SUSE-SU-2022:0371-1

Source
https://www.suse.com/support/update/announcement/2022/suse-su-20220371-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2022:0371-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2022:0371-1
Related
Published
2022-02-11T07:37:14Z
Modified
2022-02-11T07:37:14Z
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 12 SP4 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
  • CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).
  • CVE-2022-0322: Fixed SCTP issue with account stream padding length for reconf chunk (bsc#1194985).
  • CVE-2021-45486: Fixed information leak inside the IPv4 implementation caused by very small hash table (bnc#1194087).
  • CVE-2021-45095: Fixed refcount leak in pepsockaccept in net/phonet/pep.c (bnc#1193867).
  • CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/teeshm.c in the TEE subsystem, that could have occured because of a race condition in teeshmgetfrom_id during an attempt to free a shared memory object (bnc#1193767).
  • CVE-2021-43976: Fixed a flaw that could allow an attacker (who can connect a crafted USB device) to cause a denial of service. (bnc#1192847)
  • CVE-2021-43975: Fixed a flaw in hwatlutilsfwrpc_wait that could allow an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value. (bsc#1192845)
  • CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194529).
  • CVE-2021-4197: Use cgroup open-time credentials for process migraton perm checks (bsc#1194302).
  • CVE-2021-4159: Fixed kernel ptr leak vulnerability via BPF in coerceregto_size (bsc#1194227).
  • CVE-2021-4149: Fixed btrfs unlock newly allocated extent buffer after error (bsc#1194001).
  • CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1193727).
  • CVE-2021-4002: Fixed a missing TLB flush that could lead to leak or corruption of data in hugetlbfs. (bsc#1192946)
  • CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcdehdeviceresethandler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
  • CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadgetdevdescUDCshow of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
  • CVE-2021-3564: Fixed double-free memory corruption in the Linux kernel HCI device initialization subsystem that could have been used by attaching malicious HCI TTY Bluetooth devices. A local user could use this flaw to crash the system (bnc#1186207).
  • CVE-2021-33098: Fixed a potential denial of service in Intel(R) Ethernet ixgbe driver due to improper input validation. (bsc#1192877)
  • CVE-2021-28715: Fixed issue with xen/netback to do not queue unlimited number of packages (XSA-392) (bsc#1193442).
  • CVE-2021-28714: Fixed issue with xen/netback to add rx queue stall detection (XSA-392) (bsc#1193442).
  • CVE-2021-28713: Fixed issue with xen/console to harden hvc_xen against event channel storms (XSA-391) (bsc#1193440).
  • CVE-2021-28712: Fixed issue with xen/netfront to harden netfront against event channel storms (XSA-391) (bsc#1193440).
  • CVE-2021-28711: Fixed issue with xen/blkfront to harden blkfront against event channel storms (XSA-391) (bsc#1193440).
  • CVE-2021-0935: Fixed possible out of bounds write in ip6xmit of ip6output.c due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192032).
  • CVE-2021-0920: Fixed use after free bug due to a race condition in unixscmtoskb of afunix.c. This could have led to local escalation of privilege with System execution privileges needed (bnc#1193731).
  • CVE-2020-27820: Fixed a vulnerability where a use-after-frees in nouveau's postclose() handler could happen if removing device. (bsc#1179599)
  • CVE-2019-15126: Fixed a vulnerability in Broadcom and Cypress Wi-Fi chips, used in RPi family of devices aka 'Kr00k'. (bsc#1167162)
  • CVE-2018-25020: Fixed an overflow in the BPF subsystem due to a mishandling of a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions. This affects kernel/bpf/core.c and net/core/filter.c (bnc#1193575).

The following non-security bugs were fixed:

  • Bluetooth: fix the erroneous flush_work() order (git-fixes).
  • Build: Add obsoleterebuildssubpackage (boo#1172073 bsc#1191731).
  • elfcore: fix building with clang (bsc#1169514).
  • fget: clarify and improve _fgetfiles() implementation (bsc#1193727).
  • hvnetvsc: Fix the queuemapping in netvscvfxmit() (bsc#1193507).
  • hvnetvsc: Set neededheadroom according to VF (bsc#1193507).
  • kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).
  • kernel-binary.spec: Check for no kernel signing certificates. Also remove unused variable.
  • kernel-binary.spec: Define $image as rpm macro (bsc#1189841).
  • kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167).
  • kernel-binary.spec: Fix kernel-default-base scriptlets after packaging merge.
  • kernel-binary.spec: suse-kernel-rpm-scriptlets required for uninstall as well (bsc#1189841).
  • kernel-cert-subpackage: Fix certificate location in scriptlets (bsc#1189841).
  • kernel-source.spec: install-kernel-tools also required on 15.4
  • kernel-spec-macros: Since rpm 4.17 %verbose is unusable (bsc#1191229).
  • kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
  • livepatch: Avoid CPU hogging with cond_resched (bsc#1071995).
  • memstick: rtsxusbms: fix UAF (bsc#1194516).
  • moxart: fix potential use-after-free on remove path (bsc#1194516).
  • net: Using proper atomic helper (bsc#1186222).
  • net: mana: Add RX fencing (bsc#1193507).
  • net: mana: Add XDP support (bsc#1193507).
  • net: mana: Allow setting the number of queues while the NIC is down (bsc#1193507).
  • net: mana: Fix spelling mistake 'calledd' -> 'called' (bsc#1193507).
  • net: mana: Fix the netdeverr()'s vPort argument in manainit_port() (bsc#1193507).
  • net: mana: Improve the HWC error handling (bsc#1193507).
  • net: mana: Support hibernation and kexec (bsc#1193507).
  • net: mana: Use kcalloc() instead of kzalloc() (bsc#1193507).
  • objtool: Support Clang non-section symbols in ORC generation (bsc#1169514).
  • post.sh: detect /usr mountpoint too
  • recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
  • recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#1192267).
  • rpm/kernel-binary.spec.in: Use kmod-zstd provide. This makes it possible to use kmod with ZSTD support on non-Tumbleweed.
  • rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release had arbitrary values in staging, we can't use it for dependencies. The filesystem one has to be enough (boo#1184804).
  • rpm/kernel-binary.spec.in: do not strip vmlinux again (bsc#1193306) After usrmerge, vmlinux file is not named vmlinux-<version>, but simply vmlinux. And this is not reflected in STRIPKEEPSYMTAB we set. So fix this by removing the dash...
  • rpm/kernel-binary.spec: Use only non-empty certificates.
  • rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305)
  • rpm/kernel-source.rpmlintrc: ignore new include/config files In 5.13, since 0e0345b77ac4, config files have no longer .h suffix. Adapt the zero-length check. Based on Martin Liska's change.
  • rpm/kernel-source.spec.in: do some more for vanillaonly Make sure: * sources are NOT executable * env is not used as interpreter * timestamps are correct We do all this for normal kernel builds, but not for vanillaonly kernels (linux-next and vanilla).
  • rpm: fixup support gz and zst compression methods (bsc#1190428, bsc#1190358).
  • rpm: use _rpmmacrodir (boo#1191384)
  • tty: hvc: replace BUG_ON() with negative return value (git-fixes).
  • vfs: check fd has read access in kernelreadfilefromfd() (bsc#1194888).
  • watchdog: iTCO_wdt: Export vendorsupport (bsc#1177101).
  • watchdog: iTCOwdt: Make ICHRESIOSMI optional (bsc#1177101).
  • x86/xen: Mark cpubringupandidle() as deadend_function (bsc#1169514).
  • xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
  • xen/blkfront: do not trust the backend response data blindly (git-fixes).
  • xen/blkfront: read response from backend only once (git-fixes).
  • xen/netfront: disentangle txskbfreelist (git-fixes).
  • xen/netfront: do not read data from request on the ring page (git-fixes).
  • xen/netfront: do not trust the backend response data blindly (git-fixes).
  • xen/netfront: read response from backend only once (git-fixes).
  • xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
  • xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
References

Affected packages

SUSE:OpenStack Cloud 9 / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%209

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-95.88.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.12.14-95.88.1",
            "kernel-devel": "4.12.14-95.88.1",
            "kernel-default-base": "4.12.14-95.88.1",
            "kernel-default": "4.12.14-95.88.1",
            "kernel-source": "4.12.14-95.88.1",
            "kernel-syms": "4.12.14-95.88.1",
            "kernel-default-devel": "4.12.14-95.88.1"
        }
    ]
}

SUSE:OpenStack Cloud 9 / kernel-source

Package

Name
kernel-source
Purl
purl:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%209

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-95.88.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.12.14-95.88.1",
            "kernel-devel": "4.12.14-95.88.1",
            "kernel-default-base": "4.12.14-95.88.1",
            "kernel-default": "4.12.14-95.88.1",
            "kernel-source": "4.12.14-95.88.1",
            "kernel-syms": "4.12.14-95.88.1",
            "kernel-default-devel": "4.12.14-95.88.1"
        }
    ]
}

SUSE:OpenStack Cloud 9 / kernel-syms

Package

Name
kernel-syms
Purl
purl:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%209

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-95.88.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.12.14-95.88.1",
            "kernel-devel": "4.12.14-95.88.1",
            "kernel-default-base": "4.12.14-95.88.1",
            "kernel-default": "4.12.14-95.88.1",
            "kernel-source": "4.12.14-95.88.1",
            "kernel-syms": "4.12.14-95.88.1",
            "kernel-default-devel": "4.12.14-95.88.1"
        }
    ]
}

SUSE:OpenStack Cloud Crowbar 9 / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-95.88.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.12.14-95.88.1",
            "kernel-devel": "4.12.14-95.88.1",
            "kernel-default-base": "4.12.14-95.88.1",
            "kernel-default": "4.12.14-95.88.1",
            "kernel-source": "4.12.14-95.88.1",
            "kernel-syms": "4.12.14-95.88.1",
            "kernel-default-devel": "4.12.14-95.88.1"
        }
    ]
}

SUSE:OpenStack Cloud Crowbar 9 / kernel-source

Package

Name
kernel-source
Purl
purl:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-95.88.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.12.14-95.88.1",
            "kernel-devel": "4.12.14-95.88.1",
            "kernel-default-base": "4.12.14-95.88.1",
            "kernel-default": "4.12.14-95.88.1",
            "kernel-source": "4.12.14-95.88.1",
            "kernel-syms": "4.12.14-95.88.1",
            "kernel-default-devel": "4.12.14-95.88.1"
        }
    ]
}

SUSE:OpenStack Cloud Crowbar 9 / kernel-syms

Package

Name
kernel-syms
Purl
purl:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-95.88.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.12.14-95.88.1",
            "kernel-devel": "4.12.14-95.88.1",
            "kernel-default-base": "4.12.14-95.88.1",
            "kernel-default": "4.12.14-95.88.1",
            "kernel-source": "4.12.14-95.88.1",
            "kernel-syms": "4.12.14-95.88.1",
            "kernel-default-devel": "4.12.14-95.88.1"
        }
    ]
}

SUSE:Linux Enterprise High Availability Extension 12 SP4 / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-95.88.1

Ecosystem specific

{
    "binaries": [
        {
            "dlm-kmp-default": "4.12.14-95.88.1",
            "gfs2-kmp-default": "4.12.14-95.88.1",
            "ocfs2-kmp-default": "4.12.14-95.88.1",
            "cluster-md-kmp-default": "4.12.14-95.88.1"
        }
    ]
}

SUSE:Linux Enterprise Live Patching 12 SP4 / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-95.88.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-kgraft": "4.12.14-95.88.1",
            "kernel-default-kgraft-devel": "4.12.14-95.88.1",
            "kgraft-patch-4_12_14-95_88-default": "1-6.5.1"
        }
    ]
}

SUSE:Linux Enterprise Live Patching 12 SP4 / kgraft-patch-SLE12-SP4_Update_24

Package

Name
kgraft-patch-SLE12-SP4_Update_24
Purl
purl:rpm/suse/kgraft-patch-SLE12-SP4_Update_24&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1-6.5.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-kgraft": "4.12.14-95.88.1",
            "kernel-default-kgraft-devel": "4.12.14-95.88.1",
            "kgraft-patch-4_12_14-95_88-default": "1-6.5.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 12 SP4 / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-95.88.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.12.14-95.88.1",
            "kernel-devel": "4.12.14-95.88.1",
            "kernel-default-base": "4.12.14-95.88.1",
            "kernel-default": "4.12.14-95.88.1",
            "kernel-source": "4.12.14-95.88.1",
            "kernel-syms": "4.12.14-95.88.1",
            "kernel-default-devel": "4.12.14-95.88.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 12 SP4 / kernel-source

Package

Name
kernel-source
Purl
purl:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-95.88.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.12.14-95.88.1",
            "kernel-devel": "4.12.14-95.88.1",
            "kernel-default-base": "4.12.14-95.88.1",
            "kernel-default": "4.12.14-95.88.1",
            "kernel-source": "4.12.14-95.88.1",
            "kernel-syms": "4.12.14-95.88.1",
            "kernel-default-devel": "4.12.14-95.88.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 12 SP4 / kernel-syms

Package

Name
kernel-syms
Purl
purl:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-95.88.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.12.14-95.88.1",
            "kernel-devel": "4.12.14-95.88.1",
            "kernel-default-base": "4.12.14-95.88.1",
            "kernel-default": "4.12.14-95.88.1",
            "kernel-source": "4.12.14-95.88.1",
            "kernel-syms": "4.12.14-95.88.1",
            "kernel-default-devel": "4.12.14-95.88.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP4-LTSS / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-95.88.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.12.14-95.88.1",
            "kernel-devel": "4.12.14-95.88.1",
            "kernel-default-base": "4.12.14-95.88.1",
            "kernel-default-man": "4.12.14-95.88.1",
            "kernel-default": "4.12.14-95.88.1",
            "kernel-source": "4.12.14-95.88.1",
            "kernel-syms": "4.12.14-95.88.1",
            "kernel-default-devel": "4.12.14-95.88.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP4-LTSS / kernel-source

Package

Name
kernel-source
Purl
purl:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-95.88.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.12.14-95.88.1",
            "kernel-devel": "4.12.14-95.88.1",
            "kernel-default-base": "4.12.14-95.88.1",
            "kernel-default-man": "4.12.14-95.88.1",
            "kernel-default": "4.12.14-95.88.1",
            "kernel-source": "4.12.14-95.88.1",
            "kernel-syms": "4.12.14-95.88.1",
            "kernel-default-devel": "4.12.14-95.88.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP4-LTSS / kernel-syms

Package

Name
kernel-syms
Purl
purl:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-95.88.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.12.14-95.88.1",
            "kernel-devel": "4.12.14-95.88.1",
            "kernel-default-base": "4.12.14-95.88.1",
            "kernel-default-man": "4.12.14-95.88.1",
            "kernel-default": "4.12.14-95.88.1",
            "kernel-source": "4.12.14-95.88.1",
            "kernel-syms": "4.12.14-95.88.1",
            "kernel-default-devel": "4.12.14-95.88.1"
        }
    ]
}