sp=3 | suse | kernel-source | < 4.4.180-94.174.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12&sp=3 | suse | kernel-macros | < 4.4.180-94.174.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12&sp=3 | suse | kernel-devel | < 4.4.180-94.174.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12&sp=3 | suse | kernel-default | < 4.4.180-94.174.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12&sp=3 | suse | kernel-default-devel | < 4.4.180-94.174.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12&sp=3 | suse | kernel-default-base | < 4.4.180-94.174.1 | sles-12 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |