Oval Definition:oval:org.opensuse.security:def:60193
Revision Date:2020-12-01Version:1
Title:Security update for the Linux Kernel (Important)
Description:



The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bug fixes.



The following security bugs were fixed:

- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782). - CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766). - CVE-2017-18204: Fixed a denial of service in the ocfs2_setattr function of fs/ocfs2/file.c (bnc#1083244). - CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086). - CVE-2020-8694: Restricted energy meter to root access (bsc#1170415). - CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725). - CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511). - CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait operation, which could have lead to memory corruption and possibly privilege escalation (bsc#1176011). - CVE-2020-25212: Fixed A TOCTOU mismatch in the NFS client code which could have been used by local attackers to corrupt memory (bsc#1176381). - CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235). - CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206). - CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990). - CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721). - CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722). - CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725). - CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423). - CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).

The following non-security bugs were fixed:

- btrfs: fix race with relocation recovery and fs_root setup (bsc#1131277). - btrfs: flush_space always takes fs_info->fs_root (bsc#1131277). - btrfs: btrfs_init_new_device should use fs_info->dev_root (bsc#1131277, bsc#1176922). - btrfs: btrfs_test_opt and friends should take a btrfs_fs_info (bsc#1131277, bsc#1176922). - btrfs: call functions that always use the same root with fs_info instead (bsc#1131277, bsc#1176922). - btrfs: call functions that overwrite their root parameter with fs_info (bsc#1131277, bsc#1176922). - btrfs: flush_space always takes fs_info->fs_root (bsc#1131277, bsc#1176922). - btrfs: pull node/sector/stripe sizes out of root and into fs_info (bsc#1131277, bsc#1176922). - btrfs: Remove fs_info argument of btrfs_write_and_wait_transaction (bsc#1131277, bsc#1176922). - btrfs: remove root parameter from transaction commit/end routines (bsc#1131277, bsc#1176922). - btrfs: remove root usage from can_overcommit (bsc#1131277, bsc#1176922). - btrfs: root->fs_info cleanup, access fs_info->delayed_root directly (bsc#1131277, bsc#1176922). - btrfs: root->fs_info cleanup, add fs_info convenience variables (bsc#1131277, bsc#1176922). - btrfs: root->fs_info cleanup, btrfs_calc_{trans,trunc}_metadata_size (bsc#1131277, bsc#1176922). - btrfs: root->fs_info cleanup, update_block_group{,flags} (bsc#1131277, bsc#1176922). - btrfs: root->fs_info cleanup, use fs_info->dev_root everywhere (bsc#1131277, bsc#1176922). - btrfs: split btrfs_wait_marked_extents into normal and tree log functions (bsc#1131277, bsc#1176922). - btrfs: struct btrfsic_state->root should be an fs_info (bsc#1131277, bsc#1176922). - btrfs: take an fs_info directly when the root is not used otherwise (bsc#1131277, bsc#1176922). - xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411). - xen: do not reschedule in preemption off sections (bsc#1175749). - xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411). - xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411). - xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410). - xen/events: block rogue events for some time (XSA-332 bsc#1177411). - xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411). - xen/events: do not use chip_data for legacy IRQs (XSA-332 bsc#1065600). - xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411). - xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411). - xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411). - xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411). - xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411). - xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411). - XEN uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (XSA-332 bsc#1065600).
Family:unixClass:patch
Status:Reference(s):1012382
1017690
1020413
1020950
1024749
1050469
1058425
1065600
1066892
1069213
1069925
1070767
1073654
1075419
1075697
1082943
1083244
1087092
1090435
1102959
1103429
1106929
1109137
1109248
1109412
1109413
1109414
1111996
1112534
1112535
1113247
1113252
1113255
1116827
1118830
1118831
1118987
1119019
1119843
1120640
1120691
1120902
1121034
1121035
1121056
1121713
1121805
1124235
1125315
1125446
1126389
1126772
1126773
1126805
1127082
1127155
1127561
1127725
1127731
1127961
1128166
1128452
1128565
1128696
1128756
1128893
1129080
1129179
1129237
1129238
1129239
1129240
1129241
1129413
1129414
1129415
1129416
1129417
1129418
1129419
1129581
1129770
1129923
1131277
1133131
1133232
1141913
1142772
1154162
1159913
1162197
1162200
1165631
1170415
1170643
1175721
1175749
1176011
1176235
1176253
1176278
1176381
1176382
1176423
1176482
1176721
1176722
1176725
1176896
1176922
1176990
1177027
1177086
1177165
1177206
1177226
1177410
1177411
1177511
1177513
1177725
1177766
1178782
960341
969783
983436
CVE-2009-0163
CVE-2009-2820
CVE-2009-3553
CVE-2010-0393
CVE-2010-0540
CVE-2010-0542
CVE-2010-1748
CVE-2010-2941
CVE-2010-4000
CVE-2012-5519
CVE-2012-6094
CVE-2013-4238
CVE-2014-2856
CVE-2014-3537
CVE-2014-4650
CVE-2014-5029
CVE-2014-5030
CVE-2014-5031
CVE-2014-8128
CVE-2014-8964
CVE-2014-9679
CVE-2015-0295
CVE-2015-1158
CVE-2015-1159
CVE-2015-1858
CVE-2015-1859
CVE-2015-1860
CVE-2015-2325
CVE-2015-2327
CVE-2015-2328
CVE-2015-3210
CVE-2015-3217
CVE-2015-5073
CVE-2015-7554
CVE-2015-8380
CVE-2016-0772
CVE-2016-1000110
CVE-2016-10095
CVE-2016-1283
CVE-2016-3191
CVE-2016-4692
CVE-2016-4743
CVE-2016-5318
CVE-2016-5636
CVE-2016-5699
CVE-2016-7586
CVE-2016-7587
CVE-2016-7589
CVE-2016-7592
CVE-2016-7598
CVE-2016-7599
CVE-2016-7610
CVE-2016-7623
CVE-2016-7632
CVE-2016-7635
CVE-2016-7639
CVE-2016-7641
CVE-2016-7645
CVE-2016-7652
CVE-2016-7654
CVE-2016-7656
CVE-2017-13788
CVE-2017-13798
CVE-2017-13803
CVE-2017-13856
CVE-2017-13866
CVE-2017-13870
CVE-2017-14482
CVE-2017-16232
CVE-2017-18204
CVE-2017-2350
CVE-2017-2354
CVE-2017-2355
CVE-2017-2356
CVE-2017-2362
CVE-2017-2363
CVE-2017-2364
CVE-2017-2365
CVE-2017-2366
CVE-2017-2369
CVE-2017-2371
CVE-2017-2373
CVE-2017-2496
CVE-2017-2510
CVE-2017-2539
CVE-2017-5715
CVE-2017-5753
CVE-2017-5754
CVE-2017-7006
CVE-2017-7011
CVE-2017-7012
CVE-2017-7018
CVE-2017-7019
CVE-2017-7020
CVE-2017-7030
CVE-2017-7034
CVE-2017-7037
CVE-2017-7038
CVE-2017-7039
CVE-2017-7040
CVE-2017-7041
CVE-2017-7042
CVE-2017-7043
CVE-2017-7046
CVE-2017-7048
CVE-2017-7049
CVE-2017-7052
CVE-2017-7055
CVE-2017-7056
CVE-2017-7059
CVE-2017-7061
CVE-2017-7064
CVE-2017-7081
CVE-2017-7087
CVE-2017-7089
CVE-2017-7090
CVE-2017-7091
CVE-2017-7092
CVE-2017-7093
CVE-2017-7094
CVE-2017-7095
CVE-2017-7096
CVE-2017-7098
CVE-2017-7099
CVE-2017-7100
CVE-2017-7102
CVE-2017-7104
CVE-2017-7107
CVE-2017-7109
CVE-2017-7111
CVE-2017-7117
CVE-2017-7120
CVE-2017-7142
CVE-2017-7156
CVE-2017-7157
CVE-2018-1000876
CVE-2018-11805
CVE-2018-17358
CVE-2018-17359
CVE-2018-17360
CVE-2018-17985
CVE-2018-18309
CVE-2018-18483
CVE-2018-18484
CVE-2018-18605
CVE-2018-18606
CVE-2018-18607
CVE-2018-19931
CVE-2018-19932
CVE-2018-20623
CVE-2018-20651
CVE-2018-20671
CVE-2019-1010180
CVE-2019-2024
CVE-2019-2974
CVE-2019-5108
CVE-2019-9213
CVE-2020-0404
CVE-2020-0427
CVE-2020-0431
CVE-2020-0432
CVE-2020-12352
CVE-2020-14351
CVE-2020-14381
CVE-2020-14390
CVE-2020-1749
CVE-2020-1930
CVE-2020-1931
CVE-2020-25212
CVE-2020-25284
CVE-2020-25643
CVE-2020-25645
CVE-2020-25656
CVE-2020-25705
CVE-2020-26088
CVE-2020-3899
CVE-2020-8694
SUSE-SU-2017:2529-1
SUSE-SU-2018:0073-1
SUSE-SU-2018:0219-1
SUSE-SU-2019:0801-1
SUSE-SU-2019:2650-1
SUSE-SU-2020:0050-1
SUSE-SU-2020:1211-1
Platform(s):openSUSE Leap 15.0
openSUSE Leap 15.1
SUSE Linux Enterprise Server 12 SP2-ESPOS
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server 12 SP3-BCL
SUSE Linux Enterprise Server 12 SP3-ESPOS
SUSE Linux Enterprise Server 12 SP3-LTSS
SUSE Linux Enterprise Server 12 SP3-TERADATA
SUSE Linux Enterprise Server 12 SP4
SUSE OpenStack Cloud 8
SUSE OpenStack Cloud 9
SUSE OpenStack Cloud Crowbar 8
Product(s):
Definition Synopsis
  • openSUSE Leap 15.0 is installed
  • AND Package Information
  • libsoup-2.62.2-lp150.2.3 is installed
  • OR libsoup-2_4-1-2.62.2-lp150.2.3 is installed
  • OR libsoup-2_4-1-32bit-2.62.2-lp150.2.3 is installed
  • OR libsoup-devel-2.62.2-lp150.2.3 is installed
  • OR libsoup-devel-32bit-2.62.2-lp150.2.3 is installed
  • OR libsoup-lang-2.62.2-lp150.2.3 is installed
  • OR typelib-1_0-Soup-2_4-2.62.2-lp150.2.3 is installed
  • Definition Synopsis
  • openSUSE Leap 15.1 is installed
  • AND Package Information
  • ImageMagick-7.0.7.34-lp151.7.6 is installed
  • OR ImageMagick-config-7-SUSE-7.0.7.34-lp151.7.6 is installed
  • OR ImageMagick-config-7-upstream-7.0.7.34-lp151.7.6 is installed
  • OR ImageMagick-devel-7.0.7.34-lp151.7.6 is installed
  • OR ImageMagick-devel-32bit-7.0.7.34-lp151.7.6 is installed
  • OR ImageMagick-doc-7.0.7.34-lp151.7.6 is installed
  • OR ImageMagick-extra-7.0.7.34-lp151.7.6 is installed
  • OR libMagick++-7_Q16HDRI4-7.0.7.34-lp151.7.6 is installed
  • OR libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp151.7.6 is installed
  • OR libMagick++-devel-7.0.7.34-lp151.7.6 is installed
  • OR libMagick++-devel-32bit-7.0.7.34-lp151.7.6 is installed
  • OR libMagickCore-7_Q16HDRI6-7.0.7.34-lp151.7.6 is installed
  • OR libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.6 is installed
  • OR libMagickWand-7_Q16HDRI6-7.0.7.34-lp151.7.6 is installed
  • OR libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp151.7.6 is installed
  • OR perl-PerlMagick-7.0.7.34-lp151.7.6 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2-ESPOS is installed
  • AND Package Information
  • kernel-default-4.4.121-92.146 is installed
  • OR kernel-default-base-4.4.121-92.146 is installed
  • OR kernel-default-devel-4.4.121-92.146 is installed
  • OR kernel-devel-4.4.121-92.146 is installed
  • OR kernel-macros-4.4.121-92.146 is installed
  • OR kernel-source-4.4.121-92.146 is installed
  • OR kernel-syms-4.4.121-92.146 is installed
  • OR kgraft-patch-4_4_121-92_146-default-1-3.5 is installed
  • OR kgraft-patch-SLE12-SP2_Update_38-1-3.5 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3 is installed
  • AND Package Information
  • cups-1.7.5-19 is installed
  • OR cups-client-1.7.5-19 is installed
  • OR cups-libs-1.7.5-19 is installed
  • OR cups-libs-32bit-1.7.5-19 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-BCL is installed
  • AND Package Information
  • libpolkit0-0.113-5.18 is installed
  • OR polkit-0.113-5.18 is installed
  • OR typelib-1_0-Polkit-1_0-0.113-5.18 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-ESPOS is installed
  • AND Package Information
  • kgraft-patch-4_4_156-94_64-default-7-2 is installed
  • OR kgraft-patch-SLE12-SP3_Update_20-7-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-LTSS is installed
  • AND Package Information
  • libmysqlclient18-10.0.40.2-29.35 is installed
  • OR libmysqlclient18-32bit-10.0.40.2-29.35 is installed
  • OR mariadb-10.0.40.2-29.35 is installed
  • OR mariadb-client-10.0.40.2-29.35 is installed
  • OR mariadb-errormessages-10.0.40.2-29.35 is installed
  • OR mariadb-tools-10.0.40.2-29.35 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-TERADATA is installed
  • AND Package Information
  • res-signingkeys-3.0.37-52.23 is installed
  • OR smt-3.0.37-52.23 is installed
  • OR smt-support-3.0.37-52.23 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP4 is installed
  • AND Package Information
  • cpp48-4.8.5-31.17 is installed
  • OR gcc48-4.8.5-31.17 is installed
  • OR gcc48-32bit-4.8.5-31.17 is installed
  • OR gcc48-c++-4.8.5-31.17 is installed
  • OR gcc48-info-4.8.5-31.17 is installed
  • OR gcc48-locale-4.8.5-31.17 is installed
  • OR libasan0-4.8.5-31.17 is installed
  • OR libasan0-32bit-4.8.5-31.17 is installed
  • OR libstdc++48-devel-4.8.5-31.17 is installed
  • OR libstdc++48-devel-32bit-4.8.5-31.17 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud 8 is installed
  • AND binutils-2.32-9.33 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud 9 is installed
  • AND Package Information
  • libxerces-c-3_1-3.1.1-13.3 is installed
  • OR libxerces-c-3_1-32bit-3.1.1-13.3 is installed
  • OR xerces-c-3.1.1-13.3 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud Crowbar 8 is installed
  • AND Package Information
  • libjavascriptcoregtk-4_0-18-2.28.2-2.53 is installed
  • OR libwebkit2gtk-4_0-37-2.28.2-2.53 is installed
  • OR libwebkit2gtk3-lang-2.28.2-2.53 is installed
  • OR typelib-1_0-JavaScriptCore-4_0-2.28.2-2.53 is installed
  • OR typelib-1_0-WebKit2-4_0-2.28.2-2.53 is installed
  • OR webkit2gtk-4_0-injected-bundles-2.28.2-2.53 is installed
  • OR webkit2gtk3-2.28.2-2.53 is installed
  • BACK