Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.1376 Security update for the Linux Kernel 22 April 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: linux kernel Publisher: SUSE Operating System: SUSE Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Denial of Service -- Existing Account Access Confidential Data -- Existing Account Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-30002 CVE-2021-29154 CVE-2021-28950 CVE-2021-3483 CVE-2020-36312 CVE-2020-36311 CVE-2020-36310 CVE-2020-25673 CVE-2020-25672 CVE-2020-25671 CVE-2020-25670 Reference: ESB-2021.1331 ESB-2021.1307 ESB-2021.1299 Original Bulletin: https://www.suse.com/support/update/announcement/2021/suse-su-20211301-1 - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:1301-1 Rating: important References: #1047233 #1065729 #1113295 #1152489 #1154353 #1155518 #1156395 #1178181 #1181507 #1183405 #1184074 #1184120 #1184194 #1184211 #1184388 #1184391 #1184393 #1184509 #1184511 #1184512 #1184514 #1184583 #1184647 Cross-References: CVE-2020-25670 CVE-2020-25671 CVE-2020-25672 CVE-2020-25673 CVE-2020-36310 CVE-2020-36311 CVE-2020-36312 CVE-2021-28950 CVE-2021-29154 CVE-2021-30002 CVE-2021-3483 Affected Products: SUSE Linux Enterprise Module for Public Cloud 15-SP2 ______________________________________________________________________________ An update that solves 11 vulnerabilities and has 12 fixes is now available. Description: The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes. The following security bugs were fixed: o CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181). o CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511). o CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391). o CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120). o CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393). o CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc# 1184512). o CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ). o CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194). The following non-security bugs were fixed: o ALSA: aloop: Fix initialization of controls (git-fixes). o ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes). o appletalk: Fix skb allocation size in loopback case (git-fixes). o ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes). o ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes). o ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes). o ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes). o ASoC: max98373: Added 30ms turn on/off time delay (git-fixes). o ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes). o ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes). o ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes). o atl1c: fix error return code in atl1c_probe() (git-fixes). o atl1e: fix error return code in atl1e_probe() (git-fixes). o batman-adv: initialize "struct batadv_tvlv_tt_vlan_data"->reserved field (git-fixes). o bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518). o brcmfmac: clear EAP/association status bits on linkdown events (git-fixes). o bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes). o cifs: change noisy error message to FYI (bsc#1181507). o cifs_debug: use %pd instead of messing with ->d_name (bsc#1181507). o cifs: do not send close in compound create+close requests (bsc#1181507). o cifs: New optype for session operations (bsc#1181507). o cifs: print MIDs in decimal notation (bsc#1181507). o cifs: return proper error code in statfs(2) (bsc#1181507). o cifs: Tracepoints and logs for tracing credit changes (bsc#1181507). o clk: fix invalid usage of list cursor in register (git-fixes). o clk: fix invalid usage of list cursor in unregister (git-fixes). o clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes). o drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes). o drm/amdgpu: check alignment on CPU page for bo map (git-fixes). o drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes). o drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074). o drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes). o drm/msm: Ratelimit invalid-fence message (git-fixes). o drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes). o enetc: Fix reporting of h/w packet counters (git-fixes). o fuse: fix bad inode (bsc#1184211). o fuse: fix live lock in fuse_iget() (bsc#1184211). o i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025). o i40e: Fix sparse error: 'vsi->netdev' could be null (jsc#SLE-8025). o ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926). o kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes). o libbpf: Fix INSTALL flag order (bsc#1155518). o locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes). o mac80211: choose first enabled channel for monitor (git-fixes). o mac80211: fix TXQ AC confusion (git-fixes). o mISDN: fix crash in fritzpci (git-fixes). o net: atheros: switch from 'pci_' to 'dma_' API (git-fixes). o net: b44: fix error return code in b44_init_one() (git-fixes). o net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes). o net: hns3: Remove the left over redundant check & assignment (bsc#1154353). o net: lantiq: Wait for the GPHY firmware to be ready (git-fixes). o net/mlx5: Fix PPLM register mapping (jsc#SLE-8464). o net: pasemi: fix error return code in pasemi_mac_open() (git-fixes). o net: phy: broadcom: Only advertise EEE for supported modes (git-fixes). o net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes). o net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405) o net: wan/lmc: unregister device when no matching device is found (git-fixes). o platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes). o platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes). o PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes). o post.sh: Return an error when module update fails (bsc#1047233 bsc# 1184388). o powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc# 1065729). o powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes). o powerpc/pseries/ras: Remove unused variable 'status' (bsc#1065729). o powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395). o powerpc/sstep: Fix darn emulation (bsc#1156395). o powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395). o powerpc/sstep: Fix load-store and update emulation (bsc#1156395). o qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes). o RAS/CEC: Correct ce_add_elem()'s returned values (bsc#1152489). o rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc# 1184514) o scsi: ibmvfc: Fix invalid state machine BUG_ON() (bsc#1184647 ltc#191231). o smb3: add dynamic trace point to trace when credits obtained (bsc#1181507). o smb3: fix crediting for compounding when only one request in flight (bsc# 1181507). o soc/fsl: qbman: fix conflicting alignment attributes (git-fixes). o thermal/core: Add NULL pointer check before using cooling device stats (git-fixes). o USB: cdc-acm: downgrade message to debug (git-fixes). o USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes). o USBip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes). o USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes). o x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc# 1152489). o x86/ioapic: Ignore IRQ2 again (bsc#1152489). o x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc () (bsc#1152489). o xen/events: fix setting irq affinity (bsc#1184583). Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Module for Public Cloud 15-SP2: zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1301=1 Package List: o SUSE Linux Enterprise Module for Public Cloud 15-SP2 (noarch): kernel-devel-azure-5.3.18-18.44.1 kernel-source-azure-5.3.18-18.44.1 o SUSE Linux Enterprise Module for Public Cloud 15-SP2 (x86_64): kernel-azure-5.3.18-18.44.1 kernel-azure-debuginfo-5.3.18-18.44.1 kernel-azure-debugsource-5.3.18-18.44.1 kernel-azure-devel-5.3.18-18.44.1 kernel-azure-devel-debuginfo-5.3.18-18.44.1 kernel-syms-azure-5.3.18-18.44.1 References: o https://www.suse.com/security/cve/CVE-2020-25670.html o https://www.suse.com/security/cve/CVE-2020-25671.html o https://www.suse.com/security/cve/CVE-2020-25672.html o https://www.suse.com/security/cve/CVE-2020-25673.html o https://www.suse.com/security/cve/CVE-2020-36310.html o https://www.suse.com/security/cve/CVE-2020-36311.html o https://www.suse.com/security/cve/CVE-2020-36312.html o https://www.suse.com/security/cve/CVE-2021-28950.html o https://www.suse.com/security/cve/CVE-2021-29154.html o https://www.suse.com/security/cve/CVE-2021-30002.html o https://www.suse.com/security/cve/CVE-2021-3483.html o https://bugzilla.suse.com/1047233 o https://bugzilla.suse.com/1065729 o https://bugzilla.suse.com/1113295 o https://bugzilla.suse.com/1152489 o https://bugzilla.suse.com/1154353 o https://bugzilla.suse.com/1155518 o https://bugzilla.suse.com/1156395 o https://bugzilla.suse.com/1178181 o https://bugzilla.suse.com/1181507 o https://bugzilla.suse.com/1183405 o https://bugzilla.suse.com/1184074 o https://bugzilla.suse.com/1184120 o https://bugzilla.suse.com/1184194 o https://bugzilla.suse.com/1184211 o https://bugzilla.suse.com/1184388 o https://bugzilla.suse.com/1184391 o https://bugzilla.suse.com/1184393 o https://bugzilla.suse.com/1184509 o https://bugzilla.suse.com/1184511 o https://bugzilla.suse.com/1184512 o https://bugzilla.suse.com/1184514 o https://bugzilla.suse.com/1184583 o https://bugzilla.suse.com/1184647 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYID74+NLKJtyKPYoAQhiGw//R7cDt2NRBf61P/A4n+SHl3hxG+QWEK7K LA2HnlnuMQzZGkhUwrumKqTY0UC99q0bWCSXI238tgj3KykIA5FbgLUxIOzWrfbS LSmGulDBAFMLSkwg+hQBU4AO539+Eglon8d6MkGmc0J7YPfseeXhxn4bihkUaUG8 8alNlnQX5sht6NEVk6+EreyFdvh2nsslmpYjiS+kh44xwiNIRxKY7UbT1914QpVV CV+WHRMD90NJru8wBLBB+y0363l5e6SsgtbUjqs19qMRv6bR8E58YCV/MzkrjH69 UzZSiusI3dEVnenK/DqZKEqogZXQzyIv8xoN3vdmyTzqEDTBUVs8au1huXxrZxZ1 ZoqXRqmmsmbnSqDKn4T/Lk+3JZVe26M5RaicVUo41hz31B23pUjiruz0fPeEpCIe n92t/gL4oitE1nTZoEtYgUKC8yyKX1Chagjm8cda48rNADXR0l0127cOtCTRTD7T 8JOmCoapt+8xSD2h+RaYLs5BTEIEoM/E6WQsTuHAr7hO10de9fYjGqmKfcvDF5cM 0lOvYOz3gO+XFx8lyHlqNuRu4aK9q5PSRkiRjvalqlIXZarSUDYduRFuiBkhYmVj uf9NyEbz0EogB6gWHVYp8XQqMqtafCACLUNC/EalaQyI1kAM0e5hEjVJhqVQ2HPP qqQnxhrCcLs= =KGvQ -----END PGP SIGNATURE-----