Lucene search

K
suseSuseSUSE-SU-2022:2411-1
HistoryJul 15, 2022 - 12:00 a.m.

Security update for the Linux Kernel (important)

2022-07-1500:00:00
lists.opensuse.org
38

8 High

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.4 High

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:M/Au:S/C:C/I:C/A:C

An update that solves 14 vulnerabilities and has one errata
is now available.

Description:

The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various
security and bugfixes.

The following security bugs were fixed:

  • CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre
    like Branch Target Buffer attack, that can leak arbitrary kernel
    information (bsc#1199657).
  • CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in
    the way a user forces the ath9k_htc_wait_for_target function to fail
    with some input messages (bsc#1199487).
  • CVE-2022-20132: Fixed out of bounds read due to improper input
    validation in lg_probe and related functions of hid-lg.c (bsc#1200619).
  • CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)
  • CVE-2022-20141: Fixed a possible use after free due to improper locking
    in ip_check_mc_rcu() (bsc#1200604).
  • CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS
    subsystem, related to the replication of files with NFS. A user could
    potentially crash the system or escalate privileges on the system
    (bsc#1194013).
  • CVE-2022-20154: Fixed a use after free due to a race condition in
    lock_sock_nested of sock.c. This could lead to local escalation of
    privilege with System execution privileges needed (bsc#1200599).
  • CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer
    handler in net/rose/rose_timer.c that allow attackers to crash the
    system without any privileges (bsc#1201251).
  • CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed
    multiple potential data leaks with Block and Network devices when using
    untrusted backends (bsc#1200762).
  • CVE-2021-26341: Some AMD CPUs may transiently execute beyond
    unconditional direct branches, which may potentially result in data
    leakage (bsc#1201050).

The following non-security bugs were fixed:

  • exec: Force single empty string when argv is empty (bsc#1200571).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.4:

    zypper in -t patch openSUSE-SLE-15.4-2022-2411=1

  • openSUSE Leap 15.3:

    zypper in -t patch openSUSE-SLE-15.3-2022-2411=1

  • SUSE Linux Enterprise Server for SAP 15-SP1:

    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2411=1

  • SUSE Linux Enterprise Server 15-SP1-LTSS:

    zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2411=1

  • SUSE Linux Enterprise Server 15-SP1-BCL:

    zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2411=1

  • SUSE Linux Enterprise Module for Live Patching 15-SP1:

    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2022-2411=1

    Please note that this is the initial kernel livepatch without fixes
    itself, this livepatch package is later updated by seperate standalone
    livepatch updates. - SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:

    zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2411=1

  • SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:

    zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2411=1

  • SUSE Linux Enterprise High Availability 15-SP1:

    zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2022-2411=1

  • SUSE Enterprise Storage 6:

    zypper in -t patch SUSE-Storage-6-2022-2411=1

  • SUSE CaaS Platform 4.0:

    To install this update, use the SUSE CaaS Platform ‘skuba’ tool. It
    will inform you if it detects new updates and let you then trigger
    updating of the complete cluster in a controlled way.

Rows per page:
1-10 of 441

8 High

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.4 High

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:M/Au:S/C:C/I:C/A:C