Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.1331 Security update for the Linux Kernel 21 April 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux Kernel Publisher: SUSE Operating System: SUSE Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Denial of Service -- Existing Account Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-30002 CVE-2021-29154 CVE-2021-20219 CVE-2021-3483 CVE-2020-36311 CVE-2020-25673 CVE-2020-25672 CVE-2020-25671 CVE-2020-25670 Reference: ESB-2021.1307 ESB-2021.1300 ESB-2021.1299 Original Bulletin: https://www.suse.com/support/update/announcement/2021/suse-su-20211266-1 - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:1266-1 Rating: important References: #1065729 #1113295 #1178181 #1181507 #1181674 #1183405 #1183662 #1183755 #1184114 #1184120 #1184170 #1184391 #1184393 #1184397 #1184494 #1184511 #1184583 Cross-References: CVE-2020-25670 CVE-2020-25671 CVE-2020-25672 CVE-2020-25673 CVE-2020-36311 CVE-2021-20219 CVE-2021-29154 CVE-2021-30002 CVE-2021-3483 Affected Products: SUSE Linux Enterprise Real Time Extension 12-SP5 ______________________________________________________________________________ An update that solves 9 vulnerabilities and has 8 fixes is now available. Description: The SUSE Linux Enterprise 12 SP5 kernel RT was updated to receive various security and bugfixes. The following security bugs were fixed: o CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391). o CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181). o CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511). o CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393). o CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120). o CVE-2021-20219: Fixed a denial of service in n_tty_receive_char_special (bsc#1184397). The following non-security bugs were fixed: o cifs: change noisy error message to FYI (bsc#1181507). o cifs_debug: use %pd instead of messing with ->d_name (bsc#1181507). o cifs: do not send close in compound create+close requests (bsc#1181507). o cifs: New optype for session operations (bsc#1181507). o cifs: print MIDs in decimal notation (bsc#1181507). o cifs: return proper error code in statfs(2) (bsc#1181507). o cifs: Tracepoints and logs for tracing credit changes (bsc#1181507). o fix setting irq affinity (bsc#1184583) o ibmvnic: Use 'skb_frag_address()' instead of hand coding it (bsc#1184114 ltc#192237). o locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes). o net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405) o powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc# 1065729). o powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes). o powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922). o powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc# 189159 git-fixes bsc#1183662 ltc#191922). o powerpc/pseries/ras: Remove unused variable 'status' (bsc#1065729). o s390/pci: Fix s390_mmio_read/write with MIO (LTC#192079 bsc#1183755). o smb3: add dynamic trace point to trace when credits obtained (bsc#1181507). o smb3: fix crediting for compounding when only one request in flight (bsc# 1181507). o usbip: fix stub_dev to check for stream socket (git-fixes). o usbip: fix vhci_hcd to check for stream socket (git-fixes). o virsh: list is showing less guests then "xl list" (bsc#1184513). o vsprintf: Do not have bprintf dereference pointers (bsc#1184494). o vsprintf: Do not preprocess non-dereferenced pointers for bprintf (%px and %pK) (bsc#1184494). o vsprintf: Fix off-by-one bug in bstr_printf() processing dereferenced pointers (bsc#1184494). Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Real Time Extension 12-SP5: zypper in -t patch SUSE-SLE-RT-12-SP5-2021-1266=1 Package List: o SUSE Linux Enterprise Real Time Extension 12-SP5 (x86_64): cluster-md-kmp-rt-4.12.14-10.40.1 cluster-md-kmp-rt-debuginfo-4.12.14-10.40.1 dlm-kmp-rt-4.12.14-10.40.1 dlm-kmp-rt-debuginfo-4.12.14-10.40.1 gfs2-kmp-rt-4.12.14-10.40.1 gfs2-kmp-rt-debuginfo-4.12.14-10.40.1 kernel-rt-4.12.14-10.40.1 kernel-rt-base-4.12.14-10.40.1 kernel-rt-base-debuginfo-4.12.14-10.40.1 kernel-rt-debuginfo-4.12.14-10.40.1 kernel-rt-debugsource-4.12.14-10.40.1 kernel-rt-devel-4.12.14-10.40.1 kernel-rt-devel-debuginfo-4.12.14-10.40.1 kernel-rt_debug-4.12.14-10.40.1 kernel-rt_debug-debuginfo-4.12.14-10.40.1 kernel-rt_debug-debugsource-4.12.14-10.40.1 kernel-rt_debug-devel-4.12.14-10.40.1 kernel-rt_debug-devel-debuginfo-4.12.14-10.40.1 kernel-syms-rt-4.12.14-10.40.1 ocfs2-kmp-rt-4.12.14-10.40.1 ocfs2-kmp-rt-debuginfo-4.12.14-10.40.1 o SUSE Linux Enterprise Real Time Extension 12-SP5 (noarch): kernel-devel-rt-4.12.14-10.40.1 kernel-source-rt-4.12.14-10.40.1 References: o https://www.suse.com/security/cve/CVE-2020-25670.html o https://www.suse.com/security/cve/CVE-2020-25671.html o https://www.suse.com/security/cve/CVE-2020-25672.html o https://www.suse.com/security/cve/CVE-2020-25673.html o https://www.suse.com/security/cve/CVE-2020-36311.html o https://www.suse.com/security/cve/CVE-2021-20219.html o https://www.suse.com/security/cve/CVE-2021-29154.html o https://www.suse.com/security/cve/CVE-2021-30002.html o https://www.suse.com/security/cve/CVE-2021-3483.html o https://bugzilla.suse.com/1065729 o https://bugzilla.suse.com/1113295 o https://bugzilla.suse.com/1178181 o https://bugzilla.suse.com/1181507 o https://bugzilla.suse.com/1181674 o https://bugzilla.suse.com/1183405 o https://bugzilla.suse.com/1183662 o https://bugzilla.suse.com/1183755 o https://bugzilla.suse.com/1184114 o https://bugzilla.suse.com/1184120 o https://bugzilla.suse.com/1184170 o https://bugzilla.suse.com/1184391 o https://bugzilla.suse.com/1184393 o https://bugzilla.suse.com/1184397 o https://bugzilla.suse.com/1184494 o https://bugzilla.suse.com/1184511 o https://bugzilla.suse.com/1184583 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYH953+NLKJtyKPYoAQg7gQ/+IdQWIW43kZ9MY6xJd5GgzrLDpdln96KF JjfcS0rcT0cvYlXpAiJa4kNB3a3e2EaViXQK2exMukbdZEF3KF/chLwLD4BIkv6c FSBzWkEBgyyDJO2TX4n0LEsKHREUVVJn60Yg0BfgMipFg/DEDkIzQ0wqNZERN8kK aRGSWAwHfi0oCI5q/d43HPrD44XPCr84dZ+O07spDibmvNovSrvE5EsH7aRDo9HX SFxOthajA48PU1xECW/gBtwBQ1fhJpkzCw3pu6IRbH1pEqIhuPSVmj+RAmfSYZ7J 4QhGF53s5xuCaKCz5RJmdVdduOU+k3j6YhOP+ceIVTKj3GE09MJzTFUCK734sJoh blC+yL2Ieu/WV7xW0j+iyoyUGLifUkm6kkYmQPVh0obPLEN+O7eo1Yqj8ZZpDLG8 oZwL6tHiGBbvjUqrfYTTwZ6hKMxaO7DgA+qSYl1OlMbhW/0NcaLWenr/OYkjRLEZ 9GWcIQj8TKneR3qhyIr/BixI4cVNpc33B+/vX6c7cfuwQ0w777aw3JhVhSE0g7Ww LQ6wHxFVO1v9DGrpVZpLyex8XC1ep+lLtzn4GqMxyjPRLODwVbL/f5Mmh5RPysEq Fp3k8Iz+buzDlIQ1bDA2zPRjzQNzC15eP2coMpIEGadD3vuFWPKZiIohP7DWuoXf CzpQ/OirP3g= =kGjH -----END PGP SIGNATURE-----