Revision Date: | 2020-12-01 | Version: | 1 |
Title: | Security update for the Linux Kernel (Important) |
Description: |
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988). - CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191). - CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189). - CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453). - CVE-2020-10732: A flaw was found in the implementation of userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220). - CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462). - CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732). - CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999). - CVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002). - CVE-2020-10768: Indirect branch speculation could have been enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783). - CVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (bnc#1172781). - CVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782). - CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. (bnc#1172775). - CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).
The following non-security bugs were fixed:
- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115). - x86/dumpstack/64: Handle faults when printing the 'Stack: ' part of an OOPS (bsc#1170383). - xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1172049).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1050257 1051188 1054094 1057357 1060995 1060996 1061000 1061310 1072928 1086598 1092952 1093095 1095070 1109412 1109413 1109414 1111996 1112534 1112535 1113160 1113247 1113252 1113255 1114592 1116827 1118830 1118831 1120640 1120943 1121034 1121035 1121056 1133131 1133232 1134195 1135254 1138822 1141661 1141897 1141913 1142038 1142649 1142654 1142772 1143913 1148177 1148517 1149145 1153090 1153277 1154940 1154968 1155372 1160770 1160888 1162002 1163871 1165921 1168310 1170231 1170383 1170557 1171189 1171191 1171220 1171687 1171732 1171988 1172049 1172453 1172458 1172462 1172745 1172775 1172781 1172782 1172783 1172999 1174115 1174421 1174462 1174543 1176409 1176412 CVE-2009-0035 CVE-2009-0688 CVE-2011-1898 CVE-2012-0029 CVE-2012-0217 CVE-2012-2625 CVE-2012-3432 CVE-2012-3433 CVE-2012-4411 CVE-2012-4535 CVE-2012-4536 CVE-2012-4537 CVE-2012-4538 CVE-2012-4539 CVE-2012-4544 CVE-2012-5510 CVE-2012-5511 CVE-2012-5513 CVE-2012-5514 CVE-2012-5515 CVE-2012-5525 CVE-2012-5634 CVE-2012-6075 CVE-2013-0151 CVE-2013-0152 CVE-2013-0153 CVE-2013-1442 CVE-2013-1917 CVE-2013-1918 CVE-2013-1919 CVE-2013-1922 CVE-2013-1952 CVE-2013-2007 CVE-2013-2062 CVE-2013-3495 CVE-2013-4355 CVE-2013-4356 CVE-2013-4361 CVE-2013-4375 CVE-2013-4416 CVE-2013-4494 CVE-2013-4533 CVE-2013-4534 CVE-2013-4537 CVE-2013-4538 CVE-2013-4539 CVE-2013-4540 CVE-2013-4551 CVE-2013-4553 CVE-2013-4554 CVE-2014-0222 CVE-2014-3124 CVE-2014-3640 CVE-2014-3672 CVE-2014-5146 CVE-2014-5149 CVE-2014-6268 CVE-2014-7154 CVE-2014-7155 CVE-2014-7156 CVE-2014-7188 CVE-2014-7815 CVE-2015-1779 CVE-2015-1782 CVE-2015-3259 CVE-2015-3340 CVE-2015-3456 CVE-2015-4037 CVE-2015-4103 CVE-2015-4104 CVE-2015-4105 CVE-2015-4106 CVE-2015-5154 CVE-2015-5239 CVE-2015-5278 CVE-2015-5307 CVE-2015-6815 CVE-2015-6855 CVE-2015-7311 CVE-2015-7504 CVE-2015-7512 CVE-2015-7549 CVE-2015-7835 CVE-2015-7969 CVE-2015-7970 CVE-2015-7971 CVE-2015-7972 CVE-2015-8104 CVE-2015-8339 CVE-2015-8340 CVE-2015-8341 CVE-2015-8345 CVE-2015-8504 CVE-2015-8550 CVE-2015-8554 CVE-2015-8555 CVE-2015-8558 CVE-2015-8567 CVE-2015-8568 CVE-2015-8613 CVE-2015-8615 CVE-2015-8619 CVE-2015-8743 CVE-2015-8744 CVE-2015-8745 CVE-2016-0787 CVE-2016-10013 CVE-2016-10024 CVE-2016-10025 CVE-2016-1568 CVE-2016-1570 CVE-2016-1571 CVE-2016-1714 CVE-2016-1922 CVE-2016-1981 CVE-2016-2198 CVE-2016-2270 CVE-2016-2271 CVE-2016-2391 CVE-2016-2392 CVE-2016-2538 CVE-2016-2841 CVE-2016-4439 CVE-2016-4441 CVE-2016-5238 CVE-2016-5338 CVE-2016-6258 CVE-2016-6259 CVE-2016-6351 CVE-2016-7092 CVE-2016-7093 CVE-2016-7094 CVE-2016-7777 CVE-2016-7908 CVE-2016-7909 CVE-2016-8667 CVE-2016-8669 CVE-2016-8910 CVE-2016-9377 CVE-2016-9378 CVE-2016-9379 CVE-2016-9380 CVE-2016-9381 CVE-2016-9382 CVE-2016-9383 CVE-2016-9384 CVE-2016-9385 CVE-2016-9386 CVE-2016-9637 CVE-2016-9921 CVE-2016-9922 CVE-2016-9932 CVE-2017-11591 CVE-2017-11683 CVE-2017-14859 CVE-2017-14862 CVE-2017-14864 CVE-2017-14970 CVE-2017-17669 CVE-2017-2615 CVE-2017-2620 CVE-2017-6505 CVE-2017-8309 CVE-2017-9330 CVE-2018-1000876 CVE-2018-10958 CVE-2018-10998 CVE-2018-11531 CVE-2018-17358 CVE-2018-17359 CVE-2018-17360 CVE-2018-17985 CVE-2018-18309 CVE-2018-18483 CVE-2018-18484 CVE-2018-18605 CVE-2018-18606 CVE-2018-18607 CVE-2018-19931 CVE-2018-19932 CVE-2018-20030 CVE-2018-20623 CVE-2018-20651 CVE-2018-20671 CVE-2018-3741 CVE-2019-1010180 CVE-2019-10215 CVE-2019-14250 CVE-2019-14907 CVE-2019-15043 CVE-2019-15847 CVE-2019-20810 CVE-2019-20812 CVE-2019-9278 CVE-2020-0305 CVE-2020-10135 CVE-2020-10711 CVE-2020-10732 CVE-2020-10751 CVE-2020-10766 CVE-2020-10767 CVE-2020-10768 CVE-2020-10773 CVE-2020-12245 CVE-2020-12771 CVE-2020-13379 CVE-2020-13974 CVE-2020-14392 CVE-2020-14393 CVE-2020-14416 CVE-2020-15705 SUSE-SU-2017:3232-1 SUSE-SU-2018:3882-1 SUSE-SU-2019:2182-1 SUSE-SU-2019:2650-1 SUSE-SU-2020:0233-1 SUSE-SU-2020:0457-1 SUSE-SU-2020:1970-1 SUSE-SU-2020:2304-1
|
Platform(s): | openSUSE Leap 15.0 openSUSE Leap 15.1 SUSE Linux Enterprise Server 12 SP2-ESPOS SUSE Linux Enterprise Server 12 SP3 SUSE Linux Enterprise Server 12 SP3-BCL SUSE Linux Enterprise Server 12 SP3-ESPOS SUSE Linux Enterprise Server 12 SP3-LTSS SUSE Linux Enterprise Server 12 SP3-TERADATA SUSE Linux Enterprise Server 12 SP4 SUSE OpenStack Cloud Crowbar 8 SUSE OpenStack Cloud Crowbar 9
| Product(s): | |
Definition Synopsis |
openSUSE Leap 15.0 is installed AND Package Information
ovmf-2017+git1510945757.b2662641d5-lp150.4.13 is installed
OR ovmf-tools-2017+git1510945757.b2662641d5-lp150.4.13 is installed
OR qemu-ovmf-ia32-2017+git1510945757.b2662641d5-lp150.4.13 is installed
OR qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-lp150.4.13 is installed
OR qemu-ovmf-x86_64-debug-2017+git1510945757.b2662641d5-lp150.4.13 is installed
|
Definition Synopsis |
openSUSE Leap 15.1 is installed
AND Package Information
libxslt-1.1.32-lp151.3.3 is installed
OR libxslt-devel-1.1.32-lp151.3.3 is installed
OR libxslt-devel-32bit-1.1.32-lp151.3.3 is installed
OR libxslt-python-1.1.32-lp151.3.3 is installed
OR libxslt-tools-1.1.32-lp151.3.3 is installed
OR libxslt1-1.1.32-lp151.3.3 is installed
OR libxslt1-32bit-1.1.32-lp151.3.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2-ESPOS is installed
AND Package Information
kernel-default-4.4.121-92.138 is installed
OR kernel-default-base-4.4.121-92.138 is installed
OR kernel-default-devel-4.4.121-92.138 is installed
OR kernel-devel-4.4.121-92.138 is installed
OR kernel-macros-4.4.121-92.138 is installed
OR kernel-source-4.4.121-92.138 is installed
OR kernel-syms-4.4.121-92.138 is installed
OR kgraft-patch-4_4_121-92_138-default-1-3.3 is installed
OR kgraft-patch-SLE12-SP2_Update_36-1-3.3 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3 is installed
AND Package Information
alsa-1.0.27.2-15 is installed
OR alsa-docs-1.0.27.2-15 is installed
OR libasound2-1.0.27.2-15 is installed
OR libasound2-32bit-1.0.27.2-15 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-BCL is installed
AND Package Information
xen-4.9.4_06-3.62 is installed
OR xen-doc-html-4.9.4_06-3.62 is installed
OR xen-libs-4.9.4_06-3.62 is installed
OR xen-libs-32bit-4.9.4_06-3.62 is installed
OR xen-tools-4.9.4_06-3.62 is installed
OR xen-tools-domU-4.9.4_06-3.62 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-ESPOS is installed
AND Package Information
kgraft-patch-4_4_178-94_91-default-4-2 is installed
OR kgraft-patch-SLE12-SP3_Update_25-4-2 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-LTSS is installed
AND binutils-2.32-9.33 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-TERADATA is installed
AND Package Information
xen-4.9.2_10-3.41 is installed
OR xen-doc-html-4.9.2_10-3.41 is installed
OR xen-libs-4.9.2_10-3.41 is installed
OR xen-libs-32bit-4.9.2_10-3.41 is installed
OR xen-tools-4.9.2_10-3.41 is installed
OR xen-tools-domU-4.9.2_10-3.41 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP4 is installed
AND Package Information
augeas-1.2.0-17.3 is installed
OR augeas-lenses-1.2.0-17.3 is installed
OR libaugeas0-1.2.0-17.3 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud Crowbar 8 is installed
AND Package Information
ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8 is installed
OR rubygem-rails-html-sanitizer-1.0.3-8.8 is installed
|
Definition Synopsis |
SUSE OpenStack Cloud Crowbar 9 is installed
AND Package Information
LibVNCServer-0.9.9-17.31 is installed
OR libvncclient0-0.9.9-17.31 is installed
OR libvncserver0-0.9.9-17.31 is installed
|