SUSE-SU-2023:0416-1: important: Security update for the Linux Kernel

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Wed Feb 15 14:21:30 UTC 2023


   SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2023:0416-1
Rating:             important
References:         #1055710 #1084513 #1131430 #1133374 #1154848 
                    #1166098 #1173514 #1177471 #1191961 #1196973 
                    #1197331 #1197343 #1197366 #1197391 #1198516 
                    #1198829 #1199063 #1199426 #1199487 #1199650 
                    #1199657 #1200598 #1200619 #1200692 #1200910 
                    #1201050 #1201251 #1201429 #1201635 #1201636 
                    #1201940 #1201948 #1202097 #1202346 #1202347 
                    #1202393 #1202500 #1202897 #1202898 #1202960 
                    #1203107 #1203271 #1203514 #1203769 #1203960 
                    #1203987 #1204166 #1204354 #1204405 #1204431 
                    #1204439 #1204574 #1204631 #1204646 #1204647 
                    #1204653 #1204894 #1204922 #1205220 #1205514 
                    #1205671 #1205796 #1206677 
Cross-References:   CVE-2017-13695 CVE-2018-7755 CVE-2019-3837
                    CVE-2019-3900 CVE-2020-15393 CVE-2020-16119
                    CVE-2020-36557 CVE-2020-36558 CVE-2021-26341
                    CVE-2021-33655 CVE-2021-33656 CVE-2021-34981
                    CVE-2021-39713 CVE-2021-45868 CVE-2022-1011
                    CVE-2022-1048 CVE-2022-1353 CVE-2022-1462
                    CVE-2022-1652 CVE-2022-1679 CVE-2022-20132
                    CVE-2022-20166 CVE-2022-20368 CVE-2022-20369
                    CVE-2022-21123 CVE-2022-21125 CVE-2022-21127
                    CVE-2022-21166 CVE-2022-21180 CVE-2022-21385
                    CVE-2022-21499 CVE-2022-2318 CVE-2022-2663
                    CVE-2022-28356 CVE-2022-29900 CVE-2022-29901
                    CVE-2022-3028 CVE-2022-3303 CVE-2022-33981
                    CVE-2022-3424 CVE-2022-3524 CVE-2022-3565
                    CVE-2022-3566 CVE-2022-3586 CVE-2022-3621
                    CVE-2022-3635 CVE-2022-3646 CVE-2022-3649
                    CVE-2022-36879 CVE-2022-36946 CVE-2022-3903
                    CVE-2022-39188 CVE-2022-40768 CVE-2022-4095
                    CVE-2022-41218 CVE-2022-41848 CVE-2022-41850
                    CVE-2022-41858 CVE-2022-43750 CVE-2022-44032
                    CVE-2022-44033 CVE-2022-45934
CVSS scores:
                    CVE-2017-13695 (NVD) : 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2017-13695 (SUSE): 4 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
                    CVE-2018-7755 (NVD) : 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2018-7755 (SUSE): 4 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
                    CVE-2019-3837 (NVD) : 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
                    CVE-2019-3837 (SUSE): 6.1 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
                    CVE-2019-3900 (NVD) : 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
                    CVE-2019-3900 (SUSE): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2020-15393 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2020-15393 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
                    CVE-2020-16119 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2020-16119 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2020-36557 (NVD) : 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2020-36557 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2020-36558 (NVD) : 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2020-36558 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-26341 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
                    CVE-2021-26341 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2021-33655 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-33655 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-33656 (NVD) : 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-33656 (SUSE): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
                    CVE-2021-34981 (SUSE): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
                    CVE-2021-39713 (NVD) : 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-39713 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-45868 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2021-45868 (SUSE): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-1011 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-1011 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-1048 (NVD) : 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-1048 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-1353 (NVD) : 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
                    CVE-2022-1353 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
                    CVE-2022-1462 (NVD) : 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
                    CVE-2022-1462 (SUSE): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
                    CVE-2022-1652 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-1652 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-1679 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-1679 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-20132 (NVD) : 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
                    CVE-2022-20132 (SUSE): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
                    CVE-2022-20166 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-20166 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
                    CVE-2022-20368 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-20368 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-20369 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-20369 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-21123 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2022-21123 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
                    CVE-2022-21125 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2022-21125 (SUSE): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
                    CVE-2022-21127 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2022-21127 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2022-21166 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2022-21166 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2022-21180 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-21180 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2022-21385 (NVD) : 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-21385 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-21499 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-21499 (SUSE): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-2318 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-2318 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-2663 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
                    CVE-2022-2663 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
                    CVE-2022-28356 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-28356 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-29900 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
                    CVE-2022-29900 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2022-29901 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
                    CVE-2022-29901 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2022-3028 (NVD) : 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-3028 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-3303 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3303 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-33981 (NVD) : 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
                    CVE-2022-33981 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3424 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-3524 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3524 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3565 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-3565 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-3566 (NVD) : 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-3566 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3586 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3586 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-3621 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3621 (SUSE): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3635 (NVD) : 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-3635 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-3646 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
                    CVE-2022-3646 (SUSE): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
                    CVE-2022-3649 (NVD) : 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
                    CVE-2022-3649 (SUSE): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
                    CVE-2022-36879 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-36879 (SUSE): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-36946 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-36946 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3903 (NVD) : 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3903 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-39188 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-39188 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-40768 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2022-40768 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2022-4095 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-41218 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-41218 (SUSE): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-41848 (NVD) : 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-41848 (SUSE): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-41850 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-41850 (SUSE): 4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
                    CVE-2022-41858 (NVD) : 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
                    CVE-2022-41858 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-43750 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-43750 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-44032 (NVD) : 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-44032 (SUSE): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-44033 (NVD) : 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-44033 (SUSE): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-45934 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-45934 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:
                    SUSE Linux Enterprise Server 11-SP4-LTSS-EXTREME-CORE
______________________________________________________________________________

   An update that solves 62 vulnerabilities and has one errata
   is now available.

Description:


   The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various
   security and bugfixes.


   The following security bugs were fixed:

   - CVE-2017-13695: Fixed fix acpi operand cache leak in nseval.c
     (bsc#1055710).
   - CVE-2018-7755: Fixed bypass of kernel security protections such as KASLR
     using fd_locked_ioctl function in drivers/block/floppy.c (bnc#1084513).
   - CVE-2019-3837: Fixed memory leak due to thread-unsafe implementation of
     the net_dma code in tcp_recvmsg() (bnc#1131430).
   - CVE-2019-3900: Fixed infinite loop while receiving packets in vhost_net
     (bnc#1133374).
   - CVE-2020-15393: Fixed memory leak in usbtest_disconnect in
     drivers/usb/misc/usbtest.c (bnc#1173514).
   - CVE-2020-16119: Fixed use-after-free exploitable by a local attacker due
     to reuse of a DCCP socket (bnc#1177471).
   - CVE-2020-36557: Fixed race condition in the VT_DISALLOCATE ioctl and
     closing/opening of ttys which could lead to a use-after-free
     (bnc#1201429).
   - CVE-2020-36558: Fixed race condition in VT_RESIZEX (bsc#1200910).
   - CVE-2021-26341: Fixed vulnerablity where some AMD CPUs may transiently
     execute beyond unconditional direct branches, which may potentially
     result in data leakage (bnc#1201050).
   - CVE-2021-33655: When sending malicous data to kernel by ioctl cmd
     FBIOPUT_VSCREENINFO,kernel will write memory out of bounds (bnc#1201635).
   - CVE-2021-33656: Fixed memory out of bounds write when setting font with
     malicous data by ioctl cmd PIO_FONT (bnc#1201636).
   - CVE-2021-34981: Fixed file refcounter in bluetooth cmtp when
     cmtp_attach_device fails (bsc#1191961).
   - CVE-2021-39713: Fixed race condition in the network scheduling subsystem
     which could lead to a use-after-free (bsc#1196973).
   - CVE-2021-45868: Fixed use-after-free in fs/quota/quota_tree.c
     (bnc#1197366).
   - CVE-2022-1011: Fixed UAF reads of write() buffers, allowing theft of
     (partial) /etc/shadow hashes (bsc#1197343).
   - CVE-2022-1048: Fixed potential AB/BA lock with buffer_mutex and
     mmap_lock (bsc#1197331).
   - CVE-2022-1353: Fixed denial of service in the pfkey_register function in
     net/key/af_key.c (bnc#1198516).
   - CVE-2022-1462: Fixed out-of-bounds read in the TeleTYpe subsystem
     allowing local user to crash the system or read unauthorized random data
     from memory (bnc#1198829).
   - CVE-2022-1652: Fixed use after free in floppy (bsc#1199063).
   - CVE-2022-1679: Fixed use-after-free in the atheros wireless adapter
     driver (bnc#1199487).
   - CVE-2022-20132: Fixed out of bounds read in lg_probe and related
     functions of hid-lg.c and other USB HID files (bnc#1200619).
   - CVE-2022-20166: Fixed out of bounds write due to a heap buffer overflow
     which could lead to local escalation of privilege with System execution
     privileges needed (bnc#1200598).
   - CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg()
     (bnc#1202346).
   - CVE-2022-20369: Fixed out of bounds write due to improper input
     validation in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
   - CVE-2022-21166, CVE-2022-21127, CVE-2022-21123, CVE-2022-21125,
     CVE-2022-21180: Fixed stale MMIO data transient information leaks
     (INTEL-TA-00615) (bnc#1199650).
   - CVE-2022-21385: Fixed warn in rds_message_alloc_sgs (bnc#1202897).
   - CVE-2022-21499: Fixed issue where it was trivial to break out of
     lockdown using kgdb (bsc#1199426).
   - CVE-2022-2318: Fixed use-after-free caused by timer handler in
     net/rose/rose_timer.c of linux that allow attackers to crash linux
     kernel without any privileges (bnc#1201251).
   - CVE-2022-2663: Fixed possible firewall bypass when users are using
     unencrypted IRC due to message handling confusion in nf_conntrack_irc
     (bnc#1202097).
   - CVE-2022-28356: Fixed refcount leak bug in net/llc/af_llc.c
     (bnc#1197391).
   - CVE-2022-29900: Fixed mis-trained branch predictions for return
     instructions that may have allowed arbitrary speculative code execution
     under certain microarchitecture-dependent conditions (bnc#1199657).
   - CVE-2022-29901: Fixed vulnerability where an attacker with unprivileged
     user access can hijack return instructions to achieve arbitrary
     speculative code execution under certain microarchitecture-dependent
     conditions (bnc#1199657).
   - CVE-2022-3028: Fixed a race condition in the Linux kernel's IP framework
     for transforming packets (XFRM subsystem) when multiple calls to
     xfrm_probe_algs occurred simultaneously (bnc#1202898).
   - CVE-2022-3303: Fixed race condition in the sound subsystem due to
     improper locking (bnc#1203769).
   - CVE-2022-33981: Fixed denial of service in drivers/block/floppy.c
     (bnc#1200692).
   - CVE-2022-3424: Fixed use-after-free in gru_set_context_option leading to
     kernel panic (bnc#1204166).
   - CVE-2022-3524: Fixed memory leak in ipv6_renew_options of the component
     IPv6 Handler (bnc#1204354).
   - CVE-2022-3565: Fixed use-after-free in del_timer of the file
     drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth (bnc#1204431).
   - CVE-2022-3566: Fixed race condition in the TCP Handler (bnc#1204405).
   - CVE-2022-3586: Fixed use-after-free in the sch_sfb enqueue function
     (bnc#1204439).
   - CVE-2022-3621: Fixed null pointer dereference in fs/nilfs2/inode.c of
     the component nilfs2 (bnc#1204574).
   - CVE-2022-3635: Fixed use-after-free in IPsec (bnc#1204631).
   - CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer of the file
     fs/nilfs2/segment.c of the component BPF (bnc#1204646).
   - CVE-2022-3649: Fixed use-after-free in nilfs_new_inode of the file
     fs/nilfs2/inode.c (bnc#1204647).
   - CVE-2022-36879: Fixed double refcount drop in xfrm_expand_policies in
     net/xfrm/xfrm_policy.c (bnc#1201948).
   - CVE-2022-36946: Fixed denial of service in nfqnl_mangle in
     net/netfilter/nfnetlink_queue.c (bnc#1201940).
   - CVE-2022-3903: Fixed incorrect read request flaw in the Infrared
     Transceiver USB driver (bnc#1205220).
   - CVE-2022-39188: Fixed TLB flush for PFNMAP mappings before
     unlink_file_vma() (bsc#1203107).
   - CVE-2022-40768: Fixed information leak in drivers/scsi/stex.c
     (bnc#1203514).
   - CVE-2022-4095: Fixed use-after-free in rtl8712 (bsc#1205514).
   - CVE-2022-41218: Fixed use-after-free in drivers/media/dvb-core/dmxdev.c
     (bnc#1202960).
   - CVE-2022-41848: Fixed use-after-free in
     drivers/char/pcmcia/synclink_cs.c (bnc#1203987).
   - CVE-2022-41850: Fixed use-after-free in roccat_report_event in
     drivers/hid/hid-roccat.c (bnc#1203960).
   - CVE-2022-41858: Fixed NULL pointer dereference in
     drivers/net/slip/slip.c (bnc#1205671).
   - CVE-2022-43750: Fixed memory corruption in drivers/usb/mon/mon_bin.c
     (bnc#1204653).
   - CVE-2022-44032: Fixed race condition in drivers/char/pcmcia/cm4000_cs.c
     (bnc#1204894).
   - CVE-2022-44033: Fixed use-after-free in drivers/char/pcmcia/cm4040_cs.c
     (bnc#1204922).
   - CVE-2022-45934: Fixed integer wraparound in net/bluetooth/l2cap_core.c
     (bnc#1205796).

   The following non-security bugs were fixed:

   - Fail if no bound addresses can be used for a given scope (bsc#1206677).
   - Fixed missing check on handle in net_sched cls_route (bsc#1202393).
   - Trim skb to alloc size to avoid MSG_TRUNC (bsc#1166098).
   - Fixed confusing boot logging with Skylake on RETBLEED kernel
     (bsc#1202500).
   - Fixed retbleed performance issues (bsc#1203271).


Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11-SP4-LTSS-EXTREME-CORE:

      zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2023-416=1



Package List:

   - SUSE Linux Enterprise Server 11-SP4-LTSS-EXTREME-CORE (x86_64):

      kernel-default-3.0.101-108.138.1
      kernel-default-base-3.0.101-108.138.1
      kernel-default-devel-3.0.101-108.138.1
      kernel-ec2-3.0.101-108.138.1
      kernel-ec2-base-3.0.101-108.138.1
      kernel-ec2-devel-3.0.101-108.138.1
      kernel-source-3.0.101-108.138.1
      kernel-syms-3.0.101-108.138.1
      kernel-trace-3.0.101-108.138.1
      kernel-trace-base-3.0.101-108.138.1
      kernel-trace-devel-3.0.101-108.138.1
      kernel-xen-3.0.101-108.138.1
      kernel-xen-base-3.0.101-108.138.1
      kernel-xen-devel-3.0.101-108.138.1


References:

   https://www.suse.com/security/cve/CVE-2017-13695.html
   https://www.suse.com/security/cve/CVE-2018-7755.html
   https://www.suse.com/security/cve/CVE-2019-3837.html
   https://www.suse.com/security/cve/CVE-2019-3900.html
   https://www.suse.com/security/cve/CVE-2020-15393.html
   https://www.suse.com/security/cve/CVE-2020-16119.html
   https://www.suse.com/security/cve/CVE-2020-36557.html
   https://www.suse.com/security/cve/CVE-2020-36558.html
   https://www.suse.com/security/cve/CVE-2021-26341.html
   https://www.suse.com/security/cve/CVE-2021-33655.html
   https://www.suse.com/security/cve/CVE-2021-33656.html
   https://www.suse.com/security/cve/CVE-2021-34981.html
   https://www.suse.com/security/cve/CVE-2021-39713.html
   https://www.suse.com/security/cve/CVE-2021-45868.html
   https://www.suse.com/security/cve/CVE-2022-1011.html
   https://www.suse.com/security/cve/CVE-2022-1048.html
   https://www.suse.com/security/cve/CVE-2022-1353.html
   https://www.suse.com/security/cve/CVE-2022-1462.html
   https://www.suse.com/security/cve/CVE-2022-1652.html
   https://www.suse.com/security/cve/CVE-2022-1679.html
   https://www.suse.com/security/cve/CVE-2022-20132.html
   https://www.suse.com/security/cve/CVE-2022-20166.html
   https://www.suse.com/security/cve/CVE-2022-20368.html
   https://www.suse.com/security/cve/CVE-2022-20369.html
   https://www.suse.com/security/cve/CVE-2022-21123.html
   https://www.suse.com/security/cve/CVE-2022-21125.html
   https://www.suse.com/security/cve/CVE-2022-21127.html
   https://www.suse.com/security/cve/CVE-2022-21166.html
   https://www.suse.com/security/cve/CVE-2022-21180.html
   https://www.suse.com/security/cve/CVE-2022-21385.html
   https://www.suse.com/security/cve/CVE-2022-21499.html
   https://www.suse.com/security/cve/CVE-2022-2318.html
   https://www.suse.com/security/cve/CVE-2022-2663.html
   https://www.suse.com/security/cve/CVE-2022-28356.html
   https://www.suse.com/security/cve/CVE-2022-29900.html
   https://www.suse.com/security/cve/CVE-2022-29901.html
   https://www.suse.com/security/cve/CVE-2022-3028.html
   https://www.suse.com/security/cve/CVE-2022-3303.html
   https://www.suse.com/security/cve/CVE-2022-33981.html
   https://www.suse.com/security/cve/CVE-2022-3424.html
   https://www.suse.com/security/cve/CVE-2022-3524.html
   https://www.suse.com/security/cve/CVE-2022-3565.html
   https://www.suse.com/security/cve/CVE-2022-3566.html
   https://www.suse.com/security/cve/CVE-2022-3586.html
   https://www.suse.com/security/cve/CVE-2022-3621.html
   https://www.suse.com/security/cve/CVE-2022-3635.html
   https://www.suse.com/security/cve/CVE-2022-3646.html
   https://www.suse.com/security/cve/CVE-2022-3649.html
   https://www.suse.com/security/cve/CVE-2022-36879.html
   https://www.suse.com/security/cve/CVE-2022-36946.html
   https://www.suse.com/security/cve/CVE-2022-3903.html
   https://www.suse.com/security/cve/CVE-2022-39188.html
   https://www.suse.com/security/cve/CVE-2022-40768.html
   https://www.suse.com/security/cve/CVE-2022-4095.html
   https://www.suse.com/security/cve/CVE-2022-41218.html
   https://www.suse.com/security/cve/CVE-2022-41848.html
   https://www.suse.com/security/cve/CVE-2022-41850.html
   https://www.suse.com/security/cve/CVE-2022-41858.html
   https://www.suse.com/security/cve/CVE-2022-43750.html
   https://www.suse.com/security/cve/CVE-2022-44032.html
   https://www.suse.com/security/cve/CVE-2022-44033.html
   https://www.suse.com/security/cve/CVE-2022-45934.html
   https://bugzilla.suse.com/1055710
   https://bugzilla.suse.com/1084513
   https://bugzilla.suse.com/1131430
   https://bugzilla.suse.com/1133374
   https://bugzilla.suse.com/1154848
   https://bugzilla.suse.com/1166098
   https://bugzilla.suse.com/1173514
   https://bugzilla.suse.com/1177471
   https://bugzilla.suse.com/1191961
   https://bugzilla.suse.com/1196973
   https://bugzilla.suse.com/1197331
   https://bugzilla.suse.com/1197343
   https://bugzilla.suse.com/1197366
   https://bugzilla.suse.com/1197391
   https://bugzilla.suse.com/1198516
   https://bugzilla.suse.com/1198829
   https://bugzilla.suse.com/1199063
   https://bugzilla.suse.com/1199426
   https://bugzilla.suse.com/1199487
   https://bugzilla.suse.com/1199650
   https://bugzilla.suse.com/1199657
   https://bugzilla.suse.com/1200598
   https://bugzilla.suse.com/1200619
   https://bugzilla.suse.com/1200692
   https://bugzilla.suse.com/1200910
   https://bugzilla.suse.com/1201050
   https://bugzilla.suse.com/1201251
   https://bugzilla.suse.com/1201429
   https://bugzilla.suse.com/1201635
   https://bugzilla.suse.com/1201636
   https://bugzilla.suse.com/1201940
   https://bugzilla.suse.com/1201948
   https://bugzilla.suse.com/1202097
   https://bugzilla.suse.com/1202346
   https://bugzilla.suse.com/1202347
   https://bugzilla.suse.com/1202393
   https://bugzilla.suse.com/1202500
   https://bugzilla.suse.com/1202897
   https://bugzilla.suse.com/1202898
   https://bugzilla.suse.com/1202960
   https://bugzilla.suse.com/1203107
   https://bugzilla.suse.com/1203271
   https://bugzilla.suse.com/1203514
   https://bugzilla.suse.com/1203769
   https://bugzilla.suse.com/1203960
   https://bugzilla.suse.com/1203987
   https://bugzilla.suse.com/1204166
   https://bugzilla.suse.com/1204354
   https://bugzilla.suse.com/1204405
   https://bugzilla.suse.com/1204431
   https://bugzilla.suse.com/1204439
   https://bugzilla.suse.com/1204574
   https://bugzilla.suse.com/1204631
   https://bugzilla.suse.com/1204646
   https://bugzilla.suse.com/1204647
   https://bugzilla.suse.com/1204653
   https://bugzilla.suse.com/1204894
   https://bugzilla.suse.com/1204922
   https://bugzilla.suse.com/1205220
   https://bugzilla.suse.com/1205514
   https://bugzilla.suse.com/1205671
   https://bugzilla.suse.com/1205796
   https://bugzilla.suse.com/1206677



More information about the sle-security-updates mailing list