SUSE: 2022:4273-1 important: the Linux Kernel | LinuxSecurity.com

   SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:4273-1
Rating:             important
References:         #1032323 #1065729 #1196018 #1198702 #1200788 
                    #1202686 #1202972 #1203098 #1203142 #1203198 
                    #1203254 #1203290 #1203322 #1203387 #1203514 
                    #1203802 #1204166 #1204168 #1204241 #1204354 
                    #1204355 #1204402 #1204415 #1204431 #1204439 
                    #1204479 #1204574 #1204635 #1204646 #1204647 
                    #1204653 #1204755 
Cross-References:   CVE-2021-4037 CVE-2022-2153 CVE-2022-28748
                    CVE-2022-2964 CVE-2022-3169 CVE-2022-3424
                    CVE-2022-3521 CVE-2022-3524 CVE-2022-3542
                    CVE-2022-3545 CVE-2022-3565 CVE-2022-3586
                    CVE-2022-3594 CVE-2022-3621 CVE-2022-3629
                    CVE-2022-3646 CVE-2022-3649 CVE-2022-40307
                    CVE-2022-40768 CVE-2022-42703 CVE-2022-43750
                   
CVSS scores:
                    CVE-2021-4037 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-4037 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
                    CVE-2022-2153 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-2153 (SUSE): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
                    CVE-2022-28748 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
                    CVE-2022-2964 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-2964 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-3169 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3169 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3424 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-3521 (NVD) : 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
                    CVE-2022-3521 (SUSE): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3524 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3524 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3542 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3542 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3545 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-3545 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-3565 (NVD) : 8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-3565 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-3586 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3586 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-3594 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3594 (SUSE): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3621 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3621 (SUSE): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-3629 (NVD) : 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
                    CVE-2022-3629 (SUSE): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
                    CVE-2022-3646 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
                    CVE-2022-3646 (SUSE): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
                    CVE-2022-3649 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-3649 (SUSE): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
                    CVE-2022-40307 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-40307 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-40768 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2022-40768 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2022-42703 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-42703 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-43750 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-43750 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Affected Products:
                    SUSE Linux Enterprise Server 12-SP5
______________________________________________________________________________

   An update that solves 21 vulnerabilities and has 11 fixes
   is now available.

Description:


   The SUSE Linux Enterprise 12 SP5 Azure kernel was updated.

   The following security bugs were fixed:

   - CVE-2021-4037: Fixed function logic vulnerability that allowed local
     users to create files for the XFS file-system with an unintended group
     ownership and with group execution and SGID permission bits set
     (bnc#1198702).
   - CVE-2022-2153: Fixed vulnerability in KVM that could allow an
     unprivileged local attacker on the host to cause DoS (bnc#1200788).
   - CVE-2022-2964, CVE-2022-28748: Fixed memory corruption issues in
     ax88179_178a devices (bnc#1202686).
   - CVE-2022-3169: Fixed a denial of service flaw which occurs when
     consecutive requests to NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET
     are sent (bnc#1203290).
   - CVE-2022-3424: Fixed use-after-free in gru_set_context_option(),
     gru_fault() and gru_handle_user_call_os() that could lead to kernel
     panic (bsc#1204166).
   - CVE-2022-3521: Fixed race condition in kcm_tx_work() in
     net/kcm/kcmsock.c (bnc#1204355).
   - CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6
     handler (bnc#1204354).
   - CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in
     drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bnc#1204402).
   - CVE-2022-3545: Fixed use-after-free in area_cache_get() in
     drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bnc#1204415).
   - CVE-2022-3565: Fixed use-after-free in del_timer() in
     drivers/isdn/mISDN/l1oip_core.c (bnc#1204431).
   - CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could
     allow a local unprivileged user to cause a denial of service
     (bnc#1204439).
   - CVE-2022-3594: Fixed excessive data logging in intr_callback() in
     drivers/net/usb/r8152.c (bnc#1204479).
   - CVE-2022-3621: Fixed null pointer dereference in
     nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bnc#1204574).
   - CVE-2022-3629: Fixed memory leak in vsock_connect() in
     net/vmw_vsock/af_vsock.c (bnc#1204635).
   - CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in
     fs/nilfs2/segment.c (bnc#1204646).
   - CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in
     fs/nilfs2/inode.c (bnc#1204647).
   - CVE-2022-40307: Fixed a race condition that could had been exploited to
     trigger a use-after-free in the efi firmware capsule-loader.c
     (bnc#1203322).
   - CVE-2022-40768: Fixed information leak in the scsi driver which allowed
     local users to obtain sensitive information from kernel memory
     (bnc#1203514).
   - CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf
     anon_vma double reuse (bnc#1204168).
   - CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space
     client to corrupt the monitor's internal memory (bnc#1204653).

   The following non-security bugs were fixed:

   - acpi: processor idle: Practically limit "Dummy wait" workaround to old
     Intel systems (bnc#1203802).
   - acpi: processor_idle: Skip dummy wait if kernel is in guest
     (bnc#1203802).
   - amd-xgbe: Update DMA coherency values (git-fixes).
   - bnxt: do not lock the tx queue from napi poll (git-fixes).
   - bnxt_en: Fix RX consumer index logic in the error path (git-fixes).
   - bnxt_en: reverse order of TX disable and carrier off (git-fixes).
   - ethernet: sun: niu: fix missing checks of niu_pci_eeprom_read()
     (git-fixes).
   - i40e: Fix flow for IPv6 next header (extension header) (git-fixes).
   - i40e: Fix overwriting flow control settings during driver loading
     (git-fixes).
   - i40e: improve locking of mac_filter_hash (git-fixes).
   - input: gscps2 - check return value of ioremap() in gscps2_probe()
     (git-fixes).
   - input: xpad - add supported devices as contributed on github (git-fixes).
   - ip6: fix skb leak in ip6frag_expire_frag_queue (bsc#1202972)
   - kvm: x86/emulator: Fix handing of POP SS to correctly set
     interruptibility (git-fixes).
   - locking/csd_lock: Change csdlock_debug from early_param to __setup
     (git-fixes).
   - memcg, kmem: do not fail __GFP_NOFAIL charges (bsc#1204755).
   - net/mlx4: Fix EEPROM dump support (git-fixes).
   - net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes).
   - net/mlx5e: Remove dependency in IPsec initialization flows (git-fixes).
   - net: amd-xgbe: Fix NETDEV WATCHDOG transmit queue timeout warning
     (git-fixes).
   - net: amd-xgbe: Fix network fluctuations when using 1G BELFUSE SFP
     (git-fixes).
   - net: amd-xgbe: Reset link when the link never comes back (git-fixes).
   - net: dsa: mt7530: add the missing RxUnicast MIB counter (git-fixes).
   - net: ethernet: ezchip: fix UAF in nps_enet_remove (git-fixes).
   - net: lapbether: Prevent racing when checking whether the netif is
     running (git-fixes).
   - net: marvell: fix MVNETA_TX_IN_PRGRS bit number (git-fixes).
   - net: mvpp2: Put fwnode in error case during ->probe() (git-fixes).
   - net: stmmac: fix watchdog timeout during suspend/resume stress test
     (git-fixes).
   - net: stmmac: stop each tx channel independently (git-fixes).
   - net: usb: qmi_wwan: Add new usb-id for Dell branded EM7455 (git-fixes).
   - net: vxge: fix use-after-free in vxge_device_unregister (git-fixes).
   - nvmem: core: Check input parameter for NULL in nvmem_unregister()
     (bsc#1204241).
   - powerpc/mm/64s: Drop pgd_huge() (bsc#1065729).
   - powerpc/mm: remove pmd_huge/pud_huge stubs and include hugetlb.h
     (bsc#1065729).
   - powerpc/pci_dn: Add missing of_node_put() (bsc#1065729).
   - powerpc/powernv: add missing of_node_put() in opal_export_attrs()
     (bsc#1065729).
   - ppp: Fix generating ifname when empty IFLA_IFNAME is specified
     (git-fixes).
   - ppp: Fix generating ppp unit id when ifname is not specified (git-fixes).
   - quota: widen timestamps for the fs_disk_quota structure (bsc#1203387).
   - r8169: fix jumbo packet handling on RTL8168e (git-fixes).
   - revert "niu: fix missing checks of niu_pci_eeprom_read" (git-fixes).
   - s390/guarded storage: simplify task exit handling (bsc#1203254
     LTC#199911).
   - s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages
     (bsc#1203142 LTC#199883).
   - s390/hypfs: avoid error message under KVM (bsc#1032323).
   - s390/mm: do not trigger write fault when vma does not allow VM_WRITE
     (bsc#1203198 LTC#199898).
   - s390: fix double free of GS and RI CBs on fork() failure (bsc#1203254
     LTC#199911).
   - usb: core: Fix RST error in hub.c (git-fixes).
   - usb: serial: ch341: add basis for quirk detection (git-fixes).
   - usb: serial: ch341: fix lockup of devices with limited prescaler
     (git-fixes).
   - usb: serial: ch341: fix lost character on LCR updates (git-fixes).
   - usb: serial: ch341: fix receiver regression (git-fixes).
   - usb: serial: ch341: reimplement line-speed handling (git-fixes).
   - usb: serial: cp210x: add Decagon UCA device id (git-fixes).
   - usb: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).
   - usb: serial: option: add Quectel BG95 0x0203 composition (git-fixes).
   - usb: serial: option: add Quectel EM060K modem (git-fixes).
   - usb: serial: option: add Quectel RM520N (git-fixes).
   - usb: serial: option: add support for OPPO R11 diag port (git-fixes).
   - x86/xen: Remove undefined behavior in setup_features() (git-fixes).
   - xfs: account finobt blocks properly in perag reservation (bsc#1203387).
   - xfs: enable big timestamps (bsc#1203387).
   - xfs: enable new inode btree counters feature (bsc#1203387).
   - xfs: explicitly define inode timestamp range (bsc#1203387).
   - xfs: preserve default grace interval during quotacheck (bsc#1203387).
   - xfs: quota: move to time64_t interfaces (bsc#1203387).
   - xfs: redefine xfs_ictimestamp_t (bsc#1203387).
   - xfs: redefine xfs_timestamp_t (bsc#1203387).
   - xfs: store inode btree block counts in AGI header (bsc#1203387).
   - xfs: use a struct timespec64 for the in-core crtime (bsc#1203387).
   - xfs: use the finobt block counts to speed up mount times (bsc#1203387).
   - xfs: widen ondisk inode timestamps to deal with y2038+ (bsc#1203387).
   - xfs: widen ondisk quota expiration timestamps to handle y2038+
     (bsc#1203387).


Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-SP5:

      zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-4273=1



Package List:

   - SUSE Linux Enterprise Server 12-SP5 (x86_64):

      kernel-azure-4.12.14-16.115.1
      kernel-azure-base-4.12.14-16.115.1
      kernel-azure-base-debuginfo-4.12.14-16.115.1
      kernel-azure-debuginfo-4.12.14-16.115.1
      kernel-azure-debugsource-4.12.14-16.115.1
      kernel-azure-devel-4.12.14-16.115.1
      kernel-syms-azure-4.12.14-16.115.1

   - SUSE Linux Enterprise Server 12-SP5 (noarch):

      kernel-devel-azure-4.12.14-16.115.1
      kernel-source-azure-4.12.14-16.115.1


References:

   https://www.suse.com/security/cve/CVE-2021-4037.html
   https://www.suse.com/security/cve/CVE-2022-2153.html
   https://www.suse.com/security/cve/CVE-2022-28748.html
   https://www.suse.com/security/cve/CVE-2022-2964.html
   https://www.suse.com/security/cve/CVE-2022-3169.html
   https://www.suse.com/security/cve/CVE-2022-3424.html
   https://www.suse.com/security/cve/CVE-2022-3521.html
   https://www.suse.com/security/cve/CVE-2022-3524.html
   https://www.suse.com/security/cve/CVE-2022-3542.html
   https://www.suse.com/security/cve/CVE-2022-3545.html
   https://www.suse.com/security/cve/CVE-2022-3565.html
   https://www.suse.com/security/cve/CVE-2022-3586.html
   https://www.suse.com/security/cve/CVE-2022-3594.html
   https://www.suse.com/security/cve/CVE-2022-3621.html
   https://www.suse.com/security/cve/CVE-2022-3629.html
   https://www.suse.com/security/cve/CVE-2022-3646.html
   https://www.suse.com/security/cve/CVE-2022-3649.html
   https://www.suse.com/security/cve/CVE-2022-40307.html
   https://www.suse.com/security/cve/CVE-2022-40768.html
   https://www.suse.com/security/cve/CVE-2022-42703.html
   https://www.suse.com/security/cve/CVE-2022-43750.html
   https://bugzilla.suse.com/1032323
   https://bugzilla.suse.com/1065729
   https://bugzilla.suse.com/1196018
   https://bugzilla.suse.com/1198702
   https://bugzilla.suse.com/1200788
   https://bugzilla.suse.com/1202686
   https://bugzilla.suse.com/1202972
   https://bugzilla.suse.com/1203098
   https://bugzilla.suse.com/1203142
   https://bugzilla.suse.com/1203198
   https://bugzilla.suse.com/1203254
   https://bugzilla.suse.com/1203290
   https://bugzilla.suse.com/1203322
   https://bugzilla.suse.com/1203387
   https://bugzilla.suse.com/1203514
   https://bugzilla.suse.com/1203802
   https://bugzilla.suse.com/1204166
   https://bugzilla.suse.com/1204168
   https://bugzilla.suse.com/1204241
   https://bugzilla.suse.com/1204354
   https://bugzilla.suse.com/1204355
   https://bugzilla.suse.com/1204402
   https://bugzilla.suse.com/1204415
   https://bugzilla.suse.com/1204431
   https://bugzilla.suse.com/1204439
   https://bugzilla.suse.com/1204479
   https://bugzilla.suse.com/1204574
   https://bugzilla.suse.com/1204635
   https://bugzilla.suse.com/1204646
   https://bugzilla.suse.com/1204647
   https://bugzilla.suse.com/1204653
   https://bugzilla.suse.com/1204755

SUSE: 2022:4273-1 important: the Linux Kernel

November 29, 2022
An update that solves 21 vulnerabilities and has 11 fixes is now available

Summary

The SUSE Linux Enterprise 12 SP5 Azure kernel was updated. The following security bugs were fixed: - CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bnc#1198702). - CVE-2022-2153: Fixed vulnerability in KVM that could allow an unprivileged local attacker on the host to cause DoS (bnc#1200788). - CVE-2022-2964, CVE-2022-28748: Fixed memory corruption issues in ax88179_178a devices (bnc#1202686). - CVE-2022-3169: Fixed a denial of service flaw which occurs when consecutive requests to NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET are sent (bnc#1203290). - CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault() and gru_handle_user_call_os() that could lead to kernel panic (bsc#1204166). - CVE-2022-3521: Fixed race condition in kcm_tx_work() in net/kcm/kcmsock.c (bnc#1204355). - CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bnc#1204354). - CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bnc#1204402). - CVE-2022-3545: Fixed use-after-free in area_cache_get() in drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bnc#1204415). - CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/l1oip_core.c (bnc#1204431). - CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bnc#1204439). - CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/net/usb/r8152.c (bnc#1204479). - CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bnc#1204574). - CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/af_vsock.c (bnc#1204635). - CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/segment.c (bnc#1204646). - CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/inode.c (bnc#1204647). - CVE-2022-40307: Fixed a race condition that could had been exploited to trigger a use-after-free in the efi firmware capsule-loader.c (bnc#1203322). - CVE-2022-40768: Fixed information leak in the scsi driver which allowed local users to obtain sensitive information from kernel memory (bnc#1203514). - CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bnc#1204168). - CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor's internal memory (bnc#1204653). The following non-security bugs were fixed: - acpi: processor idle: Practically limit "Dummy wait" workaround to old Intel systems (bnc#1203802). - acpi: processor_idle: Skip dummy wait if kernel is in guest (bnc#1203802). - amd-xgbe: Update DMA coherency values (git-fixes). - bnxt: do not lock the tx queue from napi poll (git-fixes). - bnxt_en: Fix RX consumer index logic in the error path (git-fixes). - bnxt_en: reverse order of TX disable and carrier off (git-fixes). - ethernet: sun: niu: fix missing checks of niu_pci_eeprom_read() (git-fixes). - i40e: Fix flow for IPv6 next header (extension header) (git-fixes). - i40e: Fix overwriting flow control settings during driver loading (git-fixes). - i40e: improve locking of mac_filter_hash (git-fixes). - input: gscps2 - check return value of ioremap() in gscps2_probe() (git-fixes). - input: xpad - add supported devices as contributed on github (git-fixes). - ip6: fix skb leak in ip6frag_expire_frag_queue (bsc#1202972) - kvm: x86/emulator: Fix handing of POP SS to correctly set interruptibility (git-fixes). - locking/csd_lock: Change csdlock_debug from early_param to __setup (git-fixes). - memcg, kmem: do not fail __GFP_NOFAIL charges (bsc#1204755). - net/mlx4: Fix EEPROM dump support (git-fixes). - net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes). - net/mlx5e: Remove dependency in IPsec initialization flows (git-fixes). - net: amd-xgbe: Fix NETDEV WATCHDOG transmit queue timeout warning (git-fixes). - net: amd-xgbe: Fix network fluctuations when using 1G BELFUSE SFP (git-fixes). - net: amd-xgbe: Reset link when the link never comes back (git-fixes). - net: dsa: mt7530: add the missing RxUnicast MIB counter (git-fixes). - net: ethernet: ezchip: fix UAF in nps_enet_remove (git-fixes). - net: lapbether: Prevent racing when checking whether the netif is running (git-fixes). - net: marvell: fix MVNETA_TX_IN_PRGRS bit number (git-fixes). - net: mvpp2: Put fwnode in error case during ->probe() (git-fixes). - net: stmmac: fix watchdog timeout during suspend/resume stress test (git-fixes). - net: stmmac: stop each tx channel independently (git-fixes). - net: usb: qmi_wwan: Add new usb-id for Dell branded EM7455 (git-fixes). - net: vxge: fix use-after-free in vxge_device_unregister (git-fixes). - nvmem: core: Check input parameter for NULL in nvmem_unregister() (bsc#1204241). - powerpc/mm/64s: Drop pgd_huge() (bsc#1065729). - powerpc/mm: remove pmd_huge/pud_huge stubs and include hugetlb.h (bsc#1065729). - powerpc/pci_dn: Add missing of_node_put() (bsc#1065729). - powerpc/powernv: add missing of_node_put() in opal_export_attrs() (bsc#1065729). - ppp: Fix generating ifname when empty IFLA_IFNAME is specified (git-fixes). - ppp: Fix generating ppp unit id when ifname is not specified (git-fixes). - quota: widen timestamps for the fs_disk_quota structure (bsc#1203387). - r8169: fix jumbo packet handling on RTL8168e (git-fixes). - revert "niu: fix missing checks of niu_pci_eeprom_read" (git-fixes). - s390/guarded storage: simplify task exit handling (bsc#1203254 LTC#199911). - s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (bsc#1203142 LTC#199883). - s390/hypfs: avoid error message under KVM (bsc#1032323). - s390/mm: do not trigger write fault when vma does not allow VM_WRITE (bsc#1203198 LTC#199898). - s390: fix double free of GS and RI CBs on fork() failure (bsc#1203254 LTC#199911). - usb: core: Fix RST error in hub.c (git-fixes). - usb: serial: ch341: add basis for quirk detection (git-fixes). - usb: serial: ch341: fix lockup of devices with limited prescaler (git-fixes). - usb: serial: ch341: fix lost character on LCR updates (git-fixes). - usb: serial: ch341: fix receiver regression (git-fixes). - usb: serial: ch341: reimplement line-speed handling (git-fixes). - usb: serial: cp210x: add Decagon UCA device id (git-fixes). - usb: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes). - usb: serial: option: add Quectel BG95 0x0203 composition (git-fixes). - usb: serial: option: add Quectel EM060K modem (git-fixes). - usb: serial: option: add Quectel RM520N (git-fixes). - usb: serial: option: add support for OPPO R11 diag port (git-fixes). - x86/xen: Remove undefined behavior in setup_features() (git-fixes). - xfs: account finobt blocks properly in perag reservation (bsc#1203387). - xfs: enable big timestamps (bsc#1203387). - xfs: enable new inode btree counters feature (bsc#1203387). - xfs: explicitly define inode timestamp range (bsc#1203387). - xfs: preserve default grace interval during quotacheck (bsc#1203387). - xfs: quota: move to time64_t interfaces (bsc#1203387). - xfs: redefine xfs_ictimestamp_t (bsc#1203387). - xfs: redefine xfs_timestamp_t (bsc#1203387). - xfs: store inode btree block counts in AGI header (bsc#1203387). - xfs: use a struct timespec64 for the in-core crtime (bsc#1203387). - xfs: use the finobt block counts to speed up mount times (bsc#1203387). - xfs: widen ondisk inode timestamps to deal with y2038+ (bsc#1203387). - xfs: widen ondisk quota expiration timestamps to handle y2038+ (bsc#1203387).

References

#1032323 #1065729 #1196018 #1198702 #1200788

#1202686 #1202972 #1203098 #1203142 #1203198

#1203254 #1203290 #1203322 #1203387 #1203514

#1203802 #1204166 #1204168 #1204241 #1204354

#1204355 #1204402 #1204415 #1204431 #1204439

#1204479 #1204574 #1204635 #1204646 #1204647

#1204653 #1204755

Cross- CVE-2021-4037 CVE-2022-2153 CVE-2022-28748

CVE-2022-2964 CVE-2022-3169 CVE-2022-3424

CVE-2022-3521 CVE-2022-3524 CVE-2022-3542

CVE-2022-3545 CVE-2022-3565 CVE-2022-3586

CVE-2022-3594 CVE-2022-3621 CVE-2022-3629

CVE-2022-3646 CVE-2022-3649 CVE-2022-40307

CVE-2022-40768 CVE-2022-42703 CVE-2022-43750

CVSS scores:

CVE-2021-4037 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2021-4037 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

CVE-2022-2153 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2022-2153 (SUSE): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

CVE-2022-28748 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

CVE-2022-2964 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2022-2964 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2022-3169 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2022-3169 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-3424 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2022-3521 (NVD) : 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L

CVE-2022-3521 (SUSE): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-3524 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-3524 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2022-3542 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2022-3542 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-3545 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2022-3545 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-3565 (NVD) : 8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2022-3565 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-3586 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2022-3586 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2022-3594 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-3594 (SUSE): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-3621 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-3621 (SUSE): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2022-3629 (NVD) : 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

CVE-2022-3629 (SUSE): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L

CVE-2022-3646 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVE-2022-3646 (SUSE): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L

CVE-2022-3649 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-3649 (SUSE): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L

CVE-2022-40307 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2022-40307 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE-2022-40768 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVE-2022-40768 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVE-2022-42703 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2022-42703 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2022-43750 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2022-43750 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Affected Products:

SUSE Linux Enterprise Server 12-SP5

https://www.suse.com/security/cve/CVE-2021-4037.html

https://www.suse.com/security/cve/CVE-2022-2153.html

https://www.suse.com/security/cve/CVE-2022-28748.html

https://www.suse.com/security/cve/CVE-2022-2964.html

https://www.suse.com/security/cve/CVE-2022-3169.html

https://www.suse.com/security/cve/CVE-2022-3424.html

https://www.suse.com/security/cve/CVE-2022-3521.html

https://www.suse.com/security/cve/CVE-2022-3524.html

https://www.suse.com/security/cve/CVE-2022-3542.html

https://www.suse.com/security/cve/CVE-2022-3545.html

https://www.suse.com/security/cve/CVE-2022-3565.html

https://www.suse.com/security/cve/CVE-2022-3586.html

https://www.suse.com/security/cve/CVE-2022-3594.html

https://www.suse.com/security/cve/CVE-2022-3621.html

https://www.suse.com/security/cve/CVE-2022-3629.html

https://www.suse.com/security/cve/CVE-2022-3646.html

https://www.suse.com/security/cve/CVE-2022-3649.html

https://www.suse.com/security/cve/CVE-2022-40307.html

https://www.suse.com/security/cve/CVE-2022-40768.html

https://www.suse.com/security/cve/CVE-2022-42703.html

https://www.suse.com/security/cve/CVE-2022-43750.html

https://bugzilla.suse.com/1032323

https://bugzilla.suse.com/1065729

https://bugzilla.suse.com/1196018

https://bugzilla.suse.com/1198702

https://bugzilla.suse.com/1200788

https://bugzilla.suse.com/1202686

https://bugzilla.suse.com/1202972

https://bugzilla.suse.com/1203098

https://bugzilla.suse.com/1203142

https://bugzilla.suse.com/1203198

https://bugzilla.suse.com/1203254

https://bugzilla.suse.com/1203290

https://bugzilla.suse.com/1203322

https://bugzilla.suse.com/1203387

https://bugzilla.suse.com/1203514

https://bugzilla.suse.com/1203802

https://bugzilla.suse.com/1204166

https://bugzilla.suse.com/1204168

https://bugzilla.suse.com/1204241

https://bugzilla.suse.com/1204354

https://bugzilla.suse.com/1204355

https://bugzilla.suse.com/1204402

https://bugzilla.suse.com/1204415

https://bugzilla.suse.com/1204431

https://bugzilla.suse.com/1204439

https://bugzilla.suse.com/1204479

https://bugzilla.suse.com/1204574

https://bugzilla.suse.com/1204635

https://bugzilla.suse.com/1204646

https://bugzilla.suse.com/1204647

https://bugzilla.suse.com/1204653

https://bugzilla.suse.com/1204755

Severity
Announcement ID: SUSE-SU-2022:4273-1
Rating: important

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.