SUSE-SU-2022:3263-1

Source
https://www.suse.com/support/update/announcement/2022/suse-su-20223263-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2022:3263-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2022:3263-1
Related
Published
2022-09-14T04:14:47Z
Modified
2025-05-02T04:30:15.707444Z
Upstream
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).
  • CVE-2022-36879: Fixed an issue in xfrmexpandpolicies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).
  • CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).
  • CVE-2022-2991: Fixed an heap-based overflow in the lightnvm implemenation (bsc#1201420).
  • CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).
  • CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
  • CVE-2022-21385: Fixed a flaw in netrdsalloc_sgs() that allowed unprivileged local users to crash the machine (bnc#1202897).
  • CVE-2022-20369: Fixed out of bounds write in v4l2m2mquerybuf of v4l2-mem2mem.c (bnc#1202347).
  • CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).
  • CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bnc#1196616).
  • CVE-2019-3900: Fixed infinite loop the vhost_net kernel module that could result in a DoS scenario (bnc#1133374).

The following non-security bugs were fixed:

  • netsched: clsroute: Disallowed handle of 0 (bsc#1202393).
  • mm, rmap: Fixed anon_vma->degree ambiguity leading to double-reuse (bsc#1203098).
  • lightnvm: Removed lightnvm implemenation (bsc#1191881).
References

Affected packages

SUSE:Linux Enterprise Server 12 SP3-BCL / kernel-default

Package

Name
kernel-default
Purl
pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCL

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.180-94.174.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.180-94.174.1",
            "kernel-devel": "4.4.180-94.174.1",
            "kernel-default-base": "4.4.180-94.174.1",
            "kernel-default": "4.4.180-94.174.1",
            "kernel-source": "4.4.180-94.174.1",
            "kernel-syms": "4.4.180-94.174.1",
            "kernel-default-devel": "4.4.180-94.174.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP3-BCL / kernel-source

Package

Name
kernel-source
Purl
pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCL

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.180-94.174.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.180-94.174.1",
            "kernel-devel": "4.4.180-94.174.1",
            "kernel-default-base": "4.4.180-94.174.1",
            "kernel-default": "4.4.180-94.174.1",
            "kernel-source": "4.4.180-94.174.1",
            "kernel-syms": "4.4.180-94.174.1",
            "kernel-default-devel": "4.4.180-94.174.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP3-BCL / kernel-syms

Package

Name
kernel-syms
Purl
pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCL

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.180-94.174.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.180-94.174.1",
            "kernel-devel": "4.4.180-94.174.1",
            "kernel-default-base": "4.4.180-94.174.1",
            "kernel-default": "4.4.180-94.174.1",
            "kernel-source": "4.4.180-94.174.1",
            "kernel-syms": "4.4.180-94.174.1",
            "kernel-default-devel": "4.4.180-94.174.1"
        }
    ]
}