-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.2684
                   Security update for the Linux Kernel
                                11 May 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Linux Kernel
Publisher:         SUSE
Operating System:  SUSE
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-30772 CVE-2023-2162 CVE-2023-2124
                   CVE-2023-1998 CVE-2023-1990 CVE-2023-1989
                   CVE-2023-1855 CVE-2023-1670 

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2023/suse-su-20232156-1

Comment: CVSS (Max):  7.8 CVE-2023-1989 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: SUSE
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

Security update for the Linux Kernel

Announcement ID:  SUSE-SU-2023:2156-1
     Rating:      important
                    o #1142685
                    o #1174777
                    o #1190544
                    o #1202353
                    o #1207088
                    o #1209342
                    o #1209871
                    o #1209887
                    o #1209969
                    o #1209999
                    o #1210202
                    o #1210301
   References:      o #1210329
                    o #1210336
                    o #1210337
                    o #1210430
                    o #1210460
                    o #1210466
                    o #1210469
                    o #1210498
                    o #1210506
                    o #1210534
                    o #1210647
                    o #1210827

                    o CVE-2023-1670
                    o CVE-2023-1855
                    o CVE-2023-1989
                    o CVE-2023-1990
Cross-References:   o CVE-2023-1998
                    o CVE-2023-2124
                    o CVE-2023-2162
                    o CVE-2023-30772

                    o CVE-2023-1670 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/
                      S:U/C:N/I:N/A:H
                    o CVE-2023-1670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2023-1855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2023-1855 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/
                      S:U/C:H/I:N/A:H
                    o CVE-2023-1989 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2023-1989 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2023-1990 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2023-1990 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/
  CVSS scores:        S:U/C:N/I:N/A:H
                    o CVE-2023-1998 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/
                      S:C/C:H/I:N/A:N
                    o CVE-2023-1998 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/
                      S:C/C:H/I:N/A:N
                    o CVE-2023-2124 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2023-2162 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:H/I:N/A:N
                    o CVE-2023-30772 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N
                      /S:U/C:H/I:H/A:H
                    o CVE-2023-30772 ( NVD ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/
                      S:U/C:H/I:H/A:H

    Affected        o SUSE Linux Enterprise High Performance Computing 12 SP5
    Products:       o SUSE Linux Enterprise Real Time 12 SP5
                    o SUSE Linux Enterprise Server 12 SP5

An update that solves eight vulnerabilities and has 16 fixes can now be
installed.

Description:

The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various
security and bugfixes.

The following security bugs were fixed:

  o CVE-2023-2124: Fixed an out of bound access in the XFS subsystem that could
    have lead to denial-of-service or potentially privilege escalation (bsc#
    1210498).
  o CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet
    driver. A local user could use this flaw to crash the system or potentially
    escalate their privileges on the system (bsc#1209871).
  o CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create
    (bsc#1210647).
  o CVE-2023-1998: Fixed a use after free during login when accessing the shost
    ipaddress (bsc#1210506).
  o CVE-2023-30772: Fixed a race condition and resultant use-after-free in
    da9150_charger_remove (bsc#1210329).
  o CVE-2023-1855: Fixed a use after free in xgene_hwmon_remove (bsc#1210202).
  o CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).
  o CVE-2023-1990: Fixed a use after free in ndlc_remove (bsc#1210337).

The following non-security bugs were fixed:

  o ath10k: Fix error handling in case of CE pipe init failure (git-fixes).
  o ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).
  o ath10k: Fix the parsing error in service available event (git-fixes).
  o ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).
  o ath10k: fix control-message timeout (git-fixes).
  o ath10k: fix division by zero in send path (git-fixes).
  o ath10k: fix memory overwrite of the WoWLAN wakeup packet pattern
    (git-fixes).
  o audit: improve audit queue handling when "audit=1" on cmdline (bsc#
    1209969).
  o bpf, x86: Fix encoding for lower 8-bit registers in BPF_STX BPF_B
    (git-fixes).
  o cachefiles: Drop superfluous readpages aops NULL check (bsc#1210430).
  o cachefiles: Fix page leak in cachefiles_read_backing_file while vmscan is
    active (bsc#1210430).
  o cachefiles: Fix race between read_waiter and read_copier involving op->
    to_do (bsc#1210430).
  o cachefiles: Handle readpage error correctly (bsc#1210430).
  o cgroup/cpuset: Wake up cpuset_attach_wq tasks in cpuset_cancel_attach()
    (bsc#1210827).
  o cifs: fix negotiate context parsing (bsc#1210301).
  o cifs: fix open leaks in open_cached_dir() (bsc#1209342).
  o cred: allow get_cred() and put_cred() to be given NULL (bsc#1209887).
  o crypto: x86/ghash - fix unaligned access in ghash_setkey() (git-fixes).
  o drivers: net: lmc: fix case value for target abort error (git-fixes).
  o fscache, cachefiles: remove redundant variable 'cache' (bsc#1210430).
  o ftrace: Mark get_lock_parent_ip() __always_inline (git-fixes).
  o intel_pmc_ipc: restore ability to call functions with irq enabled
    (git-fixes).
  o ipmi: fix SSIF not responding under certain cond (git-fixes).
  o iwlwifi: Fix -EIO error code that is never returned (git-fixes).
  o iwlwifi: fw: make pos static in iwl_sar_get_ewrd_table() loop (git-fixes).
  o iwlwifi: pcie: fix locking when "HW not ready" (git-fixes).
  o iwlwifi: pcie: gen2: fix locking when "HW not ready" (git-fixes).
  o iwlwifi: pcie: reschedule in long-running memory reads (git-fixes).
  o kabi/severities: ignore KABI for NVMe, except nvme-fc (bsc#1174777).
  o kcm: Only allow TCP sockets to be attached to a KCM mux (git-fixes).
  o keys: Change keyring_serialise_link_sem to a mutex (bsc#1207088).
  o keys: Fix linking a duplicate key to a keyring's assoc_array (bsc#1207088).
  o keys: Hoist locking out of __key_link_begin() (bsc#1207088).
  o kretprobe: Prevent triggering kretprobe from within kprobe_flush_task
    (git-fixes).
  o l2tp: clean up stale tunnel or session in pppol2tp_connect's error path
    (git-fixes).
  o l2tp: fix pseudo-wire type for sessions created by pppol2tp_connect()
    (git-fixes).
  o l2tp: reject creation of non-PPP sessions on L2TPv2 tunnels (git-fixes).
  o net/ncsi: Do not return error on normal response (git-fixes).
  o net: axienet: Fix double deregister of mdio (git-fixes).
  o net: core: dst: Add kernel-doc for 'net' parameter (git-fixes).
  o net: core: dst_cache_set_ip6: Rename 'addr' parameter to 'saddr' for
    consistency (git-fixes).
  o net: phy: realtek: Use the dummy stubs for MMD register access for rtl8211b
    (git-fixes).
  o net: prevent ISA drivers from building on PPC32 (git-fixes).
  o net: usb: qmi_wwan: add Telit 0x1080 composition (git-fixes).
  o netfilter: nft_set_rbtree: fix parameter of __nft_rbtree_lookup()
    (git-fixes).
  o netfilter: x_tables: Add note about how to free percpu counters
    (git-fixes).
  o nvme-pci: do not WARN_ON in nvme_reset_work if ctrl.state is not RESETTING
    (git-fixes).
  o nvme-pci: fix doorbell buffer value endianness (git-fixes).
  o nvme: retain split access workaround for capability reads (git-fixes).
  o platform/x86: intel_pmc_ipc: Use devm_* calls in driver probe function
    (git-fixes).
  o platform/x86: intel_pmc_ipc: Use spin_lock to protect GCR updates
    (git-fixes).
  o powercap: fix possible name leak in powercap_register_zone() (git-fixes).
  o powerpc/numa: Consider the max NUMA node for migratable LPAR (bsc#1209999
    ltc#202140 bsc#1190544 ltc#194520 bsc#1142685 ltc#179509 git-fixes).
  o powerpc/numa: Detect support for coregroup (bsc#1209999 ltc#202140 bsc#
    1142685 ltc#179509 git-fixes).
  o powerpc/numa: Limit possible nodes to within num_possible_nodes (bsc#
    1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
  o powerpc/numa: Restrict possible nodes based on platform (bsc#1209999 ltc#
    202140 bsc#1142685 ltc#179509 git-fixes).
  o powerpc/papr_scm: Update the NUMA distance table for the target node (bsc#
    1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
  o powerpc/pseries: Consolidate different NUMA distance update code paths (bsc
    #1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
  o powerpc/pseries: Rename TYPE1_AFFINITY to FORM1_AFFINITY (bsc#1209999 ltc#
    202140 bsc#1142685 ltc#179509 git-fixes).
  o powerpc/pseries: rename min_common_depth to primary_domain_index (bsc#
    1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
  o printk: Give error on attempt to set log buffer length to over 2G (bsc#
    1210534).
  o ring-buffer: Fix race while reader and writer are on the same page
    (git-fixes).
  o s390/percpu: add READ_ONCE() to arch_this_cpu_to_op_simple() (git-fixes).
  o scsi: qla2xxx: Fix memory leak in qla2x00_probe_one() (git-fixes).
  o scsi: qla2xxx: Perform lockless command completion in abort path
    (git-fixes).
  o sctp: do not free asoc when it is already dead in sctp_sendmsg (git-fixes).
  o sctp: return error if the asoc has been peeled off in sctp_wait_for_sndbuf
    (git-fixes).
  o sctp: use the right sk after waking up from wait_buf sleep (git-fixes).
  o struct ci_hdrc: hide new member at end (git-fixes).
  o struct wmi_svc_avail_ev_arg: new member to end (git-fixes).
  o tuntap: fix dividing by zero in ebpf queue selection (git-fixes).
  o usb/ohci-platform: Fix a warning when hibernating (git-fixes).
  o usb: chipidea: core: fix possible concurrent when switch role (git-fixes).
  o usb: dwc3: core: fix kernel panic when do reboot (git-fixes).
  o usb: dwc3: gadget: Do not set IMI for no_interrupt (git-fixes).
  o usb: host: ohci-pxa27x: Fix and & vs | typo (git-fixes).
  o usb: storage: Add check for kcalloc (git-fixes).
  o usb: typec: Check for ops->exit instead of ops->enter in altmode_exit
    (git-fixes).
  o watchdog: pcwd_usb: Fix attempting to access uninitialized memory
    (git-fixes).
  o wifi: ath5k: fix an off by one check in ath5k_eeprom_read_freq_list()
    (git-fixes).
  o workqueue: Fix missing kfree(rescuer) in destroy_workqueue() (bsc#1210460).
  o workqueue: Fix spurious sanity check failures in destroy_workqueue() (bsc#
    1210460).
  o wq: handle VM suspension in stall detection (bsc#1210466).
  o x86/boot/compressed: Disable relocation relaxation (git-fixes).
  o x86/boot: Avoid using Intel mnemonics in AT&T syntax asm (git-fixes).
  o x86/bugs: Add Cannon lake to RETBleed affected CPU list (git-fixes).
  o x86/bugs: Enable STIBP for IBPB mitigated RETBleed (git-fixes).
  o x86/fpu: Prevent FPU state corruption (git-fixes).
  o x86/irq: Ensure PI wakeup handler is unregistered before module unload
    (git-fixes).
  o x86/kprobes: Fix to check non boostable prefixes correctly (git-fixes).
  o x86/kprobes: Restore BTF if the single-stepping is cancelled (git-fixes).
  o x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).
  o x86/mm: Stop printing BRK addresses (git-fixes).
  o x86/pkeys: Add check for pkey "overflow" (git-fixes).
  o x86/speculation/mds: Mark mds_user_clear_cpu_buffers() __always_inline
    (git-fixes).
  o x86/tools/relocs: Fix non-POSIX regexp (git-fixes).
  o x86/tools: Fix objdump version check again (git-fixes).
  o x86/virt: Eat faults on VMXOFF in reboot flows (git-fixes).
  o x86/virt: Mark flags and memory as clobbered by VMXOFF (git-fixes).
  o x86: Do not let pgprot_modify() change the page encryption bit (git-fixes).
  o x86_64: Fix jiffies ODR violation (git-fixes).
  o xfrm: policy: use hlist rcu variants on insert (git-fixes).
  o xhci: also avoid the XHCI_ZERO_64B_REGS quirk with a passthrough iommu
    (git-fixes).
  o xhci: hide include of iommu.h (git-fixes).

Special Instructions and Notes:

  o Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Important update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Real Time 12 SP5
    zypper in -t patch SUSE-SLE-RT-12-SP5-2023-2156=1

Package List:

  o SUSE Linux Enterprise Real Time 12 SP5 (x86_64)
       kernel-rt-debugsource-4.12.14-10.124.1
       cluster-md-kmp-rt-4.12.14-10.124.1
       kernel-rt_debug-devel-debuginfo-4.12.14-10.124.1
       dlm-kmp-rt-4.12.14-10.124.1
       gfs2-kmp-rt-debuginfo-4.12.14-10.124.1
       kernel-rt_debug-debuginfo-4.12.14-10.124.1
       kernel-syms-rt-4.12.14-10.124.1
       kernel-rt-base-debuginfo-4.12.14-10.124.1
       ocfs2-kmp-rt-debuginfo-4.12.14-10.124.1
       gfs2-kmp-rt-4.12.14-10.124.1
       dlm-kmp-rt-debuginfo-4.12.14-10.124.1
       kernel-rt-devel-debuginfo-4.12.14-10.124.1
       cluster-md-kmp-rt-debuginfo-4.12.14-10.124.1
       kernel-rt-devel-4.12.14-10.124.1
       kernel-rt_debug-devel-4.12.14-10.124.1
       ocfs2-kmp-rt-4.12.14-10.124.1
       kernel-rt-debuginfo-4.12.14-10.124.1
       kernel-rt_debug-debugsource-4.12.14-10.124.1
       kernel-rt-base-4.12.14-10.124.1
  o SUSE Linux Enterprise Real Time 12 SP5 (noarch)
       kernel-source-rt-4.12.14-10.124.1
       kernel-devel-rt-4.12.14-10.124.1
  o SUSE Linux Enterprise Real Time 12 SP5 (nosrc x86_64)
       kernel-rt-4.12.14-10.124.1
       kernel-rt_debug-4.12.14-10.124.1

References:

  o https://www.suse.com/security/cve/CVE-2023-1670.html
  o https://www.suse.com/security/cve/CVE-2023-1855.html
  o https://www.suse.com/security/cve/CVE-2023-1989.html
  o https://www.suse.com/security/cve/CVE-2023-1990.html
  o https://www.suse.com/security/cve/CVE-2023-1998.html
  o https://www.suse.com/security/cve/CVE-2023-2124.html
  o https://www.suse.com/security/cve/CVE-2023-2162.html
  o https://www.suse.com/security/cve/CVE-2023-30772.html
  o https://bugzilla.suse.com/show_bug.cgiid=1142685
  o https://bugzilla.suse.com/show_bug.cgiid=1174777
  o https://bugzilla.suse.com/show_bug.cgiid=1190544
  o https://bugzilla.suse.com/show_bug.cgiid=1202353
  o https://bugzilla.suse.com/show_bug.cgiid=1207088
  o https://bugzilla.suse.com/show_bug.cgiid=1209342
  o https://bugzilla.suse.com/show_bug.cgiid=1209871
  o https://bugzilla.suse.com/show_bug.cgiid=1209887
  o https://bugzilla.suse.com/show_bug.cgiid=1209969
  o https://bugzilla.suse.com/show_bug.cgiid=1209999
  o https://bugzilla.suse.com/show_bug.cgiid=1210202
  o https://bugzilla.suse.com/show_bug.cgiid=1210301
  o https://bugzilla.suse.com/show_bug.cgiid=1210329
  o https://bugzilla.suse.com/show_bug.cgiid=1210336
  o https://bugzilla.suse.com/show_bug.cgiid=1210337
  o https://bugzilla.suse.com/show_bug.cgiid=1210430
  o https://bugzilla.suse.com/show_bug.cgiid=1210460
  o https://bugzilla.suse.com/show_bug.cgiid=1210466
  o https://bugzilla.suse.com/show_bug.cgiid=1210469
  o https://bugzilla.suse.com/show_bug.cgiid=1210498
  o https://bugzilla.suse.com/show_bug.cgiid=1210506
  o https://bugzilla.suse.com/show_bug.cgiid=1210534
  o https://bugzilla.suse.com/show_bug.cgiid=1210647
  o https://bugzilla.suse.com/show_bug.cgiid=1210827

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=q+rx
-----END PGP SIGNATURE-----