SUSE-SU-2022:1329-1: important: Security update for the Linux Kernel (Live Patch 28 for SLE 15)

sle-security-updates at sle-security-updates at
Mon Apr 25 19:44:07 UTC 2022

   SUSE Security Update: Security update for the Linux Kernel (Live Patch 28 for SLE 15)

Announcement ID:    SUSE-SU-2022:1329-1
Rating:             important
References:         #1197211 #1197335 #1197344 
Cross-References:   CVE-2021-39713 CVE-2022-1011 CVE-2022-1016
CVSS scores:
                    CVE-2021-39713 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-39713 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-1011 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-1011 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-1016 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Affected Products:
                    SUSE Linux Enterprise High Performance Computing 15
                    SUSE Linux Enterprise Live Patching 12-SP4
                    SUSE Linux Enterprise Module for Live Patching 15
                    SUSE Linux Enterprise Server 15
                    SUSE Linux Enterprise Server for SAP Applications 15

   An update that fixes three vulnerabilities is now available.


   This update for the Linux Kernel 4.12.14-150_86 fixes several issues.

   The following security issues were fixed:

   - CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the
     netfilter subsystem. This vulnerability gives an attacker a powerful
     primitive that can be used to both read from and write to relative stack
     data, which can lead to arbitrary code execution. (bsc#1197335)
   - CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a
     local attacker to retireve (partial) /etc/shadow hashes or any other
     data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
   - CVE-2021-39713: Fixed a race condition in the network scheduling
     subsystem which could lead to a use-after-free (bsc#1197211).

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Live Patching 15:

      zypper in -t patch SUSE-SLE-Module-Live-Patching-15-2022-1348=1 SUSE-SLE-Module-Live-Patching-15-2022-1349=1 SUSE-SLE-Module-Live-Patching-15-2022-1360=1 SUSE-SLE-Module-Live-Patching-15-2022-1370=1 SUSE-SLE-Module-Live-Patching-15-2022-1398=1

   - SUSE Linux Enterprise Live Patching 12-SP4:

      zypper in -t patch SUSE-SLE-Live-Patching-12-SP4-2022-1329=1 SUSE-SLE-Live-Patching-12-SP4-2022-1330=1 SUSE-SLE-Live-Patching-12-SP4-2022-1331=1

Package List:

   - SUSE Linux Enterprise Module for Live Patching 15 (ppc64le x86_64):


   - SUSE Linux Enterprise Live Patching 12-SP4 (ppc64le s390x x86_64):



More information about the sle-security-updates mailing list