-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1331
                   Security update for the Linux Kernel
                               21 April 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Linux Kernel
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Denial of Service               -- Existing Account
                   Reduced Security                -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-30002 CVE-2021-29154 CVE-2021-20219
                   CVE-2021-3483 CVE-2020-36311 CVE-2020-25673
                   CVE-2020-25672 CVE-2020-25671 CVE-2020-25670

Reference:         ESB-2021.1307
                   ESB-2021.1300
                   ESB-2021.1299

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2021/suse-su-20211266-1

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:1266-1
Rating:            important
References:        #1065729 #1113295 #1178181 #1181507 #1181674 #1183405
                   #1183662 #1183755 #1184114 #1184120 #1184170 #1184391
                   #1184393 #1184397 #1184494 #1184511 #1184583
Cross-References:  CVE-2020-25670 CVE-2020-25671 CVE-2020-25672 CVE-2020-25673
                   CVE-2020-36311 CVE-2021-20219 CVE-2021-29154 CVE-2021-30002
                   CVE-2021-3483
Affected Products:
                   SUSE Linux Enterprise Real Time Extension 12-SP5
______________________________________________________________________________

An update that solves 9 vulnerabilities and has 8 fixes is now available.

Description:

The SUSE Linux Enterprise 12 SP5 kernel RT was updated to receive various
security and bugfixes.
The following security bugs were fixed:

  o CVE-2021-29154: Fixed incorrect computation of branch displacements,
    allowing arbitrary code execution (bsc#1184391).
  o CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed
    multiple bugs in NFC subsytem (bsc#1178181).
  o CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering
    destruction of a large SEV VM (bsc#1184511).
  o CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).
  o CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy
    (bsc#1184120).
  o CVE-2021-20219: Fixed a denial of service in n_tty_receive_char_special
    (bsc#1184397).


The following non-security bugs were fixed:

  o cifs: change noisy error message to FYI (bsc#1181507).
  o cifs_debug: use %pd instead of messing with ->d_name (bsc#1181507).
  o cifs: do not send close in compound create+close requests (bsc#1181507).
  o cifs: New optype for session operations (bsc#1181507).
  o cifs: print MIDs in decimal notation (bsc#1181507).
  o cifs: return proper error code in statfs(2) (bsc#1181507).
  o cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
  o fix setting irq affinity (bsc#1184583)
  o ibmvnic: Use 'skb_frag_address()' instead of hand coding it (bsc#1184114
    ltc#192237).
  o locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).
  o net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)
  o powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#
    1065729).
  o powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
  o powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674
    ltc#189159 git-fixes bsc#1183662 ltc#191922).
  o powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#
    189159 git-fixes bsc#1183662 ltc#191922).
  o powerpc/pseries/ras: Remove unused variable 'status' (bsc#1065729).
  o s390/pci: Fix s390_mmio_read/write with MIO (LTC#192079 bsc#1183755).
  o smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
  o smb3: fix crediting for compounding when only one request in flight (bsc#
    1181507).
  o usbip: fix stub_dev to check for stream socket (git-fixes).
  o usbip: fix vhci_hcd to check for stream socket (git-fixes).
  o virsh: list is showing less guests then "xl list" (bsc#1184513).
  o vsprintf: Do not have bprintf dereference pointers (bsc#1184494).
  o vsprintf: Do not preprocess non-dereferenced pointers for bprintf (%px and
    %pK) (bsc#1184494).
  o vsprintf: Fix off-by-one bug in bstr_printf() processing dereferenced
    pointers (bsc#1184494).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Real Time Extension 12-SP5:
    zypper in -t patch SUSE-SLE-RT-12-SP5-2021-1266=1

Package List:

  o SUSE Linux Enterprise Real Time Extension 12-SP5 (x86_64):
       cluster-md-kmp-rt-4.12.14-10.40.1
       cluster-md-kmp-rt-debuginfo-4.12.14-10.40.1
       dlm-kmp-rt-4.12.14-10.40.1
       dlm-kmp-rt-debuginfo-4.12.14-10.40.1
       gfs2-kmp-rt-4.12.14-10.40.1
       gfs2-kmp-rt-debuginfo-4.12.14-10.40.1
       kernel-rt-4.12.14-10.40.1
       kernel-rt-base-4.12.14-10.40.1
       kernel-rt-base-debuginfo-4.12.14-10.40.1
       kernel-rt-debuginfo-4.12.14-10.40.1
       kernel-rt-debugsource-4.12.14-10.40.1
       kernel-rt-devel-4.12.14-10.40.1
       kernel-rt-devel-debuginfo-4.12.14-10.40.1
       kernel-rt_debug-4.12.14-10.40.1
       kernel-rt_debug-debuginfo-4.12.14-10.40.1
       kernel-rt_debug-debugsource-4.12.14-10.40.1
       kernel-rt_debug-devel-4.12.14-10.40.1
       kernel-rt_debug-devel-debuginfo-4.12.14-10.40.1
       kernel-syms-rt-4.12.14-10.40.1
       ocfs2-kmp-rt-4.12.14-10.40.1
       ocfs2-kmp-rt-debuginfo-4.12.14-10.40.1
  o SUSE Linux Enterprise Real Time Extension 12-SP5 (noarch):
       kernel-devel-rt-4.12.14-10.40.1
       kernel-source-rt-4.12.14-10.40.1


References:

  o https://www.suse.com/security/cve/CVE-2020-25670.html
  o https://www.suse.com/security/cve/CVE-2020-25671.html
  o https://www.suse.com/security/cve/CVE-2020-25672.html
  o https://www.suse.com/security/cve/CVE-2020-25673.html
  o https://www.suse.com/security/cve/CVE-2020-36311.html
  o https://www.suse.com/security/cve/CVE-2021-20219.html
  o https://www.suse.com/security/cve/CVE-2021-29154.html
  o https://www.suse.com/security/cve/CVE-2021-30002.html
  o https://www.suse.com/security/cve/CVE-2021-3483.html
  o https://bugzilla.suse.com/1065729
  o https://bugzilla.suse.com/1113295
  o https://bugzilla.suse.com/1178181
  o https://bugzilla.suse.com/1181507
  o https://bugzilla.suse.com/1181674
  o https://bugzilla.suse.com/1183405
  o https://bugzilla.suse.com/1183662
  o https://bugzilla.suse.com/1183755
  o https://bugzilla.suse.com/1184114
  o https://bugzilla.suse.com/1184120
  o https://bugzilla.suse.com/1184170
  o https://bugzilla.suse.com/1184391
  o https://bugzilla.suse.com/1184393
  o https://bugzilla.suse.com/1184397
  o https://bugzilla.suse.com/1184494
  o https://bugzilla.suse.com/1184511
  o https://bugzilla.suse.com/1184583

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=kGjH
-----END PGP SIGNATURE-----