SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:0289-1
Rating:             important
References:         #1071995 #1184209 #1191271 #1193255 #1193660 
                    #1193669 #1193727 #1193767 #1193901 #1193927 
                    #1194001 #1194087 #1194094 #1194302 #1194516 
                    #1194517 #1194529 #1194888 #1194985 
Cross-References:   CVE-2021-4083 CVE-2021-4135 CVE-2021-4149
                    CVE-2021-4197 CVE-2021-4202 CVE-2021-44733
                    CVE-2021-45485 CVE-2021-45486 CVE-2022-0185
                    CVE-2022-0322
CVSS scores:
                    CVE-2021-4083 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-4135 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2021-4149 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-4197 (SUSE): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
                    CVE-2021-4202 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-44733 (SUSE): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
                    CVE-2021-45485 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
                    CVE-2021-45485 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
                    CVE-2021-45486 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
                    CVE-2022-0185 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-0322 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:
                    SUSE Linux Enterprise Module for Realtime 15-SP2
                    SUSE Linux Enterprise Micro 5.0
______________________________________________________________________________

   An update that solves 10 vulnerabilities and has 9 fixes is
   now available.

Description:

   The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various
   security and bugfixes.

   The following security bugs were fixed:

   - CVE-2021-4083: Fixed race condition in Unix domain socket garbage
     collection that could lead to read memory after free (bsc#1193727).
   - CVE-2021-4135: Fixed an information leak in the nsim_bpf_map_alloc
     function (bsc#1193927).
   - CVE-2021-4149: Fixed improper lock operation in btrfs that allowed users     to crash the kernel or deadlock the system (bsc#1194001).
   - CVE-2021-4197: Fixed a cgroup issue where lower privileged processes
     could write to fds of lower privileged ones that could lead to privilege
     escalation (bsc#1194302).
   - CVE-2021-4202: Fixed race condition in nci_request() that could cause
     use-after-free (bsc#1194529).
   - CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c
     in the TEE subsystem in the Linux kernel that occured because of a race
     condition in tee_shm_get_from_id during an attempt to free a shared
     memory object (bnc#1193767).
   - CVE-2021-45485: Fixed an information leak because of certain use of a
     hash table which use IPv6 source addresses (bsc#1194094).
   - CVE-2021-45486: Fixed an information leak because the hash table is very
     small in net/ipv4/route.c (bnc#1194087).
   - CVE-2022-0185: Incorrect param length parsing in legacy_parse_param
     which could have led to a local privilege escalation (bsc#1194517).
   - CVE-2022-0322: Fixed a denial of service in SCTP sctp_addto_chunk
     (bsc#1194985).

   The following non-security bugs were fixed:

   - ext4: Avoid trim error on fs with small groups (bsc#1191271).
   - fget: clarify and improve __fget_files() implementation (bsc#1193727).
   - kabi/severities: Add a kabi exception for drivers/tee/tee
   - kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
   - livepatch: Avoid CPU hogging with cond_resched (bsc#1071995).
   - media: Revert "media: uvcvideo: Set unique vdev name based in type"
     (bsc#1193255).
   - moxart: fix potential use-after-free on remove path (bsc#1194516).
   - powerpc/fadump: Fix inaccurate CPU state info in vmcore generated with
     panic (bsc#1193901).
   - powerpc: handle kdump appropriately with crash_kexec_post_notifiers     option (bsc#1193901).
   - tpm: fix potential NULL pointer access in tpm_del_char_device
     (bsc#1184209, bsc#1193660).
   - vfs: check fd has read access in kernel_read_file_from_fd()
     (bsc#1194888).


Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Realtime 15-SP2:

      zypper in -t patch SUSE-SLE-Module-RT-15-SP2-2022-289=1

   - SUSE Linux Enterprise Micro 5.0:

      zypper in -t patch SUSE-SUSE-MicroOS-5.0-2022-289=1



Package List:

   - SUSE Linux Enterprise Module for Realtime 15-SP2 (x86_64):

      cluster-md-kmp-rt-5.3.18-68.1
      cluster-md-kmp-rt-debuginfo-5.3.18-68.1
      dlm-kmp-rt-5.3.18-68.1
      dlm-kmp-rt-debuginfo-5.3.18-68.1
      gfs2-kmp-rt-5.3.18-68.1
      gfs2-kmp-rt-debuginfo-5.3.18-68.1
      kernel-rt-5.3.18-68.1
      kernel-rt-debuginfo-5.3.18-68.1
      kernel-rt-debugsource-5.3.18-68.1
      kernel-rt-devel-5.3.18-68.1
      kernel-rt-devel-debuginfo-5.3.18-68.1
      kernel-rt_debug-5.3.18-68.1
      kernel-rt_debug-debuginfo-5.3.18-68.1
      kernel-rt_debug-debugsource-5.3.18-68.1
      kernel-rt_debug-devel-5.3.18-68.1
      kernel-rt_debug-devel-debuginfo-5.3.18-68.1
      kernel-syms-rt-5.3.18-68.1
      ocfs2-kmp-rt-5.3.18-68.1
      ocfs2-kmp-rt-debuginfo-5.3.18-68.1

   - SUSE Linux Enterprise Module for Realtime 15-SP2 (noarch):

      kernel-devel-rt-5.3.18-68.1
      kernel-source-rt-5.3.18-68.1

   - SUSE Linux Enterprise Micro 5.0 (x86_64):

      kernel-rt-5.3.18-68.1
      kernel-rt-debuginfo-5.3.18-68.1
      kernel-rt-debugsource-5.3.18-68.1


References:

   https://www.suse.com/security/cve/CVE-2021-4083.html
   https://www.suse.com/security/cve/CVE-2021-4135.html
   https://www.suse.com/security/cve/CVE-2021-4149.html
   https://www.suse.com/security/cve/CVE-2021-4197.html
   https://www.suse.com/security/cve/CVE-2021-4202.html
   https://www.suse.com/security/cve/CVE-2021-44733.html
   https://www.suse.com/security/cve/CVE-2021-45485.html
   https://www.suse.com/security/cve/CVE-2021-45486.html
   https://www.suse.com/security/cve/CVE-2022-0185.html
   https://www.suse.com/security/cve/CVE-2022-0322.html
   https://bugzilla.suse.com/1071995
   https://bugzilla.suse.com/1184209
   https://bugzilla.suse.com/1191271
   https://bugzilla.suse.com/1193255
   https://bugzilla.suse.com/1193660
   https://bugzilla.suse.com/1193669
   https://bugzilla.suse.com/1193727
   https://bugzilla.suse.com/1193767
   https://bugzilla.suse.com/1193901
   https://bugzilla.suse.com/1193927
   https://bugzilla.suse.com/1194001
   https://bugzilla.suse.com/1194087
   https://bugzilla.suse.com/1194094
   https://bugzilla.suse.com/1194302
   https://bugzilla.suse.com/1194516
   https://bugzilla.suse.com/1194517
   https://bugzilla.suse.com/1194529
   https://bugzilla.suse.com/1194888
   https://bugzilla.suse.com/1194985

SUSE: 2022:0289-1 important: the Linux Kernel

February 2, 2022
An update that solves 10 vulnerabilities and has 9 fixes is now available

Summary

The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2021-4083: Fixed race condition in Unix domain socket garbage collection that could lead to read memory after free (bsc#1193727). - CVE-2021-4135: Fixed an information leak in the nsim_bpf_map_alloc function (bsc#1193927). - CVE-2021-4149: Fixed improper lock operation in btrfs that allowed users to crash the kernel or deadlock the system (bsc#1194001). - CVE-2021-4197: Fixed a cgroup issue where lower privileged processes could write to fds of lower privileged ones that could lead to privilege escalation (bsc#1194302). - CVE-2021-4202: Fixed race condition in nci_request() that could cause use-after-free (bsc#1194529). - CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel that occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767). - CVE-2021-45485: Fixed an information leak because of certain use of a hash table which use IPv6 source addresses (bsc#1194094). - CVE-2021-45486: Fixed an information leak because the hash table is very small in net/ipv4/route.c (bnc#1194087). - CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517). - CVE-2022-0322: Fixed a denial of service in SCTP sctp_addto_chunk (bsc#1194985). The following non-security bugs were fixed: - ext4: Avoid trim error on fs with small groups (bsc#1191271). - fget: clarify and improve __fget_files() implementation (bsc#1193727). - kabi/severities: Add a kabi exception for drivers/tee/tee - kprobes: Limit max data_size of the kretprobe instances (bsc#1193669). - livepatch: Avoid CPU hogging with cond_resched (bsc#1071995). - media: Revert "media: uvcvideo: Set unique vdev name based in type" (bsc#1193255). - moxart: fix potential use-after-free on remove path (bsc#1194516). - powerpc/fadump: Fix inaccurate CPU state info in vmcore generated with panic (bsc#1193901). - powerpc: handle kdump appropriately with crash_kexec_post_notifiers option (bsc#1193901). - tpm: fix potential NULL pointer access in tpm_del_char_device (bsc#1184209, bsc#1193660). - vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888).

References

#1071995 #1184209 #1191271 #1193255 #1193660

#1193669 #1193727 #1193767 #1193901 #1193927

#1194001 #1194087 #1194094 #1194302 #1194516

#1194517 #1194529 #1194888 #1194985

Cross- CVE-2021-4083 CVE-2021-4135 CVE-2021-4149

CVE-2021-4197 CVE-2021-4202 CVE-2021-44733

CVE-2021-45485 CVE-2021-45486 CVE-2022-0185

CVE-2022-0322

CVSS scores:

CVE-2021-4083 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2021-4135 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVE-2021-4149 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-4197 (SUSE): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

CVE-2021-4202 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2021-44733 (SUSE): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

CVE-2021-45485 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVE-2021-45485 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

CVE-2021-45486 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

CVE-2022-0185 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2022-0322 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

SUSE Linux Enterprise Module for Realtime 15-SP2

SUSE Linux Enterprise Micro 5.0

https://www.suse.com/security/cve/CVE-2021-4083.html

https://www.suse.com/security/cve/CVE-2021-4135.html

https://www.suse.com/security/cve/CVE-2021-4149.html

https://www.suse.com/security/cve/CVE-2021-4197.html

https://www.suse.com/security/cve/CVE-2021-4202.html

https://www.suse.com/security/cve/CVE-2021-44733.html

https://www.suse.com/security/cve/CVE-2021-45485.html

https://www.suse.com/security/cve/CVE-2021-45486.html

https://www.suse.com/security/cve/CVE-2022-0185.html

https://www.suse.com/security/cve/CVE-2022-0322.html

https://bugzilla.suse.com/1071995

https://bugzilla.suse.com/1184209

https://bugzilla.suse.com/1191271

https://bugzilla.suse.com/1193255

https://bugzilla.suse.com/1193660

https://bugzilla.suse.com/1193669

https://bugzilla.suse.com/1193727

https://bugzilla.suse.com/1193767

https://bugzilla.suse.com/1193901

https://bugzilla.suse.com/1193927

https://bugzilla.suse.com/1194001

https://bugzilla.suse.com/1194087

https://bugzilla.suse.com/1194094

https://bugzilla.suse.com/1194302

https://bugzilla.suse.com/1194516

https://bugzilla.suse.com/1194517

https://bugzilla.suse.com/1194529

https://bugzilla.suse.com/1194888

https://bugzilla.suse.com/1194985

Severity
Announcement ID: SUSE-SU-2022:0289-1
Rating: important

Related News