Security update for the Linux Kernel

Announcement ID: SUSE-SU-2022:0289-1
Rating: important
References:
Cross-References:
CVSS scores:
  • CVE-2021-4083 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-4083 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-4135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2021-4135 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2021-4149 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-4149 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-4197 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
  • CVE-2021-4197 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-4202 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-4202 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-44733 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
  • CVE-2021-44733 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-45485 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
  • CVE-2021-45485 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • CVE-2021-45486 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
  • CVE-2021-45486 ( NVD ): 3.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  • CVE-2022-0185 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-0185 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-0322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-0322 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
  • SUSE Linux Enterprise Micro 5.0
  • SUSE Linux Enterprise Real Time 15 SP2
  • SUSE Real Time Module 15-SP2

An update that solves 10 vulnerabilities and has nine security fixes can now be installed.

Description:

The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2021-4083: Fixed race condition in Unix domain socket garbage collection that could lead to read memory after free (bsc#1193727).
  • CVE-2021-4135: Fixed an information leak in the nsim_bpf_map_alloc function (bsc#1193927).
  • CVE-2021-4149: Fixed improper lock operation in btrfs that allowed users to crash the kernel or deadlock the system (bsc#1194001).
  • CVE-2021-4197: Fixed a cgroup issue where lower privileged processes could write to fds of lower privileged ones that could lead to privilege escalation (bsc#1194302).
  • CVE-2021-4202: Fixed race condition in nci_request() that could cause use-after-free (bsc#1194529).
  • CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel that occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
  • CVE-2021-45485: Fixed an information leak because of certain use of a hash table which use IPv6 source addresses (bsc#1194094).
  • CVE-2021-45486: Fixed an information leak because the hash table is very small in net/ipv4/route.c (bnc#1194087).
  • CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
  • CVE-2022-0322: Fixed a denial of service in SCTP sctp_addto_chunk (bsc#1194985).

The following non-security bugs were fixed:

  • ext4: Avoid trim error on fs with small groups (bsc#1191271).
  • fget: clarify and improve __fget_files() implementation (bsc#1193727).
  • kabi/severities: Add a kabi exception for drivers/tee/tee
  • kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
  • livepatch: Avoid CPU hogging with cond_resched (bsc#1071995).
  • media: Revert "media: uvcvideo: Set unique vdev name based in type" (bsc#1193255).
  • moxart: fix potential use-after-free on remove path (bsc#1194516).
  • powerpc/fadump: Fix inaccurate CPU state info in vmcore generated with panic (bsc#1193901).
  • powerpc: handle kdump appropriately with crash_kexec_post_notifiers option (bsc#1193901).
  • tpm: fix potential NULL pointer access in tpm_del_char_device (bsc#1184209, bsc#1193660).
  • vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888).

Special Instructions and Notes:

  • Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Real Time Module 15-SP2
    zypper in -t patch SUSE-SLE-Module-RT-15-SP2-2022-289=1
  • SUSE Linux Enterprise Micro 5.0
    zypper in -t patch SUSE-SUSE-MicroOS-5.0-2022-289=1

Package List:

  • SUSE Real Time Module 15-SP2 (x86_64)
    • kernel-rt-devel-5.3.18-68.1
    • kernel-rt-debuginfo-5.3.18-68.1
    • ocfs2-kmp-rt-debuginfo-5.3.18-68.1
    • cluster-md-kmp-rt-debuginfo-5.3.18-68.1
    • kernel-rt_debug-devel-debuginfo-5.3.18-68.1
    • kernel-syms-rt-5.3.18-68.1
    • kernel-rt_debug-debuginfo-5.3.18-68.1
    • dlm-kmp-rt-5.3.18-68.1
    • cluster-md-kmp-rt-5.3.18-68.1
    • dlm-kmp-rt-debuginfo-5.3.18-68.1
    • kernel-rt_debug-devel-5.3.18-68.1
    • kernel-rt_debug-debugsource-5.3.18-68.1
    • ocfs2-kmp-rt-5.3.18-68.1
    • kernel-rt-devel-debuginfo-5.3.18-68.1
    • gfs2-kmp-rt-debuginfo-5.3.18-68.1
    • kernel-rt-debugsource-5.3.18-68.1
    • gfs2-kmp-rt-5.3.18-68.1
  • SUSE Real Time Module 15-SP2 (noarch)
    • kernel-devel-rt-5.3.18-68.1
    • kernel-source-rt-5.3.18-68.1
  • SUSE Real Time Module 15-SP2 (nosrc x86_64)
    • kernel-rt-5.3.18-68.1
    • kernel-rt_debug-5.3.18-68.1
  • SUSE Linux Enterprise Micro 5.0 (nosrc x86_64)
    • kernel-rt-5.3.18-68.1
  • SUSE Linux Enterprise Micro 5.0 (x86_64)
    • kernel-rt-debugsource-5.3.18-68.1
    • kernel-rt-debuginfo-5.3.18-68.1

References: