Revision Date: | 2021-07-21 | Version: | 1 |
Title: | Security update for the Linux Kernel (Important) |
Description: |
The SUSE Linux Enterprise 12 SP4 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116). - CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062). - CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215). - CVE-2021-33624: In kernel/bpf/verifier.c a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db (bnc#1187554). - CVE-2021-0605: In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation (bnc#1187601). - CVE-2021-0512: In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1187595). - CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time (bnc#1179610 bnc#1186463). - CVE-2021-34693: net/can/bcm.c allowed local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized (bnc#1187452). - CVE-2020-36385: An issue was discovered in drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c (bnc#1187050). - CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463). - CVE-2020-36386: An issue was discovered net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf (bnc#1187038). - CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets (bnc#1185861). - CVE-2021-33200: kernel/bpf/verifier.c enforced incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux->alu_limit (bnc#1186484).
The following non-security bugs were fixed:
- block: do not use blocking queue entered for recursive bio (bsc#1104967). - s390/stack: fix possible register corruption with stack switch helper (git-fixes). - scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1047178 1056993 1057721 1057724 1065729 1070162 1104967 1110279 1116574 1116998 1122292 1122299 1129180 1131863 1132665 1134156 1136085 1139959 1140122 1140359 1141780 1141782 1141783 1141785 1141787 1141789 1146351 1146882 1146884 1147021 1149652 1152457 1156146 1159723 1159729 1162002 1164825 1164910 1166238 1170011 1170618 1171078 1171189 1171191 1171220 1171477 1171732 1171928 1171930 1171988 1172453 1172458 1172775 1172999 1173280 1173477 1173658 1173691 1173694 1173700 1173701 1173743 1173874 1173875 1173876 1173880 1174115 1174462 1174543 1174978 1179610 1185701 1185861 1186463 1186484 1187038 1187050 1187215 1187452 1187554 1187595 1187601 1187934 1188062 1188116 999735 CVE-2010-0405 CVE-2011-1145 CVE-2016-10165 CVE-2016-2399 CVE-2016-9841 CVE-2017-10281 CVE-2017-10285 CVE-2017-10293 CVE-2017-10295 CVE-2017-10345 CVE-2017-10346 CVE-2017-10347 CVE-2017-10348 CVE-2017-10349 CVE-2017-10350 CVE-2017-10355 CVE-2017-10356 CVE-2017-10357 CVE-2017-10388 CVE-2017-12837 CVE-2017-12883 CVE-2017-18922 CVE-2017-6362 CVE-2017-6512 CVE-2018-11212 CVE-2018-13785 CVE-2018-21247 CVE-2018-3136 CVE-2018-3139 CVE-2018-3149 CVE-2018-3169 CVE-2018-3180 CVE-2018-3183 CVE-2018-3214 CVE-2018-4191 CVE-2018-4197 CVE-2018-4207 CVE-2018-4208 CVE-2018-4209 CVE-2018-4210 CVE-2018-4212 CVE-2018-4213 CVE-2018-4261 CVE-2018-4262 CVE-2018-4263 CVE-2018-4264 CVE-2018-4265 CVE-2018-4266 CVE-2018-4267 CVE-2018-4270 CVE-2018-4272 CVE-2018-4273 CVE-2018-4278 CVE-2018-4284 CVE-2018-4299 CVE-2018-4306 CVE-2018-4309 CVE-2018-4312 CVE-2018-4314 CVE-2018-4315 CVE-2018-4316 CVE-2018-4317 CVE-2018-4318 CVE-2018-4319 CVE-2018-4323 CVE-2018-4328 CVE-2018-4345 CVE-2018-4358 CVE-2018-4359 CVE-2018-4361 CVE-2018-4372 CVE-2018-4373 CVE-2018-4375 CVE-2018-4376 CVE-2018-4378 CVE-2018-4382 CVE-2018-4386 CVE-2018-4392 CVE-2018-4416 CVE-2019-0221 CVE-2019-11771 CVE-2019-11772 CVE-2019-11775 CVE-2019-12418 CVE-2019-12973 CVE-2019-13012 CVE-2019-14811 CVE-2019-14812 CVE-2019-14813 CVE-2019-14817 CVE-2019-14818 CVE-2019-17563 CVE-2019-17569 CVE-2019-20503 CVE-2019-20810 CVE-2019-20812 CVE-2019-20839 CVE-2019-20840 CVE-2019-2449 CVE-2019-2762 CVE-2019-2766 CVE-2019-2769 CVE-2019-2786 CVE-2019-2816 CVE-2019-3835 CVE-2019-3839 CVE-2019-4473 CVE-2019-7317 CVE-2020-0305 CVE-2020-10135 CVE-2020-10711 CVE-2020-10722 CVE-2020-10732 CVE-2020-10751 CVE-2020-10773 CVE-2020-12771 CVE-2020-13974 CVE-2020-14397 CVE-2020-14398 CVE-2020-14399 CVE-2020-14400 CVE-2020-14401 CVE-2020-14402 CVE-2020-14403 CVE-2020-14404 CVE-2020-14416 CVE-2020-24588 CVE-2020-26558 CVE-2020-36385 CVE-2020-36386 CVE-2020-6805 CVE-2020-6806 CVE-2020-6807 CVE-2020-6811 CVE-2020-6812 CVE-2020-6814 CVE-2020-9484 CVE-2021-0129 CVE-2021-0512 CVE-2021-0605 CVE-2021-22555 CVE-2021-33200 CVE-2021-33624 CVE-2021-33909 CVE-2021-34693 CVE-2021-3609 SUSE-SU-2017:3092-1 SUSE-SU-2017:3455-1 SUSE-SU-2018:0135-1 SUSE-SU-2019:0059-1 SUSE-SU-2019:1830-1 SUSE-SU-2019:2371-1 SUSE-SU-2020:0717-1 SUSE-SU-2020:1498-1 SUSE-SU-2020:2152-1 SUSE-SU-2020:2167-1 SUSE-SU-2020:2194-1
|
Platform(s): | openSUSE Leap 15.0 openSUSE Leap 15.1 SUSE Linux Enterprise Server 12 SP2-BCL SUSE Linux Enterprise Server 12 SP2-ESPOS SUSE Linux Enterprise Server 12 SP3 SUSE Linux Enterprise Server 12 SP3-BCL SUSE Linux Enterprise Server 12 SP3-ESPOS SUSE Linux Enterprise Server 12 SP3-LTSS SUSE Linux Enterprise Server 12 SP3-TERADATA SUSE Linux Enterprise Server 12 SP4 SUSE Linux Enterprise Server 12 SP4-ESPOS SUSE OpenStack Cloud 8 SUSE OpenStack Cloud Crowbar 8 SUSE OpenStack Cloud Crowbar 9
| Product(s): | |
Definition Synopsis |
openSUSE Leap 15.0 is installed AND libdmx1-1.1.3-lp150.1 is installed
|
Definition Synopsis |
openSUSE Leap 15.1 is installed
AND Package Information
libBasicUsageEnvironment1-2019.06.28-lp151.2.3 is installed
OR libUsageEnvironment3-2019.06.28-lp151.2.3 is installed
OR libgroupsock8-2019.06.28-lp151.2.3 is installed
OR libliveMedia66-2019.06.28-lp151.2.3 is installed
OR live555-2019.06.28-lp151.2.3 is installed
OR live555-devel-2019.06.28-lp151.2.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2-BCL is installed
AND Package Information
glib2-2.48.2-12.15 is installed
OR glib2-lang-2.48.2-12.15 is installed
OR glib2-tools-2.48.2-12.15 is installed
OR libgio-2_0-0-2.48.2-12.15 is installed
OR libgio-2_0-0-32bit-2.48.2-12.15 is installed
OR libglib-2_0-0-2.48.2-12.15 is installed
OR libglib-2_0-0-32bit-2.48.2-12.15 is installed
OR libgmodule-2_0-0-2.48.2-12.15 is installed
OR libgmodule-2_0-0-32bit-2.48.2-12.15 is installed
OR libgobject-2_0-0-2.48.2-12.15 is installed
OR libgobject-2_0-0-32bit-2.48.2-12.15 is installed
OR libgthread-2_0-0-2.48.2-12.15 is installed
OR libgthread-2_0-0-32bit-2.48.2-12.15 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2-ESPOS is installed
AND Package Information
java-1_8_0-ibm-1.8.0_sr5.25-30.39 is installed
OR java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39 is installed
OR java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39 is installed
OR java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3 is installed
AND Package Information
bzip2-1.0.6-29 is installed
OR bzip2-doc-1.0.6-29 is installed
OR libbz2-1-1.0.6-29 is installed
OR libbz2-1-32bit-1.0.6-29 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-BCL is installed
AND Package Information
git-2.12.3-27.22 is installed
OR git-core-2.12.3-27.22 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-ESPOS is installed
AND Package Information
MozillaFirefox-60.9.0-109.86 is installed
OR MozillaFirefox-translations-common-60.9.0-109.86 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-LTSS is installed
AND Package Information
libXvnc1-1.6.0-18.28 is installed
OR tigervnc-1.6.0-18.28 is installed
OR xorg-x11-Xvnc-1.6.0-18.28 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-TERADATA is installed
AND perl-Archive-Zip-1.34-3.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP4 is installed
AND Package Information
automake-1.13.4-6 is installed
OR m4-1.4.16-15 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP4-ESPOS is installed
AND Package Information
kernel-default-4.12.14-95.80.1 is installed
OR kernel-default-base-4.12.14-95.80.1 is installed
OR kernel-default-devel-4.12.14-95.80.1 is installed
OR kernel-devel-4.12.14-95.80.1 is installed
OR kernel-macros-4.12.14-95.80.1 is installed
OR kernel-source-4.12.14-95.80.1 is installed
OR kernel-syms-4.12.14-95.80.1 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud 8 is installed
AND Package Information
kernel-default-4.4.180-94.127 is installed
OR kernel-default-base-4.4.180-94.127 is installed
OR kernel-default-devel-4.4.180-94.127 is installed
OR kernel-default-kgraft-4.4.180-94.127 is installed
OR kernel-devel-4.4.180-94.127 is installed
OR kernel-macros-4.4.180-94.127 is installed
OR kernel-source-4.4.180-94.127 is installed
OR kernel-syms-4.4.180-94.127 is installed
OR kgraft-patch-4_4_180-94_127-default-1-4.3 is installed
OR kgraft-patch-SLE12-SP3_Update_34-1-4.3 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud Crowbar 8 is installed
AND Package Information
dpdk-16.11.9-8.15 is installed
OR dpdk-kmp-default-16.11.9_k4.4.180_94.127-8.15 is installed
OR dpdk-tools-16.11.9-8.15 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud Crowbar 9 is installed
AND Package Information
apache2-2.4.23-29.63 is installed
OR apache2-doc-2.4.23-29.63 is installed
OR apache2-example-pages-2.4.23-29.63 is installed
OR apache2-prefork-2.4.23-29.63 is installed
OR apache2-utils-2.4.23-29.63 is installed
OR apache2-worker-2.4.23-29.63 is installed
|