Oval Definition:oval:org.opensuse.security:def:58825
Revision Date:2021-02-05Version:1
Title:Security update for kernel-source (Important)
Description:

The SUSE Linux Enterprise 12 SP3 Kernel for Teradata was updated to receive the following fixes:

The following security issues were fixed:

- CVE-2021-3347: An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458 (bsc#969755, bsc#1181349)

- CVE-2020-25211: In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff (bsc#1176395)

- CVE-2020-27673: An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271 (bsc#1177411)

- CVE-2020-29568: An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable (bsc#1179508)

- CVE-2020-29569: An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback (bsc#1179509)

- CVE-2020-0466: In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bsc#1180031)

- CVE-2020-0444: In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bsc#1180027)

- CVE-2020-36158: mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332 (bsc#1180559)

- CVE-2020-27825: A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat (bsc#1179960)

- CVE-2020-27068: In the nl80211_policy policy of nl80211.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation (bsc#1180086)

- CVE-2020-0465: In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bsc#1180029)

- CVE-2020-29660, CVE-2020-29661: A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24 (bsc#1179745)

- CVE-2020-27777: A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel (bsc#1179107, bsc#1179887)

- CVE-2020-11668: In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770 (bsc#1168952)

- CVE-2018-10902: It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation (bsc#1105322)

- CVE-2020-27786: A flaw was found in the Linux kernels implementation of MIDI, where an attacker with a local account and the permissions to issue an ioctl commands to midi devices, could trigger a use-after-free. A write to this specific memory while freed and before use could cause the flow of execution to change and possibly allow for memory corruption or privilege escalation (bsc#1179601)

- CVE-2020-15436: Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field (bsc#1173834, bsc#1179141)

- CVE-2020-15437: The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized (bsc#1179140)

- CVE-2020-28974: A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height (bsc#1178589)

- CVE-2020-25641: A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability (bsc#1177121)

- CVE-2020-28915: A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def (bsc#1178886)

- CVE-2020-25669: Input: sunkbd - avoid use-after-free in teardown paths (bsc#1178182)

- CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812 (bsc#1176485)

Regular bug fixes:

- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204) - hv: v4.12 API for hyperv-iommu (fate#327171, bsc#1122822) - blacklist.conf: f10881a46f89 powerpc/rtas: Fix typo of ibm,open-errinjct in RTAS filter not relevant for 12-sp3-td as it doesn't build ppc - cgroup: Fix deadlock in cpu hotplug path (bsc#1012382, bsc#1180679) - HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052) - x86/Hyper-V/hv_apic: Build the Hyper-V APIC conditionally (git-fixes) - x86/Hyper-V/hv_apic: Include asm/apic.h (git-fixes) - x86/hyperv: Clarify comment on x2apic mode (git-fixes) - x86/hyperv: Make vapic support x2apic mode (git-fixes) - X86/Hyper-V: Enlighten APIC access (bsc#1107207) - hyperv_fb: disable superfluous VERSION_WIN10_V5 case (bsc#1175306) - hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306) - video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306) - video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306) - video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306) - Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (bsc#1177816) - Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127) - PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263) - scsi: storvsc: Reduce default ring buffer size to 128 Kbytes (fate#323887) - iommu/hyper-v: Add Hyper-V stub IOMMU driver (fate#327171, bsc#1122822) - x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (fate#327171, bsc#1122822) - Drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389) - Drivers: hv: vmbus: Offload the handling of channels to two workqueues (bsc#1130567) - scsi: storvsc: Fix a race in sub-channel creation that can cause panic (fate#323887) - Drivers: hv: vmbus: check the creation_status in vmbus_establish_gpadl() (bsc#1104098) - Drivers: hv: vmbus: Reset the channel callback in vmbus_onoffer_rescind() (bsc#1130567) - Drivers: hv: vmbus: Fix the offer_in_progress in vmbus_process_offer() (bsc#1130567) - use upstream variant of pci-hyperv change (bsc#1094268) - x86/apic: Provide apic_ack_irq() (fate#327171, bsc#1122822) - hv_netvsc: Fix the return status in RX path (bsc#1118506) - hv_netvsc: use napi_schedule_irqoff (bsc#1118506) - hv_netvsc: fix race in napi poll when rescheduling (bsc#1118506) - PCI: hv: Use effective affinity mask (bsc#1109772) - Drivers: hv: vmbus: Fix bugs in rescind handling (bsc#1130567) - x86/vdso: Add VCLOCK_HVCLOCK vDSO clock read method (bsc#1133308) - x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772) - scsi: storvsc: Fix calculation of sub-channel count (bsc#1012382) - Drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1012382) - Tools: hv: Fix a bug in the key delete code (bsc#1012382) - scsi: libiscsi: fix NOP race condition (bsc#1176481)
Family:unixClass:patch
Status:Reference(s):1012382
1027519
1054413
1057460
1065600
1073230
1073879
1076017
1076390
1082810
1083424
1083488
1085018
1085114
1085447
1086039
1089152
1089635
1090820
1090822
1090823
1092885
1094268
1096223
1098531
1098735
1104098
1105322
1107207
1109772
1111622
1111853
1118506
1118595
1118596
1122668
1122822
1123823
1123828
1123832
1124729
1124734
1126140
1126141
1126192
1126195
1126196
1126198
1126201
1126389
1127400
1128378
1130567
1133191
1133308
1136446
1136935
1137597
1143797
1144920
1146874
1149813
1153263
1156323
1156324
1156326
1156328
1156329
1162687
1162689
1162691
1168952
1173834
1175127
1175306
1176395
1176481
1176485
1177121
1177410
1177411
1177816
1178182
1178589
1178886
1179107
1179140
1179141
1179204
1179508
1179509
1179601
1179663
1179745
1179887
1179960
1180027
1180029
1180031
1180052
1180086
1180559
1180679
1181349
761500
922448
929736
929900
935252
945455
947357
955131
961596
966304
967128
969755
CVE-2008-4316
CVE-2009-1494
CVE-2011-4971
CVE-2012-3524
CVE-2013-0179
CVE-2013-7239
CVE-2013-7290
CVE-2013-7291
CVE-2014-0004
CVE-2015-2296
CVE-2016-8704
CVE-2016-8705
CVE-2016-8706
CVE-2017-13166
CVE-2017-5754
CVE-2017-7467
CVE-2018-1000004
CVE-2018-10471
CVE-2018-10472
CVE-2018-1068
CVE-2018-10902
CVE-2018-11806
CVE-2018-12327
CVE-2018-12617
CVE-2018-15518
CVE-2018-18074
CVE-2018-19873
CVE-2018-20748
CVE-2018-20749
CVE-2018-20750
CVE-2018-2579
CVE-2018-2582
CVE-2018-2588
CVE-2018-2599
CVE-2018-2602
CVE-2018-2603
CVE-2018-2618
CVE-2018-2633
CVE-2018-2634
CVE-2018-2637
CVE-2018-2641
CVE-2018-2657
CVE-2018-2663
CVE-2018-2677
CVE-2018-2678
CVE-2018-3639
CVE-2018-7170
CVE-2018-7566
CVE-2018-8897
CVE-2019-11477
CVE-2019-11478
CVE-2019-11487
CVE-2019-12068
CVE-2019-12523
CVE-2019-12526
CVE-2019-12528
CVE-2019-14378
CVE-2019-15890
CVE-2019-17340
CVE-2019-17341
CVE-2019-17342
CVE-2019-17343
CVE-2019-17344
CVE-2019-17346
CVE-2019-17347
CVE-2019-17348
CVE-2019-18676
CVE-2019-18677
CVE-2019-18678
CVE-2019-18679
CVE-2019-20934
CVE-2019-3846
CVE-2019-6974
CVE-2019-7221
CVE-2019-9213
CVE-2020-0444
CVE-2020-0465
CVE-2020-0466
CVE-2020-11668
CVE-2020-15436
CVE-2020-15437
CVE-2020-25211
CVE-2020-25285
CVE-2020-25641
CVE-2020-25669
CVE-2020-27068
CVE-2020-27673
CVE-2020-27675
CVE-2020-27777
CVE-2020-27786
CVE-2020-27825
CVE-2020-28915
CVE-2020-28974
CVE-2020-29568
CVE-2020-29569
CVE-2020-29660
CVE-2020-29661
CVE-2020-36158
CVE-2020-8449
CVE-2020-8450
CVE-2020-8517
CVE-2021-3347
SUSE-SU-2018:0743-1
SUSE-SU-2018:0989-1
SUSE-SU-2018:2973-1
SUSE-SU-2018:3342-1
SUSE-SU-2018:4183-1
SUSE-SU-2019:0313-1
SUSE-SU-2019:2783-1
SUSE-SU-2020:0661-1
SUSE-SU-2020:1792-1
Platform(s):openSUSE Leap 15.0
openSUSE Leap 15.1
SUSE Linux Enterprise Server 12 SP2
SUSE Linux Enterprise Server 12 SP2-BCL
SUSE Linux Enterprise Server 12 SP2-ESPOS
SUSE Linux Enterprise Server 12 SP2-LTSS
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server 12 SP3-BCL
SUSE Linux Enterprise Server 12 SP3-ESPOS
SUSE Linux Enterprise Server 12 SP3-LTSS
SUSE Linux Enterprise Server 12 SP3-TERADATA
SUSE Linux Enterprise Server 12 SP4
SUSE OpenStack Cloud 8
SUSE OpenStack Cloud 9
SUSE OpenStack Cloud Crowbar 8
Product(s):
Definition Synopsis
  • openSUSE Leap 15.0 is installed
  • AND Package Information
  • libgnomesu-2.0.2-lp150.1 is installed
  • OR libgnomesu-lang-2.0.2-lp150.1 is installed
  • OR libgnomesu0-2.0.2-lp150.1 is installed
  • Definition Synopsis
  • openSUSE Leap 15.1 is installed
  • AND Package Information
  • proftpd-1.3.6c-lp151.3.9 is installed
  • OR proftpd-devel-1.3.6c-lp151.3.9 is installed
  • OR proftpd-doc-1.3.6c-lp151.3.9 is installed
  • OR proftpd-lang-1.3.6c-lp151.3.9 is installed
  • OR proftpd-ldap-1.3.6c-lp151.3.9 is installed
  • OR proftpd-mysql-1.3.6c-lp151.3.9 is installed
  • OR proftpd-pgsql-1.3.6c-lp151.3.9 is installed
  • OR proftpd-radius-1.3.6c-lp151.3.9 is installed
  • OR proftpd-sqlite-1.3.6c-lp151.3.9 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2 is installed
  • AND Package Information
  • java-1_7_1-ibm-1.7.1_sr4.20-38.16 is installed
  • OR java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16 is installed
  • OR java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16 is installed
  • OR java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2-BCL is installed
  • AND Package Information
  • xen-4.7.6_06-43.54 is installed
  • OR xen-doc-html-4.7.6_06-43.54 is installed
  • OR xen-libs-4.7.6_06-43.54 is installed
  • OR xen-libs-32bit-4.7.6_06-43.54 is installed
  • OR xen-tools-4.7.6_06-43.54 is installed
  • OR xen-tools-domU-4.7.6_06-43.54 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2-ESPOS is installed
  • AND Package Information
  • xen-4.7.5_02-43.30 is installed
  • OR xen-doc-html-4.7.5_02-43.30 is installed
  • OR xen-libs-4.7.5_02-43.30 is installed
  • OR xen-libs-32bit-4.7.5_02-43.30 is installed
  • OR xen-tools-4.7.5_02-43.30 is installed
  • OR xen-tools-domU-4.7.5_02-43.30 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2-LTSS is installed
  • AND Package Information
  • qemu-2.6.2-41.43 is installed
  • OR qemu-block-curl-2.6.2-41.43 is installed
  • OR qemu-block-rbd-2.6.2-41.43 is installed
  • OR qemu-block-ssh-2.6.2-41.43 is installed
  • OR qemu-guest-agent-2.6.2-41.43 is installed
  • OR qemu-ipxe-1.0.0-41.43 is installed
  • OR qemu-kvm-2.6.2-41.43 is installed
  • OR qemu-lang-2.6.2-41.43 is installed
  • OR qemu-ppc-2.6.2-41.43 is installed
  • OR qemu-s390-2.6.2-41.43 is installed
  • OR qemu-seabios-1.9.1-41.43 is installed
  • OR qemu-sgabios-8-41.43 is installed
  • OR qemu-tools-2.6.2-41.43 is installed
  • OR qemu-vgabios-1.9.1-41.43 is installed
  • OR qemu-x86-2.6.2-41.43 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3 is installed
  • AND Package Information
  • glib2-lang-2.48.2-10 is installed
  • OR glib2-tools-2.48.2-10 is installed
  • OR libgio-2_0-0-2.48.2-10 is installed
  • OR libgio-2_0-0-32bit-2.48.2-10 is installed
  • OR libglib-2_0-0-2.48.2-10 is installed
  • OR libglib-2_0-0-32bit-2.48.2-10 is installed
  • OR libgmodule-2_0-0-2.48.2-10 is installed
  • OR libgmodule-2_0-0-32bit-2.48.2-10 is installed
  • OR libgobject-2_0-0-2.48.2-10 is installed
  • OR libgobject-2_0-0-32bit-2.48.2-10 is installed
  • OR libgthread-2_0-0-2.48.2-10 is installed
  • OR libgthread-2_0-0-32bit-2.48.2-10 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-BCL is installed
  • AND Package Information
  • MozillaFirefox-60.8.0-109.83 is installed
  • OR MozillaFirefox-translations-common-60.8.0-109.83 is installed
  • OR libfreebl3-3.44.1-58.28 is installed
  • OR libfreebl3-32bit-3.44.1-58.28 is installed
  • OR libfreebl3-hmac-3.44.1-58.28 is installed
  • OR libfreebl3-hmac-32bit-3.44.1-58.28 is installed
  • OR libsoftokn3-3.44.1-58.28 is installed
  • OR libsoftokn3-32bit-3.44.1-58.28 is installed
  • OR libsoftokn3-hmac-3.44.1-58.28 is installed
  • OR libsoftokn3-hmac-32bit-3.44.1-58.28 is installed
  • OR mozilla-nss-3.44.1-58.28 is installed
  • OR mozilla-nss-32bit-3.44.1-58.28 is installed
  • OR mozilla-nss-certs-3.44.1-58.28 is installed
  • OR mozilla-nss-certs-32bit-3.44.1-58.28 is installed
  • OR mozilla-nss-sysinit-3.44.1-58.28 is installed
  • OR mozilla-nss-sysinit-32bit-3.44.1-58.28 is installed
  • OR mozilla-nss-tools-3.44.1-58.28 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-ESPOS is installed
  • AND Package Information
  • postgresql96-9.6.15-3.29 is installed
  • OR postgresql96-contrib-9.6.15-3.29 is installed
  • OR postgresql96-docs-9.6.15-3.29 is installed
  • OR postgresql96-libs-9.6.15-3.29 is installed
  • OR postgresql96-plperl-9.6.15-3.29 is installed
  • OR postgresql96-plpython-9.6.15-3.29 is installed
  • OR postgresql96-pltcl-9.6.15-3.29 is installed
  • OR postgresql96-server-9.6.15-3.29 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-LTSS is installed
  • AND Package Information
  • kgraft-patch-4_4_176-94_88-default-3-2 is installed
  • OR kgraft-patch-SLE12-SP3_Update_24-3-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-TERADATA is installed
  • AND Package Information
  • openssh-7.2p2-74.23 is installed
  • OR openssh-askpass-gnome-7.2p2-74.23 is installed
  • OR openssh-fips-7.2p2-74.23 is installed
  • OR openssh-helpers-7.2p2-74.23 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP4 is installed
  • AND chrony-2.3-3 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud 8 is installed
  • AND Package Information
  • MozillaFirefox-68.1.0-109.89 is installed
  • OR MozillaFirefox-branding-SLE-68-32.8 is installed
  • OR MozillaFirefox-translations-common-68.1.0-109.89 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud 9 is installed
  • AND Package Information
  • tomcat-9.0.36-3.42 is installed
  • OR tomcat-admin-webapps-9.0.36-3.42 is installed
  • OR tomcat-docs-webapp-9.0.36-3.42 is installed
  • OR tomcat-el-3_0-api-9.0.36-3.42 is installed
  • OR tomcat-javadoc-9.0.36-3.42 is installed
  • OR tomcat-jsp-2_3-api-9.0.36-3.42 is installed
  • OR tomcat-lib-9.0.36-3.42 is installed
  • OR tomcat-servlet-4_0-api-9.0.36-3.42 is installed
  • OR tomcat-webapps-9.0.36-3.42 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud Crowbar 8 is installed
  • AND Package Information
  • libmysqlclient18-10.0.40.4-29.41 is installed
  • OR mariadb-10.0.40.4-29.41 is installed
  • BACK