SUSE-SU-2022:1651-1: important: Security update for the Linux Kernel

sle-updates at lists.suse.com sle-updates at lists.suse.com
Thu May 12 19:16:20 UTC 2022


   SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:1651-1
Rating:             important
References:         #1028340 #1065729 #1071995 #1084513 #1114648 
                    #1121726 #1129770 #1137728 #1172456 #1183723 
                    #1187055 #1191647 #1191958 #1194625 #1196018 
                    #1196247 #1196657 #1196901 #1197075 #1197343 
                    #1197663 #1197888 #1197914 #1198217 #1198228 
                    #1198400 #1198413 #1198516 #1198660 #1198687 
                    #1198742 #1198825 #1199012 
Cross-References:   CVE-2018-7755 CVE-2019-20811 CVE-2021-20292
                    CVE-2021-20321 CVE-2021-38208 CVE-2021-43389
                    CVE-2022-1011 CVE-2022-1280 CVE-2022-1353
                    CVE-2022-1419 CVE-2022-1516 CVE-2022-23960
                    CVE-2022-28748
CVSS scores:
                    CVE-2018-7755 (NVD) : 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2018-7755 (SUSE): 4 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
                    CVE-2019-20811 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
                    CVE-2019-20811 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
                    CVE-2021-20292 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-20292 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-20321 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-20321 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-38208 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-38208 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-43389 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-43389 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-1011 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-1011 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-1280 (NVD) : 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
                    CVE-2022-1280 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-1353 (NVD) : 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
                    CVE-2022-1353 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
                    CVE-2022-1419 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-1516 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-23960 (NVD) : 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
                    CVE-2022-23960 (SUSE): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
                    CVE-2022-28748 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Affected Products:
                    SUSE Linux Enterprise Server 12-SP5
______________________________________________________________________________

   An update that solves 13 vulnerabilities and has 20 fixes
   is now available.

Description:


   The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various
   security and bugfixes.


   The following security bugs were fixed:

   - CVE-2018-7755: Fixed an issue in the fd_locked_ioctl function in
     drivers/block/floppy.c. The floppy driver will copy a kernel pointer to
     user memory in response to the FDGETPRM ioctl. An attacker can send the
     FDGETPRM ioctl and use the obtained kernel pointer to discover the
     location of kernel code and data and bypass kernel security protections
     such as KASLR (bnc#1084513).
   - CVE-2019-20811: Fixed issue in rx_queue_add_kobject() and
     netdev_queue_add_kobject() in net/core/net-sysfs.c, where a reference
     count is mishandled (bnc#1172456).
   - CVE-2021-20292: Fixed object validation prior to performing operations
     on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem
     (bnc#1183723).
   - CVE-2021-20321: Fixed a race condition accessing file object in the
     OverlayFS subsystem in the way users do rename in specific way with
     OverlayFS. A local user could have used this flaw to crash the system
     (bnc#1191647).
   - CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and
     BUG) by making a getsockname call after a certain type of failure of a
     bind call (bnc#1187055).
   - CVE-2021-43389: Fixed an array-index-out-of-bounds flaw in the
     detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
   - CVE-2022-1011: Fixed a use-after-free flaw inside the FUSE filesystem in
     the way a user triggers write(). This flaw allowed a local user to gain
     unauthorized access to data from the FUSE filesystem, resulting in
     privilege escalation (bnc#1197343).
   - CVE-2022-1280: Fixed a use-after-free vulnerability in drm_lease_held in
     drivers/gpu/drm/drm_lease.c (bnc#1197914).
   - CVE-2022-1353: Fixed access controll to kernel memory in the
     pfkey_register function in net/key/af_key.c (bnc#1198516).
   - CVE-2022-1419: Fixed a concurrency use-after-free in
     vgem_gem_dumb_create (bsc#1198742).
   - CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect
     (bsc#1199012).
   - CVE-2022-23960: Fixed speculation issues in the Branch History Buffer
     that allowed an attacker to obtain sensitive information using cache
     allocation (bnc#1196657).
   - CVE-2022-28748: Fixed memory lead over the network by ax88179_178a
     devices (bsc#1196018).

   The following non-security bugs were fixed:

   - IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() (git-fixes)
   - NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).
   - NFSv4: recover from pre-mature loss of openstateid (bsc#1196247).
   - NFSv4: Do not try to CLOSE if the stateid 'other' field has changed
     (bsc#1196247).
   - NFSv4: Fix a regression in nfs_set_open_stateid_locked() (bsc#1196247).
   - NFSv4: Handle NFS4ERR_OLD_STATEID in CLOSE/OPEN_DOWNGRADE (bsc#1196247).
   - NFSv4: Wait for stateid updates after CLOSE/OPEN_DOWNGRADE (bsc#1196247).
   - NFSv4: fix open failure with O_ACCMODE flag (git-fixes).
   - PCI/switchtec: Read all 64 bits of part_event_bitmap (git-fixes).
   - PCI: Add device even if driver attach failed (git-fixes).
   - PCI: Fix overflow in command-line resource alignment requests
     (git-fixes).
   - PCI: iproc: Fix out-of-bound array accesses (git-fixes).
   - PCI: iproc: Set affinity mask on MSI interrupts (git-fixes).
   - PCI: qcom: Change duplicate PCI reset to phy reset (git-fixes).
   - PCI: qcom: Make sure PCIe is reset before init for rev 2.1.0 (git-fixes).
   - RDMA/rxe: Missing unlock on error in get_srq_wqe() (git-fixes)
   - RDMA/rxe: Restore setting tot_len in the IPv4 header (git-fixes)
   - RDMA/rxe: Use the correct size of wqe when processing SRQ (git-fixes)
   - SUNRPC: Handle low memory situations in call_status() (git-fixes).
   - USB: Fix "slab-out-of-bounds Write" bug in usb_hcd_poll_rh_status
     (git-fixes).
   - USB: core: Fix bug in resuming hub's handling of wakeup requests
     (git-fixes).
   - USB: serial: cp210x: add NCR Retail IO box id (git-fixes).
   - USB: serial: pl2303: add IBM device IDs (git-fixes).
   - USB: serial: simple: add Nokia phone driver (git-fixes).
   - USB: usb-storage: Fix use of bitfields for hardware data in ene_ub6250.c
     (git-fixes).
   - arm64: cmpxchg: Use "K" instead of "L" for ll/sc immediate constraint
     (git-fixes)
   - arm64: compat: Provide definition for COMPAT_SIGMINSTKSZ (git-fixes)
   - arm64: drop linker script hack to hide __efistub_ symbols (git-fixes)
   - arm64: fix for bad_mode() handler to always result in panic (git-fixes)
   - arm64: hibernate: Clean the __hyp_text to PoC after resume (git-fixes)
   - arm64: hyp-stub: Forbid kprobing of the hyp-stub (git-fixes)
   - arm64: kaslr: ensure randomized quantities are clean also when kaslr
     (git-fixes)
   - arm64: kaslr: ensure randomized quantities are clean to the PoC
     (git-fixes)
   - arm64: kprobe: Always blacklist the KVM world-switch code (git-fixes)
   - arm64: only advance singlestep for user instruction traps (git-fixes)
   - arm64: relocatable: fix inconsistencies in linker script and options
     (git-fixes)
   - ath10k: fix max antenna gain unit (git-fixes).
   - ath6kl: fix control-message timeout (git-fixes).
   - ath6kl: fix division by zero in send path (git-fixes).
   - ath9k: Fix potential interrupt storm on queue reset (git-fixes).
   - b43: fix a lower bounds test (git-fixes).
   - b43legacy: fix a lower bounds test (git-fixes).
   - backlight: pwm_bl: Improve bootloader/kernel device handover
     (bsc#1129770)
   - bnx2x: fix napi API usage sequence (bsc#1198217).
   - can: gs_usb: fix use of uninitialized variable, detach device on
     reception of invalid USB data (git-fixes).
   - char/mwave: Adjust io port register size (git-fixes).
   - cifs: do not skip link targets when an I/O fails (bsc#1194625).
   - crypto: arm64/aes-ce-cipher - move assembler code to .S file (git-fixes)
   - drm: add a locked version of drm_is_current_master (bsc#1197914).
   - drm: drm_file struct kABI compatibility workaround (bsc#1197914).
   - drm: protect drm_master pointers in drm_lease.c (bsc#1197914).
   - drm: serialize drm_file.master with a new spinlock (bsc#1197914).
   - drm: use the lookup lock in drm_is_current_master (bsc#1197914).
   - fbmem: do not allow too huge resolutions (bsc#1129770)
   - fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).
   - fsl/fman: Check for null pointer after calling devm_ioremap (git-fixes).
   - hwrng: atmel - disable trng on failure path (git-fixes).
   - hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER
     (git-fixes).
   - i40e: Fix incorrect netdev's real number of RX/TX queues (git-fixes).
   - i40e: add correct exception tracing for XDP (git-fixes).
   - i40e: optimize for XDP_REDIRECT in xsk path (git-fixes).
   - ieee802154: atusb: fix uninit value in atusb_set_extended_addr
     (git-fixes).
   - io-64-nonatomic: add io{read|write}64{_lo_hi|_hi_lo} macros (git-fixes).
   - libertas: Fix possible memory leak in probe and disconnect (git-fixes).
   - libertas_tf: Fix possible memory leak in probe and disconnect
     (git-fixes).
   - livepatch: Do not block removal of patches that are safe to unload
     (bsc#1071995).
   - mac80211: mesh: fix potentially unaligned access (git-fixes).
   - media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes).
   - media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes).
   - media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).
   - media: em28xx: fix memory leak in em28xx_init_dev (git-fixes).
   - media: lmedm04: Fix misuse of comma (git-fixes).
   - media: rc-loopback: return number of emitters rather than error
     (git-fixes).
   - media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes).
   - media: uvc: do not do DMA on stack (git-fixes).
   - media: v4l2-ioctl: S_CTRL output the right value (git-fixes).
   - media: videobuf2-core: dequeue if start_streaming fails (git-fixes).
   - mt7601u: fix rx buffer refcounting (git-fixes).
   - mwifiex: Read a PCI register after writing the TX ring write pointer
     (git-fixes).
   - mwifiex: Send DELBA requests according to spec (git-fixes).
   - mxser: fix xmit_buf leak in activate when LSR == 0xff (git-fixes).
   - net/mlx5e: Reduce tc unsupported key print level (git-fixes).
   - net: davinci_emac: Fix incorrect masking of tx and rx error channel
     (git-fixes).
   - net: ethernet: mtk_eth_soc: fix return values and refactor MDIO ops
     (git-fixes).
   - net: rtlwifi: properly check for alloc_workqueue() failure (git-fixes).
   - net: stmicro: handle clk_prepare() failure during init (git-fixes).
   - net: emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send
     (git-fixes).
   - parisc/sticon: fix reverse colors (bsc#1129770)
   - powerpc/perf: Fix power9 event alternatives (bsc#1137728, LTC#178106,
     git-fixes).
   - ppp: ensure minimum packet size in ppp_write() (git-fixes).
   - ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE
     (bsc#1198413).
   - random: check for signal_pending() outside of need_resched() check
     (git-fixes).
   - random: fix data race on crng_node_pool (git-fixes).
   - rtl8187: fix control-message timeouts (git-fixes).
   - scsi: libsas: Fix sas_ata_qc_issue() handling of NCQ NON DATA commands
     (git-fixes).
   - scsi: scsi_dh_alua: Avoid crash during alua_bus_detach() (bsc#1028340
     bsc#1198825).
   - tcp: Fix potential use-after-free due to double kfree() (bsc#1197075).
   - tcp: fix race condition when creating child sockets from syncookies
     (bsc#1197075).
   - usb: hub: Fix usb enumeration issue due to address0 race (git-fixes).
   - usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
   - usb: ulpi: Call of_node_put correctly (git-fixes).
   - usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).
   - video: fbdev: atari: Atari 2 bpp (STe) palette bugfix (bsc#1129770)
   - video: fbdev: atmel_lcdfb: fix an error code in atmel_lcdfb_probe()
     (bsc#1129770)
   - video: fbdev: chipsfb: use memset_io() instead of memset() (bsc#1129770)
   - video: fbdev: fbcvt.c: fix printing in fb_cvt_print_name() (bsc#1129770)
   - video: fbdev: omapfb: Add missing of_node_put() in dvic_probe_of
     (bsc#1129770)
   - video: fbdev: sm712fb: Fix crash in smtcfb_read() (bsc#1129770)
   - video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe()
     (bsc#1129770)
   - video: fbdev: udlfb: properly check endpoint type (bsc#1129770)
   - wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).
   - wcn36xx: add proper DMA memory barriers in rx path (git-fixes).
   - x86/pm: Save the MSR validity status at context setup (bsc#1114648).
   - x86/sev: Unroll string mmio with CC_ATTR_GUEST_UNROLL_STRING_IO
     (git-fixes).
   - x86/speculation: Restore speculation related MSRs during S3 resume
     (bsc#1114648).
   - xen/blkfront: fix comment for need_copy (git-fixes).
   - xen: detect uninitialized xenbus in xenbus_init (git-fixes).
   - xen: do not continue xenstore initialization in case of errors
     (git-fixes).
   - xen: fix is_xen_pmu() (git-fixes).


Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-SP5:

      zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-1651=1



Package List:

   - SUSE Linux Enterprise Server 12-SP5 (noarch):

      kernel-devel-azure-4.12.14-16.97.1
      kernel-source-azure-4.12.14-16.97.1

   - SUSE Linux Enterprise Server 12-SP5 (x86_64):

      kernel-azure-4.12.14-16.97.1
      kernel-azure-base-4.12.14-16.97.1
      kernel-azure-base-debuginfo-4.12.14-16.97.1
      kernel-azure-debuginfo-4.12.14-16.97.1
      kernel-azure-debugsource-4.12.14-16.97.1
      kernel-azure-devel-4.12.14-16.97.1
      kernel-syms-azure-4.12.14-16.97.1


References:

   https://www.suse.com/security/cve/CVE-2018-7755.html
   https://www.suse.com/security/cve/CVE-2019-20811.html
   https://www.suse.com/security/cve/CVE-2021-20292.html
   https://www.suse.com/security/cve/CVE-2021-20321.html
   https://www.suse.com/security/cve/CVE-2021-38208.html
   https://www.suse.com/security/cve/CVE-2021-43389.html
   https://www.suse.com/security/cve/CVE-2022-1011.html
   https://www.suse.com/security/cve/CVE-2022-1280.html
   https://www.suse.com/security/cve/CVE-2022-1353.html
   https://www.suse.com/security/cve/CVE-2022-1419.html
   https://www.suse.com/security/cve/CVE-2022-1516.html
   https://www.suse.com/security/cve/CVE-2022-23960.html
   https://www.suse.com/security/cve/CVE-2022-28748.html
   https://bugzilla.suse.com/1028340
   https://bugzilla.suse.com/1065729
   https://bugzilla.suse.com/1071995
   https://bugzilla.suse.com/1084513
   https://bugzilla.suse.com/1114648
   https://bugzilla.suse.com/1121726
   https://bugzilla.suse.com/1129770
   https://bugzilla.suse.com/1137728
   https://bugzilla.suse.com/1172456
   https://bugzilla.suse.com/1183723
   https://bugzilla.suse.com/1187055
   https://bugzilla.suse.com/1191647
   https://bugzilla.suse.com/1191958
   https://bugzilla.suse.com/1194625
   https://bugzilla.suse.com/1196018
   https://bugzilla.suse.com/1196247
   https://bugzilla.suse.com/1196657
   https://bugzilla.suse.com/1196901
   https://bugzilla.suse.com/1197075
   https://bugzilla.suse.com/1197343
   https://bugzilla.suse.com/1197663
   https://bugzilla.suse.com/1197888
   https://bugzilla.suse.com/1197914
   https://bugzilla.suse.com/1198217
   https://bugzilla.suse.com/1198228
   https://bugzilla.suse.com/1198400
   https://bugzilla.suse.com/1198413
   https://bugzilla.suse.com/1198516
   https://bugzilla.suse.com/1198660
   https://bugzilla.suse.com/1198687
   https://bugzilla.suse.com/1198742
   https://bugzilla.suse.com/1198825
   https://bugzilla.suse.com/1199012



More information about the sle-updates mailing list