SUSE-SU-2022:3587-1: important: Security update for the Linux Kernel
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Fri Oct 14 13:32:07 UTC 2022
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3587-1
Rating: important
References: #1124235 #1129770 #1154048 #1190317 #1199564
#1201309 #1202097 #1202385 #1202677 #1202960
#1203098 #1203107 #1203410 #1203424 #1203462
#1203552 #1203769 #1203935 #1203987
Cross-References: CVE-2022-20008 CVE-2022-2503 CVE-2022-2663
CVE-2022-3239 CVE-2022-3303 CVE-2022-39188
CVE-2022-41218 CVE-2022-41848
CVSS scores:
CVE-2022-20008 (NVD) : 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2022-20008 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2022-2503 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2022-2503 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2022-2663 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2022-2663 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2022-3239 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3239 (SUSE): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3303 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3303 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2022-39188 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-39188 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-41218 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-41218 (SUSE): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-41848 (NVD) : 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-41848 (SUSE): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE Linux Enterprise Desktop 12-SP5
SUSE Linux Enterprise High Availability 12-SP5
SUSE Linux Enterprise High Performance Computing 12-SP5
SUSE Linux Enterprise Live Patching 12-SP5
SUSE Linux Enterprise Server 12-SP5
SUSE Linux Enterprise Server for SAP Applications 12-SP5
SUSE Linux Enterprise Software Development Kit 12-SP5
SUSE Linux Enterprise Workstation Extension 12-SP5
______________________________________________________________________________
An update that solves 8 vulnerabilities and has 11 fixes is
now available.
Description:
The SUSE Linux Enterprise 12 SP5 kernel was updated.
The following security bugs were fixed:
- CVE-2022-3303: Fixed a race condition in the sound subsystem due to
improper locking (bnc#1203769).
- CVE-2022-41218: Fixed an use-after-free caused by refcount races in
drivers/media/dvb-core/dmxdev.c (bnc#1202960).
- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that
could lead a local user to able to crash the system or escalate their
privileges (bnc#1203552).
- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a
physically proximate attacker removes a PCMCIA device while calling
ioctl (bnc#1203987).
- CVE-2022-2503: Fixed a vulnerability that allowed root to bypass LoadPin
and load untrusted and unverified kernel modules and firmware
(bnc#1202677).
- CVE-2022-20008: Fixed a bug which allowed to read kernel heap memory due
to uninitialized data. This could lead to local information disclosure
if reading from an SD card that triggers errors, with no additional
execution privileges needed. (bnc#1199564)
- CVE-2022-2663: Fixed an issue which allowed a firewall to be bypassed
when users are using unencrypted IRC with nf_conntrack_irc configured
(bnc#1202097).
- CVE-2022-39188: Fixed a race condition where a device driver can free a
page while it still has stale TLB entries. (bnc#1203107).
The following non-security bugs were fixed:
- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1
(git-fixes)
- cifs: alloc_mid function should be marked as static (bsc#1190317).
- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is
empty (bsc#1190317).
- cifs: change smb2_query_info_compound to use a cached fid, if available
(bsc#1190317).
- cifs: check for smb1 in open_cached_dir() (bsc#1190317).
- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1190317).
- cifs: clean up an inconsistent indenting (bsc#1190317).
- cifs: convert the path to utf16 in smb2_query_info_compound
(bsc#1190317).
- cifs: Do not use tcon->cfid directly, use the cfid we get from
open_cached_dir (bsc#1190317).
- cifs: do not use uninitialized data in the owner/group sid (bsc#1190317).
- cifs: fix double free race when mount fails in cifs_get_root()
(bsc#1190317).
- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1190317).
- cifs: fix handlecache and multiuser (bsc#1190317).
- cifs: fix lock length calculation (bsc#1190317).
- cifs: fix ntlmssp auth when there is no key exchange (bsc#1190317).
- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1190317).
- cifs: fix NULL ptr dereference in smb2_ioctl_query_info() (bsc#1190317).
- cifs: fix set of group SID via NTSD xattrs (bsc#1190317).
- cifs: fix signed integer overflow when fl_end is OFFSET_MAX
(bsc#1190317).
- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1190317).
- cifs: fix the cifs_reconnect path for DFS (bsc#1190317).
- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share
(bsc#1190317).
- cifs: mark sessions for reconnection in helper function (bsc#1190317).
- cifs: modefromsids must add an ACE for authenticated users (bsc#1190317).
- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1190317).
- cifs: move from strlcpy with unused retval to strscpy (bsc#1190317).
- cifs: move superblock magic defitions to magic.h (bsc#1190317).
- cifs: potential buffer overflow in handling symlinks (bsc#1190317).
- cifs: prevent bad output lengths in smb2_ioctl_query_info()
(bsc#1190317).
- cifs: release cached dentries only if mount is complete (bsc#1190317).
- cifs: remove "cifs_" prefix from init/destroy mids functions
(bsc#1190317).
- cifs: remove check of list iterator against head past the loop body
(bsc#1190317).
- cifs: remove minor build warning (bsc#1190317).
- cifs: remove redundant initialization to variable mnt_sign_enabled
(bsc#1190317).
- cifs: remove remaining build warnings (bsc#1190317).
- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1190317).
- cifs: remove some camelCase and also some static build warnings
(bsc#1190317).
- cifs: remove unnecessary (void*) conversions (bsc#1190317).
- cifs: remove unused server parameter from calc_smb_size() (bsc#1190317).
- cifs: remove useless DeleteMidQEntry() (bsc#1190317).
- cifs: remove useless parameter 'is_fsctl' from SMB2_ioctl()
(bsc#1190317).
- cifs: return errors during session setup during reconnects (bsc#1190317).
- cifs: return the more nuanced writeback error on close() (bsc#1190317).
- cifs: sanitize multiple delimiters in prepath (bsc#1190317).
- cifs: set the CREATE_NOT_FILE when opening the directory in
use_cached_dir() (bsc#1190317).
- cifs: skip trailing separators of prefix paths (bsc#1190317).
- cifs: smbd: fix typo in comment (bsc#1190317).
- cifs: Split the smb3_add_credits tracepoint (bsc#1190317).
- cifs: use correct lock type in cifs_reconnect() (bsc#1190317).
- cifs: Use kzalloc instead of kmalloc/memset (bsc#1190317).
- cifs: verify that tcon is valid before dereference in cifs_kill_sb
(bsc#1190317).
- cifs: version operations for smb20 unneeded when legacy support disabled
(bsc#1190317).
- cifs: we do not need a spinlock around the tree access during umount
(bsc#1190317).
- cifs: when extending a file with falloc we should make files not-sparse
(bsc#1190317).
- dm: thin metadata: Fix use-after-free in dm_bm_set_read_only
(bsc#1203462).
- dtb: Do not include sources in src.rpm - refer to kernel-source Same as
other kernel binary packages there is no need to carry duplicate sources
in dtb packages.
- fbdev: fb_pm2fb: Avoid potential divide by zero error (bsc#1154048)
- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace
is dead (git-fixes).
- Input: iforce - constify usb_device_id and fix space before '[' error
(git-fixes).
- Input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).
- Input: stop telling users to snail-mail Vojtech (git-fixes).
- md-raid10: fix KASAN warning (git-fixes).
- md: call __md_stop_writes in md_stop (git-fixes).
- net: mana: Add rmb after checking owner bits (git-fixes).
- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).
- NFS: LOOKUP_DIRECTORY is also ok with symlinks (git-fixes).
- NFS: RECLAIM_COMPLETE must handle EACCES (git-fixes).
- NFSD: Fix zero-length NFSv3 WRITEs (git-fixes).
- powerpc: Use device_type helpers to access the node type (bsc#1203424
ltc#199544).
- powerpc/drmem: Make lmb_size 64 bit (bsc#1203424 ltc#199544).
- powerpc/memhotplug: Make lmb size 64bit (bsc#1203424 ltc#199544).
- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).
- scsi: ch: Make it possible to open a ch device multiple times again
(git-fixes).
- scsi: core: Avoid that a kernel warning appears during system resume
(git-fixes).
- scsi: core: Avoid that system resume triggers a kernel warning
(git-fixes).
- scsi: fcoe: Embed fc_rport_priv in fcoe_rport structure (git-fixes).
- scsi: lpfc: Add missing destroy_workqueue() in error path (git-fixes).
- scsi: lpfc: Check the return value of alloc_workqueue() (git-fixes).
- scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (git-fixes).
- scsi: mpt3sas: Fix ioctl timeout (git-fixes).
- scsi: mpt3sas: Fix sync irqs (git-fixes).
- scsi: mpt3sas: Fix use-after-free warning (git-fixes).
- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).
- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status
(bsc#1203935).
- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1()
(bsc#1203935).
- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).
- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX
(bsc#1203935).
- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).
- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).
- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (git-fixes).
- scsi: qla2xxx: Fix response queue handler reading stale packets
(bsc#1203935).
- scsi: qla2xxx: Log message "skipping scsi_scan_host()" as informational
(bsc#1203935).
- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).
- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).
- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).
- scsi: qla2xxx: Revert "scsi: qla2xxx: Fix response queue handler reading
stale packets" (bsc#1203935).
- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).
- scsi: sd_zbc: Fix compilation warning (git-fixes).
- scsi: sd: enable compat ioctls for sed-opal (git-fixes).
- scsi: sd: Fix Opal support (git-fixes).
- scsi: sg: Allow waiting for commands to complete on removed device
(git-fixes).
- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).
- SMB2: small refactor in smb2_check_message() (bsc#1190317).
- SMB3: add trace point for SMB2_set_eof (bsc#1190317).
- SMB3: check for null tcon (bsc#1190317).
- SMB3: check xattr value length earlier (bsc#1190317).
- SMB3: do not set rc when used and unneeded in query_info_compound
(bsc#1190317).
- SMB3: EBADF/EIO errors in rename/open caused by race condition in
smb2_compound_op (bsc#1190317).
- SUNRPC: Reinitialise the backchannel request buffers before reuse
(git-fixes).
- sysfb: Enable boot time VESA graphic mode selection (bsc#1129770)
Backporting notes: * context changes * config update
- USB: Add ignore-residue quirk for NXP PN7462AU (git-fixes).
- USB: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).
- USB: core: Prevent nested device-reset calls (git-fixes).
- USB: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).
- USB: serial: ftdi_sio: add Belimo device ids (git-fixes).
- USB: serial: option: add Quectel EM05-G modem (git-fixes).
- USB: serial: option: add Quectel RM500K module support.
- USB: serial: option: add support for Cinterion MV31 with new baseline
(git-fixes).
- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).
- USB: struct usb_device: hide new member (git-fixes).
- USB: typec: altmodes/displayport: correct pin assignment for UFP
receptacles (git-fixes).
- USB: typec: tcpci: Do not skip cleanup in .remove() on error (git-fixes).
- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).
- video: fbdev: amba-clcd: Fix refcount leak bugs (bsc#1154048)
Backporting notes: * context changes
- video: fbdev: arkfb: Check the size of screen before memset_io()
(bsc#1154048)
- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock()
(bsc#1154048)
- video: fbdev: s3fb: Check the size of screen before memset_io()
(bsc#1154048)
- video: fbdev: sis: fix typos in SiS_GetModeID() (bsc#1154048)
- video: fbdev: vt8623fb: Check the size of screen before memset_io()
(bsc#1154048)
- x86/bugs: Reenable retbleed=off While for older kernels the return
thunks are statically built in and cannot be dynamically patched out,
retbleed=off should still be possible to do so that the mitigation can
still be disabled on Intel who do not use the return thunks but IBRS.
- xhci: bail out early if driver can't accress host in resume (git-fixes).
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP5:
zypper in -t patch SUSE-SLE-WE-12-SP5-2022-3587=1
- SUSE Linux Enterprise Software Development Kit 12-SP5:
zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-3587=1
- SUSE Linux Enterprise Server 12-SP5:
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-3587=1
- SUSE Linux Enterprise Live Patching 12-SP5:
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2022-3587=1
Please note that this is the initial kernel livepatch without fixes
itself, this livepatch package is later updated by seperate standalone
livepatch updates.
- SUSE Linux Enterprise High Availability 12-SP5:
zypper in -t patch SUSE-SLE-HA-12-SP5-2022-3587=1
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP5 (x86_64):
kernel-default-debuginfo-4.12.14-122.136.1
kernel-default-debugsource-4.12.14-122.136.1
kernel-default-extra-4.12.14-122.136.1
kernel-default-extra-debuginfo-4.12.14-122.136.1
- SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64):
kernel-obs-build-4.12.14-122.136.1
kernel-obs-build-debugsource-4.12.14-122.136.1
- SUSE Linux Enterprise Software Development Kit 12-SP5 (noarch):
kernel-docs-4.12.14-122.136.1
- SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
kernel-default-4.12.14-122.136.1
kernel-default-base-4.12.14-122.136.1
kernel-default-base-debuginfo-4.12.14-122.136.1
kernel-default-debuginfo-4.12.14-122.136.1
kernel-default-debugsource-4.12.14-122.136.1
kernel-default-devel-4.12.14-122.136.1
kernel-syms-4.12.14-122.136.1
- SUSE Linux Enterprise Server 12-SP5 (noarch):
kernel-devel-4.12.14-122.136.1
kernel-macros-4.12.14-122.136.1
kernel-source-4.12.14-122.136.1
- SUSE Linux Enterprise Server 12-SP5 (x86_64):
kernel-default-devel-debuginfo-4.12.14-122.136.1
- SUSE Linux Enterprise Server 12-SP5 (s390x):
kernel-default-man-4.12.14-122.136.1
- SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64):
kernel-default-debuginfo-4.12.14-122.136.1
kernel-default-debugsource-4.12.14-122.136.1
kernel-default-kgraft-4.12.14-122.136.1
kernel-default-kgraft-devel-4.12.14-122.136.1
kgraft-patch-4_12_14-122_136-default-1-8.3.1
- SUSE Linux Enterprise High Availability 12-SP5 (ppc64le s390x x86_64):
cluster-md-kmp-default-4.12.14-122.136.1
cluster-md-kmp-default-debuginfo-4.12.14-122.136.1
dlm-kmp-default-4.12.14-122.136.1
dlm-kmp-default-debuginfo-4.12.14-122.136.1
gfs2-kmp-default-4.12.14-122.136.1
gfs2-kmp-default-debuginfo-4.12.14-122.136.1
kernel-default-debuginfo-4.12.14-122.136.1
kernel-default-debugsource-4.12.14-122.136.1
ocfs2-kmp-default-4.12.14-122.136.1
ocfs2-kmp-default-debuginfo-4.12.14-122.136.1
References:
https://www.suse.com/security/cve/CVE-2022-20008.html
https://www.suse.com/security/cve/CVE-2022-2503.html
https://www.suse.com/security/cve/CVE-2022-2663.html
https://www.suse.com/security/cve/CVE-2022-3239.html
https://www.suse.com/security/cve/CVE-2022-3303.html
https://www.suse.com/security/cve/CVE-2022-39188.html
https://www.suse.com/security/cve/CVE-2022-41218.html
https://www.suse.com/security/cve/CVE-2022-41848.html
https://bugzilla.suse.com/1124235
https://bugzilla.suse.com/1129770
https://bugzilla.suse.com/1154048
https://bugzilla.suse.com/1190317
https://bugzilla.suse.com/1199564
https://bugzilla.suse.com/1201309
https://bugzilla.suse.com/1202097
https://bugzilla.suse.com/1202385
https://bugzilla.suse.com/1202677
https://bugzilla.suse.com/1202960
https://bugzilla.suse.com/1203098
https://bugzilla.suse.com/1203107
https://bugzilla.suse.com/1203410
https://bugzilla.suse.com/1203424
https://bugzilla.suse.com/1203462
https://bugzilla.suse.com/1203552
https://bugzilla.suse.com/1203769
https://bugzilla.suse.com/1203935
https://bugzilla.suse.com/1203987
More information about the sle-security-updates
mailing list