<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP1)</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2022:2710-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2022-08-09T10:34:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2022-08-09T10:34:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2022-08-09T10:34:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP1)</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for the Linux Kernel 4.12.14-150100_197_111 fixes several issues.

The following security issues were fixed:

- CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2022-2710,SUSE-SLE-Live-Patching-12-SP4-2022-2715,SUSE-SLE-Module-Live-Patching-15-SP1-2022-2710</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20222710-1/</URL>
      <Description>Link for SUSE-SU-2022:2710-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2022-August/024349.html</URL>
      <Description>E-Mail link for SUSE-SU-2022:2710-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1200605</URL>
      <Description>SUSE Bug 1200605</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201080</URL>
      <Description>SUSE Bug 1201080</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201655</URL>
      <Description>SUSE Bug 1201655</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1419/</URL>
      <Description>SUSE CVE CVE-2022-1419 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1679/</URL>
      <Description>SUSE CVE CVE-2022-1679 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-20141/</URL>
      <Description>SUSE CVE CVE-2022-20141 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 12 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 12 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP4" CPE="cpe:/o:suse:sle-live-patching:12:sp4">SUSE Linux Enterprise Live Patching 12 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 15 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 15 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP1" CPE="cpe:/o:suse:sle-module-live-patching:15:sp1">SUSE Linux Enterprise Live Patching 15 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-livepatch-4_12_14-150100_197_111-default-6-150100.2.2">
      <FullProductName ProductID="kernel-livepatch-4_12_14-150100_197_111-default-6-150100.2.2">kernel-livepatch-4_12_14-150100_197_111-default-6-150100.2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-4_12_14-95_96-default-6-2.2">
      <FullProductName ProductID="kgraft-patch-4_12_14-95_96-default-6-2.2">kgraft-patch-4_12_14-95_96-default-6-2.2</FullProductName>
    </Branch>
    <Relationship ProductReference="kgraft-patch-4_12_14-95_96-default-6-2.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-6-2.2">kgraft-patch-4_12_14-95_96-default-6-2.2 as a component of SUSE Linux Enterprise Live Patching 12 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-livepatch-4_12_14-150100_197_111-default-6-150100.2.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-6-150100.2.2">kernel-livepatch-4_12_14-150100_197_111-default-6-150100.2.2 as a component of SUSE Linux Enterprise Live Patching 15 SP1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The root cause of this vulnerability is that the ioctl$DRM_IOCTL_MODE_DESTROY_DUMB can decrease refcount of *drm_vgem_gem_object *(created in *vgem_gem_dumb_create*) concurrently, and *vgem_gem_dumb_create *will access the freed drm_vgem_gem_object.</Note>
    </Notes>
    <CVE>CVE-2022-1419</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-6-2.2</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-6-150100.2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20222710-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1419.html</URL>
        <Description>CVE-2022-1419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1198742</URL>
        <Description>SUSE Bug 1198742</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201655</URL>
        <Description>SUSE Bug 1201655</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203034</URL>
        <Description>SUSE Bug 1203034</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free flaw was found in the Linux kernel's Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.</Note>
    </Notes>
    <CVE>CVE-2022-1679</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-6-2.2</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-6-150100.2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20222710-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1679.html</URL>
        <Description>CVE-2022-1679</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199487</URL>
        <Description>SUSE Bug 1199487</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201080</URL>
        <Description>SUSE Bug 1201080</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201832</URL>
        <Description>SUSE Bug 1201832</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1204132</URL>
        <Description>SUSE Bug 1204132</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1212316</URL>
        <Description>SUSE Bug 1212316</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel</Note>
    </Notes>
    <CVE>CVE-2022-20141</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_96-default-6-2.2</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_111-default-6-150100.2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20222710-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-20141.html</URL>
        <Description>CVE-2022-20141</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200604</URL>
        <Description>SUSE Bug 1200604</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200605</URL>
        <Description>SUSE Bug 1200605</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203034</URL>
        <Description>SUSE Bug 1203034</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
