Oval Definition:oval:org.opensuse.security:def:59510
Revision Date:2021-07-21Version:1
Title:Security update for the Linux Kernel (Important)
Description:



The SUSE Linux Enterprise 12 SP4 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116). - CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062). - CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215). - CVE-2021-33624: In kernel/bpf/verifier.c a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db (bnc#1187554). - CVE-2021-0605: In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation (bnc#1187601). - CVE-2021-0512: In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1187595). - CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time (bnc#1179610 bnc#1186463). - CVE-2021-34693: net/can/bcm.c allowed local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized (bnc#1187452). - CVE-2020-36385: An issue was discovered in drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c (bnc#1187050). - CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463). - CVE-2020-36386: An issue was discovered net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf (bnc#1187038). - CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets (bnc#1185861). - CVE-2021-33200: kernel/bpf/verifier.c enforced incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux->alu_limit (bnc#1186484).

The following non-security bugs were fixed:

- block: do not use blocking queue entered for recursive bio (bsc#1104967). - s390/stack: fix possible register corruption with stack switch helper (git-fixes). - scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).
Family:unixClass:patch
Status:Reference(s):1047178
1056993
1057721
1057724
1065729
1070162
1104967
1110279
1116574
1116998
1122292
1122299
1129180
1131863
1132665
1134156
1136085
1139959
1140122
1140359
1141780
1141782
1141783
1141785
1141787
1141789
1146351
1146882
1146884
1147021
1149652
1152457
1156146
1159723
1159729
1162002
1164825
1164910
1166238
1170011
1170618
1171078
1171189
1171191
1171220
1171477
1171732
1171928
1171930
1171988
1172453
1172458
1172775
1172999
1173280
1173477
1173658
1173691
1173694
1173700
1173701
1173743
1173874
1173875
1173876
1173880
1174115
1174462
1174543
1174978
1179610
1185701
1185861
1186463
1186484
1187038
1187050
1187215
1187452
1187554
1187595
1187601
1187934
1188062
1188116
999735
CVE-2010-0405
CVE-2011-1145
CVE-2016-10165
CVE-2016-2399
CVE-2016-9841
CVE-2017-10281
CVE-2017-10285
CVE-2017-10293
CVE-2017-10295
CVE-2017-10345
CVE-2017-10346
CVE-2017-10347
CVE-2017-10348
CVE-2017-10349
CVE-2017-10350
CVE-2017-10355
CVE-2017-10356
CVE-2017-10357
CVE-2017-10388
CVE-2017-12837
CVE-2017-12883
CVE-2017-18922
CVE-2017-6362
CVE-2017-6512
CVE-2018-11212
CVE-2018-13785
CVE-2018-21247
CVE-2018-3136
CVE-2018-3139
CVE-2018-3149
CVE-2018-3169
CVE-2018-3180
CVE-2018-3183
CVE-2018-3214
CVE-2018-4191
CVE-2018-4197
CVE-2018-4207
CVE-2018-4208
CVE-2018-4209
CVE-2018-4210
CVE-2018-4212
CVE-2018-4213
CVE-2018-4261
CVE-2018-4262
CVE-2018-4263
CVE-2018-4264
CVE-2018-4265
CVE-2018-4266
CVE-2018-4267
CVE-2018-4270
CVE-2018-4272
CVE-2018-4273
CVE-2018-4278
CVE-2018-4284
CVE-2018-4299
CVE-2018-4306
CVE-2018-4309
CVE-2018-4312
CVE-2018-4314
CVE-2018-4315
CVE-2018-4316
CVE-2018-4317
CVE-2018-4318
CVE-2018-4319
CVE-2018-4323
CVE-2018-4328
CVE-2018-4345
CVE-2018-4358
CVE-2018-4359
CVE-2018-4361
CVE-2018-4372
CVE-2018-4373
CVE-2018-4375
CVE-2018-4376
CVE-2018-4378
CVE-2018-4382
CVE-2018-4386
CVE-2018-4392
CVE-2018-4416
CVE-2019-0221
CVE-2019-11771
CVE-2019-11772
CVE-2019-11775
CVE-2019-12418
CVE-2019-12973
CVE-2019-13012
CVE-2019-14811
CVE-2019-14812
CVE-2019-14813
CVE-2019-14817
CVE-2019-14818
CVE-2019-17563
CVE-2019-17569
CVE-2019-20503
CVE-2019-20810
CVE-2019-20812
CVE-2019-20839
CVE-2019-20840
CVE-2019-2449
CVE-2019-2762
CVE-2019-2766
CVE-2019-2769
CVE-2019-2786
CVE-2019-2816
CVE-2019-3835
CVE-2019-3839
CVE-2019-4473
CVE-2019-7317
CVE-2020-0305
CVE-2020-10135
CVE-2020-10711
CVE-2020-10722
CVE-2020-10732
CVE-2020-10751
CVE-2020-10773
CVE-2020-12771
CVE-2020-13974
CVE-2020-14397
CVE-2020-14398
CVE-2020-14399
CVE-2020-14400
CVE-2020-14401
CVE-2020-14402
CVE-2020-14403
CVE-2020-14404
CVE-2020-14416
CVE-2020-24588
CVE-2020-26558
CVE-2020-36385
CVE-2020-36386
CVE-2020-6805
CVE-2020-6806
CVE-2020-6807
CVE-2020-6811
CVE-2020-6812
CVE-2020-6814
CVE-2020-9484
CVE-2021-0129
CVE-2021-0512
CVE-2021-0605
CVE-2021-22555
CVE-2021-33200
CVE-2021-33624
CVE-2021-33909
CVE-2021-34693
CVE-2021-3609
SUSE-SU-2017:3092-1
SUSE-SU-2017:3455-1
SUSE-SU-2018:0135-1
SUSE-SU-2019:0059-1
SUSE-SU-2019:1830-1
SUSE-SU-2019:2371-1
SUSE-SU-2020:0717-1
SUSE-SU-2020:1498-1
SUSE-SU-2020:2152-1
SUSE-SU-2020:2167-1
SUSE-SU-2020:2194-1
Platform(s):openSUSE Leap 15.0
openSUSE Leap 15.1
SUSE Linux Enterprise Server 12 SP2-BCL
SUSE Linux Enterprise Server 12 SP2-ESPOS
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server 12 SP3-BCL
SUSE Linux Enterprise Server 12 SP3-ESPOS
SUSE Linux Enterprise Server 12 SP3-LTSS
SUSE Linux Enterprise Server 12 SP3-TERADATA
SUSE Linux Enterprise Server 12 SP4
SUSE Linux Enterprise Server 12 SP4-ESPOS
SUSE OpenStack Cloud 8
SUSE OpenStack Cloud Crowbar 8
SUSE OpenStack Cloud Crowbar 9
Product(s):
Definition Synopsis
  • openSUSE Leap 15.0 is installed
  • AND libdmx1-1.1.3-lp150.1 is installed
  • Definition Synopsis
  • openSUSE Leap 15.1 is installed
  • AND Package Information
  • libBasicUsageEnvironment1-2019.06.28-lp151.2.3 is installed
  • OR libUsageEnvironment3-2019.06.28-lp151.2.3 is installed
  • OR libgroupsock8-2019.06.28-lp151.2.3 is installed
  • OR libliveMedia66-2019.06.28-lp151.2.3 is installed
  • OR live555-2019.06.28-lp151.2.3 is installed
  • OR live555-devel-2019.06.28-lp151.2.3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2-BCL is installed
  • AND Package Information
  • glib2-2.48.2-12.15 is installed
  • OR glib2-lang-2.48.2-12.15 is installed
  • OR glib2-tools-2.48.2-12.15 is installed
  • OR libgio-2_0-0-2.48.2-12.15 is installed
  • OR libgio-2_0-0-32bit-2.48.2-12.15 is installed
  • OR libglib-2_0-0-2.48.2-12.15 is installed
  • OR libglib-2_0-0-32bit-2.48.2-12.15 is installed
  • OR libgmodule-2_0-0-2.48.2-12.15 is installed
  • OR libgmodule-2_0-0-32bit-2.48.2-12.15 is installed
  • OR libgobject-2_0-0-2.48.2-12.15 is installed
  • OR libgobject-2_0-0-32bit-2.48.2-12.15 is installed
  • OR libgthread-2_0-0-2.48.2-12.15 is installed
  • OR libgthread-2_0-0-32bit-2.48.2-12.15 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2-ESPOS is installed
  • AND Package Information
  • java-1_8_0-ibm-1.8.0_sr5.25-30.39 is installed
  • OR java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39 is installed
  • OR java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39 is installed
  • OR java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3 is installed
  • AND Package Information
  • bzip2-1.0.6-29 is installed
  • OR bzip2-doc-1.0.6-29 is installed
  • OR libbz2-1-1.0.6-29 is installed
  • OR libbz2-1-32bit-1.0.6-29 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-BCL is installed
  • AND Package Information
  • git-2.12.3-27.22 is installed
  • OR git-core-2.12.3-27.22 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-ESPOS is installed
  • AND Package Information
  • MozillaFirefox-60.9.0-109.86 is installed
  • OR MozillaFirefox-translations-common-60.9.0-109.86 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-LTSS is installed
  • AND Package Information
  • libXvnc1-1.6.0-18.28 is installed
  • OR tigervnc-1.6.0-18.28 is installed
  • OR xorg-x11-Xvnc-1.6.0-18.28 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-TERADATA is installed
  • AND perl-Archive-Zip-1.34-3.3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP4 is installed
  • AND Package Information
  • automake-1.13.4-6 is installed
  • OR m4-1.4.16-15 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP4-ESPOS is installed
  • AND Package Information
  • kernel-default-4.12.14-95.80.1 is installed
  • OR kernel-default-base-4.12.14-95.80.1 is installed
  • OR kernel-default-devel-4.12.14-95.80.1 is installed
  • OR kernel-devel-4.12.14-95.80.1 is installed
  • OR kernel-macros-4.12.14-95.80.1 is installed
  • OR kernel-source-4.12.14-95.80.1 is installed
  • OR kernel-syms-4.12.14-95.80.1 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud 8 is installed
  • AND Package Information
  • kernel-default-4.4.180-94.127 is installed
  • OR kernel-default-base-4.4.180-94.127 is installed
  • OR kernel-default-devel-4.4.180-94.127 is installed
  • OR kernel-default-kgraft-4.4.180-94.127 is installed
  • OR kernel-devel-4.4.180-94.127 is installed
  • OR kernel-macros-4.4.180-94.127 is installed
  • OR kernel-source-4.4.180-94.127 is installed
  • OR kernel-syms-4.4.180-94.127 is installed
  • OR kgraft-patch-4_4_180-94_127-default-1-4.3 is installed
  • OR kgraft-patch-SLE12-SP3_Update_34-1-4.3 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud Crowbar 8 is installed
  • AND Package Information
  • dpdk-16.11.9-8.15 is installed
  • OR dpdk-kmp-default-16.11.9_k4.4.180_94.127-8.15 is installed
  • OR dpdk-tools-16.11.9-8.15 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud Crowbar 9 is installed
  • AND Package Information
  • apache2-2.4.23-29.63 is installed
  • OR apache2-doc-2.4.23-29.63 is installed
  • OR apache2-example-pages-2.4.23-29.63 is installed
  • OR apache2-prefork-2.4.23-29.63 is installed
  • OR apache2-utils-2.4.23-29.63 is installed
  • OR apache2-worker-2.4.23-29.63 is installed
  • BACK