Oval Definition:oval:org.opensuse.security:def:69604
Revision Date:2021-03-09Version:1
Title:Security update for the Linux Kernel (Important)
Description:

The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843). - CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753). - CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747). by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372). - CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).

The following non-security bugs were fixed:

- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082) - kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). - rpm/kernel-binary.spec.in: avoid using barewords (bsc#1179014) - rpm/kernel-binary.spec.in: avoid using more barewords (bsc#1179014) %split_extra still contained two. - rpm/kernel-binary.spec.in: Fix compressed module handling for in-tree KMP (jsc#SLE-10886) The in-tree KMP that is built with SLE kernels have a different scriptlet that is embedded in kernel-binary.spec.in rather than *.sh files. - rpm/kernel-binary.spec.in: use grep -E instead of egrep (bsc#1179045) egrep is only a deprecated bash wrapper for 'grep -E'. So use the latter instead. - rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592) - rpm/kernel-obs-build.spec.in: Add -q option to modprobe calls (bsc#1178401) - rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082). - rpm/mkspec: do not build kernel-obs-build on x86_32 We want to use 64bit kernel due to various bugs (bsc#1178762 to name one). - rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058) - xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600). - xen/netback: fix spurious event detection for common event case (bsc#1182175).
Family:unixClass:patch
Status:Reference(s):1012382
1050242
1050549
1051510
1052904
1053043
1055117
1055121
1055186
1056787
1058115
1061840
1063638
1064802
1065600
1065729
1066129
1068546
1070872
1071995
1075020
1082387
1082555
1083647
1085535
1085536
1086657
1088804
1093389
1097583
1097584
1097585
1097586
1097587
1097588
1099658
1103186
1103259
1103992
1104353
1104427
1106011
1106284
1108193
1108838
1108937
1110946
1111331
1111666
1111696
1112063
1112128
1112178
1113722
1113956
1114279
1114427
1114542
1114638
1115688
1117114
1117158
1117561
1118139
1119680
1119843
1120091
1120318
1120423
1120566
1120843
1120902
1122767
1122776
1123454
1123663
1124503
1124839
1126206
1126356
1126704
1127175
1127371
1127374
1127616
1128052
1128415
1128544
1128904
1128971
1128979
1129138
1129273
1129497
1129693
1129770
1129845
1130195
1130425
1130527
1130567
1130579
1130699
1130937
1130972
1131326
1131427
1131438
1131451
1131467
1131488
1131530
1131565
1131574
1131587
1131659
1131673
1131847
1131848
1131851
1131900
1131934
1131935
1132044
1132219
1132226
1132227
1132365
1132368
1132369
1132370
1132372
1132373
1132384
1132397
1132402
1132403
1132404
1132405
1132407
1132411
1132412
1132413
1132414
1132426
1132527
1132531
1132555
1132558
1132561
1132562
1132563
1132564
1132570
1132571
1132572
1132589
1132618
1132673
1132681
1132726
1132828
1132894
1132943
1132982
1133005
1133016
1133094
1133095
1133115
1133149
1133176
1133188
1133190
1133320
1133486
1133529
1133547
1133584
1133593
1133612
1133616
1133667
1133668
1133672
1133674
1133675
1133698
1133702
1133731
1133769
1133772
1133774
1133778
1133779
1133780
1133825
1133850
1133851
1133852
1133897
1134090
1134160
1134162
1134199
1134200
1134201
1134202
1134203
1134204
1134205
1134223
1134354
1134393
1134397
1134459
1134460
1134461
1134597
1134600
1134607
1134618
1134651
1134671
1134760
1134806
1134810
1134813
1134848
1134936
1134945
1134946
1134947
1134948
1134949
1134950
1134951
1134952
1134953
1134972
1134974
1134975
1134980
1134981
1134983
1134987
1134989
1134990
1134994
1134995
1134998
1134999
1135006
1135007
1135008
1135018
1135021
1135024
1135026
1135027
1135028
1135029
1135031
1135033
1135034
1135035
1135036
1135037
1135038
1135039
1135041
1135042
1135044
1135045
1135046
1135047
1135049
1135051
1135052
1135053
1135055
1135056
1135058
1135100
1135120
1135278
1135281
1135309
1135312
1135314
1135315
1135316
1135320
1135323
1135330
1135492
1135542
1135556
1135603
1135642
1135661
1135758
1136188
1136206
1136215
1136345
1136347
1136348
1136353
1136424
1136428
1136430
1136432
1136434
1136435
1136438
1136439
1136456
1136460
1136461
1136469
1136477
1136478
1136498
1136573
1136586
1136881
1136935
1136990
1137151
1137152
1137153
1137162
1137201
1137224
1137232
1137233
1137236
1137372
1137429
1137444
1137586
1137739
1137752
1138291
1138293
1163592
1178401
1178762
1179014
1179015
1179045
1179082
1179428
1179660
1180058
1181747
1181753
1181843
1182140
1182175
CVE-2014-9939
CVE-2017-12448
CVE-2017-12450
CVE-2017-12452
CVE-2017-12453
CVE-2017-12454
CVE-2017-12456
CVE-2017-12799
CVE-2017-13757
CVE-2017-14128
CVE-2017-14129
CVE-2017-14130
CVE-2017-14333
CVE-2017-14529
CVE-2017-14729
CVE-2017-14745
CVE-2017-14974
CVE-2017-15938
CVE-2017-15939
CVE-2017-15996
CVE-2017-16826
CVE-2017-16827
CVE-2017-16828
CVE-2017-16829
CVE-2017-16830
CVE-2017-16831
CVE-2017-16832
CVE-2017-5753
CVE-2017-6965
CVE-2017-6966
CVE-2017-6969
CVE-2017-7209
CVE-2017-7210
CVE-2017-7223
CVE-2017-7224
CVE-2017-7225
CVE-2017-7226
CVE-2017-7299
CVE-2017-7300
CVE-2017-7301
CVE-2017-7302
CVE-2017-7303
CVE-2017-7304
CVE-2017-8392
CVE-2017-8393
CVE-2017-8394
CVE-2017-8396
CVE-2017-8421
CVE-2017-9746
CVE-2017-9747
CVE-2017-9748
CVE-2017-9750
CVE-2017-9755
CVE-2017-9756
CVE-2018-1000876
CVE-2018-10372
CVE-2018-10373
CVE-2018-10534
CVE-2018-10535
CVE-2018-12126
CVE-2018-12127
CVE-2018-12130
CVE-2018-16880
CVE-2018-17358
CVE-2018-17359
CVE-2018-17360
CVE-2018-17985
CVE-2018-18309
CVE-2018-18483
CVE-2018-18484
CVE-2018-18605
CVE-2018-18606
CVE-2018-18607
CVE-2018-19931
CVE-2018-19932
CVE-2018-20623
CVE-2018-20651
CVE-2018-20671
CVE-2018-6323
CVE-2018-6543
CVE-2018-6759
CVE-2018-6872
CVE-2018-7191
CVE-2018-7208
CVE-2018-7568
CVE-2018-7569
CVE-2018-7570
CVE-2018-7642
CVE-2018-7643
CVE-2018-8945
CVE-2019-1010180
CVE-2019-10124
CVE-2019-11085
CVE-2019-11091
CVE-2019-11477
CVE-2019-11478
CVE-2019-11479
CVE-2019-11486
CVE-2019-11487
CVE-2019-11811
CVE-2019-11815
CVE-2019-11833
CVE-2019-11884
CVE-2019-12382
CVE-2019-12818
CVE-2019-12819
CVE-2019-3846
CVE-2019-3882
CVE-2019-5489
CVE-2019-8564
CVE-2019-9003
CVE-2019-9500
CVE-2019-9503
CVE-2020-29368
CVE-2020-29374
CVE-2021-26930
CVE-2021-26931
CVE-2021-26932
SUSE-SU-2021:0740-1
Platform(s):SUSE Linux Enterprise Module for Basesystem 15 SP2
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise Workstation Extension 15 SP1
Product(s):
Definition Synopsis
  • SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed
  • AND Package Information
  • binutils-2.32-7.8 is installed
  • OR binutils-devel-2.32-7.8 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 15-LTSS is installed
  • AND Package Information
  • kernel-default-4.12.14-150.69.1 is installed
  • OR kernel-default-base-4.12.14-150.69.1 is installed
  • OR kernel-default-devel-4.12.14-150.69.1 is installed
  • OR kernel-default-man-4.12.14-150.69.1 is installed
  • OR kernel-devel-4.12.14-150.69.1 is installed
  • OR kernel-docs-4.12.14-150.69.1 is installed
  • OR kernel-macros-4.12.14-150.69.1 is installed
  • OR kernel-obs-build-4.12.14-150.69.1 is installed
  • OR kernel-source-4.12.14-150.69.1 is installed
  • OR kernel-syms-4.12.14-150.69.1 is installed
  • OR kernel-vanilla-base-4.12.14-150.69.1 is installed
  • OR reiserfs-kmp-default-4.12.14-150.69.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Workstation Extension 15 SP1 is installed
  • AND Package Information
  • kernel-default-4.12.14-197.4 is installed
  • OR kernel-default-extra-4.12.14-197.4 is installed
  • BACK