-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.0615
                   Security update for the Linux Kernel
                             11 February 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Linux Kernel
Publisher:         SUSE
Operating System:  SUSE
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-0330 CVE-2021-45486 CVE-2021-45485
                   CVE-2021-45095 CVE-2021-43976 CVE-2021-39657
                   CVE-2021-39648 CVE-2021-33098 CVE-2021-28715
                   CVE-2021-28714 CVE-2021-28713 CVE-2021-28712
                   CVE-2021-28711 CVE-2021-4202 CVE-2021-4197
                   CVE-2021-4155 CVE-2021-4149 CVE-2021-4083
                   CVE-2021-4002 CVE-2021-3564 CVE-2021-0935
                   CVE-2020-35519 CVE-2019-0136 CVE-2018-25020

Reference:         ASB-2021.0206
                   ASB-2021.0198
                   ESB-2022.0604
                   ESB-2022.0565

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2022/suse-su-20220362-1

Comment: CVSS (Max):  7.8* CVE-2020-35519 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: SUSE
         * Not all CVSS available when published

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

Announcement ID:   SUSE-SU-2022:0362-1
Rating:            important
References:        #1012382 #1179960 #1183696 #1186207 #1192032 #1192267
                   #1192847 #1192877 #1192946 #1193157 #1193440 #1193442
                   #1193507 #1193575 #1193669 #1193727 #1193861 #1193864
                   #1193867 #1194001 #1194087 #1194094 #1194272 #1194302
                   #1194516 #1194529 #1194880
Cross-References:  CVE-2018-25020 CVE-2019-0136 CVE-2020-35519 CVE-2021-0935
                   CVE-2021-28711 CVE-2021-28712 CVE-2021-28713 CVE-2021-28715
                   CVE-2021-33098 CVE-2021-3564 CVE-2021-39648 CVE-2021-39657
                   CVE-2021-4002 CVE-2021-4083 CVE-2021-4149 CVE-2021-4155
                   CVE-2021-4197 CVE-2021-4202 CVE-2021-43976 CVE-2021-45095
                   CVE-2021-45485 CVE-2021-45486 CVE-2022-0330
Affected Products:
                   HPE Helion Openstack 8
                   SUSE Linux Enterprise High Availability 12-SP3
                   SUSE Linux Enterprise High Performance Computing 12-SP3
                   SUSE Linux Enterprise Server 12-SP3
                   SUSE Linux Enterprise Server 12-SP3-BCL
                   SUSE Linux Enterprise Server 12-SP3-LTSS
                   SUSE Linux Enterprise Server 12-SP4
                   SUSE Linux Enterprise Server 12-SP5
                   SUSE Linux Enterprise Server for SAP 12-SP3
                   SUSE Linux Enterprise Server for SAP Applications 12-SP3
                   SUSE Linux Enterprise Server for SAP Applications 12-SP4
                   SUSE Linux Enterprise Server for SAP Applications 12-SP5
                   SUSE OpenStack Cloud 8
                   SUSE OpenStack Cloud Crowbar 8
______________________________________________________________________________

An update that solves 23 vulnerabilities and has four fixes is now available.

Description:


The SUSE Linux Enterprise 12 SP3 LTSS kernel was updated to receive various
security and bugfixes.

The following security bugs were fixed:

  o CVE-2018-25020: Fixed an overflow in the BPF subsystem due to a mishandling
    of a long jump over an instruction sequence where inner instructions
    require substantial expansions into multiple BPF instructions. This affects
    kernel/bpf/core.c and net/core/filter.c (bnc#1193575).
  o CVE-2019-0136: Fixed insufficient access control in the Intel(R) PROSet/
    Wireless WiFi Software driver that may have allowed an unauthenticated user
    to potentially enable denial of service via adjacent access (bnc#1193157).
  o CVE-2020-35519: Fixed out-of-bounds memory access in x25_bind in net/x25/
    af_x25.c. A bounds check failure allowed a local attacker with a user
    account on the system to gain access to out-of-bounds memory, leading to a
    system crash or a leak of internal kernel information (bnc#1183696).
  o CVE-2021-0935: Fixed possible out of bounds write in ip6_xmit of
    ip6_output.c due to a use after free. This could lead to local escalation
    of privilege with System execution privileges needed. User interaction is
    not needed for exploitation (bnc#1192032).
  o CVE-2021-28711: Fixed issue with xen/blkfront to harden blkfront against
    event channel storms (XSA-391) (bsc#1193440).
  o CVE-2021-28712: Fixed issue with xen/netfront to harden netfront against
    event channel storms (XSA-391) (bsc#1193440).
  o CVE-2021-28713: Fixed issue with xen/console to harden hvc_xen against
    event channel storms (XSA-391) (bsc#1193440).
  o CVE-2021-28715: Fixed issue with xen/netback to do not queue unlimited
    number of packages (XSA-392) (bsc#1193442).
  o CVE-2021-33098: Fixed improper input validation in the Intel(R) Ethernet
    ixgbe driver that may have allowed an authenticated user to potentially
    cause denial of service via local access (bnc#1192877).
  o CVE-2021-3564: Fixed double-free memory corruption in the Linux kernel HCI
    device initialization subsystem that could have been used by attaching
    malicious HCI TTY Bluetooth devices. A local user could use this flaw to
    crash the system (bnc#1186207).
  o CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a
    race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead
    to local information disclosure with System execution privileges needed.
    User interaction is not needed for exploitation (bnc#1193861).
  o CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in
    ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local
    information disclosure with System execution privileges needed (bnc#
    1193864).
  o CVE-2021-4002: Fixed incorrect TLBs flush in hugetlbfs after
    huge_pmd_unshare (bsc#1192946).
  o CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage
    collection for Unix domain socket file handlers when users call close() and
    fget() simultaneouslyand can potentially trigger a race condition (bnc#
    1193727).
  o CVE-2021-4149: Fixed btrfs unlock newly allocated extent buffer after error
    (bsc#1194001).
  o CVE-2021-4155: Fixed XFS map issue when unwritten blocks in XFS_IOC_
    {ALLOC,FREE}SP just like fallocate (bsc#1194272).
  o CVE-2021-4197: Use cgroup open-time credentials for process migraton perm
    checks (bsc#1194302).
  o CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#
    1194529).
  o CVE-2021-43976: Fixed insufficient access control in drivers/net/wireless/
    marvell/mwifiex/usb.c that allowed an attacker who connect a crafted USB
    device to cause denial of service (bnc#1192847).
  o CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c
    (bnc#1193867).
  o CVE-2021-45485: Fixed information leak in the IPv6 implementation in net/
    ipv6/output_core.c (bnc#1194094).
  o CVE-2021-45486: Fixed information leak inside the IPv4 implementation
    caused by very small hash table (bnc#1194087).
  o CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#
    1194880).

The following non-security bugs were fixed:

  o fget: clarify and improve __fget_files() implementation (bsc#1193727).
  o hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (bsc#1193507).
  o hv_netvsc: Set needed_headroom according to VF (bsc#1193507).
  o kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
  o memstick: rtsx_usb_ms: fix UAF
  o moxart: fix potential use-after-free on remove path (bsc1194516).
  o net/x25: fix a race in x25_bind() (networking-stable-19_03_15).
  o net: mana: Add RX fencing (bsc#1193507).
  o net: mana: Allow setting the number of queues while the NIC is down (bsc#
    1193507).
  o net: mana: Fix spelling mistake "calledd" -> "called" (bsc#1193507).
  o net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (bsc#
    1193507).
  o net: mana: Improve the HWC error handling (bsc#1193507).
  o net: mana: Support hibernation and kexec (bsc#1193507).
  o net: mana: Use kcalloc() instead of kzalloc() (bsc#1193507).
  o recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
  o recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#
    1192267).
  o ring-buffer: Protect ring_buffer_reset() from reentrancy (bsc#1179960).
  o tty: hvc: replace BUG_ON() with negative return value (git-fixes).
  o xen-netfront: do not assume sk_buff_head list is empty in error handling
    (git-fixes).
  o xen-netfront: do not use ~0U as error return value for xennet_fill_frags()
    (git-fixes).
  o xen/blkfront: do not take local copy of a request from the ring page
    (git-fixes).
  o xen/blkfront: do not trust the backend response data blindly (git-fixes).
  o xen/blkfront: read response from backend only once (git-fixes).
  o xen/netfront: disentangle tx_skb_freelist (git-fixes).
  o xen/netfront: do not bug in case of too many frags (bnc#1012382).
  o xen/netfront: do not cache skb_shinfo() (bnc#1012382).
  o xen/netfront: do not read data from request on the ring page (git-fixes).
  o xen/netfront: do not trust the backend response data blindly (git-fixes).
  o xen/netfront: read response from backend only once (git-fixes).
  o xen: sync include/xen/interface/io/ring.h with Xen's newest version
    (git-fixes).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE OpenStack Cloud Crowbar 8:
    zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2022-362=1
  o SUSE OpenStack Cloud 8:
    zypper in -t patch SUSE-OpenStack-Cloud-8-2022-362=1
  o SUSE Linux Enterprise Server for SAP 12-SP3:
    zypper in -t patch SUSE-SLE-SAP-12-SP3-2022-362=1
  o SUSE Linux Enterprise Server 12-SP3-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-2022-362=1
  o SUSE Linux Enterprise Server 12-SP3-BCL:
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2022-362=1
  o SUSE Linux Enterprise High Availability 12-SP3:
    zypper in -t patch SUSE-SLE-HA-12-SP3-2022-362=1
  o HPE Helion Openstack 8:
    zypper in -t patch HPE-Helion-OpenStack-8-2022-362=1

Package List:

  o SUSE OpenStack Cloud Crowbar 8 (noarch):
       kernel-devel-4.4.180-94.153.1
       kernel-macros-4.4.180-94.153.1
       kernel-source-4.4.180-94.153.1
  o SUSE OpenStack Cloud Crowbar 8 (x86_64):
       kernel-default-4.4.180-94.153.1
       kernel-default-base-4.4.180-94.153.1
       kernel-default-base-debuginfo-4.4.180-94.153.1
       kernel-default-debuginfo-4.4.180-94.153.1
       kernel-default-debugsource-4.4.180-94.153.1
       kernel-default-devel-4.4.180-94.153.1
       kernel-default-kgraft-4.4.180-94.153.1
       kernel-syms-4.4.180-94.153.1
       kgraft-patch-4_4_180-94_153-default-1-4.3.1
       kgraft-patch-4_4_180-94_153-default-debuginfo-1-4.3.1
  o SUSE OpenStack Cloud 8 (x86_64):
       kernel-default-4.4.180-94.153.1
       kernel-default-base-4.4.180-94.153.1
       kernel-default-base-debuginfo-4.4.180-94.153.1
       kernel-default-debuginfo-4.4.180-94.153.1
       kernel-default-debugsource-4.4.180-94.153.1
       kernel-default-devel-4.4.180-94.153.1
       kernel-default-kgraft-4.4.180-94.153.1
       kernel-syms-4.4.180-94.153.1
       kgraft-patch-4_4_180-94_153-default-1-4.3.1
       kgraft-patch-4_4_180-94_153-default-debuginfo-1-4.3.1
  o SUSE OpenStack Cloud 8 (noarch):
       kernel-devel-4.4.180-94.153.1
       kernel-macros-4.4.180-94.153.1
       kernel-source-4.4.180-94.153.1
  o SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64):
       kernel-default-4.4.180-94.153.1
       kernel-default-base-4.4.180-94.153.1
       kernel-default-base-debuginfo-4.4.180-94.153.1
       kernel-default-debuginfo-4.4.180-94.153.1
       kernel-default-debugsource-4.4.180-94.153.1
       kernel-default-devel-4.4.180-94.153.1
       kernel-default-kgraft-4.4.180-94.153.1
       kernel-syms-4.4.180-94.153.1
       kgraft-patch-4_4_180-94_153-default-1-4.3.1
       kgraft-patch-4_4_180-94_153-default-debuginfo-1-4.3.1
  o SUSE Linux Enterprise Server for SAP 12-SP3 (noarch):
       kernel-devel-4.4.180-94.153.1
       kernel-macros-4.4.180-94.153.1
       kernel-source-4.4.180-94.153.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64):
       kernel-default-4.4.180-94.153.1
       kernel-default-base-4.4.180-94.153.1
       kernel-default-base-debuginfo-4.4.180-94.153.1
       kernel-default-debuginfo-4.4.180-94.153.1
       kernel-default-debugsource-4.4.180-94.153.1
       kernel-default-devel-4.4.180-94.153.1
       kernel-syms-4.4.180-94.153.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (ppc64le x86_64):
       kernel-default-kgraft-4.4.180-94.153.1
       kgraft-patch-4_4_180-94_153-default-1-4.3.1
       kgraft-patch-4_4_180-94_153-default-debuginfo-1-4.3.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (noarch):
       kernel-devel-4.4.180-94.153.1
       kernel-macros-4.4.180-94.153.1
       kernel-source-4.4.180-94.153.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (s390x):
       kernel-default-man-4.4.180-94.153.1
  o SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):
       kernel-default-4.4.180-94.153.1
       kernel-default-base-4.4.180-94.153.1
       kernel-default-base-debuginfo-4.4.180-94.153.1
       kernel-default-debuginfo-4.4.180-94.153.1
       kernel-default-debugsource-4.4.180-94.153.1
       kernel-default-devel-4.4.180-94.153.1
       kernel-syms-4.4.180-94.153.1
  o SUSE Linux Enterprise Server 12-SP3-BCL (noarch):
       kernel-devel-4.4.180-94.153.1
       kernel-macros-4.4.180-94.153.1
       kernel-source-4.4.180-94.153.1
  o SUSE Linux Enterprise High Availability 12-SP3 (ppc64le s390x x86_64):
       cluster-md-kmp-default-4.4.180-94.153.1
       cluster-md-kmp-default-debuginfo-4.4.180-94.153.1
       dlm-kmp-default-4.4.180-94.153.1
       dlm-kmp-default-debuginfo-4.4.180-94.153.1
       gfs2-kmp-default-4.4.180-94.153.1
       gfs2-kmp-default-debuginfo-4.4.180-94.153.1
       kernel-default-debuginfo-4.4.180-94.153.1
       kernel-default-debugsource-4.4.180-94.153.1
       ocfs2-kmp-default-4.4.180-94.153.1
       ocfs2-kmp-default-debuginfo-4.4.180-94.153.1
  o HPE Helion Openstack 8 (noarch):
       kernel-devel-4.4.180-94.153.1
       kernel-macros-4.4.180-94.153.1
       kernel-source-4.4.180-94.153.1
  o HPE Helion Openstack 8 (x86_64):
       kernel-default-4.4.180-94.153.1
       kernel-default-base-4.4.180-94.153.1
       kernel-default-base-debuginfo-4.4.180-94.153.1
       kernel-default-debuginfo-4.4.180-94.153.1
       kernel-default-debugsource-4.4.180-94.153.1
       kernel-default-devel-4.4.180-94.153.1
       kernel-default-kgraft-4.4.180-94.153.1
       kernel-syms-4.4.180-94.153.1
       kgraft-patch-4_4_180-94_153-default-1-4.3.1
       kgraft-patch-4_4_180-94_153-default-debuginfo-1-4.3.1


References:

  o https://www.suse.com/security/cve/CVE-2018-25020.html
  o https://www.suse.com/security/cve/CVE-2019-0136.html
  o https://www.suse.com/security/cve/CVE-2020-35519.html
  o https://www.suse.com/security/cve/CVE-2021-0935.html
  o https://www.suse.com/security/cve/CVE-2021-28711.html
  o https://www.suse.com/security/cve/CVE-2021-28712.html
  o https://www.suse.com/security/cve/CVE-2021-28713.html
  o https://www.suse.com/security/cve/CVE-2021-28715.html
  o https://www.suse.com/security/cve/CVE-2021-33098.html
  o https://www.suse.com/security/cve/CVE-2021-3564.html
  o https://www.suse.com/security/cve/CVE-2021-39648.html
  o https://www.suse.com/security/cve/CVE-2021-39657.html
  o https://www.suse.com/security/cve/CVE-2021-4002.html
  o https://www.suse.com/security/cve/CVE-2021-4083.html
  o https://www.suse.com/security/cve/CVE-2021-4149.html
  o https://www.suse.com/security/cve/CVE-2021-4155.html
  o https://www.suse.com/security/cve/CVE-2021-4197.html
  o https://www.suse.com/security/cve/CVE-2021-4202.html
  o https://www.suse.com/security/cve/CVE-2021-43976.html
  o https://www.suse.com/security/cve/CVE-2021-45095.html
  o https://www.suse.com/security/cve/CVE-2021-45485.html
  o https://www.suse.com/security/cve/CVE-2021-45486.html
  o https://www.suse.com/security/cve/CVE-2022-0330.html
  o https://bugzilla.suse.com/1012382
  o https://bugzilla.suse.com/1179960
  o https://bugzilla.suse.com/1183696
  o https://bugzilla.suse.com/1186207
  o https://bugzilla.suse.com/1192032
  o https://bugzilla.suse.com/1192267
  o https://bugzilla.suse.com/1192847
  o https://bugzilla.suse.com/1192877
  o https://bugzilla.suse.com/1192946
  o https://bugzilla.suse.com/1193157
  o https://bugzilla.suse.com/1193440
  o https://bugzilla.suse.com/1193442
  o https://bugzilla.suse.com/1193507
  o https://bugzilla.suse.com/1193575
  o https://bugzilla.suse.com/1193669
  o https://bugzilla.suse.com/1193727
  o https://bugzilla.suse.com/1193861
  o https://bugzilla.suse.com/1193864
  o https://bugzilla.suse.com/1193867
  o https://bugzilla.suse.com/1194001
  o https://bugzilla.suse.com/1194087
  o https://bugzilla.suse.com/1194094
  o https://bugzilla.suse.com/1194272
  o https://bugzilla.suse.com/1194302
  o https://bugzilla.suse.com/1194516
  o https://bugzilla.suse.com/1194529
  o https://bugzilla.suse.com/1194880

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=au+u
-----END PGP SIGNATURE-----