-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.3417
                   Security update for the Linux Kernel
                               14 July 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Linux Kernel
Publisher:         SUSE
Operating System:  SUSE
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-33981 CVE-2022-33742 CVE-2022-33741
                   CVE-2022-33740 CVE-2022-29901 CVE-2022-29900
                   CVE-2022-26365 CVE-2022-20154 CVE-2022-20141
                   CVE-2022-20132 CVE-2022-2318 CVE-2022-1679
                   CVE-2022-1012 CVE-2021-4157 CVE-2020-26541

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2022/suse-su-20222377-1

Comment: CVSS (Max):  7.0 CVE-2022-20154 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: SUSE
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

Announcement ID:   SUSE-SU-2022:2377-1
Rating:            important
References:        #1065729 #1129770 #1177282 #1194013 #1196964 #1197170
                   #1199482 #1199487 #1199657 #1200343 #1200571 #1200599
                   #1200600 #1200604 #1200605 #1200608 #1200619 #1200692
                   #1200762 #1200806 #1200807 #1200809 #1200810 #1200813
                   #1200820 #1200821 #1200822 #1200829 #1200868 #1200869
                   #1200870 #1200871 #1200872 #1200873 #1200925 #1201080
                   #1201251
Cross-References:  CVE-2020-26541 CVE-2021-4157 CVE-2022-1012 CVE-2022-1679
                   CVE-2022-20132 CVE-2022-20141 CVE-2022-20154 CVE-2022-2318
                   CVE-2022-26365 CVE-2022-29900 CVE-2022-29901 CVE-2022-33740
                   CVE-2022-33741 CVE-2022-33742 CVE-2022-33981
Affected Products:
                   SUSE Linux Enterprise Server 12-SP5
______________________________________________________________________________

An update that solves 15 vulnerabilities and has 22 fixes is now available.

Description:

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
and bugfixes.

The following security bugs were fixed:

  o CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre
    like Branch Target Buffer attack, that can leak arbitrary kernel
    information (bsc#1199657).
  o CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the
    way a user forces the ath9k_htc_wait_for_target function to fail with some
    input messages (bsc#1199487).
  o CVE-2022-20132: Fixed out of bounds read due to improper input validation
    in lg_probe and related functions of hid-lg.c (bsc#1200619).
  o CVE-2022-1012: Fixed information leak caused by small table perturb size in
    the TCP source port generation algorithm (bsc#1199482).
  o CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)
  o CVE-2022-20141: Fixed a possible use after free due to improper locking in
    ip_check_mc_rcu() (bsc#1200604).
  o CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS
    subsystem, related to the replication of files with NFS. A user could
    potentially crash the system or escalate privileges on the system (bsc#
    1194013).
  o CVE-2022-20154: Fixed a use after free due to a race condition in
    lock_sock_nested of sock.c. This could lead to local escalation of
    privilege with System execution privileges needed (bsc#1200599).
  o CVE-2020-26541: Enforce the secure boot forbidden signature database (aka
    dbx) protection mechanism. (bsc#1177282)
  o CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer handler
    in net/rose/rose_timer.c that allow attackers to crash the system without
    any privileges (bsc#1201251).
  o CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed
    multiple potential data leaks with Block and Network devices when using
    untrusted backends (bsc#1200762).


The following non-security bugs were fixed:

  o audit: fix a race condition with the auditd tracking code (bsc#1197170).
  o block: bio-integrity: Advance seed correctly for larger interval sizes
    (git-fixes).
  o bnxt_en: Remove the setting of dev_port (git-fixes).
  o bonding: fix bond_neigh_init() (git-fixes).
  o dm crypt: Avoid percpu_counter spinlock contention in crypt_page_alloc()
    (git-fixes).
  o drbd: fix duplicate array initializer (git-fixes).
  o drbd: remove assign_p_sizes_qlim (git-fixes).
  o drbd: use bdev_alignment_offset instead of queue_alignment_offset
    (git-fixes).
  o drbd: use bdev based limit helpers in drbd_send_sizes (git-fixes).
  o exec: Force single empty string when argv is empty (bsc#1200571).
  o ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).
  o ext4: fix bug_on in __es_tree_search (bsc#1200809).
  o ext4: fix bug_on in ext4_writepages (bsc#1200872).
  o ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#
    1200869).
  o ext4: fix race condition between ext4_write and ext4_convert_inline_data
    (bsc#1200807).
  o ext4: fix symlink file size not match to file content (bsc#1200868).
  o ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).
  o ext4: force overhead calculation if the s_overhead_cluster makes no sense
    (bsc#1200870).
  o ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#
    1200806).
  o ext4: make variable "count" signed (bsc#1200820).
  o fs-writeback: writeback_sb_inodes Recalculate 'wrote' according skipped
    pages (bsc#1200873).
  o i915_vma: Rename vma_lookup to i915_vma_lookup (git-fixes).
  o ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).
  o init: Initialize noop_backing_dev_info early (bsc#1200822).
  o inotify: show inotify mask flags in proc fdinfo (bsc#1200600).
  o Input: bcm5974 - set missing URB_NO_TRANSFER_DMA_MAP urb flag (git-fixes).
  o Input: elan_i2c - fix regulator enable count imbalance after suspend/resume
    (git-fixes).
  o Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]
    able_power() (git-fixes).
  o Input: omap4-keypad - fix pm_runtime_get_sync() error checking (git-fixes).
  o iomap: iomap_write_failed fix (bsc#1200829).
  o kvm: fix wrong exception emulation in check_rdtsc (git-fixes).
  o kvm: i8254: remove redundant assignment to pointer s (git-fixes).
  o KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw
    disabled (git-fixes).
  o KVM: s390: vsie/gmap: reduce gmap_rmap overhead (git-fixes).
  o KVM: x86: Allocate new rmap and large page tracking when moving memslot
    (git-fixes).
  o KVM: x86: always stop emulation on page fault (git-fixes).
  o KVM: x86: clear stale x86_emulate_ctxt->intercept value (git-fixes).
  o KVM: x86: clflushopt should be treated as a no-op by emulation (git-fixes).
  o kvm: x86/cpuid: Only provide CPUID leaf 0xA if host has architectural PMU
    (git-fixes).
  o KVM: x86: Do not force set BSP bit when local APIC is managed by userspace
    (git-fixes).
  o KVM: x86: do not modify masked bits of shared MSRs (git-fixes).
  o KVM: x86/emulator: Defer not-present segment check in
    __load_segment_descriptor() (git-fixes).
  o KVM: x86: Fix emulation in writing cr8 (git-fixes).
  o KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce (git-fixes).
  o KVM: x86: Fix potential put_fpu() w/o load_fpu() on MPX platform
    (git-fixes).
  o KVM: x86: Fix x86_decode_insn() return when fetching insn bytes fails
    (git-fixes).
  o KVM: x86: Free wbinvd_dirty_mask if vCPU creation fails (git-fixes).
  o kvm: x86: Improve emulation of CPUID leaves 0BH and 1FH (git-fixes).
  o KVM: x86: Inject #GP if guest attempts to toggle CR4.LA57 in 64-bit mode
    (git-fixes).
  o KVM: x86: Manually calculate reserved bits when loading PDPTRS (git-fixes).
  o KVM: x86: Manually flush collapsible SPTEs only when toggling flags
    (git-fixes).
  o KVM: x86: Migrate the PIT only if vcpu0 is migrated, not any BSP
    (git-fixes).
  o KVM: x86/mmu: Treat invalid shadow pages as obsolete (git-fixes).
  o KVM: x86: Refactor prefix decoding to prevent Spectre-v1/L1TF attacks
    (git-fixes).
  o KVM: x86: Remove spurious clearing of async #PF MSR (git-fixes).
  o KVM: x86: Remove spurious kvm_mmu_unload() from vcpu destruction path
    (git-fixes).
  o KVM: x86: remove stale comment from struct x86_emulate_ctxt (git-fixes).
  o KVM: x86: set ctxt->have_exception in x86_decode_insn() (git-fixes).
  o kvm: x86: skip populating logical dest map if apic is not sw enabled
    (git-fixes).
  o KVM: x86: Trace the original requested CPUID function in kvm_cpuid()
    (git-fixes).
  o KVM: x86: Update vCPU's hv_clock before back to guest when tsc_offset is
    adjusted (git-fixes).
  o md: bcache: check the return value of kzalloc() in detached_dev_do_request
    () (git-fixes).
  o md: fix an incorrect NULL check in does_sb_need_changing (git-fixes).
  o md: fix an incorrect NULL check in md_reload_sb (git-fixes).
  o md/raid0: Ignore RAID0 layout if the second zone has only one device
    (git-fixes).
  o mm: add vma_lookup(), update find_vma_intersection() comments (git-fixes).
  o net/mlx5: Avoid double free of root ns in the error flow path (git-fixes).
  o net/mlx5e: Replace reciprocal_scale in TX select queue function
    (git-fixes).
  o net/mlx5e: Switch to Toeplitz RSS hash by default (git-fixes).
  o net/mlx5: Fix auto group size calculation (git-fixes).
  o net: qed: Disable aRFS for NPAR and 100G (git-fixes).
  o net: qede: Disable aRFS for NPAR and 100G (git-fixes).
  o net: stmmac: update rx tail pointer register to fix rx dma hang issue
    (git-fixes).
  o NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).
  o NFS: Further fixes to the writeback error handling (git-fixes).
  o PCI/ACPI: Allow D3 only if Root Port can signal and wake from D3
    (git-fixes).
  o PCI: Tidy comments (git-fixes).
  o platform/chrome: cros_ec_proto: Send command again when timeout occurs
    (git-fixes).
  o powerpc/idle: Fix return value of __setup() handler (bsc#1065729).
  o powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#
    1065729).
  o powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address
    (bsc#1200343 ltc#198477).
  o qed: Enable automatic recovery on error condition (bsc#1196964).
  o raid5: introduce MD_BROKEN (git-fixes).
  o s390: fix detection of vector enhancements facility 1 vs. vector packed
    decimal facility (git-fixes).
  o s390: fix strrchr() implementation (git-fixes).
  o s390/ftrace: fix ftrace_update_ftrace_func implementation (git-fixes).
  o s390/gmap: do not unconditionally call pte_unmap_unlock() in __gmap_zap()
    (git-fixes).
  o s390/gmap: validate VMA in __gmap_zap() (git-fixes).
  o s390/mm: fix VMA and page table handling code in storage key handling
    functions (git-fixes).
  o s390/mm: validate VMA in PGSTE manipulation functions (git-fixes).
  o scsi: dc395x: Fix a missing check on list iterator (git-fixes).
  o scsi: ufs: qcom: Add a readl() to make sure ref_clk gets enabled
    (git-fixes).
  o scsi: ufs: qcom: Fix ufs_qcom_resume() (git-fixes).
  o SUNRPC: Fix the calculation of xdr->end in xdr_get_next_encode_buffer()
    (git-fixes).
  o target: remove an incorrect unmap zeroes data deduction (git-fixes).
  o tracing: Fix return value of trace_pid_write() (git-fixes).
  o usb: musb: Fix missing of_node_put() in omap2430_probe (git-fixes).
  o USB: serial: option: add Quectel BG95 modem (git-fixes).
  o USB: storage: karma: fix rio_karma_init return (git-fixes).
  o usb: usbip: add missing device lock on tweak configuration cmd (git-fixes).
  o usb: usbip: fix a refcount leak in stub_probe() (git-fixes).
  o video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup (bsc#
    1129770)
  o writeback: Avoid skipping inode writeback (bsc#1200813).
  o writeback: Fix inode->i_io_list not be protected by inode->i_lock error
    (bsc#1200821).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Server 12-SP5:
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-2377=1

Package List:

  o SUSE Linux Enterprise Server 12-SP5 (noarch):
       kernel-devel-azure-4.12.14-16.103.1
       kernel-source-azure-4.12.14-16.103.1
  o SUSE Linux Enterprise Server 12-SP5 (x86_64):
       kernel-azure-4.12.14-16.103.1
       kernel-azure-base-4.12.14-16.103.1
       kernel-azure-base-debuginfo-4.12.14-16.103.1
       kernel-azure-debuginfo-4.12.14-16.103.1
       kernel-azure-debugsource-4.12.14-16.103.1
       kernel-azure-devel-4.12.14-16.103.1
       kernel-syms-azure-4.12.14-16.103.1


References:

  o https://www.suse.com/security/cve/CVE-2020-26541.html
  o https://www.suse.com/security/cve/CVE-2021-4157.html
  o https://www.suse.com/security/cve/CVE-2022-1012.html
  o https://www.suse.com/security/cve/CVE-2022-1679.html
  o https://www.suse.com/security/cve/CVE-2022-20132.html
  o https://www.suse.com/security/cve/CVE-2022-20141.html
  o https://www.suse.com/security/cve/CVE-2022-20154.html
  o https://www.suse.com/security/cve/CVE-2022-2318.html
  o https://www.suse.com/security/cve/CVE-2022-26365.html
  o https://www.suse.com/security/cve/CVE-2022-29900.html
  o https://www.suse.com/security/cve/CVE-2022-29901.html
  o https://www.suse.com/security/cve/CVE-2022-33740.html
  o https://www.suse.com/security/cve/CVE-2022-33741.html
  o https://www.suse.com/security/cve/CVE-2022-33742.html
  o https://www.suse.com/security/cve/CVE-2022-33981.html
  o https://bugzilla.suse.com/1065729
  o https://bugzilla.suse.com/1129770
  o https://bugzilla.suse.com/1177282
  o https://bugzilla.suse.com/1194013
  o https://bugzilla.suse.com/1196964
  o https://bugzilla.suse.com/1197170
  o https://bugzilla.suse.com/1199482
  o https://bugzilla.suse.com/1199487
  o https://bugzilla.suse.com/1199657
  o https://bugzilla.suse.com/1200343
  o https://bugzilla.suse.com/1200571
  o https://bugzilla.suse.com/1200599
  o https://bugzilla.suse.com/1200600
  o https://bugzilla.suse.com/1200604
  o https://bugzilla.suse.com/1200605
  o https://bugzilla.suse.com/1200608
  o https://bugzilla.suse.com/1200619
  o https://bugzilla.suse.com/1200692
  o https://bugzilla.suse.com/1200762
  o https://bugzilla.suse.com/1200806
  o https://bugzilla.suse.com/1200807
  o https://bugzilla.suse.com/1200809
  o https://bugzilla.suse.com/1200810
  o https://bugzilla.suse.com/1200813
  o https://bugzilla.suse.com/1200820
  o https://bugzilla.suse.com/1200821
  o https://bugzilla.suse.com/1200822
  o https://bugzilla.suse.com/1200829
  o https://bugzilla.suse.com/1200868
  o https://bugzilla.suse.com/1200869
  o https://bugzilla.suse.com/1200870
  o https://bugzilla.suse.com/1200871
  o https://bugzilla.suse.com/1200872
  o https://bugzilla.suse.com/1200873
  o https://bugzilla.suse.com/1200925
  o https://bugzilla.suse.com/1201080
  o https://bugzilla.suse.com/1201251

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=ehGw
-----END PGP SIGNATURE-----