[SUSE-SU-2022:3599-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
7
CVEs
4
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 SP3 kernel was updated.
The following security bugs were fixed:
- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).
- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).
- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).
- CVE-2022-2503: Fixed a vulnerability that allowed root to bypass LoadPin and load untrusted and unverified kernel modules and firmware (bnc#1202677).
The following non-security bugs were fixed:
- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still be possible to do so that the mitigation can still be disabled on Intel who do not use the return thunks but IBRS.
Package | Affected Version |
---|---|
pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12&sp=3 | < 4.4.180-94.177.1 |
pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12&sp=3 | < 4.4.180-94.177.1 |
pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12&sp=3 | < 4.4.180-94.177.1 |
pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12&sp=3 | < 4.4.180-94.177.1 |
pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12&sp=3 | < 4.4.180-94.177.1 |
pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12&sp=3 | < 4.4.180-94.177.1 |
pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12&sp=3 | < 4.4.180-94.177.1 |
- ID
- SUSE-SU-2022:3599-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2022/suse-su-20223599-1/
- Published
-
2022-10-17T11:21:21
(23 months ago) - Modified
-
2022-10-17T11:21:21
(23 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALSA-2023:2951
- DSA-5257-1
- DSA-5324-1
- ELSA-2022-9852
- ELSA-2022-9969
- ELSA-2022-9996
- ELSA-2022-9997
- ELSA-2023-12117
- ELSA-2023-12118
- ELSA-2023-12196
- ELSA-2023-12199
- ELSA-2023-12200
- ELSA-2023-12206
- ELSA-2023-12207
- ELSA-2023-12688
- ELSA-2023-2951
- MS:CVE-2022-2503
- MS:CVE-2022-3303
- MS:CVE-2022-41218
- RHSA-2022:7933
- RHSA-2022:8267
- RHSA-2023:2736
- RHSA-2023:2951
- SSA:2022-237-02
- SSA:2022-333-01
- SSA:2023-048-01
- SUSE-SU-2022:3584-1
- SUSE-SU-2022:3585-1
- SUSE-SU-2022:3586-1
- SUSE-SU-2022:3587-1
- SUSE-SU-2022:3609-1
- SUSE-SU-2022:3688-1
- SUSE-SU-2022:3693-1
- SUSE-SU-2022:3704-1
- SUSE-SU-2022:3775-1
- SUSE-SU-2022:3779-1
- SUSE-SU-2022:3809-1
- SUSE-SU-2022:3810-1
- SUSE-SU-2022:3844-1
- SUSE-SU-2022:4506-1
- SUSE-SU-2022:4513-1
- SUSE-SU-2022:4516-1
- SUSE-SU-2022:4518-1
- SUSE-SU-2022:4520-1
- SUSE-SU-2022:4527-1
- SUSE-SU-2022:4528-1
- SUSE-SU-2022:4533-1
- SUSE-SU-2022:4534-1
- SUSE-SU-2022:4543-1
- SUSE-SU-2022:4544-1
- SUSE-SU-2022:4545-1
- SUSE-SU-2022:4550-1
- SUSE-SU-2022:4551-1
- SUSE-SU-2022:4559-1
- SUSE-SU-2022:4562-1
- SUSE-SU-2022:4569-1
- SUSE-SU-2022:4577-1
- SUSE-SU-2022:4580-1
- SUSE-SU-2022:4587-1
- SUSE-SU-2022:4595-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0416-1
- USN-5594-1
- USN-5599-1
- USN-5602-1
- USN-5616-1
- USN-5622-1
- USN-5623-1
- USN-5630-1
- USN-5639-1
- USN-5647-1
- USN-5654-1
- USN-5660-1
- USN-5757-1
- USN-5757-2
- USN-5758-1
- USN-5774-1
- USN-5791-1
- USN-5791-2
- USN-5791-3
- USN-5792-1
- USN-5792-2
- USN-5793-1
- USN-5793-2
- USN-5793-3
- USN-5793-4
- USN-5815-1
- USN-5877-1
- USN-5915-1
- USN-5917-1
- USN-5924-1
- USN-5927-1
- USN-5934-1
- USN-5939-1
- USN-5940-1
- USN-5951-1
- USN-5975-1
- USN-5981-1
- USN-5982-1
- USN-5984-1
- USN-5987-1
- USN-5991-1
- USN-6000-1
- USN-6001-1
- USN-6004-1
- USN-6009-1
- USN-6013-1
- USN-6014-1
- USN-6024-1
- USN-6030-1
- USN-6071-1
- USN-6252-1
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3599-1.json | |
Suse | URL for SUSE-SU-2022:3599-1 | https://www.suse.com/support/update/announcement/2022/suse-su-20223599-1/ | |
Suse | E-Mail link for SUSE-SU-2022:3599-1 | https://lists.suse.com/pipermail/sle-security-updates/2022-October/012549.html | |
Bugzilla | SUSE Bug 1202677 | https://bugzilla.suse.com/1202677 | |
Bugzilla | SUSE Bug 1202960 | https://bugzilla.suse.com/1202960 | |
Bugzilla | SUSE Bug 1203552 | https://bugzilla.suse.com/1203552 | |
Bugzilla | SUSE Bug 1203769 | https://bugzilla.suse.com/1203769 | |
CVE | SUSE CVE CVE-2022-2503 page | https://www.suse.com/security/cve/CVE-2022-2503/ | |
CVE | SUSE CVE CVE-2022-3239 page | https://www.suse.com/security/cve/CVE-2022-3239/ | |
CVE | SUSE CVE CVE-2022-3303 page | https://www.suse.com/security/cve/CVE-2022-3303/ | |
CVE | SUSE CVE CVE-2022-41218 page | https://www.suse.com/security/cve/CVE-2022-41218/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12&sp=3 | suse | kernel-syms | < 4.4.180-94.177.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12&sp=3 | suse | kernel-source | < 4.4.180-94.177.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12&sp=3 | suse | kernel-macros | < 4.4.180-94.177.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12&sp=3 | suse | kernel-devel | < 4.4.180-94.177.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12&sp=3 | suse | kernel-default | < 4.4.180-94.177.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12&sp=3 | suse | kernel-default-devel | < 4.4.180-94.177.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12&sp=3 | suse | kernel-default-base | < 4.4.180-94.177.1 | sles-12 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |