SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:0366-1
Rating:             critical
References:         #1071995 #1124431 #1167162 #1169514 #1172073 
                    #1179599 #1184804 #1185377 #1186207 #1186222 
                    #1187167 #1189305 #1189841 #1190358 #1190428 
                    #1191229 #1191241 #1191384 #1191731 #1192032 
                    #1192267 #1192740 #1192845 #1192847 #1192877 
                    #1192946 #1193306 #1193440 #1193442 #1193575 
                    #1193669 #1193727 #1193731 #1193767 #1193861 
                    #1193864 #1193867 #1193927 #1194001 #1194048 
                    #1194087 #1194227 #1194302 #1194516 #1194529 
                    #1194880 #1194888 #1194985 #1195166 #1195254 
                    
Cross-References:   CVE-2018-25020 CVE-2019-15126 CVE-2020-27820
                    CVE-2021-0920 CVE-2021-0935 CVE-2021-28711
                    CVE-2021-28712 CVE-2021-28713 CVE-2021-28714
                    CVE-2021-28715 CVE-2021-33098 CVE-2021-3564
                    CVE-2021-39648 CVE-2021-39657 CVE-2021-4002
                    CVE-2021-4083 CVE-2021-4135 CVE-2021-4149
                    CVE-2021-4197 CVE-2021-4202 CVE-2021-43975
                    CVE-2021-43976 CVE-2021-44733 CVE-2021-45095
                    CVE-2021-45486 CVE-2022-0322 CVE-2022-0330
                   
CVSS scores:
                    CVE-2018-25020 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2019-15126 (NVD) : 3.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
                    CVE-2019-15126 (SUSE): 3.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
                    CVE-2020-27820 (SUSE): 3.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L
                    CVE-2021-0920 (NVD) : 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-0920 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-0935 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-28711 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
                    CVE-2021-28711 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-28712 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
                    CVE-2021-28712 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-28713 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
                    CVE-2021-28713 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-28714 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
                    CVE-2021-28714 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-28715 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
                    CVE-2021-28715 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-33098 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-33098 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-3564 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-3564 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-39648 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
                    CVE-2021-39657 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
                    CVE-2021-4002 (SUSE): 5.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
                    CVE-2021-4083 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-4135 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2021-4149 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-4197 (SUSE): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
                    CVE-2021-4202 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-43975 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-43976 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-44733 (SUSE): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
                    CVE-2021-45095 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2021-45095 (SUSE): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
                    CVE-2021-45486 (NVD) : 3.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
                    CVE-2021-45486 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
                    CVE-2022-0322 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:
                    SUSE CaaS Platform 4.0
                    SUSE Enterprise Storage 6
                    SUSE Linux Enterprise High Availability 15-SP1
                    SUSE Linux Enterprise High Performance Computing 15-SP1
                    SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
                    SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
                    SUSE Linux Enterprise Module for Live Patching 15-SP1
                    SUSE Linux Enterprise Server 15-SP1
                    SUSE Linux Enterprise Server 15-SP1-BCL
                    SUSE Linux Enterprise Server 15-SP1-LTSS
                    SUSE Linux Enterprise Server for SAP 15-SP1
                    SUSE Linux Enterprise Server for SAP Applications 15-SP1
                    SUSE Linux Enterprise Storage 6
                    SUSE Manager Proxy 4.0
                    SUSE Manager Server 4.0
______________________________________________________________________________

   An update that solves 27 vulnerabilities and has 23 fixes
   is now available.

Description:



   The SUSE Linux Enterprise 15 SP1 LTSS kernel was updated to receive
   various security and bugfixes.

   The following security bugs were fixed:

   - CVE-2022-0435: Fixed remote stack overflow in net/tipc module that
     validate domain record count on input (bsc#1195254).
   - CVE-2022-0330: Fixed flush TLBs before releasing backing store
     (bsc#1194880).
   - CVE-2021-45486: Fixed an information leak because the hash table is very
     small in net/ipv4/route.c (bnc#1194087).
   - CVE-2021-45095: Fixed refcount leak in pep_sock_accept in
     net/phonet/pep.c (bnc#1193867).
   - CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c
     in the TEE subsystem, that could have occured because of a race
     condition in tee_shm_get_from_id during an attempt to free a shared
     memory object (bnc#1193767).
   - CVE-2021-43976: Fixed a flaw that could allow an attacker (who can
     connect a crafted USB device) to cause a denial of service. (bnc#1192847)
   - CVE-2021-43975: Fixed a flaw in hw_atl_utils_fw_rpc_wait that could
     allow an attacker (who can introduce a crafted device) to trigger an
     out-of-bounds write via a crafted length value. (bsc#1192845)
   - CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag
     (bsc#1194529).
   - CVE-2021-4197: Use cgroup open-time credentials for process migraton
     perm checks (bsc#1194302).
   - CVE-2021-4159: Fixed kernel ptr leak vulnerability via BPF in
     coerce_reg_to_size (bsc#1194227).
   - CVE-2021-4149: Fixed btrfs unlock newly allocated extent buffer after
     error (bsc#1194001).
   - CVE-2021-4135: Fixed zero-initialize memory inside netdevsim for new
     map's value in function nsim_bpf_map_alloc (bsc#1193927).
   - CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage
     collection for Unix domain socket file handlers when users call close()
     and fget() simultaneouslyand can potentially trigger a race condition
     (bnc#1193727).
   - CVE-2021-4002: Fixed incorrect TLBs flush in hugetlbfs after
     huge_pmd_unshare (bsc#1192946).
   - CVE-2021-39657: Fixed out of bounds read due to a missing bounds check
     in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local
     information disclosure with System execution privileges needed
     (bnc#1193864).
   - CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a
     race condition in gadget_dev_desc_UDC_show of configfs.c. This could
     lead to local information disclosure with System execution privileges
     needed. User interaction is not needed for exploitation (bnc#1193861).
   - CVE-2021-3564: Fixed double-free memory corruption in the Linux kernel
     HCI device initialization subsystem that could have been used by
     attaching malicious HCI TTY Bluetooth devices. A local user could use
     this flaw to crash the system (bnc#1186207).
   - CVE-2021-33098: Fixed a potential denial of service in Intel(R) Ethernet
     ixgbe driver due to improper input validation. (bsc#1192877)
   - CVE-2021-28715: Fixed issue with xen/netback to do not queue unlimited
     number of packages (XSA-392) (bsc#1193442).
   - CVE-2021-28714: Fixed issue with xen/netback to handle rx queue stall
     detection (XSA-392) (bsc#1193442).
   - CVE-2021-28713: Fixed issue with xen/console to harden hvc_xen against
     event channel storms (XSA-391) (bsc#1193440).
   - CVE-2021-28712: Fixed issue with xen/netfront to harden netfront against
     event channel storms (XSA-391) (bsc#1193440).
   - CVE-2021-28711: Fixed issue with xen/blkfront to harden blkfront against
     event channel storms (XSA-391) (bsc#1193440).
   - CVE-2021-0935: Fixed possible out of bounds write in ip6_xmit of
     ip6_output.c due to a use after free. This could lead to local
     escalation of privilege with System execution privileges needed. User
     interaction is not needed for exploitation (bnc#1192032).
   - CVE-2021-0920: Fixed a local privilege escalation due to an use after
     free bug in unix_gc (bsc#1193731).
   - CVE-2020-27820: Fixed a vulnerability where a use-after-frees in
     nouveau's postclose() handler could happen if removing device
     (bsc#1179599).
   - CVE-2019-15126: Fixed a vulnerability in Broadcom and Cypress Wi-Fi
     chips, used in RPi family of devices aka "Kr00k". (bsc#1167162)
   - CVE-2018-25020: Fixed an overflow in the BPF subsystem due to a
     mishandling of a long jump over an instruction sequence where inner
     instructions require substantial expansions into multiple BPF
     instructions. This affects kernel/bpf/core.c and net/core/filter.c
     (bnc#1193575).

   The following non-security bugs were fixed:

   - Bluetooth: fix the erroneous flush_work() order (git-fixes).
   - Build: Add obsolete_rebuilds_subpackage (boo#1172073 bsc#1191731).
   - ICMPv6: Add ICMPv6 Parameter Problem, code 3 definition (bsc#1191241
     bsc#1195166).
   - IPv6: reply ICMP error if the first fragment do not include all headers     (bsc#1191241).
   - elfcore: fix building with clang (bsc#1169514).
   - hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
   - ipv6/netfilter: Discard first fragment not including all headers     (bsc#1191241 bsc#1195166).
   - kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).
   - kernel-binary.spec.in Stop templating the scriptlets for subpackages
     (bsc#1190358).
   - kernel-binary.spec.in: add zstd to BuildRequires if used
   - kernel-binary.spec.in: make sure zstd is supported by kmod if used
   - kernel-binary.spec: Check for no kernel signing certificates. Also
     remove unused variable.
   - kernel-binary.spec: Define $image as rpm macro (bsc#1189841).
   - kernel-binary.spec: Do not fail silently when KMP is empty
     (bsc#1190358). Copy the code from kernel-module-subpackage that deals
     with empty KMPs.
   - kernel-binary.spec: Do not sign kernel when no key provided
     (bsc#1187167).
   - kernel-binary.spec: Fix kernel-default-base scriptlets after packaging
     merge.
   - kernel-binary.spec: Require dwarves for kernel-binary-devel when BTF is
     enabled (jsc#SLE-17288).
   - kernel-binary.spec: suse-kernel-rpm-scriptlets required for uninstall as
     well.
   - kernel-cert-subpackage: Fix certificate location in scriptlets
     (bsc#1189841).
   - kernel-source.spec: install-kernel-tools also required on 15.4
   - kernel-spec-macros: Since rpm 4.17 %verbose is unusable (bsc#1191229).
     The semantic changed in an incompatible way so invoking the macro now
     causes a build failure.
   - kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
   - livepatch: Avoid CPU hogging with cond_resched (bsc#1071995).
   - memstick: rtsx_usb_ms: fix UAF (bsc#1194516).
   - moxart: fix potential use-after-free on remove path (bsc#1194516).
   - net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
   - net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
   - net: Using proper atomic helper (bsc#1186222).
   - net: ipv6: Discard next-hop MTU less than minimum link MTU (bsc#1191241).
   - net: mana: Add RX fencing (bsc#1193506).
   - net: mana: Add XDP support (bsc#1193506).
   - net: mana: Allow setting the number of queues while the NIC is down
     (bsc#1193506).
   - net: mana: Fix spelling mistake "calledd" -> "called" (bsc#1193506).
   - net: mana: Fix the netdev_err()'s vPort argument in mana_init_port()
     (bsc#1193506).
   - net: mana: Improve the HWC error handling (bsc#1193506).
   - net: mana: Support hibernation and kexec (bsc#1193506).
   - net: mana: Use kcalloc() instead of kzalloc() (bsc#1193506).
   - objtool: Support Clang non-section symbols in ORC generation
     (bsc#1169514).
   - post.sh: detect /usr mountpoint too
   - recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
   - recordmcount.pl: look for jgnop instruction as well as bcrl on s390
     (bsc#1192267).
   - rpm/kernel-binary.spec.in: Use kmod-zstd provide. This makes it possible
     to use kmod with ZSTD support on non-Tumbleweed.
   - rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release
     had arbitrary values in staging, we can't use it for dependencies. The
     filesystem one has to be enough (boo#1184804).
   - rpm/kernel-binary.spec.in: do not strip vmlinux again (bsc#1193306).
   - rpm/kernel-binary.spec: Use only non-empty certificates.
   - rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305).
   - rpm/kernel-source.rpmlintrc: ignore new include/config files.
   - rpm/kernel-source.spec.in: do some more for vanilla_only.
   - rpm: Abolish image suffix (bsc#1189841).
   - rpm: Abolish scritplet templating (bsc#1189841). Outsource kernel-binary
     and KMP scriptlets to suse-module-tools.
   - rpm: Define $certs as rpm macro (bsc#1189841).
   - rpm: Fold kernel-devel and kernel-source scriptlets into spec files
     (bsc#1189841).
   - rpm: fix kmp install path
   - rpm: use _rpmmacrodir (boo#1191384)
   - tty: hvc: replace BUG_ON() with negative return value.
   - vfs: check fd has read access in kernel_read_file_from_fd()
     (bsc#1194888).
   - x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (bsc#1169514).
   - xen/blkfront: do not take local copy of a request from the ring page
     (git-fixes).
   - xen/blkfront: do not trust the backend response data blindly (git-fixes).
   - xen/blkfront: read response from backend only once (git-fixes).
   - xen/netfront: disentangle tx_skb_freelist (git-fixes).
   - xen/netfront: do not read data from request on the ring page (git-fixes).
   - xen/netfront: do not trust the backend response data blindly (git-fixes).
   - xen/netfront: read response from backend only once (git-fixes).
   - xen: sync include/xen/interface/io/ring.h with Xen's newest version
     (git-fixes).
   - xfrm: fix MTU regression (bsc#1185377, bsc#1194048).


Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server for SAP 15-SP1:

      zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-366=1

   - SUSE Linux Enterprise Server 15-SP1-LTSS:

      zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-366=1

   - SUSE Linux Enterprise Server 15-SP1-BCL:

      zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-366=1

   - SUSE Linux Enterprise Module for Live Patching 15-SP1:

      zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2022-366=1

   - SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:

      zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-366=1

   - SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:

      zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-366=1

   - SUSE Linux Enterprise High Availability 15-SP1:

      zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2022-366=1

   - SUSE Enterprise Storage 6:

      zypper in -t patch SUSE-Storage-6-2022-366=1

   - SUSE CaaS Platform 4.0:

      To install this update, use the SUSE CaaS Platform 'skuba' tool. It
      will inform you if it detects new updates and let you then trigger
      updating of the complete cluster in a controlled way.



Package List:

   - SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):

      kernel-default-4.12.14-197.105.1
      kernel-default-base-4.12.14-197.105.1
      kernel-default-base-debuginfo-4.12.14-197.105.1
      kernel-default-debuginfo-4.12.14-197.105.1
      kernel-default-debugsource-4.12.14-197.105.1
      kernel-default-devel-4.12.14-197.105.1
      kernel-default-devel-debuginfo-4.12.14-197.105.1
      kernel-obs-build-4.12.14-197.105.1
      kernel-obs-build-debugsource-4.12.14-197.105.1
      kernel-syms-4.12.14-197.105.1
      reiserfs-kmp-default-4.12.14-197.105.1
      reiserfs-kmp-default-debuginfo-4.12.14-197.105.1

   - SUSE Linux Enterprise Server for SAP 15-SP1 (noarch):

      kernel-devel-4.12.14-197.105.1
      kernel-docs-4.12.14-197.105.1
      kernel-macros-4.12.14-197.105.1
      kernel-source-4.12.14-197.105.1

   - SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):

      kernel-default-4.12.14-197.105.1
      kernel-default-base-4.12.14-197.105.1
      kernel-default-base-debuginfo-4.12.14-197.105.1
      kernel-default-debuginfo-4.12.14-197.105.1
      kernel-default-debugsource-4.12.14-197.105.1
      kernel-default-devel-4.12.14-197.105.1
      kernel-default-devel-debuginfo-4.12.14-197.105.1
      kernel-obs-build-4.12.14-197.105.1
      kernel-obs-build-debugsource-4.12.14-197.105.1
      kernel-syms-4.12.14-197.105.1
      reiserfs-kmp-default-4.12.14-197.105.1
      reiserfs-kmp-default-debuginfo-4.12.14-197.105.1

   - SUSE Linux Enterprise Server 15-SP1-LTSS (noarch):

      kernel-devel-4.12.14-197.105.1
      kernel-docs-4.12.14-197.105.1
      kernel-macros-4.12.14-197.105.1
      kernel-source-4.12.14-197.105.1

   - SUSE Linux Enterprise Server 15-SP1-LTSS (s390x):

      kernel-default-man-4.12.14-197.105.1
      kernel-zfcpdump-debuginfo-4.12.14-197.105.1
      kernel-zfcpdump-debugsource-4.12.14-197.105.1

   - SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):

      kernel-default-4.12.14-197.105.1
      kernel-default-base-4.12.14-197.105.1
      kernel-default-base-debuginfo-4.12.14-197.105.1
      kernel-default-debuginfo-4.12.14-197.105.1
      kernel-default-debugsource-4.12.14-197.105.1
      kernel-default-devel-4.12.14-197.105.1
      kernel-default-devel-debuginfo-4.12.14-197.105.1
      kernel-obs-build-4.12.14-197.105.1
      kernel-obs-build-debugsource-4.12.14-197.105.1
      kernel-syms-4.12.14-197.105.1
      reiserfs-kmp-default-4.12.14-197.105.1
      reiserfs-kmp-default-debuginfo-4.12.14-197.105.1

   - SUSE Linux Enterprise Server 15-SP1-BCL (noarch):

      kernel-devel-4.12.14-197.105.1
      kernel-docs-4.12.14-197.105.1
      kernel-macros-4.12.14-197.105.1
      kernel-source-4.12.14-197.105.1

   - SUSE Linux Enterprise Module for Live Patching 15-SP1 (ppc64le x86_64):

      kernel-default-debuginfo-4.12.14-197.105.1
      kernel-default-debugsource-4.12.14-197.105.1
      kernel-default-livepatch-4.12.14-197.105.1
      kernel-default-livepatch-devel-4.12.14-197.105.1
      kernel-livepatch-4_12_14-197_105-default-1-3.3.1

   - SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):

      kernel-default-4.12.14-197.105.1
      kernel-default-base-4.12.14-197.105.1
      kernel-default-base-debuginfo-4.12.14-197.105.1
      kernel-default-debuginfo-4.12.14-197.105.1
      kernel-default-debugsource-4.12.14-197.105.1
      kernel-default-devel-4.12.14-197.105.1
      kernel-default-devel-debuginfo-4.12.14-197.105.1
      kernel-obs-build-4.12.14-197.105.1
      kernel-obs-build-debugsource-4.12.14-197.105.1
      kernel-syms-4.12.14-197.105.1

   - SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (noarch):

      kernel-devel-4.12.14-197.105.1
      kernel-docs-4.12.14-197.105.1
      kernel-macros-4.12.14-197.105.1
      kernel-source-4.12.14-197.105.1

   - SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64):

      kernel-default-4.12.14-197.105.1
      kernel-default-base-4.12.14-197.105.1
      kernel-default-base-debuginfo-4.12.14-197.105.1
      kernel-default-debuginfo-4.12.14-197.105.1
      kernel-default-debugsource-4.12.14-197.105.1
      kernel-default-devel-4.12.14-197.105.1
      kernel-default-devel-debuginfo-4.12.14-197.105.1
      kernel-obs-build-4.12.14-197.105.1
      kernel-obs-build-debugsource-4.12.14-197.105.1
      kernel-syms-4.12.14-197.105.1

   - SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (noarch):

      kernel-devel-4.12.14-197.105.1
      kernel-docs-4.12.14-197.105.1
      kernel-macros-4.12.14-197.105.1
      kernel-source-4.12.14-197.105.1

   - SUSE Linux Enterprise High Availability 15-SP1 (aarch64 ppc64le s390x x86_64):

      cluster-md-kmp-default-4.12.14-197.105.1
      cluster-md-kmp-default-debuginfo-4.12.14-197.105.1
      dlm-kmp-default-4.12.14-197.105.1
      dlm-kmp-default-debuginfo-4.12.14-197.105.1
      gfs2-kmp-default-4.12.14-197.105.1
      gfs2-kmp-default-debuginfo-4.12.14-197.105.1
      kernel-default-debuginfo-4.12.14-197.105.1
      kernel-default-debugsource-4.12.14-197.105.1
      ocfs2-kmp-default-4.12.14-197.105.1
      ocfs2-kmp-default-debuginfo-4.12.14-197.105.1

   - SUSE Enterprise Storage 6 (aarch64 x86_64):

      kernel-default-4.12.14-197.105.1
      kernel-default-base-4.12.14-197.105.1
      kernel-default-base-debuginfo-4.12.14-197.105.1
      kernel-default-debuginfo-4.12.14-197.105.1
      kernel-default-debugsource-4.12.14-197.105.1
      kernel-default-devel-4.12.14-197.105.1
      kernel-default-devel-debuginfo-4.12.14-197.105.1
      kernel-obs-build-4.12.14-197.105.1
      kernel-obs-build-debugsource-4.12.14-197.105.1
      kernel-syms-4.12.14-197.105.1
      reiserfs-kmp-default-4.12.14-197.105.1
      reiserfs-kmp-default-debuginfo-4.12.14-197.105.1

   - SUSE Enterprise Storage 6 (noarch):

      kernel-devel-4.12.14-197.105.1
      kernel-docs-4.12.14-197.105.1
      kernel-macros-4.12.14-197.105.1
      kernel-source-4.12.14-197.105.1

   - SUSE CaaS Platform 4.0 (x86_64):

      kernel-default-4.12.14-197.105.1
      kernel-default-base-4.12.14-197.105.1
      kernel-default-base-debuginfo-4.12.14-197.105.1
      kernel-default-debuginfo-4.12.14-197.105.1
      kernel-default-debugsource-4.12.14-197.105.1
      kernel-default-devel-4.12.14-197.105.1
      kernel-default-devel-debuginfo-4.12.14-197.105.1
      kernel-obs-build-4.12.14-197.105.1
      kernel-obs-build-debugsource-4.12.14-197.105.1
      kernel-syms-4.12.14-197.105.1
      reiserfs-kmp-default-4.12.14-197.105.1
      reiserfs-kmp-default-debuginfo-4.12.14-197.105.1

   - SUSE CaaS Platform 4.0 (noarch):

      kernel-devel-4.12.14-197.105.1
      kernel-docs-4.12.14-197.105.1
      kernel-macros-4.12.14-197.105.1
      kernel-source-4.12.14-197.105.1


References:

   https://www.suse.com/security/cve/CVE-2018-25020.html
   https://www.suse.com/security/cve/CVE-2019-15126.html
   https://www.suse.com/security/cve/CVE-2020-27820.html
   https://www.suse.com/security/cve/CVE-2021-0920.html
   https://www.suse.com/security/cve/CVE-2021-0935.html
   https://www.suse.com/security/cve/CVE-2021-28711.html
   https://www.suse.com/security/cve/CVE-2021-28712.html
   https://www.suse.com/security/cve/CVE-2021-28713.html
   https://www.suse.com/security/cve/CVE-2021-28714.html
   https://www.suse.com/security/cve/CVE-2021-28715.html
   https://www.suse.com/security/cve/CVE-2021-33098.html
   https://www.suse.com/security/cve/CVE-2021-3564.html
   https://www.suse.com/security/cve/CVE-2021-39648.html
   https://www.suse.com/security/cve/CVE-2021-39657.html
   https://www.suse.com/security/cve/CVE-2021-4002.html
   https://www.suse.com/security/cve/CVE-2021-4083.html
   https://www.suse.com/security/cve/CVE-2021-4135.html
   https://www.suse.com/security/cve/CVE-2021-4149.html
   https://www.suse.com/security/cve/CVE-2021-4197.html
   https://www.suse.com/security/cve/CVE-2021-4202.html
   https://www.suse.com/security/cve/CVE-2021-43975.html
   https://www.suse.com/security/cve/CVE-2021-43976.html
   https://www.suse.com/security/cve/CVE-2021-44733.html
   https://www.suse.com/security/cve/CVE-2021-45095.html
   https://www.suse.com/security/cve/CVE-2021-45486.html
   https://www.suse.com/security/cve/CVE-2022-0322.html
   https://www.suse.com/security/cve/CVE-2022-0330.html
   https://bugzilla.suse.com/1071995
   https://bugzilla.suse.com/1124431
   https://bugzilla.suse.com/1167162
   https://bugzilla.suse.com/1169514
   https://bugzilla.suse.com/1172073
   https://bugzilla.suse.com/1179599
   https://bugzilla.suse.com/1184804
   https://bugzilla.suse.com/1185377
   https://bugzilla.suse.com/1186207
   https://bugzilla.suse.com/1186222
   https://bugzilla.suse.com/1187167
   https://bugzilla.suse.com/1189305
   https://bugzilla.suse.com/1189841
   https://bugzilla.suse.com/1190358
   https://bugzilla.suse.com/1190428
   https://bugzilla.suse.com/1191229
   https://bugzilla.suse.com/1191241
   https://bugzilla.suse.com/1191384
   https://bugzilla.suse.com/1191731
   https://bugzilla.suse.com/1192032
   https://bugzilla.suse.com/1192267
   https://bugzilla.suse.com/1192740
   https://bugzilla.suse.com/1192845
   https://bugzilla.suse.com/1192847
   https://bugzilla.suse.com/1192877
   https://bugzilla.suse.com/1192946
   https://bugzilla.suse.com/1193306
   https://bugzilla.suse.com/1193440
   https://bugzilla.suse.com/1193442
   https://bugzilla.suse.com/1193575
   https://bugzilla.suse.com/1193669
   https://bugzilla.suse.com/1193727
   https://bugzilla.suse.com/1193731
   https://bugzilla.suse.com/1193767
   https://bugzilla.suse.com/1193861
   https://bugzilla.suse.com/1193864
   https://bugzilla.suse.com/1193867
   https://bugzilla.suse.com/1193927
   https://bugzilla.suse.com/1194001
   https://bugzilla.suse.com/1194048
   https://bugzilla.suse.com/1194087
   https://bugzilla.suse.com/1194227
   https://bugzilla.suse.com/1194302
   https://bugzilla.suse.com/1194516
   https://bugzilla.suse.com/1194529
   https://bugzilla.suse.com/1194880
   https://bugzilla.suse.com/1194888
   https://bugzilla.suse.com/1194985
   https://bugzilla.suse.com/1195166
   https://bugzilla.suse.com/1195254

SUSE: 2022:0366-1 critical: the Linux Kernel

February 10, 2022
An update that solves 27 vulnerabilities and has 23 fixes is now available

Summary

The SUSE Linux Enterprise 15 SP1 LTSS kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254). - CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880). - CVE-2021-45486: Fixed an information leak because the hash table is very small in net/ipv4/route.c (bnc#1194087). - CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867). - CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767). - CVE-2021-43976: Fixed a flaw that could allow an attacker (who can connect a crafted USB device) to cause a denial of service. (bnc#1192847) - CVE-2021-43975: Fixed a flaw in hw_atl_utils_fw_rpc_wait that could allow an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value. (bsc#1192845) - CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194529). - CVE-2021-4197: Use cgroup open-time credentials for process migraton perm checks (bsc#1194302). - CVE-2021-4159: Fixed kernel ptr leak vulnerability via BPF in coerce_reg_to_size (bsc#1194227). - CVE-2021-4149: Fixed btrfs unlock newly allocated extent buffer after error (bsc#1194001). - CVE-2021-4135: Fixed zero-initialize memory inside netdevsim for new map's value in function nsim_bpf_map_alloc (bsc#1193927). - CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1193727). - CVE-2021-4002: Fixed incorrect TLBs flush in hugetlbfs after huge_pmd_unshare (bsc#1192946). - CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864). - CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861). - CVE-2021-3564: Fixed double-free memory corruption in the Linux kernel HCI device initialization subsystem that could have been used by attaching malicious HCI TTY Bluetooth devices. A local user could use this flaw to crash the system (bnc#1186207). - CVE-2021-33098: Fixed a potential denial of service in Intel(R) Ethernet ixgbe driver due to improper input validation. (bsc#1192877) - CVE-2021-28715: Fixed issue with xen/netback to do not queue unlimited number of packages (XSA-392) (bsc#1193442). - CVE-2021-28714: Fixed issue with xen/netback to handle rx queue stall detection (XSA-392) (bsc#1193442). - CVE-2021-28713: Fixed issue with xen/console to harden hvc_xen against event channel storms (XSA-391) (bsc#1193440). - CVE-2021-28712: Fixed issue with xen/netfront to harden netfront against event channel storms (XSA-391) (bsc#1193440). - CVE-2021-28711: Fixed issue with xen/blkfront to harden blkfront against event channel storms (XSA-391) (bsc#1193440). - CVE-2021-0935: Fixed possible out of bounds write in ip6_xmit of ip6_output.c due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192032). - CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1193731). - CVE-2020-27820: Fixed a vulnerability where a use-after-frees in nouveau's postclose() handler could happen if removing device (bsc#1179599). - CVE-2019-15126: Fixed a vulnerability in Broadcom and Cypress Wi-Fi chips, used in RPi family of devices aka "Kr00k". (bsc#1167162) - CVE-2018-25020: Fixed an overflow in the BPF subsystem due to a mishandling of a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions. This affects kernel/bpf/core.c and net/core/filter.c (bnc#1193575). The following non-security bugs were fixed: - Bluetooth: fix the erroneous flush_work() order (git-fixes). - Build: Add obsolete_rebuilds_subpackage (boo#1172073 bsc#1191731). - ICMPv6: Add ICMPv6 Parameter Problem, code 3 definition (bsc#1191241 bsc#1195166). - IPv6: reply ICMP error if the first fragment do not include all headers (bsc#1191241). - elfcore: fix building with clang (bsc#1169514). - hv_netvsc: Set needed_headroom according to VF (bsc#1193506). - ipv6/netfilter: Discard first fragment not including all headers (bsc#1191241 bsc#1195166). - kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740). - kernel-binary.spec.in Stop templating the scriptlets for subpackages (bsc#1190358). - kernel-binary.spec.in: add zstd to BuildRequires if used - kernel-binary.spec.in: make sure zstd is supported by kmod if used - kernel-binary.spec: Check for no kernel signing certificates. Also remove unused variable. - kernel-binary.spec: Define $image as rpm macro (bsc#1189841). - kernel-binary.spec: Do not fail silently when KMP is empty (bsc#1190358). Copy the code from kernel-module-subpackage that deals with empty KMPs. - kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167). - kernel-binary.spec: Fix kernel-default-base scriptlets after packaging merge. - kernel-binary.spec: Require dwarves for kernel-binary-devel when BTF is enabled (jsc#SLE-17288). - kernel-binary.spec: suse-kernel-rpm-scriptlets required for uninstall as well. - kernel-cert-subpackage: Fix certificate location in scriptlets (bsc#1189841). - kernel-source.spec: install-kernel-tools also required on 15.4 - kernel-spec-macros: Since rpm 4.17 %verbose is unusable (bsc#1191229). The semantic changed in an incompatible way so invoking the macro now causes a build failure. - kprobes: Limit max data_size of the kretprobe instances (bsc#1193669). - livepatch: Avoid CPU hogging with cond_resched (bsc#1071995). - memstick: rtsx_usb_ms: fix UAF (bsc#1194516). - moxart: fix potential use-after-free on remove path (bsc#1194516). - net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506). - net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506). - net: Using proper atomic helper (bsc#1186222). - net: ipv6: Discard next-hop MTU less than minimum link MTU (bsc#1191241). - net: mana: Add RX fencing (bsc#1193506). - net: mana: Add XDP support (bsc#1193506). - net: mana: Allow setting the number of queues while the NIC is down (bsc#1193506). - net: mana: Fix spelling mistake "calledd" -> "called" (bsc#1193506). - net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (bsc#1193506). - net: mana: Improve the HWC error handling (bsc#1193506). - net: mana: Support hibernation and kexec (bsc#1193506). - net: mana: Use kcalloc() instead of kzalloc() (bsc#1193506). - objtool: Support Clang non-section symbols in ORC generation (bsc#1169514). - post.sh: detect /usr mountpoint too - recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267). - recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#1192267). - rpm/kernel-binary.spec.in: Use kmod-zstd provide. This makes it possible to use kmod with ZSTD support on non-Tumbleweed. - rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release had arbitrary values in staging, we can't use it for dependencies. The filesystem one has to be enough (boo#1184804). - rpm/kernel-binary.spec.in: do not strip vmlinux again (bsc#1193306). - rpm/kernel-binary.spec: Use only non-empty certificates. - rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305). - rpm/kernel-source.rpmlintrc: ignore new include/config files. - rpm/kernel-source.spec.in: do some more for vanilla_only. - rpm: Abolish image suffix (bsc#1189841). - rpm: Abolish scritplet templating (bsc#1189841). Outsource kernel-binary and KMP scriptlets to suse-module-tools. - rpm: Define $certs as rpm macro (bsc#1189841). - rpm: Fold kernel-devel and kernel-source scriptlets into spec files (bsc#1189841). - rpm: fix kmp install path - rpm: use _rpmmacrodir (boo#1191384) - tty: hvc: replace BUG_ON() with negative return value. - vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888). - x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (bsc#1169514). - xen/blkfront: do not take local copy of a request from the ring page (git-fixes). - xen/blkfront: do not trust the backend response data blindly (git-fixes). - xen/blkfront: read response from backend only once (git-fixes). - xen/netfront: disentangle tx_skb_freelist (git-fixes). - xen/netfront: do not read data from request on the ring page (git-fixes). - xen/netfront: do not trust the backend response data blindly (git-fixes). - xen/netfront: read response from backend only once (git-fixes). - xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes). - xfrm: fix MTU regression (bsc#1185377, bsc#1194048).

References

#1071995 #1124431 #1167162 #1169514 #1172073

#1179599 #1184804 #1185377 #1186207 #1186222

#1187167 #1189305 #1189841 #1190358 #1190428

#1191229 #1191241 #1191384 #1191731 #1192032

#1192267 #1192740 #1192845 #1192847 #1192877

#1192946 #1193306 #1193440 #1193442 #1193575

#1193669 #1193727 #1193731 #1193767 #1193861

#1193864 #1193867 #1193927 #1194001 #1194048

#1194087 #1194227 #1194302 #1194516 #1194529

#1194880 #1194888 #1194985 #1195166 #1195254

Cross- CVE-2018-25020 CVE-2019-15126 CVE-2020-27820

CVE-2021-0920 CVE-2021-0935 CVE-2021-28711

CVE-2021-28712 CVE-2021-28713 CVE-2021-28714

CVE-2021-28715 CVE-2021-33098 CVE-2021-3564

CVE-2021-39648 CVE-2021-39657 CVE-2021-4002

CVE-2021-4083 CVE-2021-4135 CVE-2021-4149

CVE-2021-4197 CVE-2021-4202 CVE-2021-43975

CVE-2021-43976 CVE-2021-44733 CVE-2021-45095

CVE-2021-45486 CVE-2022-0322 CVE-2022-0330

CVSS scores:

CVE-2018-25020 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2019-15126 (NVD) : 3.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

CVE-2019-15126 (SUSE): 3.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

CVE-2020-27820 (SUSE): 3.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L

CVE-2021-0920 (NVD) : 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE-2021-0920 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2021-0935 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2021-28711 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

CVE-2021-28711 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-28712 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

CVE-2021-28712 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-28713 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

CVE-2021-28713 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-28714 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

CVE-2021-28714 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-28715 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

CVE-2021-28715 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-33098 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-33098 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-3564 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-3564 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-39648 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

CVE-2021-39657 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

CVE-2021-4002 (SUSE): 5.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

CVE-2021-4083 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2021-4135 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVE-2021-4149 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-4197 (SUSE): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

CVE-2021-4202 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2021-43975 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE-2021-43976 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-44733 (SUSE): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

CVE-2021-45095 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVE-2021-45095 (SUSE): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVE-2021-45486 (NVD) : 3.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVE-2021-45486 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

CVE-2022-0322 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

SUSE CaaS Platform 4.0

SUSE Enterprise Storage 6

SUSE Linux Enterprise High Availability 15-SP1

SUSE Linux Enterprise High Performance Computing 15-SP1

SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS

SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS

SUSE Linux Enterprise Module for Live Patching 15-SP1

SUSE Linux Enterprise Server 15-SP1

SUSE Linux Enterprise Server 15-SP1-BCL

SUSE Linux Enterprise Server 15-SP1-LTSS

SUSE Linux Enterprise Server for SAP 15-SP1

SUSE Linux Enterprise Server for SAP Applications 15-SP1

SUSE Linux Enterprise Storage 6

SUSE Manager Proxy 4.0

SUSE Manager Server 4.0

https://www.suse.com/security/cve/CVE-2018-25020.html

https://www.suse.com/security/cve/CVE-2019-15126.html

https://www.suse.com/security/cve/CVE-2020-27820.html

https://www.suse.com/security/cve/CVE-2021-0920.html

https://www.suse.com/security/cve/CVE-2021-0935.html

https://www.suse.com/security/cve/CVE-2021-28711.html

https://www.suse.com/security/cve/CVE-2021-28712.html

https://www.suse.com/security/cve/CVE-2021-28713.html

https://www.suse.com/security/cve/CVE-2021-28714.html

https://www.suse.com/security/cve/CVE-2021-28715.html

https://www.suse.com/security/cve/CVE-2021-33098.html

https://www.suse.com/security/cve/CVE-2021-3564.html

https://www.suse.com/security/cve/CVE-2021-39648.html

https://www.suse.com/security/cve/CVE-2021-39657.html

https://www.suse.com/security/cve/CVE-2021-4002.html

https://www.suse.com/security/cve/CVE-2021-4083.html

https://www.suse.com/security/cve/CVE-2021-4135.html

https://www.suse.com/security/cve/CVE-2021-4149.html

https://www.suse.com/security/cve/CVE-2021-4197.html

https://www.suse.com/security/cve/CVE-2021-4202.html

https://www.suse.com/security/cve/CVE-2021-43975.html

https://www.suse.com/security/cve/CVE-2021-43976.html

https://www.suse.com/security/cve/CVE-2021-44733.html

https://www.suse.com/security/cve/CVE-2021-45095.html

https://www.suse.com/security/cve/CVE-2021-45486.html

https://www.suse.com/security/cve/CVE-2022-0322.html

https://www.suse.com/security/cve/CVE-2022-0330.html

https://bugzilla.suse.com/1071995

https://bugzilla.suse.com/1124431

https://bugzilla.suse.com/1167162

https://bugzilla.suse.com/1169514

https://bugzilla.suse.com/1172073

https://bugzilla.suse.com/1179599

https://bugzilla.suse.com/1184804

https://bugzilla.suse.com/1185377

https://bugzilla.suse.com/1186207

https://bugzilla.suse.com/1186222

https://bugzilla.suse.com/1187167

https://bugzilla.suse.com/1189305

https://bugzilla.suse.com/1189841

https://bugzilla.suse.com/1190358

https://bugzilla.suse.com/1190428

https://bugzilla.suse.com/1191229

https://bugzilla.suse.com/1191241

https://bugzilla.suse.com/1191384

https://bugzilla.suse.com/1191731

https://bugzilla.suse.com/1192032

https://bugzilla.suse.com/1192267

https://bugzilla.suse.com/1192740

https://bugzilla.suse.com/1192845

https://bugzilla.suse.com/1192847

https://bugzilla.suse.com/1192877

https://bugzilla.suse.com/1192946

https://bugzilla.suse.com/1193306

https://bugzilla.suse.com/1193440

https://bugzilla.suse.com/1193442

https://bugzilla.suse.com/1193575

https://bugzilla.suse.com/1193669

https://bugzilla.suse.com/1193727

https://bugzilla.suse.com/1193731

https://bugzilla.suse.com/1193767

https://bugzilla.suse.com/1193861

https://bugzilla.suse.com/1193864

https://bugzilla.suse.com/1193867

https://bugzilla.suse.com/1193927

https://bugzilla.suse.com/1194001

https://bugzilla.suse.com/1194048

https://bugzilla.suse.com/1194087

https://bugzilla.suse.com/1194227

https://bugzilla.suse.com/1194302

https://bugzilla.suse.com/1194516

https://bugzilla.suse.com/1194529

https://bugzilla.suse.com/1194880

https://bugzilla.suse.com/1194888

https://bugzilla.suse.com/1194985

https://bugzilla.suse.com/1195166

https://bugzilla.suse.com/1195254

Severity
Announcement ID: SUSE-SU-2022:0366-1
Rating: critical

Related News