SUSE-SU-2022:0477-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2022:0477-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2022:0477-1
Related
Published
2022-02-17T13:41:34Z
Modified
2022-02-17T13:41:34Z
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2018-25020: Fixed an overflow in the BPF subsystem due to a mishandling of a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions. This affects kernel/bpf/core.c and net/core/filter.c (bnc#1193575).
  • CVE-2019-0136: Fixed insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver that may have allowed an unauthenticated user to potentially enable denial of service via adjacent access (bnc#1193157).
  • CVE-2020-35519: Fixed out-of-bounds memory access in x25bind in net/x25/afx25.c. A bounds check failure allowed a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information (bnc#1183696).
  • CVE-2021-0935: Fixed possible out of bounds write in ip6xmit of ip6output.c due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192032).
  • CVE-2021-28711: Fixed issue with xen/blkfront to harden blkfront against event channel storms (XSA-391) (bsc#1193440).
  • CVE-2021-28712: Fixed issue with xen/netfront to harden netfront against event channel storms (XSA-391) (bsc#1193440).
  • CVE-2021-28713: Fixed issue with xen/console to harden hvc_xen against event channel storms (XSA-391) (bsc#1193440).
  • CVE-2021-28715: Fixed issue with xen/netback to do not queue unlimited number of packages (XSA-392) (bsc#1193442).
  • CVE-2021-33098: Fixed improper input validation in the Intel(R) Ethernet ixgbe driver that may have allowed an authenticated user to potentially cause denial of service via local access (bnc#1192877).
  • CVE-2021-3564: Fixed double-free memory corruption in the Linux kernel HCI device initialization subsystem that could have been used by attaching malicious HCI TTY Bluetooth devices. A local user could use this flaw to crash the system (bnc#1186207).
  • CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadgetdevdescUDCshow of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
  • CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcdehdeviceresethandler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
  • CVE-2021-4002: Fixed incorrect TLBs flush in hugetlbfs after hugepmdunshare (bsc#1192946).
  • CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1193727).
  • CVE-2021-4149: Fixed btrfs unlock newly allocated extent buffer after error (bsc#1194001).
  • CVE-2021-4155: Fixed XFS map issue when unwritten blocks in XFSIOC{ALLOC,FREE}SP just like fallocate (bsc#1194272).
  • CVE-2021-4197: Use cgroup open-time credentials for process migraton perm checks (bsc#1194302).
  • CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194529).
  • CVE-2021-43976: Fixed insufficient access control in drivers/net/wireless/marvell/mwifiex/usb.c that allowed an attacker who connect a crafted USB device to cause denial of service (bnc#1192847).
  • CVE-2021-45095: Fixed refcount leak in pepsockaccept in net/phonet/pep.c (bnc#1193867).
  • CVE-2021-45485: Fixed information leak in the IPv6 implementation in net/ipv6/output_core.c (bnc#1194094).
  • CVE-2021-45486: Fixed information leak inside the IPv4 implementation caused by very small hash table (bnc#1194087).
  • CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).

The following non-security bugs were fixed:

  • kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
  • memstick: rtsxusbms: fix UAF
  • moxart: fix potential use-after-free on remove path (bsc1194516).
  • net/x25: fix a race in x25bind() (networking-stable-1903_15).
  • ring-buffer: Protect ringbufferreset() from reentrancy (bsc#1179960).
  • tty: hvc: replace BUG_ON() with negative return value (git-fixes).
  • xen-netfront: do not assume skbuffhead list is empty in error handling (git-fixes).
  • xen-netfront: do not use ~0U as error return value for xennetfillfrags() (git-fixes).
  • xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
  • xen/blkfront: do not trust the backend response data blindly (git-fixes).
  • xen/blkfront: read response from backend only once (git-fixes).
  • xen/netfront: disentangle txskbfreelist (git-fixes).
  • xen/netfront: do not bug in case of too many frags (bnc#1012382).
  • xen/netfront: do not cache skb_shinfo() (bnc#1012382).
  • xen/netfront: do not read data from request on the ring page (git-fixes).
  • xen/netfront: do not trust the backend response data blindly (git-fixes).
  • xen/netfront: read response from backend only once (git-fixes).
  • xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
References

Affected packages

SUSE:Linux Enterprise Server 12 SP2-BCL / kernel-default

Package

Name
kernel-default
Purl
purl:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.121-92.164.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.121-92.164.1",
            "kernel-devel": "4.4.121-92.164.1",
            "kernel-default-base": "4.4.121-92.164.1",
            "kernel-default": "4.4.121-92.164.1",
            "kernel-source": "4.4.121-92.164.1",
            "kernel-syms": "4.4.121-92.164.1",
            "kernel-default-devel": "4.4.121-92.164.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP2-BCL / kernel-source

Package

Name
kernel-source
Purl
purl:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.121-92.164.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.121-92.164.1",
            "kernel-devel": "4.4.121-92.164.1",
            "kernel-default-base": "4.4.121-92.164.1",
            "kernel-default": "4.4.121-92.164.1",
            "kernel-source": "4.4.121-92.164.1",
            "kernel-syms": "4.4.121-92.164.1",
            "kernel-default-devel": "4.4.121-92.164.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP2-BCL / kernel-syms

Package

Name
kernel-syms
Purl
purl:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.121-92.164.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.4.121-92.164.1",
            "kernel-devel": "4.4.121-92.164.1",
            "kernel-default-base": "4.4.121-92.164.1",
            "kernel-default": "4.4.121-92.164.1",
            "kernel-source": "4.4.121-92.164.1",
            "kernel-syms": "4.4.121-92.164.1",
            "kernel-default-devel": "4.4.121-92.164.1"
        }
    ]
}