Security update for the Linux Kernel

SUSE Security Update: Security update for the Linux Kernel
Announcement ID: SUSE-SU-2023:0416-1
Rating: important
References: #1055710 #1084513 #1131430 #1133374 #1154848 #1166098 #1173514 #1177471 #1191961 #1196973 #1197331 #1197343 #1197366 #1197391 #1198516 #1198829 #1199063 #1199426 #1199487 #1199650 #1199657 #1200598 #1200619 #1200692 #1200910 #1201050 #1201251 #1201429 #1201635 #1201636 #1201940 #1201948 #1202097 #1202346 #1202347 #1202393 #1202500 #1202897 #1202898 #1202960 #1203107 #1203271 #1203514 #1203769 #1203960 #1203987 #1204166 #1204354 #1204405 #1204431 #1204439 #1204574 #1204631 #1204646 #1204647 #1204653 #1204894 #1204922 #1205220 #1205514 #1205671 #1205796 #1206677
Cross-References:CVE-2017-13695 CVE-2018-7755 CVE-2019-3837 CVE-2019-3900 CVE-2020-15393 CVE-2020-16119 CVE-2020-36557 CVE-2020-36558 CVE-2021-26341 CVE-2021-33655 CVE-2021-33656 CVE-2021-34981 CVE-2021-39713 CVE-2021-45868 CVE-2022-1011 CVE-2022-1048 CVE-2022-1353 CVE-2022-1462 CVE-2022-1652 CVE-2022-1679 CVE-2022-20132 CVE-2022-20166 CVE-2022-20368 CVE-2022-20369 CVE-2022-21123 CVE-2022-21125 CVE-2022-21127 CVE-2022-21166 CVE-2022-21180 CVE-2022-21385 CVE-2022-21499 CVE-2022-2318 CVE-2022-2663 CVE-2022-28356 CVE-2022-29900 CVE-2022-29901 CVE-2022-3028 CVE-2022-3303 CVE-2022-33981 CVE-2022-3424 CVE-2022-3524 CVE-2022-3565 CVE-2022-3566 CVE-2022-3586 CVE-2022-3621 CVE-2022-3635 CVE-2022-3646 CVE-2022-3649 CVE-2022-36879 CVE-2022-36946 CVE-2022-3903 CVE-2022-39188 CVE-2022-40768 CVE-2022-4095 CVE-2022-41218 CVE-2022-41848 CVE-2022-41850 CVE-2022-41858 CVE-2022-43750 CVE-2022-44032 CVE-2022-44033 CVE-2022-45934
Affected Products:
  • SUSE Linux Enterprise Server 11-SP4-LTSS-EXTREME-CORE

An update that solves 62 vulnerabilities and has one errata is now available.

Description:


The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2017-13695: Fixed fix acpi operand cache leak in nseval.c (bsc#1055710).
  • CVE-2018-7755: Fixed bypass of kernel security protections such as KASLR using fd_locked_ioctl function in drivers/block/floppy.c (bnc#1084513).
  • CVE-2019-3837: Fixed memory leak due to thread-unsafe implementation of the net_dma code in tcp_recvmsg() (bnc#1131430).
  • CVE-2019-3900: Fixed infinite loop while receiving packets in vhost_net (bnc#1133374).
  • CVE-2020-15393: Fixed memory leak in usbtest_disconnect in drivers/usb/misc/usbtest.c (bnc#1173514).
  • CVE-2020-16119: Fixed use-after-free exploitable by a local attacker due to reuse of a DCCP socket (bnc#1177471).
  • CVE-2020-36557: Fixed race condition in the VT_DISALLOCATE ioctl and closing/opening of ttys which could lead to a use-after-free (bnc#1201429).
  • CVE-2020-36558: Fixed race condition in VT_RESIZEX (bsc#1200910).
  • CVE-2021-26341: Fixed vulnerablity where some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bnc#1201050).
  • CVE-2021-33655: When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds (bnc#1201635).
  • CVE-2021-33656: Fixed memory out of bounds write when setting font with malicous data by ioctl cmd PIO_FONT (bnc#1201636).
  • CVE-2021-34981: Fixed file refcounter in bluetooth cmtp when cmtp_attach_device fails (bsc#1191961).
  • CVE-2021-39713: Fixed race condition in the network scheduling subsystem which could lead to a use-after-free (bsc#1196973).
  • CVE-2021-45868: Fixed use-after-free in fs/quota/quota_tree.c (bnc#1197366).
  • CVE-2022-1011: Fixed UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (bsc#1197343).
  • CVE-2022-1048: Fixed potential AB/BA lock with buffer_mutex and mmap_lock (bsc#1197331).
  • CVE-2022-1353: Fixed denial of service in the pfkey_register function in net/key/af_key.c (bnc#1198516).
  • CVE-2022-1462: Fixed out-of-bounds read in the TeleTYpe subsystem allowing local user to crash the system or read unauthorized random data from memory (bnc#1198829).
  • CVE-2022-1652: Fixed use after free in floppy (bsc#1199063).
  • CVE-2022-1679: Fixed use-after-free in the atheros wireless adapter driver (bnc#1199487).
  • CVE-2022-20132: Fixed out of bounds read in lg_probe and related functions of hid-lg.c and other USB HID files (bnc#1200619).
  • CVE-2022-20166: Fixed out of bounds write due to a heap buffer overflow which could lead to local escalation of privilege with System execution privileges needed (bnc#1200598).
  • CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bnc#1202346).
  • CVE-2022-20369: Fixed out of bounds write due to improper input validation in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
  • CVE-2022-21166, CVE-2022-21127, CVE-2022-21123, CVE-2022-21125, CVE-2022-21180: Fixed stale MMIO data transient information leaks (INTEL-TA-00615) (bnc#1199650).
  • CVE-2022-21385: Fixed warn in rds_message_alloc_sgs (bnc#1202897).
  • CVE-2022-21499: Fixed issue where it was trivial to break out of lockdown using kgdb (bsc#1199426).
  • CVE-2022-2318: Fixed use-after-free caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges (bnc#1201251).
  • CVE-2022-2663: Fixed possible firewall bypass when users are using unencrypted IRC due to message handling confusion in nf_conntrack_irc (bnc#1202097).
  • CVE-2022-28356: Fixed refcount leak bug in net/llc/af_llc.c (bnc#1197391).
  • CVE-2022-29900: Fixed mis-trained branch predictions for return instructions that may have allowed arbitrary speculative code execution under certain microarchitecture-dependent conditions (bnc#1199657).
  • CVE-2022-29901: Fixed vulnerability where an attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions (bnc#1199657).
  • CVE-2022-3028: Fixed a race condition in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously (bnc#1202898).
  • CVE-2022-3303: Fixed race condition in the sound subsystem due to improper locking (bnc#1203769).
  • CVE-2022-33981: Fixed denial of service in drivers/block/floppy.c (bnc#1200692).
  • CVE-2022-3424: Fixed use-after-free in gru_set_context_option leading to kernel panic (bnc#1204166).
  • CVE-2022-3524: Fixed memory leak in ipv6_renew_options of the component IPv6 Handler (bnc#1204354).
  • CVE-2022-3565: Fixed use-after-free in del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth (bnc#1204431).
  • CVE-2022-3566: Fixed race condition in the TCP Handler (bnc#1204405).
  • CVE-2022-3586: Fixed use-after-free in the sch_sfb enqueue function (bnc#1204439).
  • CVE-2022-3621: Fixed null pointer dereference in fs/nilfs2/inode.c of the component nilfs2 (bnc#1204574).
  • CVE-2022-3635: Fixed use-after-free in IPsec (bnc#1204631).
  • CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF (bnc#1204646).
  • CVE-2022-3649: Fixed use-after-free in nilfs_new_inode of the file fs/nilfs2/inode.c (bnc#1204647).
  • CVE-2022-36879: Fixed double refcount drop in xfrm_expand_policies in net/xfrm/xfrm_policy.c (bnc#1201948).
  • CVE-2022-36946: Fixed denial of service in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (bnc#1201940).
  • CVE-2022-3903: Fixed incorrect read request flaw in the Infrared Transceiver USB driver (bnc#1205220).
  • CVE-2022-39188: Fixed TLB flush for PFNMAP mappings before unlink_file_vma() (bsc#1203107).
  • CVE-2022-40768: Fixed information leak in drivers/scsi/stex.c (bnc#1203514).
  • CVE-2022-4095: Fixed use-after-free in rtl8712 (bsc#1205514).
  • CVE-2022-41218: Fixed use-after-free in drivers/media/dvb-core/dmxdev.c (bnc#1202960).
  • CVE-2022-41848: Fixed use-after-free in drivers/char/pcmcia/synclink_cs.c (bnc#1203987).
  • CVE-2022-41850: Fixed use-after-free in roccat_report_event in drivers/hid/hid-roccat.c (bnc#1203960).
  • CVE-2022-41858: Fixed NULL pointer dereference in drivers/net/slip/slip.c (bnc#1205671).
  • CVE-2022-43750: Fixed memory corruption in drivers/usb/mon/mon_bin.c (bnc#1204653).
  • CVE-2022-44032: Fixed race condition in drivers/char/pcmcia/cm4000_cs.c (bnc#1204894).
  • CVE-2022-44033: Fixed use-after-free in drivers/char/pcmcia/cm4040_cs.c (bnc#1204922).
  • CVE-2022-45934: Fixed integer wraparound in net/bluetooth/l2cap_core.c (bnc#1205796).

The following non-security bugs were fixed:
  • Fail if no bound addresses can be used for a given scope (bsc#1206677).
  • Fixed missing check on handle in net_sched cls_route (bsc#1202393).
  • Trim skb to alloc size to avoid MSG_TRUNC (bsc#1166098).
  • Fixed confusing boot logging with Skylake on RETBLEED kernel (bsc#1202500).
  • Fixed retbleed performance issues (bsc#1203271).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Server 11-SP4-LTSS-EXTREME-CORE:
    zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2023-416=1

Package List:

  • SUSE Linux Enterprise Server 11-SP4-LTSS-EXTREME-CORE (x86_64):
    • kernel-default-3.0.101-108.138.1
    • kernel-default-base-3.0.101-108.138.1
    • kernel-default-devel-3.0.101-108.138.1
    • kernel-ec2-3.0.101-108.138.1
    • kernel-ec2-base-3.0.101-108.138.1
    • kernel-ec2-devel-3.0.101-108.138.1
    • kernel-source-3.0.101-108.138.1
    • kernel-syms-3.0.101-108.138.1
    • kernel-trace-3.0.101-108.138.1
    • kernel-trace-base-3.0.101-108.138.1
    • kernel-trace-devel-3.0.101-108.138.1
    • kernel-xen-3.0.101-108.138.1
    • kernel-xen-base-3.0.101-108.138.1
    • kernel-xen-devel-3.0.101-108.138.1

References: