SUSE-SU-2022:1283-1

Source
https://www.suse.com/support/update/announcement/2022/suse-su-20221283-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2022:1283-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2022:1283-1
Related
Published
2022-04-20T10:59:42Z
Modified
2025-05-02T04:32:01.013419Z
Upstream
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
  • CVE-2022-1048: Fixed a race Condition in sndpcmhwfree leading to use-after-free due to the AB/BA lock with buffermutex and mmap_lock. (bsc#1197331)
  • CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)
  • CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)
  • CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device. (bsc#1196836)
  • CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
  • CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)

The following non-security bugs were fixed:

  • ax88179178a: Merge memcpy + le32tocpus to getunaligned_le32 (bsc#1196018).
  • llc: fix netdevice reference leaks in llcuibind() (git-fixes).
  • net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).
  • net: usb: ax88179_178a: fix packet alignment padding (bsc#1196018).
  • sched/autogroup: Fix possible Spectre-v1 indexing for (git-fixes)
  • sr9700: sanity check for packet length (bsc#1196836).
  • usb: host: xen-hcd: add missing unlock in error path (git-fixes).
  • xen/usb: do not use gnttabendforeignaccess() in xenhcdgnttab_done() (bsc#1196488, XSA-396).
References

Affected packages

SUSE:Linux Enterprise Server 12 SP2-BCL / kernel-default

Package

Name
kernel-default
Purl
pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.121-92.172.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.121-92.172.1",
            "kernel-devel": "4.4.121-92.172.1",
            "kernel-default-base": "4.4.121-92.172.1",
            "kernel-default": "4.4.121-92.172.1",
            "kernel-source": "4.4.121-92.172.1",
            "kernel-syms": "4.4.121-92.172.1",
            "kernel-default-devel": "4.4.121-92.172.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP2-BCL / kernel-source

Package

Name
kernel-source
Purl
pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.121-92.172.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.121-92.172.1",
            "kernel-devel": "4.4.121-92.172.1",
            "kernel-default-base": "4.4.121-92.172.1",
            "kernel-default": "4.4.121-92.172.1",
            "kernel-source": "4.4.121-92.172.1",
            "kernel-syms": "4.4.121-92.172.1",
            "kernel-default-devel": "4.4.121-92.172.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP2-BCL / kernel-syms

Package

Name
kernel-syms
Purl
pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.121-92.172.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.121-92.172.1",
            "kernel-devel": "4.4.121-92.172.1",
            "kernel-default-base": "4.4.121-92.172.1",
            "kernel-default": "4.4.121-92.172.1",
            "kernel-source": "4.4.121-92.172.1",
            "kernel-syms": "4.4.121-92.172.1",
            "kernel-default-devel": "4.4.121-92.172.1"
        }
    ]
}