Revision Date: | 2021-07-22 | Version: | 1 |
Title: | Security update for the Linux Kernel (Important) |
Description: |
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116) - CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062) - CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215) - CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601) - CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595) - CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452) - CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050) - CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bsc#1186463) - CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bsc#1179610) - CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038) - CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861) - CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611) - CVE-2021-33034: Fixed an issue in net/bluetooth/hci_event.c where a use-after-free leads to writing an arbitrary value. (bsc#1186111) - CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1186062) - CVE-2021-23134: Fixed a use After Free vulnerability in nfc sockets which allows local attackers to elevate their privileges. (bsc#1186060) - CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859) - CVE-2020-26141: Fixed a flaw that could allows an adversary to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bsc#1185987) - CVE-2020-26145: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject arbitrary network packets. (bsc#1185860) - CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862) - CVE-2020-26147: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames. (bsc#1185987)
The following non-security bugs were fixed:
- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes). - Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724). - Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724). - hv_netvsc: Add handlers for ethtool get/set msg level (bsc#1175462). - hv_netvsc: avoid retry on send during shutdown (bsc#1175462). - hv_netvsc: avoid unnecessary wakeups on subchannel creation (bsc#1175462). - hv_netvsc: cancel subchannel setup before halting device (bsc#1175462). - hv_netvsc: change GPAD teardown order on older versions (bsc#1175462). - hv_netvsc: common detach logic (bsc#1175462). - hv_netvsc: delay setup of VF device (bsc#1175462). - hv_netvsc: disable NAPI before channel close (bsc#1175462). - hv_netvsc: Ensure correct teardown message sequence order (bsc#1175462). - hv_netvsc: Fix a deadlock by getting rtnl lock earlier in netvsc_probe() (bsc#1175462). - hv_netvsc: Fix a network regression after ifdown/ifup (bsc#1175462). - hv_netvsc: fix deadlock on hotplug (bsc#1175462). - hv_netvsc: Fix error handling in netvsc_attach() (bsc#1175462). - hv_netvsc: fix error unwind handling if vmbus_open fails (bsc#1175462). - hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (bsc#1175462). - hv_netvsc: fix handling of fallback to single queue mode (bsc#1175462). - hv_netvsc: Fix hash key value reset after other ops (bsc#1175462). - hv_netvsc: Fix IP header checksum for coalesced packets (bsc#1175462). - hv_netvsc: Fix net device attach on older Windows hosts (bsc#1175462). - hv_netvsc: fix network namespace issues with VF support (bsc#1175462). - hv_netvsc: Fix NULL dereference at single queue mode fallback (bsc#1175462). - hv_netvsc: fix race during initialization (bsc#1175462). - hv_netvsc: fix race on sub channel creation (bsc#1175462). - hv_netvsc: fix race that may miss tx queue wakeup (bsc#1175462). - hv_netvsc: fix schedule in RCU context (bsc#1175462). - hv_netvsc: Fix the variable sizes in ipsecv2 and rsc offload (bsc#1175462). - hv_netvsc: Fix tx_table init in rndis_set_subchannel() (bsc#1175462). - hv_netvsc: Fix unwanted wakeup after tx_disable (bsc#1175462). - hv_netvsc: Fix unwanted wakeup in netvsc_attach() (bsc#1175462). - hv_netvsc: flag software created hash value (bsc#1175462). - hv_netvsc: netvsc_teardown_gpadl() split (bsc#1175462). - hv_netvsc: only wake transmit queue if link is up (bsc#1175462). - hv_netvsc: pass netvsc_device to rndis halt (bsc#1175462). - hv_netvsc: preserve hw_features on mtu/channels/ringparam changes (bsc#1175462). - hv_netvsc: Refactor assignments of struct netvsc_device_info (bsc#1175462). - hv_netvsc: set master device (bsc#1175462). - hv_netvsc: Set tx_table to equal weight after subchannels open (bsc#1175462). - hv_netvsc: Simplify num_chn checking in rndis_filter_device_add() (bsc#1175462). - hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() (bsc#1175462). - hv_netvsc: split sub-channel setup into async and sync (bsc#1175462). - hv_netvsc: typo in NDIS RSS parameters structure (bsc#1175462). - hv_netvsc: use RCU to fix concurrent rx and queue changes (bsc#1175462). - hv_netvsc: use reciprocal divide to speed up percent calculation (bsc#1175462). - hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown (bsc#1175462). - kgraft: truncate the output from state_show() sysfs attr (bsc#1186235). - mm, memory_hotplug: do not clear numa_node association after hot_remove (bsc#1115026). - mm: consider __HW_POISON pages when allocating from pcp lists (bsc#1187388). - scsi: storvsc: Enable scatterlist entry lengths > 4Kbytes (bsc#1187193). - video: hyperv_fb: Add ratelimit on error message (bsc#1185724).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1017646 1024989 1044337 1109412 1109413 1109414 1111996 1112534 1112535 1113247 1113252 1113255 1115026 1115045 1116574 1116827 1118830 1118831 1119687 1120640 1121034 1121035 1121056 1122293 1122299 1123371 1123377 1123378 1126140 1126141 1126192 1126195 1126196 1126201 1131576 1132728 1132729 1132732 1133131 1133191 1133232 1134297 1135905 1136446 1136935 1137597 1141913 1142772 1143797 1145652 1146874 1149813 1152497 1154448 1154456 1154458 1154461 1155945 1157888 1158003 1158004 1158005 1158006 1158007 1161181 1175462 1177914 1179610 1184611 1185724 1185859 1185860 1185861 1185862 1185863 1185898 1185987 1186060 1186062 1186111 1186235 1186390 1186463 1187038 1187050 1187193 1187215 1187388 1187452 1187595 1187601 1187934 1188062 1188063 1188116 898572 901715 920160 958791 962052 CVE-2007-4772 CVE-2007-6600 CVE-2009-4034 CVE-2009-4136 CVE-2010-1169 CVE-2010-1170 CVE-2010-3433 CVE-2010-4352 CVE-2012-0866 CVE-2012-0867 CVE-2012-0868 CVE-2012-2143 CVE-2012-2451 CVE-2012-2655 CVE-2012-3488 CVE-2012-3489 CVE-2012-3524 CVE-2013-0255 CVE-2013-1899 CVE-2013-1900 CVE-2013-1901 CVE-2013-2168 CVE-2014-0060 CVE-2014-0061 CVE-2014-0062 CVE-2014-0063 CVE-2014-0064 CVE-2014-0065 CVE-2014-0066 CVE-2014-0067 CVE-2014-3477 CVE-2014-3532 CVE-2014-3533 CVE-2014-3635 CVE-2014-3636 CVE-2014-3637 CVE-2014-3638 CVE-2014-3639 CVE-2014-7185 CVE-2014-7824 CVE-2014-8148 CVE-2014-9687 CVE-2015-0245 CVE-2015-3165 CVE-2015-3166 CVE-2015-3167 CVE-2015-5288 CVE-2015-5289 CVE-2015-8540 CVE-2016-0766 CVE-2016-0773 CVE-2016-10087 CVE-2016-1572 CVE-2016-5423 CVE-2016-5424 CVE-2017-0663 CVE-2017-5969 CVE-2018-1000876 CVE-2018-11212 CVE-2018-12207 CVE-2018-13785 CVE-2018-16890 CVE-2018-17358 CVE-2018-17359 CVE-2018-17360 CVE-2018-17985 CVE-2018-18309 CVE-2018-18483 CVE-2018-18484 CVE-2018-18605 CVE-2018-18606 CVE-2018-18607 CVE-2018-19931 CVE-2018-19932 CVE-2018-19965 CVE-2018-20346 CVE-2018-20506 CVE-2018-20623 CVE-2018-20651 CVE-2018-20671 CVE-2018-3136 CVE-2018-3139 CVE-2018-3149 CVE-2018-3169 CVE-2018-3180 CVE-2018-3214 CVE-2019-1010180 CVE-2019-11135 CVE-2019-11477 CVE-2019-11478 CVE-2019-11487 CVE-2019-12067 CVE-2019-12068 CVE-2019-12155 CVE-2019-14378 CVE-2019-15890 CVE-2019-17340 CVE-2019-17341 CVE-2019-17342 CVE-2019-17343 CVE-2019-17344 CVE-2019-17347 CVE-2019-18420 CVE-2019-18421 CVE-2019-18424 CVE-2019-18425 CVE-2019-19577 CVE-2019-19578 CVE-2019-19579 CVE-2019-19580 CVE-2019-19581 CVE-2019-19583 CVE-2019-2422 CVE-2019-2426 CVE-2019-2602 CVE-2019-2684 CVE-2019-2698 CVE-2019-3822 CVE-2019-3823 CVE-2019-3846 CVE-2020-15999 CVE-2020-24586 CVE-2020-24587 CVE-2020-24588 CVE-2020-26139 CVE-2020-26141 CVE-2020-26145 CVE-2020-26147 CVE-2020-26558 CVE-2020-36385 CVE-2020-36386 CVE-2020-7211 CVE-2021-0129 CVE-2021-0512 CVE-2021-0605 CVE-2021-22555 CVE-2021-23134 CVE-2021-32399 CVE-2021-33034 CVE-2021-33909 CVE-2021-34693 CVE-2021-3609 SUSE-SU-2016:0290-1 SUSE-SU-2017:0860-1 SUSE-SU-2017:1670-1 SUSE-SU-2018:3933-1 SUSE-SU-2019:0249-1 SUSE-SU-2019:0913-1 SUSE-SU-2019:1392-1 SUSE-SU-2019:2650-1 SUSE-SU-2020:0388-1 SUSE-SU-2020:2998-1 SUSE-SU-2021:2451-1
|
Platform(s): | openSUSE Leap 15.0 openSUSE Leap 15.1 SUSE Linux Enterprise Desktop 11 SP3 SUSE Linux Enterprise Desktop 11 SP4 SUSE Linux Enterprise Server 12 SP1-LTSS SUSE Linux Enterprise Server 12 SP2 SUSE Linux Enterprise Server 12 SP2-BCL SUSE Linux Enterprise Server 12 SP2-ESPOS SUSE Linux Enterprise Server 12 SP2-LTSS SUSE Linux Enterprise Server 12 SP3 SUSE Linux Enterprise Server 12 SP3-BCL SUSE Linux Enterprise Server 12 SP3-ESPOS SUSE Linux Enterprise Server 12 SP3-LTSS SUSE Linux Enterprise Server 12 SP3-TERADATA SUSE Linux Enterprise Server 12 SP4 SUSE OpenStack Cloud 7 SUSE OpenStack Cloud 8 SUSE OpenStack Cloud Crowbar 8
| Product(s): | |
Definition Synopsis |
openSUSE Leap 15.0 is installed AND Package Information
cracklib-2.9.6-lp150.2 is installed
OR libcrack2-2.9.6-lp150.2 is installed
OR libcrack2-32bit-2.9.6-lp150.2 is installed
|
Definition Synopsis |
openSUSE Leap 15.1 is installed
AND Package Information
gnutls-3.6.7-lp151.2.3 is installed
OR gnutls-guile-3.6.7-lp151.2.3 is installed
OR libgnutls-dane-devel-3.6.7-lp151.2.3 is installed
OR libgnutls-dane0-3.6.7-lp151.2.3 is installed
OR libgnutls-devel-3.6.7-lp151.2.3 is installed
OR libgnutls-devel-32bit-3.6.7-lp151.2.3 is installed
OR libgnutls30-3.6.7-lp151.2.3 is installed
OR libgnutls30-32bit-3.6.7-lp151.2.3 is installed
OR libgnutlsxx-devel-3.6.7-lp151.2.3 is installed
OR libgnutlsxx28-3.6.7-lp151.2.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 11 SP3 is installed
AND Package Information
libpython2_6-1_0-2.6.9-0.33 is installed
OR libpython2_6-1_0-32bit-2.6.9-0.33 is installed
OR python-2.6.9-0.33 is installed
OR python-base-2.6.9-0.33 is installed
OR python-base-32bit-2.6.9-0.33 is installed
OR python-curses-2.6.9-0.33 is installed
OR python-devel-2.6.9-0.33 is installed
OR python-tk-2.6.9-0.33 is installed
OR python-xml-2.6.9-0.33 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Desktop 11 SP4 is installed
AND Package Information
ecryptfs-utils-61-1.35 is installed
OR ecryptfs-utils-32bit-61-1.35 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP1-LTSS is installed
AND Package Information
curl-7.37.0-37.34 is installed
OR libcurl4-7.37.0-37.34 is installed
OR libcurl4-32bit-7.37.0-37.34 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2 is installed
AND Package Information
dbus-1-1.8.16-19 is installed
OR dbus-1-x11-1.8.16-19 is installed
OR libdbus-1-3-1.8.16-19 is installed
OR libdbus-1-3-32bit-1.8.16-19 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2-BCL is installed
AND Package Information
ntp-4.2.8p11-64.5 is installed
OR ntp-doc-4.2.8p11-64.5 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2-ESPOS is installed
AND Package Information
libwireshark9-2.4.10-48.32 is installed
OR libwiretap7-2.4.10-48.32 is installed
OR libwscodecs1-2.4.10-48.32 is installed
OR libwsutil8-2.4.10-48.32 is installed
OR wireshark-2.4.10-48.32 is installed
OR wireshark-gtk-2.4.10-48.32 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2-LTSS is installed
AND Package Information
java-1_7_1-ibm-1.7.1_sr4.35-38.29 is installed
OR java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29 is installed
OR java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29 is installed
OR java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29 is installed
OR java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3 is installed
AND Package Information
cron-4.2-58 is installed
OR cronie-1.4.11-58 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-BCL is installed
AND Package Information
kernel-default-4.4.180-94.147.1 is installed
OR kernel-default-base-4.4.180-94.147.1 is installed
OR kernel-default-devel-4.4.180-94.147.1 is installed
OR kernel-devel-4.4.180-94.147.1 is installed
OR kernel-macros-4.4.180-94.147.1 is installed
OR kernel-source-4.4.180-94.147.1 is installed
OR kernel-syms-4.4.180-94.147.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-ESPOS is installed
AND Package Information
ghostscript-9.27-23.31 is installed
OR ghostscript-x11-9.27-23.31 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-LTSS is installed
AND Package Information
ghostscript-9.52-23.39 is installed
OR ghostscript-x11-9.52-23.39 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-TERADATA is installed
AND Package Information
libpython2_7-1_0-2.7.13-28.31 is installed
OR libpython2_7-1_0-32bit-2.7.13-28.31 is installed
OR python-2.7.13-28.31 is installed
OR python-32bit-2.7.13-28.31 is installed
OR python-base-2.7.13-28.31 is installed
OR python-base-32bit-2.7.13-28.31 is installed
OR python-curses-2.7.13-28.31 is installed
OR python-demo-2.7.13-28.31 is installed
OR python-devel-2.7.13-28.31 is installed
OR python-doc-2.7.13-28.31 is installed
OR python-doc-pdf-2.7.13-28.31 is installed
OR python-gdbm-2.7.13-28.31 is installed
OR python-idle-2.7.13-28.31 is installed
OR python-tk-2.7.13-28.31 is installed
OR python-xml-2.7.13-28.31 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP4 is installed
AND Package Information
libMagickCore-6_Q16-1-6.8.8.1-71.85 is installed
OR libMagickWand-6_Q16-1-6.8.8.1-71.85 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud 7 is installed
AND Package Information
binutils-2.32-9.33 is installed
OR binutils-devel-2.32-9.33 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud 8 is installed
AND Package Information
libgcrypt-1.6.1-16.68 is installed
OR libgcrypt20-1.6.1-16.68 is installed
OR libgcrypt20-32bit-1.6.1-16.68 is installed
OR libgcrypt20-hmac-1.6.1-16.68 is installed
OR libgcrypt20-hmac-32bit-1.6.1-16.68 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud Crowbar 8 is installed
AND couchdb-1.7.2-3.3 is installed
|