Oval Definition:oval:org.opensuse.security:def:87425
Revision Date:2021-07-01Version:1
Title:Security update for kernel-source (Important)
Description:
The SUSE Linux Enterprise 12 SP3 Kernel for Teradata was updated to receive the following fixes:

Security fixes:

- CVE-2020-36386: An issue exists in the Linux kernel prior to 5.8.1. net/bluetooth/hci_event.c has a slab
out-of-bounds read in hci_extended_inquiry_result_evt (bsc#1187038)

- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired
Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is
authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part
of 802.11n), an adversary can abuse this to inject arbitrary network packets (bsc#1185861)

- CVE-2021-32399: net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for
removal of the HCI controller (bsc#1184611)

- CVE-2021-33034: In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when
destroying an hci_chan. This leads to writing an arbitrary value (bsc#1186111)

- CVE-2020-26139: An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL
frames to other clients even though the sender has not yet successfully authenticated to the AP. This
might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients
and makes it easier to exploit other vulnerabilities in connected clients (bsc#1186062)

- CVE-2021-23134: Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows
local attackers to elevate their privileges. In typical configurations, the issue can only be triggered
by a privileged local user with the CAP_NET_RAW capability (bsc#1186060)

- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired
Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting
to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP,
CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data (bsc#1185859)

- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired
Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An
adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP,
CCMP, or GCMP encryption key is periodically renewed (bsc#1185859, bsc#1185863, bsc#1185862)

- CVE-2020-26141: An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi
implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An
adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP
data-confidentiality protocol (bsc#1185987)

- CVE-2020-26145: An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and
WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and
process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets
independent of the network configuration (bsc#1185860)

- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired
Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting
to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP,
CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data
(bsc#1185863, bsc#1185862, bsc#1185859)

- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired
Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key.
An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and
the WEP, CCMP, or GCMP encryption key is periodically renewed (bsc#1185863, bsc#1185862, bsc#1185859)

- CVE-2020-26147: An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations
reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject
packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or
GCMP data-confidentiality protocol is used (bsc#1185863, bsc#1185859)

- CVE-2020-36312: An issue was discovered in the Linux kernel before 5.8.10. virt/kvm/kvm_main.c has a
kvm_io_bus_unregister_dev memory leak upon a kmalloc failure (bsc#1184509)

- CVE-2021-29650: An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows
attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and
include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bsc#1184208)

- CVE-2020-27673: An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest
OS users can cause a denial of service (host OS hang) via a high rate of events to dom0 (bsc#1184583, bsc#1183638)

- CVE-2021-29154: BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements,
allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and
arch/x86/net/bpf_jit_comp32.c (bsc#1184391)

- CVE-2020-25673: A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to
leak and eventually hanging-up the system (bsc#1178181)

- CVE-2020-25672: A memory leak vulnerability was found in Linux kernel in llcp_sock_connect (bsc#1178181)

- CVE-2020-25671: A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing
use-after-free which might lead to privilege escalations (bsc#1178181)

- CVE-2020-25670: A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing
use-after-free which might lead to privilege escalations (bsc#1178181)

- CVE-2021-28950: An issue was discovered in fs/fuse/fuse_i.h in the Linux kernel before 5.11.8. A 'stall on CPU'
can occur because a retry loop continually finds the same bad inode (bsc#1184211)

- CVE-2020-36322: An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6.
fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original
fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184211)

- CVE-2020-36322: An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy
in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments (bsc#1184120)

- CVE-2021-3483: A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted
twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest
threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before
kernel 5.12-rc6 are affected (bsc#1184393)

- CVE-2021-20219: A denial of service vulnerability was found in n_tty_receive_char_special in drivers/tty/n_tty.c
of the Linux kernel. In this flaw a local attacker with a normal user privilege could delay the loop (due to a
changing ldata->read_head, and a missing sanity check) and cause a threat to the system availability (bsc#1184397)

- CVE-2021-29265: An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c
allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the
local and shared status (bsc#1184167)

- CVE-2021-29264: An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the
Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in
situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled (bsc#1184168)

- CVE-2021-28972: In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a
user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data
to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination
(bsc#1184198)

- CVE-2021-28660: rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows
writing beyond the end of the ->ssid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally
used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging
issue is relevant to their own customer base (bsc#1183593)

- CVE-2021-26931: An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI
backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least
under the influence of guests (such as out of memory conditions), it isn't correct to assume a plain bug. Memory allocations
potentially causing such crashes occur only when Linux is running in PV mode, though. This affects
drivers/block/xen-blkback/blkback.c and drivers/xen/xen-scsiback.c (bsc#1181753)

- CVE-2020-0433: In blk_mq_queue_tag_busy_iter of blk-mq-tag.c, there is a possible use after free due to improper locking.
This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not
needed for exploitation (bsc#1176720, bsc#1167316)

- CVE-2021-28038: An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the
netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the
handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend
driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931 (bsc#1183022)

- CVE-2021-27365: An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have
appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink
message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715)

- CVE-2021-27363: An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to
determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI
subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at
/sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function
(in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to
an iscsi_transport struct in the kernel module's global variables (bsc#1182716)

- CVE-2021-27364: An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c
is adversely affected by the ability of an unprivileged user to craft Netlink messages (bsc#1182717)

- CVE-2020-1749: A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec,
such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the
kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted.
This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from
this vulnerability is to data confidentiality (bsc#1165629)

- CVE-2021-26930: An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests
to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be
encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the
caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In
another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects
drivers/block/xen-blkback/blkback.c (bsc#1181843)

- CVE-2021-26932: An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping
operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the
success or failure of each one is reported to the backend driver, and the backend driver then loops over the
results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when
running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying
their success from the success of related batch elements. In other cases, errors resulting from one batch
element lead to further batch elements not being inspected, and hence successful ones to not be possible to
properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux
backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c
(bsc#1181747)

- CVE-2020-27786: A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a
local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue.
A write to this specific memory while freed and before use causes the flow of execution to change and possibly
allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to
confidentiality, integrity, as well as system availability (bsc#1179601)

- CVE-2020-27835: A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was
found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash
the system (bsc#1179878)

- CVE-2020-28374: In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier
checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory
traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the
attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are
proxied via an attacker-selected backstore (bsc#1178372)

Regular fixes or improvements:

- scsi: storvsc: Enable scatterlist entry lengths > 4Kbytes (bsc#1187193)
- mm: consider __HW_POISON pages when allocating from pcp lists (bsc#1187388)
- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724)
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724)
- genirq: Fix reference leaks on irq affinity notifiers (bsc#1185433)
- genirq: Prevent use-after-free and work list corruption (bsc#1012382, bsc#1185433)
- blacklist.conf: blacklist d120198bd5ff ('xen/evtchn: Change irq_info lock to raw_spinlock_t')
no PREEMPT_RT kernel is pulling from this cve branch and this is a follow up fix for a CVE fix.
- KVM: Add proper lockdep assertion in I/O bus unregister (bsc#1185555)
- KVM: Stop looking for coalesced MMIO zones if the bus is destroyed (bsc#1185557)
- KVM: Destroy I/O bus devices on unregister failure after syncing SRCU (bsc#1185556)
- hv_netvsc: fix deadlock on hotplug (bsc#1175462)
- hv_netvsc: Simplify num_chn checking in rndis_filter_device_add() (bsc#1175462)
- netvsc: delay setup of VF device (bsc#1175462)
- netvsc: fix race on sub channel creation (bsc#1175462)
- netvsc: fix race during initialization (bsc#1175462)
- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (bsc#1175462)
- hv_netvsc: Fix tx_table init in rndis_set_subchannel() (bsc#1175462)
- hv_netvsc: flag software created hash value (bsc#1175462)
- hv_netvsc: Fix error handling in netvsc_attach() (bsc#1175462)
- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (bsc#1175462)
- hv_netvsc: fix race that may miss tx queue wakeup (bsc#1175462)
- hv_netvsc: Fix unwanted wakeup after tx_disable (bsc#1175462)
- hv_netvsc: Fix IP header checksum for coalesced packets (bsc#1175462)
- hv_netvsc: Fix hash key value reset after other ops (bsc#1175462)
- hv_netvsc: Refactor assignments of struct netvsc_device_info (bsc#1175462)
- hv_netvsc: fix schedule in RCU context (bsc#1175462)
- hv_netvsc: Fix a deadlock by getting rtnl lock earlier in netvsc_probe() (bsc#1175462)
- hv/netvsc: Fix NULL dereference at single queue mode fallback (bsc#1175462)
- hv/netvsc: fix handling of fallback to single queue mode (bsc#1175462)
- hv_netvsc: split sub-channel setup into async and sync (bsc#1175462)
- hv_netvsc: Fix the variable sizes in ipsecv2 and rsc offload (bsc#1175462)
- hv_netvsc: fix network namespace issues with VF support (bsc#1175462)
- hv_netvsc: Fix a network regression after ifdown/ifup (bsc#1175462)
- hv_netvsc: Add handlers for ethtool get/set msg level (bsc#1175462)
- hv_netvsc: typo in NDIS RSS parameters structure (bsc#1175462)
- hv_netvsc: set master device (bsc#1175462)
- hv_netvsc: Fix net device attach on older Windows hosts (bsc#1175462)
- hv_netvsc: Ensure correct teardown message sequence order (bsc#1175462)
- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() (bsc#1175462)
- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown (bsc#1175462)
- hv_netvsc: common detach logic (bsc#1175462)
- hv_netvsc: pass netvsc_device to rndis halt (bsc#1175462)
- hv_netvsc: change GPAD teardown order on older versions (bsc#1175462)
- hv_netvsc: use RCU to fix concurrent rx and queue changes (bsc#1175462)
- hv_netvsc: disable NAPI before channel close (bsc#1175462)
- hv_netvsc: cancel subchannel setup before halting device (bsc#1175462)
- hv_netvsc: fix error unwind handling if vmbus_open fails (bsc#1175462)
- hv_netvsc: only wake transmit queue if link is up (bsc#1175462)
- hv_netvsc: avoid retry on send during shutdown (bsc#1175462)
- hv_netvsc: use reciprocal divide to speed up percent calculation (bsc#1175462)
- hv_netvsc: preserve hw_features on mtu/channels/ringparam changes (bsc#1175462)
- hv_netvsc: netvsc_teardown_gpadl() split (bsc#1175462)
- hv_netvsc: Set tx_table to equal weight after subchannels open (bsc#1175462)
- hv_netvsc: avoid unnecessary wakeups on subchannel creation (bsc#1175462)
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: don't allow overlapping system zones (bsc#1173485).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485)
- x86: fix speculation bug reporting (bsc#1012382)
- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022)
- Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022)
- xen/netback: fix spurious event detection for common event case (bsc#1182175)
- blacklist.conf: CVE-2020-4788 is ppc specific
- x86/speculation: Fix incorrect MDS/TAA mitigation status (bsc#1139073 CVE-2019-11135)
- x86/speculation/mds: fix asm to C function calls (bsc#1111331, CVE-2018-12126,
CVE-2018-12127, CVE-2018-12130, CVE-2019-11091)
Family:unixClass:patch
Status:Reference(s):1012382
1111331
1139073
1165629
1167316
1173485
1175462
1176720
1178181
1178372
1179601
1179878
1181747
1181753
1181843
1182175
1182715
1182716
1182717
1183022
1183593
1183638
1184120
1184167
1184168
1184198
1184208
1184211
1184391
1184393
1184397
1184509
1184583
1184611
1185433
1185555
1185556
1185557
1185724
1185859
1185860
1185861
1185862
1185863
1185987
1186060
1186062
1186111
1187038
1187193
1187388
CVE-2018-12126
CVE-2018-12127
CVE-2018-12130
CVE-2019-11091
CVE-2019-11135
CVE-2020-0433
CVE-2020-1749
CVE-2020-24586
CVE-2020-24587
CVE-2020-24588
CVE-2020-25670
CVE-2020-25671
CVE-2020-25672
CVE-2020-25673
CVE-2020-26139
CVE-2020-26141
CVE-2020-26145
CVE-2020-26147
CVE-2020-27673
CVE-2020-27786
CVE-2020-27835
CVE-2020-28374
CVE-2020-36312
CVE-2020-36322
CVE-2020-36386
CVE-2020-4788
CVE-2021-20219
CVE-2021-23134
CVE-2021-26930
CVE-2021-26931
CVE-2021-26932
CVE-2021-27363
CVE-2021-27364
CVE-2021-27365
CVE-2021-28038
CVE-2021-28660
CVE-2021-28950
CVE-2021-28972
CVE-2021-29154
CVE-2021-29264
CVE-2021-29265
CVE-2021-29650
CVE-2021-30002
CVE-2021-32399
CVE-2021-33034
CVE-2021-3483
Platform(s):SUSE Linux Enterprise Server 12 SP3-TERADATA
Product(s):
BACK