SUSE Alert
2445Warning Date
Severity Level
Warning Number
Target Sector
2 February, 2022
● Critical
2022-4314
All
SUSE has released security updates to address several vulnerabilities in the following products:
- Linux Kernel (Live Patch 22 for SLE 15)
- SUSE Linux Enterprise Module for Live Patching 15
- SUSE Linux Enterprise Module for Live Patching 15-SP2
- Linux Kernel (Live Patch 11 for SLE 15 SP3)
- SUSE Linux Enterprise Module for Live Patching 15-SP3
- Linux Kernel (Live Patch 15 for SLE 12 SP5)
- SUSE Linux Enterprise Module for Live Patching 15-SP1
- SUSE Linux Enterprise Live Patching 12-SP5
- Linux Kernel (Live Patch 21 for SLE 12 SP5)
- SUSE Linux Enterprise Live Patching 12-SP5
- Linux Kernel (Live Patch 4 for SLE 15 SP3)
- SUSE Linux Enterprise Module for Live Patching 15-SP3
- Linux Kernel (Live Patch 7 for SLE 15 SP3)
- SUSE Linux Enterprise Module for Live Patching 15-SP3
- samba
- SUSE OpenStack Cloud Crowbar 9
- SUSE OpenStack Cloud Crowbar 8
- SUSE OpenStack Cloud 9
- SUSE OpenStack Cloud 8
- SUSE Linux Enterprise Server for SAP 12-SP4
- SUSE Linux Enterprise Server for SAP 12-SP3
- SUSE Linux Enterprise Server 12-SP4-LTSS
- SUSE Linux Enterprise Server 12-SP3-LTSS
- SUSE Linux Enterprise Server 12-SP3-BCL
- SUSE Linux Enterprise High Availability 12-SP4
- SUSE Linux Enterprise High Availability 12-SP3
- HPE Helion Openstack 8
- SUSE Linux Enterprise Module for Server Applications 15-SP3
- SUSE Linux Enterprise Module for Python2 15-SP3
- SUSE Linux Enterprise Module for Basesystem 15-SP3
- SUSE Linux Enterprise Micro 5.1
- SUSE Linux Enterprise High Availability 15-SP3
- SUSE Linux Enterprise Server for SAP 15-SP1
- SUSE Linux Enterprise Server 15-SP1-LTSS
- SUSE Linux Enterprise Server 15-SP1-BCL
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
- SUSE Linux Enterprise High Availability 15-SP1
- SUSE Enterprise Storage 6
- SUSE CaaS Platform 4.0
- SUSE:SLE-15-SP2:Update
- SUSE Linux Enterprise Module for Basesystem 15-SP4
- python-Django1
- SUSE OpenStack Cloud Crowbar 9
- SUSE OpenStack Cloud 9
- SUSE OpenStack Cloud Crowbar 8
- SUSE OpenStack Cloud 8
- HPE Helion Openstack 8
An attacker could exploit these vulnerabilities by doing the following:
- Privilege escalation
- Cross-site scripting (XSS) attack
- Denial of service attack (DoS)
- Information disclosure
- Arbitrary code execution
The CERT team encourages users to review SUSE security advisory and apply the necessary updates:
- https://www.suse.com/support/update/announcement/2022/suse-su-20220255-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220254-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220262-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220263-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220267-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220257-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220270-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220271-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220277-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220283-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220284-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220285-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220286-1/
- https://www.suse.com/support/update/announcement/2022/suse-su-20220287-1/