{"affected":[{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"5.3.18-76.1","dlm-kmp-rt":"5.3.18-76.1","gfs2-kmp-rt":"5.3.18-76.1","kernel-devel-rt":"5.3.18-76.1","kernel-rt":"5.3.18-76.1","kernel-rt-devel":"5.3.18-76.1","kernel-rt_debug":"5.3.18-76.1","kernel-rt_debug-devel":"5.3.18-76.1","kernel-source-rt":"5.3.18-76.1","kernel-syms-rt":"5.3.18-76.1","ocfs2-kmp-rt":"5.3.18-76.1"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP2","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-76.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"5.3.18-76.1","dlm-kmp-rt":"5.3.18-76.1","gfs2-kmp-rt":"5.3.18-76.1","kernel-devel-rt":"5.3.18-76.1","kernel-rt":"5.3.18-76.1","kernel-rt-devel":"5.3.18-76.1","kernel-rt_debug":"5.3.18-76.1","kernel-rt_debug-devel":"5.3.18-76.1","kernel-source-rt":"5.3.18-76.1","kernel-syms-rt":"5.3.18-76.1","ocfs2-kmp-rt":"5.3.18-76.1"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP2","name":"kernel-rt_debug","purl":"pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Real%20Time%20Module%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-76.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"5.3.18-76.1","dlm-kmp-rt":"5.3.18-76.1","gfs2-kmp-rt":"5.3.18-76.1","kernel-devel-rt":"5.3.18-76.1","kernel-rt":"5.3.18-76.1","kernel-rt-devel":"5.3.18-76.1","kernel-rt_debug":"5.3.18-76.1","kernel-rt_debug-devel":"5.3.18-76.1","kernel-source-rt":"5.3.18-76.1","kernel-syms-rt":"5.3.18-76.1","ocfs2-kmp-rt":"5.3.18-76.1"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP2","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-76.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"5.3.18-76.1","dlm-kmp-rt":"5.3.18-76.1","gfs2-kmp-rt":"5.3.18-76.1","kernel-devel-rt":"5.3.18-76.1","kernel-rt":"5.3.18-76.1","kernel-rt-devel":"5.3.18-76.1","kernel-rt_debug":"5.3.18-76.1","kernel-rt_debug-devel":"5.3.18-76.1","kernel-source-rt":"5.3.18-76.1","kernel-syms-rt":"5.3.18-76.1","ocfs2-kmp-rt":"5.3.18-76.1"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP2","name":"kernel-syms-rt","purl":"pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-76.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.3.18-76.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.0","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-76.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n\nThe following non-security bugs were fixed:\n\n- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).\n- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).\n- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).\n- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).\n- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).\n- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).\n- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).\n","id":"SUSE-SU-2022:0764-1","modified":"2022-03-09T13:32:59Z","published":"2022-03-09T13:32:59Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20220764-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191580"},{"type":"REPORT","url":"https://bugzilla.suse.com/1192483"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195701"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195995"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196584"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-0001"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-0002"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-0847"}],"related":["CVE-2022-0001","CVE-2022-0002","CVE-2022-0847"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2022-0001","CVE-2022-0002","CVE-2022-0847"]}