Oval Definition:oval:org.opensuse.security:def:87575
Revision Date:2022-01-17Version:1
Title:Security update for the Linux Kernel (Important) (in QA)
Description:



The SUSE Linux Enterprise 12 SP3 Teradata kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2018-25020: Fixed an issue in the BPF subsystem in the Linux kernel mishandled situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. (bsc#1193575) - CVE-2019-0136: Fixed an insufficient access control which allow an unauthenticated user to execute a denial of service. (bsc#1193157) - CVE-2020-35519: Fixed an out-of-bounds memory access was found in x25_bind (bsc#1183696). - CVE-2021-0935: Fixed out of bounds write due to a use after free which could lead to local escalation of privilege with System execution privileges needed in ip6_xmit. (bsc#1192032) - CVE-2021-4002: Added a missing TLB flush that could lead to leak or corruption of data in hugetlbfs. (bsc#1192946) - CVE-2021-4083: Fixed race condition in Unix domain socket garbage collection that could lead to read memory after free. (bsc#1193727) - CVE-2021-4149: Fixed improper lock operation in btrfs that allowed users to crash the kernel or deadlock the system. (bsc#1194001) - CVE-2021-4155: Fixed a data leak flaw that allows a local attacker to leak data on the XFS filesystem. (bsc#1194272) - CVE-2021-4197: Fixed an issue in cgroups may allow local privilege escalation. (bsc#1194302) - CVE-2021-4202: Fixed race condition in nci_request() that could cause use-after-free. (bsc#1194529) - CVE-2021-20322: Fixed a bug that provides to an attacker the ability to quickly scan open UDP ports. (bsc#1191790) - CVE-2021-28711: Fixed a rogue backends that could cause DoS of guests via high frequency events by hardening blkfront against event channel storms. (bsc#1193440) - CVE-2021-28712: Fixed a rogue backends that could cause DoS of guests via high frequency events by hardening netfront against event channel storms. (bsc#1193440) - CVE-2021-28713: Fixed a rogue backends that could cause DoS of guests via high frequency events by hardening netfront against event channel storms. (bsc#1193440 - CVE-2021-28715: Fixed an issue where a guest could force Linux netback driver to hog large amounts of kernel memory by do not queueing unlimited number of packages. (bsc#1193442) - CVE-2021-31916: Fixed a bound check failure that could allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash, a leak of internal kernel information, or a privilege escalation problem. (bnc#1192781) - CVE-2021-33098: Fixed a potential denial of service in Intel(R) Ethernet ixgbe driver due to improper input validation. (bsc#1192877) - CVE-2021-34981: Fixed an issue that allows an attacker with a local account to escalate privileges when CAPI (ISDN) hardware connection fails. (bsc#1191961) - CVE-2021-43976: Fixed a flaw that could allow an attacker (who can connect a crafted USB device) to cause a denial of service. (bsc#1192847) - CVE-2021-45485: Fixed an information leak because of certain use of a hash table which use IPv6 source addresses. (bsc#1194094) - CVE-2021-45486: Fixed an information leak because the hash table is very small in net/ipv4/route.c. (bsc#1194087)

The following non-security bugs were fixed:

- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22918) - bpf: Disallow unprivileged bpf by default (jsc#SLE-22918). - cgroupns: Close race between cgroup_post_fork and copy_cgroup_ns (bsc#1180679). - config: disable unprivileged BPF by default (jsc#SLE-22918) - kprobes: Limit max data_size of the kretprobe instances (bsc#1193669). - net/x25: fix a race in x25_bind() (networking-stable-19_03_15). - nvme: Do not allow to reset a reconnecting controller (bsc#1133874). - nvme: validate controller state before rescheduling keep alive (bsc#1103257). - ring-buffer: Protect ring_buffer_reset() from reentrancy (bsc#1179960). - scsi: virtio_scsi: let host do exception handling (bsc#1141181 bsc#1183996). - tty: hvc: replace BUG_ON() with negative return value (git-fixes). - xen/blkfront: do not take local copy of a request from the ring page (git-fixes). - xen/blkfront: do not trust the backend response data blindly (git-fixes). - xen/blkfront: read response from backend only once (git-fixes). - xen/netfront: disentangle tx_skb_freelist (git-fixes). - xen/netfront: do not assume sk_buff_head list is empty in error handling (git-fixes). - xen/netfront: do not bug in case of too many frags (bnc#1012382). - xen/netfront: do not cache skb_shinfo() (bnc#1012382). - xen/netfront: do not read data from request on the ring page (git-fixes). - xen/netfront: do not trust the backend response data blindly (git-fixes). - xen/netfront: do not use ~0U as error return value for xennet_fill_frags() (git-fixes). - xen/netfront: read response from backend only once (git-fixes). - xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).

This patch is currently in QA and not yet available for download.
Family:unixClass:patch
Status:Reference(s):1012382
1103257
1133874
1141181
1179960
1180679
1183696
1183996
1191790
1191961
1192032
1192781
1192847
1192877
1192946
1193157
1193440
1193442
1193575
1193669
1193727
1194001
1194087
1194094
1194272
1194302
1194529
CVE-2018-25020
CVE-2019-0136
CVE-2020-35519
CVE-2021-0935
CVE-2021-20322
CVE-2021-28711
CVE-2021-28712
CVE-2021-28713
CVE-2021-28715
CVE-2021-31916
CVE-2021-33098
CVE-2021-34981
CVE-2021-4002
CVE-2021-4083
CVE-2021-4149
CVE-2021-4155
CVE-2021-4197
CVE-2021-4202
CVE-2021-43976
CVE-2021-45485
CVE-2021-45486
Platform(s):SUSE Linux Enterprise Server 12 SP3-TERADATA
Product(s):
BACK