Operating System:

[SUSE]

Published:

18 November 2021

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.3938
                   Security update for the Linux Kernel
                             18 November 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Linux Kernel
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Root Compromise                 -- Existing Account
                   Execute Arbitrary Code/Commands -- Existing Account
                   Modify Arbitrary Files          -- Existing Account
                   Denial of Service               -- Existing Account
                   Access Confidential Data        -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-42739 CVE-2021-42252 CVE-2021-42008
                   CVE-2021-41864 CVE-2021-37159 CVE-2021-35477
                   CVE-2021-34866 CVE-2021-34556 CVE-2021-33033
                   CVE-2021-3772 CVE-2021-3760 CVE-2021-3752
                   CVE-2021-3715 CVE-2021-3655 CVE-2021-3542
                   CVE-2021-0935 CVE-2018-13405 

Reference:         ESB-2021.3927
                   ESB-2021.3872
                   ESB-2021.3743
                   ESB-2021.3456

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2021/suse-su-20213723-1
   https://www.suse.com/support/update/announcement/2021/suse-su-20213712-1
   https://www.suse.com/support/update/announcement/2021/suse-su-20213710-1
   https://www.suse.com/support/update/announcement/2021/suse-su-20213684-1
   https://www.suse.com/support/update/announcement/2021/suse-su-20213692-1
   https://www.suse.com/support/update/announcement/2021/suse-su-20213718-1

Comment: This bulletin contains six (6) SUSE security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:3723-1
Rating:            important
References:        #1050549 #1065729 #1085030 #1094840 #1114648 #1180624
                   #1184673 #1186063 #1186109 #1188563 #1188601 #1188983
                   #1188985 #1190006 #1190067 #1190317 #1190349 #1190351
                   #1190479 #1190620 #1190795 #1190941 #1191241 #1191315
                   #1191317 #1191349 #1191450 #1191452 #1191455 #1191500
                   #1191579 #1191628 #1191662 #1191667 #1191713 #1191801
                   #1192145 #1192379
Cross-References:  CVE-2018-13405 CVE-2021-33033 CVE-2021-34556 CVE-2021-3542
                   CVE-2021-35477 CVE-2021-3655 CVE-2021-3715 CVE-2021-37159
                   CVE-2021-3760 CVE-2021-3772 CVE-2021-41864 CVE-2021-42008
                   CVE-2021-42252 CVE-2021-42739
Affected Products:
                   SUSE Linux Enterprise Real Time Extension 12-SP5
______________________________________________________________________________

An update that solves 14 vulnerabilities and has 24 fixes is now available.

Description:

The SUSE Linux Enterprise 12 SP5 Real Time kernel was updated to receive
various security and bugfixes.

The following security bugs were fixed:

  o CVE-2021-3655: Fixed a missing size validations on inbound SCTP packets,
    which may have allowed the kernel to read uninitialized memory (bsc#
    1188563).
  o CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/
    cls_route.c (bsc#1190349).
  o CVE-2021-33033: Fixed a use-after-free in cipso_v4_genopt in net/ipv4/
    cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI
    definitions is mishandled (bsc#1186109).
  o CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev->
    rf_conn_info object (bsc#1190067).
  o CVE-2021-42739: The firewire subsystem had a buffer overflow related to
    drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/
    firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
  o CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).
  o CVE-2021-34556: Fixed side-channel attack via a Speculative Store Bypass
    via unprivileged BPF program that could have obtain sensitive information
    from kernel memory (bsc#1188983).
  o CVE-2021-35477: Fixed BPF stack frame pointer which could have been abused
    to disclose content of arbitrary kernel memory (bsc#1188985).
  o CVE-2021-42252: Fixed an issue inside aspeed_lpc_ctrl_mmap that could have
    allowed local attackers to access the Aspeed LPC control interface to
    overwrite memory in the kernel and potentially execute privileges (bnc#
    1190479).
  o CVE-2021-41864: Fixed prealloc_elems_and_freelist that allowed unprivileged
    users to trigger an eBPF multiplication integer overflow with a resultant
    out-of-bounds write (bnc#1191317).
  o CVE-2021-42008: Fixed a slab out-of-bounds write in the decode_data
    function in drivers/net/hamradio/6pack.c. Input from a process that had the
    CAP_NET_ADMIN capability could have lead to root access (bsc#1191315).
  o CVE-2021-37159: Fixed use-after-free and a double free in
    hso_free_net_device in drivers/net/usb/hso.c when unregister_netdev is
    called without checking for the NETREG_REGISTERED state (bnc#1188601).
  o CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).


The following non-security bugs were fixed:

  o IB/hfi1: Fix abba locking issue with sc_disable() (git-fixes)
  o ICMPv6: Add ICMPv6 Parameter Problem, code 3 definition (bsc#1191241).
  o IPv6: reply ICMP error if the first fragment do not include all headers
    (bsc#1191241).
  o KVM: PPC: Book3S HV: Save host FSCR in the P7/8 path (bsc#1065729).
  o NFS: Do uncached readdir when we're seeking a cookie in an empty page cache
    (bsc#1191628).
  o PM: base: power: do not try to use non-existing RTC for storing data
    (git-fixes).
  o SMB3.1.1: Fix ids returned in POSIX query dir (bsc#1190317).
  o SMB3.1.1: do not log warning message if server does not populate salt (bsc#
    1190317).
  o SMB3.1.1: fix mount failure to some servers when compression enabled (bsc#
    1190317).
  o SMB3.1.1: remove confusing mount warning when no SPNEGO info on negprot rsp
    (bsc#1190317).
  o SMB3.1.1: update comments clarifying SPNEGO info in negprot response (bsc#
    1190317).
  o SMB3: Add new info level for query directory (bsc#1190317).
  o SMB3: Add support for getting and setting SACLs (bsc#1190317).
  o SMB3: Fix mkdir when idsfromsid configured on mount (bsc#1190317).
  o SMB3: Resolve data corruption of TCP server info fields (bsc#1190317).
  o SMB3: add support for recognizing WSL reparse tags (bsc#1190317).
  o SMB3: avoid confusing warning message on mount to Azure (bsc#1190317).
  o SMB3: fix readpage for large swap cache (bsc#1190317).
  o SMB3: incorrect file id in requests compounded with open (bsc#1190317).
  o SMB3: update structures for new compression protocol definitions (bsc#
    1190317).
  o USB: cdc-acm: fix break reporting (git-fixes).
  o USB: cdc-acm: fix racy tty buffer accesses (git-fixes).
  o USB: serial: cp210x: add ID for GW Instek GDM-834x Digital Multimeter
    (git-fixes).
  o USB: serial: option: add Telit LN920 compositions (git-fixes).
  o USB: serial: option: add device id for Foxconn T99W265 (git-fixes).
  o USB: xhci: dbc: fix tty registration race (git-fixes).
  o bitmap: remove unused function declaration (git-fixes).
  o blktrace: Fix uaf in blk_trace access after removing by sysfs (bsc#
    1191452).
  o cdc_ncm: Set NTB format again after altsetting switch for Huawei devices
    (git-fixes).
  o cifs: Add get_security_type_str function to return sec type (bsc#1190317).
  o cifs: Avoid field over-reading memcpy() (bsc#1190317).
  o cifs: Change SIDs in ACEs while transferring file ownership (bsc#1190317).
  o cifs: Clarify SMB1 code for POSIX Create (bsc#1190317).
  o cifs: Clarify SMB1 code for POSIX Lock (bsc#1190317).
  o cifs: Clarify SMB1 code for POSIX delete file (bsc#1190317).
  o cifs: Clarify SMB1 code for SetFileSize (bsc#1190317).
  o cifs: Clarify SMB1 code for UnixCreateSymLink (bsc#1190317).
  o cifs: Clarify SMB1 code for UnixSetPathInfo (bsc#1190317).
  o cifs: Clarify SMB1 code for delete (bsc#1190317).
  o cifs: Clarify SMB1 code for rename open file (bsc#1190317).
  o cifs: Display local UID details for SMB sessions in DebugData (bsc#
    1190317).
  o cifs: Do not use the original cruid when following DFS links for multiuser
    mounts (bsc#1190317).
  o cifs: Enable sticky bit with cifsacl mount option (bsc#1190317).
  o cifs: Fix cached_fid refcnt leak in open_shroot (bsc#1190317).
  o cifs: Fix chmod with modefromsid when an older ACE already exists (bsc#
    1190317).
  o cifs: Fix cifsacl ACE mask for group and others (bsc#1190317).
  o cifs: Fix double add page to memcg when cifs_readpages (bsc#1190317).
  o cifs: Fix in error types returned for out-of-credit situations (bsc#
    1190317).
  o cifs: Fix unix perm bits to cifsacl conversion for "other" bits (bsc#
    1190317).
  o cifs: Grab a reference for the dentry of the cached directory during the
    lifetime of the cache (bsc#1190317).
  o cifs: If a corrupted DACL is returned by the server, bail out (bsc#
    1190317).
  o cifs: Make extract_hostname function public (bsc#1190317).
  o cifs: Make extract_sharename function public (bsc#1190317).
  o cifs: Print the address and port we are connecting to in generic_ip_connect
    () (bsc#1190317).
  o cifs: Retain old ACEs when converting between mode bits and ACL (bsc#
    1190317).
  o cifs: Silently ignore unknown oplock break handle (bsc#1190317).
  o cifs: add FALLOC_FL_INSERT_RANGE support (bsc#1190317).
  o cifs: add a function to get a cached dir based on its dentry (bsc#1190317).
  o cifs: add a timestamp to track when the lease of the cached dir was taken
    (bsc#1190317).
  o cifs: add shutdown support (bsc#1190317).
  o cifs: add support for FALLOC_FL_COLLAPSE_RANGE (bsc#1190317).
  o cifs: added WARN_ON for all the count decrements (bsc#1190317).
  o cifs: ask for more credit on async read/write code paths (bsc#1190317).
  o cifs: avoid extra calls in posix_info_parse (bsc#1190317).
  o cifs: check pointer before freeing (bsc#1190317).
  o cifs: check the timestamp for the cached dirent when deciding on revalidate
    (bsc#1190317).
  o cifs: clarify SMB1 code for UnixCreateHardLink (bsc#1190317).
  o cifs: cleanup a few le16 vs. le32 uses in cifsacl.c (bsc#1190317).
  o cifs: cleanup misc.c (bsc#1190317).
  o cifs: compute full_path already in cifs_readdir() (bsc#1190317).
  o cifs: constify path argument of ->make_node() (bsc#1190317).
  o cifs: constify pathname arguments in a bunch of helpers (bsc#1190317).
  o cifs: convert list_for_each to entry variant in cifs_debug.c (bsc#1190317).
  o cifs: convert list_for_each to entry variant in smb2misc.c (bsc#1190317).
  o cifs: convert to use be32_add_cpu() (bsc#1190317).
  o cifs: create sd context must be a multiple of 8 (bsc#1190317).
  o cifs: detect dead connections only when echoes are enabled (bsc#1190317).
  o cifs: do not fail __smb_send_rqst if non-fatal signals are pending (bsc#
    1190317).
  o cifs: dump Security Type info in DebugData (bsc#1190317).
  o cifs: fix DFS mount with cifsacl/modefromsid (bsc#1190317).
  o cifs: fix NULL dereference in smb2_check_message() (bsc#1190317).
  o cifs: fix SMB1 error path in cifs_get_file_info_unix (bsc#1190317).
  o cifs: fix a memleak with modefromsid (bsc#1190317).
  o cifs: fix allocation size on newly created files (bsc#1190317).
  o cifs: fix chown and chgrp when idsfromsid mount option enabled (bsc#
    1190317).
  o cifs: fix fallocate when trying to allocate a hole (bsc#1190317).
  o cifs: fix leaked reference on requeued write (bsc#1190317).
  o cifs: fix missing null session check in mount (bsc#1190317).
  o cifs: fix missing spinlock around update to ses->status (bsc#1190317).
  o cifs: fix out-of-bound memory access when calling smb3_notify() at mount
    point (bsc#1190317).
  o cifs: fix reference leak for tlink (bsc#1190317).
  o cifs: fix rsize/wsize to be negotiated values (bsc#1190317).
  o cifs: fix string declarations and assignments in tracepoints (bsc#1190317).
  o cifs: fix the out of range assignment to bit fields in
    parse_server_interfaces (bsc#1190317).
  o cifs: handle "nolease" option for vers=1.0 (bsc#1190317).
  o cifs: handle -EINTR in cifs_setattr (bsc#1190317).
  o cifs: handle ERRBaduid for SMB1 (bsc#1190317).
  o cifs: handle reconnect of tcon when there is no cached dfs referral (bsc#
    1190317).
  o cifs: have ->mkdir() handle race with another client sanely (bsc#1190317).
  o cifs: improve fallocate emulation (bsc#1190317).
  o cifs: make build_path_from_dentry() return const char * (bsc#1190317).
  o cifs: make const array static, makes object smaller (bsc#1190317).
  o cifs: make locking consistent around the server session status (bsc#
    1190317).
  o cifs: map STATUS_ACCOUNT_LOCKED_OUT to -EACCES (bsc#1190317).
  o cifs: minor kernel style fixes for comments (bsc#1190317).
  o cifs: minor simplification to smb2_is_network_name_deleted (bsc#1190317).
  o cifs: missing null check for newinode pointer (bsc#1190317).
  o cifs: move some variables off the stack in smb2_ioctl_query_info (bsc#
    1190317).
  o cifs: move the check for nohandlecache into open_shroot (bsc#1190317).
  o cifs: only write 64kb at a time when fallocating a small region of a file
    (bsc#1190317).
  o cifs: pass a path to open_shroot and check if it is the root or not (bsc#
    1190317).
  o cifs: pass the dentry instead of the inode down to the revalidation check
    functions (bsc#1190317).
  o cifs: prevent truncation from long to int in wait_for_free_credits (bsc#
    1190317).
  o cifs: reduce stack use in smb2_compound_op (bsc#1190317).
  o cifs: refactor create_sd_buf() and and avoid corrupting the buffer (bsc#
    1190317).
  o cifs: remove old dead code (bsc#1190317).
  o cifs: remove some minor warnings pointed out by kernel test robot (bsc#
    1190317).
  o cifs: remove the retry in cifs_poxis_lock_set (bsc#1190317).
  o cifs: remove two cases where rc is set unnecessarily in sid_to_id (bsc#
    1190317).
  o cifs: remove unnecessary copies of tcon->crfid.fid (bsc#1190317).
  o cifs: remove various function description warnings (bsc#1190317).
  o cifs: rename the *_shroot* functions to *_cached_dir* (bsc#1190317).
  o cifs: retry lookup and readdir when EAGAIN is returned (bsc#1190317).
  o cifs: return cached_fid from open_shroot (bsc#1190317).
  o cifs: revalidate mapping when we open files for SMB1 POSIX (bsc#1190317).
  o cifs: set server->cipher_type to AES-128-CCM for SMB3.0 (bsc#1190317).
  o cifs: smb1: Try failing back to SetFileInfo if SetPathInfo fails (bsc#
    1190317).
  o cifs: store a pointer to the root dentry in cifs_sb_info once we have
    completed mounting the share (bsc#1190317).
  o cifs: update ctime and mtime during truncate (bsc#1190317).
  o cifs: update new ACE pointer after populate_new_aces (bsc#1190317).
  o cifs: use echo_interval even when connection not ready (bsc#1190317).
  o cifs: use the expiry output of dns_query to schedule next resolution (bsc#
    1190317).
  o ext4: fix potential infinite loop in ext4_dx_readdir() (bsc#1191662).
  o ext4: fix reserved space counter leakage (bsc#1191450).
  o fs, mm: fix race in unlinking swapfile (bsc#1191455).
  o fs: copy BTRFS_IOC_[SG]ET_FSLABEL to vfs (bsc#1191500).
  o gianfar: Account for Tx PTP timestamp in the skb headroom (git-fixes).
  o gianfar: Fix TX timestamping with a stacked DSA driver (git-fixes).
  o gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP
    (git-fixes).
  o gianfar: simplify FCS handling and fix memory leak (git-fixes).
  o ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).
  o ipc: remove memcg accounting for sops objects in do_semtimedop()
  o ipv6/netfilter: Discard first fragment not including all headers (bsc#
    1191241).
  o kernel, fs: Introduce and use set_restart_fn() and arch_set_restart_data()
    (bsc#1191713).
  o kernel, fs: Introduce and use set_restart_fn() and arch_set_restart_data()
    (bsc#1191713).
  o kernel, hrtimer: Move copyout of remaining time to do_nanosleep() (bsc#
    1191713).
  o kernel, hrtimer_nanosleep(): Pass rmtp in restart_block (bsc#1191713).
  o kernel/locking/mutex.c: remove caller signal_pending branch predictions
    (bsc#1050549).
  o lib: iov_iter_fault_in_readable() should do nothing in xarray case (bsc#
    1191579).
  o locking/mutex: clear MUTEX_FLAGS if wait_list is empty due to signal
    (git-fixes).
  o locking/pvqspinlock/x86: Use LOCK_PREFIX in __pv_queued_spin_unlock()
    assembly code (bsc#1050549).
  o net: cdc_eem: fix tx fixup skb leak (git-fixes).
  o net: cdc_ncm: correct overhead in delayed_ndp_size (git-fixes).
  o net: cdc_ncm: use tasklet_init() for tasklet_struct init (git-fixes).
  o net: hso: add failure handler for add_net_device (git-fixes).
  o net: hso: fix NULL-deref on disconnect regression (git-fixes).
  o net: hso: fix null-ptr-deref during tty device unregistration (git-fixes).
  o net: hso: remove redundant unused variable dev (git-fixes).
  o net: ipv6: Discard next-hop MTU less than minimum link MTU (bsc#1191241).
  o net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#
    1191801).
  o net: usb: Fix uninit-was-stored issue in asix_read_phy_addr() (git-fixes).
  o net: usb: qmi_wwan: added support for Thales Cinterion PLSx3 modem family
    (git-fixes).
  o net: usb: qmi_wwan: support ZTE P685M modem (git-fixes).
  o net_sched: cls_route: remove the right filter from hashtable
    (networking-stable-20_03_28).
  o netfilter: Drop fragmented ndisc packets assembled in netfilter
    (git-fixes).
  o objtool: Don't fail on missing symbol table (bsc#1192379).
  o ocfs2: drop acl cache for directories too (bsc#1191667).
  o ocfs2: fix data corruption after conversion from inline format (bsc#
    1190795).
  o ocfs2: Fix data corruption on truncate (bsc#1190795).
  o ocfs2: do not zero pages beyond i_size (bsc#1190795).
  o powerpc/64s: Fix crashes when toggling entry flush barrier
  o powerpc/bpf: Fix BPF_MOD when imm == 1 (bsc#1065729).
  o powerpc/bpf: Fix BPF_SUB when imm == 0x80000000 (bsc#1065729).
  o powerpc/bpf: Use bctrl for making function calls (bsc#1065729).
  o powerpc/lib: Fix emulate_step() std test (bsc#1065729).
  o powerpc/pseries: Fix build error when NUMA=n (bsc#1190620 ltc#194498
    git-fixes).
  o powerpc/xive: Discard disabled interrupts in get_irqchip_state() (bsc#
    1085030 git-fixes).
  o pseries/eeh: Fix the kdump kernel crash during eeh_pseries_init
    (git-fixes).
  o s390x: Turn off CONFIG_NUMA_EMU (jsc#SLE-11600).
  o scsi: lpfc: Allow PLOGI retry if previous PLOGI was aborted (bsc#1192145).
  o scsi: lpfc: Allow fabric node recovery if recovery is in progress before
    devloss (bsc#1192145).
  o scsi: lpfc: Correct sysfs reporting of loop support after SFP status change
    (bsc#1192145).
  o scsi: lpfc: Fix crash when nvmet transport calls host_release (bsc#
    1192145).
  o scsi: lpfc: Fix link down processing to address NULL pointer dereference
    (bsc#1192145).
  o scsi: lpfc: Fix memory overwrite during FC-GS I/O abort handling (bsc#
    1191349).
  o scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine (bsc#1192145).
  o scsi: lpfc: Revert LOG_TRACE_EVENT back to LOG_INIT prior to
    driver_resource_setup() (bsc#1192145).
  o scsi: lpfc: Update lpfc version to 14.0.0.3 (bsc#1192145).
  o scsi: lpfc: Wait for successful restart of SLI3 adapter during host
    sg_reset (bsc#1192145).
  o scsi: qla2xxx: Add debug print of 64G link speed (bsc#1190941).
  o scsi: qla2xxx: Add host attribute to trigger MPI hang (bsc#1190941).
  o scsi: qla2xxx: Add support for mailbox passthru (bsc#1190941).
  o scsi: qla2xxx: Adjust request/response queue size for 28xx (bsc#1190941).
  o scsi: qla2xxx: Call process_response_queue() in Tx path (bsc#1190941).
  o scsi: qla2xxx: Changes to support FCP2 Target (bsc#1190941).
  o scsi: qla2xxx: Changes to support kdump kernel (bsc#1190941).
  o scsi: qla2xxx: Changes to support kdump kernel for NVMe BFS (bsc#1190941).
  o scsi: qla2xxx: Check for firmware capability before creating QPair (bsc#
    1190941).
  o scsi: qla2xxx: Display 16G only as supported speeds for 3830c card (bsc#
    1190941).
  o scsi: qla2xxx: Do not call fc_block_scsi_eh() during bus reset (bsc#
    1190941).
  o scsi: qla2xxx: Fix NPIV create erroneous error (bsc#1190941).
  o scsi: qla2xxx: Fix NVMe retry (bsc#1190941).
  o scsi: qla2xxx: Fix NVMe session down detection (bsc#1190941).
  o scsi: qla2xxx: Fix NVMe | FCP personality change (bsc#1190941).
  o scsi: qla2xxx: Fix crash in NVMe abort path (bsc#1190941).
  o scsi: qla2xxx: Fix excessive messages during device logout (bsc#1190941).
  o scsi: qla2xxx: Fix hang during NVMe session tear down (bsc#1190941).
  o scsi: qla2xxx: Fix hang on NVMe command timeouts (bsc#1190941).
  o scsi: qla2xxx: Fix kernel crash when accessing port_speed sysfs file (bsc#
    1190941).
  o scsi: qla2xxx: Fix port type info (bsc#1190941).
  o scsi: qla2xxx: Fix unsafe removal from linked list (bsc#1190941).
  o scsi: qla2xxx: Fix use after free in eh_abort path (bsc#1190941).
  o scsi: qla2xxx: Move heartbeat handling from DPC thread to workqueue (bsc#
    1190941).
  o scsi: qla2xxx: Open-code qla2xxx_eh_device_reset() (bsc#1190941).
  o scsi: qla2xxx: Open-code qla2xxx_eh_target_reset() (bsc#1190941).
  o scsi: qla2xxx: Remove redundant initialization of pointer req (bsc#
    1190941).
  o scsi: qla2xxx: Restore initiator in dual mode (bsc#1190941).
  o scsi: qla2xxx: Show OS name and version in FDMI-1 (bsc#1190941).
  o scsi: qla2xxx: Suppress unnecessary log messages during login (bsc#
    1190941).
  o scsi: qla2xxx: Sync queue idx with queue_pair_map idx (bsc#1190941).
  o scsi: qla2xxx: Update version to 10.02.06.100-k (bsc#1190941).
  o scsi: qla2xxx: Update version to 10.02.06.200-k (bsc#1190941).
  o scsi: qla2xxx: Update version to 10.02.07.100-k (bsc#1190941).
  o scsi: qla2xxx: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#
    1190941).
  o scsi: qla2xxx: edif: Add N2N support for EDIF (bsc#1190941).
  o scsi: qla2xxx: edif: Do secure PLOGI when auth app is present (bsc#
    1190941).
  o scsi: qla2xxx: edif: Fix EDIF enable flag (bsc#1190941).
  o scsi: qla2xxx: edif: Fix returnvar.cocci warnings (bsc#1190941).
  o scsi: qla2xxx: edif: Fix stale session (bsc#1190941).
  o scsi: qla2xxx: edif: Reject AUTH ELS on session down (bsc#1190941).
  o scsi: qla2xxx: edif: Use link event to wake up app (bsc#1190941).
  o scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).
  o sctp: fully initialize v4 addr in some functions (bsc#1188563).
  o selinux: fix error initialization in inode_doinit_with_dentry()
    (git-fixes).
  o selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling
    (git-fxes).
  o smb2: fix use-after-free in smb2_ioctl_query_info() (bsc#1190317).
  o smb3: Add debug message for new file creation with idsfromsid mount option
    (bsc#1190317).
  o smb3: Add new parm "nodelete" (bsc#1190317).
  o smb3: Avoid Mid pending list corruption (bsc#1190317).
  o smb3: Call cifs reconnect from demultiplex thread (bsc#1190317).
  o smb3: Handle error case during offload read path (bsc#1190317).
  o smb3: add indatalen that can be a non-zero value to calculation of credit
    charge in smb2 ioctl (bsc#1190317).
  o smb3: add some missing definitions from MS-FSCC (bsc#1190317).
  o smb3: allow uid and gid owners to be set on create with idsfromsid mount
    option (bsc#1190317).
  o smb3: do not try to cache root directory if dir leases not supported (bsc#
    1190317).
  o smb3: fix access denied on change notify request to some servers (bsc#
    1190317).
  o smb3: fix cached file size problems in duplicate extents (reflink) (bsc#
    1190317).
  o smb3: fix incorrect number of credits when ioctl MaxOutputResponse > 64K
    (bsc#1190317).
  o smb3: fix possible access to uninitialized pointer to DACL (bsc#1190317).
  o smb3: fix stat when special device file and mounted with modefromsid (bsc#
    1190317).
  o smb3: fix unneeded error message on change notify (bsc#1190317).
  o smb3: limit noisy error (bsc#1190317).
  o smb3: minor update to compression header definitions (bsc#1190317).
  o smb3: prevent races updating CurrentMid (bsc#1190317).
  o smb3: rc uninitialized in one fallocate path (bsc#1190317).
  o smb3: remove static checker warning (bsc#1190317).
  o tcp/dccp: fix possible race __inet_lookup_established() (bsc#1180624).
  o tpm: ibmvtpm: Avoid error message when process gets signal while waiting
    (bsc#1065729).
  o uapi: nfnetlink_cthelper.h: fix userspace compilation error (git-fixes).
  o update structure definitions from updated protocol documentation (bsc#
    1190317).
  o usb-storage: Add quirk for ScanLogic SL11R-IDE older than 2.6c (git-fixes).
  o usb: hso: fix error handling code of hso_create_net_device (git-fixes).
  o usb: typec: tcpm: handle SRC_STARTUP state if cc changes (git-fixes).
  o usb: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes).
  o usb: xhci: dbc: Simplify error handling in 'xhci_dbc_alloc_requests()'
    (git-fixes).
  o usb: xhci: dbc: Use GFP_KERNEL instead of GFP_ATOMIC in
    'xhci_dbc_alloc_requests()' (git-fixes).
  o x86/reboot: Limit Dell Optiplex 990 quirk to early BIOS versions (bsc#
    1114648).
  o x86/resctrl: Free the ctrlval arrays when domain_setup_mon_state() fails
    (bsc#1114648).
  o xen: fix setting of max_pfn in shared_info (git-fixes).
  o xen: reset legacy rtc flag for PV domU (git-fixes).
  o xfs: Fixed non-directory creation in SGID directories introduced by
    CVE-2018-13405 patch (bsc#1190006).
  o xfs: always honor OWN_UNKNOWN rmap removal requests (bsc#1191500).
  o xfs: convert growfs AG header init to use buffer lists (bsc#1191500).
  o xfs: factor ag btree root block initialisation (bsc#1191500).
  o xfs: factor out AG header initialisation from growfs core (bsc#1191500).
  o xfs: fix check on struct_version for versions 4 or greater (bsc#1191500,
    git-fixes).
  o xfs: fix string handling in label get/set functions (bsc#1191500,
    git-fixes).
  o xfs: hoist xfs_fs_geometry to libxfs (bsc#1191500).
  o xfs: implement online get/set fs label (bsc#1191500).
  o xfs: make imaxpct changes in growfs separate (bsc#1191500).
  o xfs: move growfs core to libxfs (bsc#1191500).
  o xfs: one-shot cached buffers (bsc#1191500).
  o xfs: refactor the geometry structure filling function (bsc#1191500).
  o xfs: rework secondary superblock updates in growfs (bsc#1191500).
  o xfs: separate secondary sb update in growfs (bsc#1191500).
  o xfs: turn ag header initialisation into a table driven operation (bsc#
    1191500).
  o xfs: xfs_fsops: drop useless LIST_HEAD (bsc#1191500, git-fixes).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Real Time Extension 12-SP5:
    zypper in -t patch SUSE-SLE-RT-12-SP5-2021-3723=1

Package List:

  o SUSE Linux Enterprise Real Time Extension 12-SP5 (x86_64):
       cluster-md-kmp-rt-4.12.14-10.65.1
       cluster-md-kmp-rt-debuginfo-4.12.14-10.65.1
       dlm-kmp-rt-4.12.14-10.65.1
       dlm-kmp-rt-debuginfo-4.12.14-10.65.1
       gfs2-kmp-rt-4.12.14-10.65.1
       gfs2-kmp-rt-debuginfo-4.12.14-10.65.1
       kernel-rt-4.12.14-10.65.1
       kernel-rt-base-4.12.14-10.65.1
       kernel-rt-base-debuginfo-4.12.14-10.65.1
       kernel-rt-debuginfo-4.12.14-10.65.1
       kernel-rt-debugsource-4.12.14-10.65.1
       kernel-rt-devel-4.12.14-10.65.1
       kernel-rt-devel-debuginfo-4.12.14-10.65.1
       kernel-rt_debug-4.12.14-10.65.1
       kernel-rt_debug-debuginfo-4.12.14-10.65.1
       kernel-rt_debug-debugsource-4.12.14-10.65.1
       kernel-rt_debug-devel-4.12.14-10.65.1
       kernel-rt_debug-devel-debuginfo-4.12.14-10.65.1
       kernel-syms-rt-4.12.14-10.65.1
       ocfs2-kmp-rt-4.12.14-10.65.1
       ocfs2-kmp-rt-debuginfo-4.12.14-10.65.1
  o SUSE Linux Enterprise Real Time Extension 12-SP5 (noarch):
       kernel-devel-rt-4.12.14-10.65.1
       kernel-source-rt-4.12.14-10.65.1


References:

  o https://www.suse.com/security/cve/CVE-2018-13405.html
  o https://www.suse.com/security/cve/CVE-2021-33033.html
  o https://www.suse.com/security/cve/CVE-2021-34556.html
  o https://www.suse.com/security/cve/CVE-2021-3542.html
  o https://www.suse.com/security/cve/CVE-2021-35477.html
  o https://www.suse.com/security/cve/CVE-2021-3655.html
  o https://www.suse.com/security/cve/CVE-2021-3715.html
  o https://www.suse.com/security/cve/CVE-2021-37159.html
  o https://www.suse.com/security/cve/CVE-2021-3760.html
  o https://www.suse.com/security/cve/CVE-2021-3772.html
  o https://www.suse.com/security/cve/CVE-2021-41864.html
  o https://www.suse.com/security/cve/CVE-2021-42008.html
  o https://www.suse.com/security/cve/CVE-2021-42252.html
  o https://www.suse.com/security/cve/CVE-2021-42739.html
  o https://bugzilla.suse.com/1050549
  o https://bugzilla.suse.com/1065729
  o https://bugzilla.suse.com/1085030
  o https://bugzilla.suse.com/1094840
  o https://bugzilla.suse.com/1114648
  o https://bugzilla.suse.com/1180624
  o https://bugzilla.suse.com/1184673
  o https://bugzilla.suse.com/1186063
  o https://bugzilla.suse.com/1186109
  o https://bugzilla.suse.com/1188563
  o https://bugzilla.suse.com/1188601
  o https://bugzilla.suse.com/1188983
  o https://bugzilla.suse.com/1188985
  o https://bugzilla.suse.com/1190006
  o https://bugzilla.suse.com/1190067
  o https://bugzilla.suse.com/1190317
  o https://bugzilla.suse.com/1190349
  o https://bugzilla.suse.com/1190351
  o https://bugzilla.suse.com/1190479
  o https://bugzilla.suse.com/1190620
  o https://bugzilla.suse.com/1190795
  o https://bugzilla.suse.com/1190941
  o https://bugzilla.suse.com/1191241
  o https://bugzilla.suse.com/1191315
  o https://bugzilla.suse.com/1191317
  o https://bugzilla.suse.com/1191349
  o https://bugzilla.suse.com/1191450
  o https://bugzilla.suse.com/1191452
  o https://bugzilla.suse.com/1191455
  o https://bugzilla.suse.com/1191500
  o https://bugzilla.suse.com/1191579
  o https://bugzilla.suse.com/1191628
  o https://bugzilla.suse.com/1191662
  o https://bugzilla.suse.com/1191667
  o https://bugzilla.suse.com/1191713
  o https://bugzilla.suse.com/1191801
  o https://bugzilla.suse.com/1192145
  o https://bugzilla.suse.com/1192379


- --------------------------------------------------------------------------------


SUSE Security Update: Security update for the Linux Kernel (Live Patch 14 for
SLE 15 SP2)

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:3712-1
Rating:            important
References:        #1191318
Cross-References:  CVE-2021-41864
Affected Products:
                   SUSE Linux Enterprise Module for Live Patching 15-SP2
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for the Linux Kernel 5.3.18-24_67 fixes one issue.
The following security issue was fixed:

  o CVE-2021-41864: Fixed an integer overflow with a resultant out-of-bounds
    write in prealloc_elems_and_freelist in kernel/bpf/stackmap.c (bsc#
    1191318).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Module for Live Patching 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2021-3712=1
    SUSE-SLE-Module-Live-Patching-15-SP2-2021-3714=1
    SUSE-SLE-Module-Live-Patching-15-SP2-2021-3715=1
    SUSE-SLE-Module-Live-Patching-15-SP2-2021-3716=1
    SUSE-SLE-Module-Live-Patching-15-SP2-2021-3717=1

Package List:

  o SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le s390x
    x86_64):
       kernel-livepatch-5_3_18-24_67-default-6-2.2
       kernel-livepatch-5_3_18-24_67-default-debuginfo-6-2.2
       kernel-livepatch-5_3_18-24_70-default-6-2.2
       kernel-livepatch-5_3_18-24_70-default-debuginfo-6-2.2
       kernel-livepatch-5_3_18-24_75-default-5-2.2
       kernel-livepatch-5_3_18-24_75-default-debuginfo-5-2.2
       kernel-livepatch-5_3_18-24_78-default-4-2.2
       kernel-livepatch-5_3_18-24_78-default-debuginfo-4-2.2
       kernel-livepatch-5_3_18-24_83-default-2-2.2
       kernel-livepatch-5_3_18-24_83-default-debuginfo-2-2.2
       kernel-livepatch-SLE15-SP2_Update_14-debugsource-6-2.2
       kernel-livepatch-SLE15-SP2_Update_16-debugsource-6-2.2
       kernel-livepatch-SLE15-SP2_Update_17-debugsource-5-2.2
       kernel-livepatch-SLE15-SP2_Update_18-debugsource-4-2.2
       kernel-livepatch-SLE15-SP2_Update_19-debugsource-2-2.2


References:

  o https://www.suse.com/security/cve/CVE-2021-41864.html
  o https://bugzilla.suse.com/1191318


- --------------------------------------------------------------------------------


SUSE Security Update: Security update for the Linux Kernel (Live Patch 15 for
SLE 15 SP2)

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:3710-1
Rating:            important
References:        #1190432 #1191318
Cross-References:  CVE-2021-3752 CVE-2021-41864
Affected Products:
                   SUSE Linux Enterprise Module for Live Patching 15-SP2
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 5.3.18-24_53_4 fixes several issues.
The following security issues were fixed:

  o CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module
    (bsc#1190432).
  o CVE-2021-41864: Fixed an integer overflow with a resultant out-of-bounds
    write in prealloc_elems_and_freelist in kernel/bpf/stackmap.c (bsc#
    1191318).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Module for Live Patching 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2021-3706=1
    SUSE-SLE-Module-Live-Patching-15-SP2-2021-3707=1
    SUSE-SLE-Module-Live-Patching-15-SP2-2021-3708=1
    SUSE-SLE-Module-Live-Patching-15-SP2-2021-3709=1
    SUSE-SLE-Module-Live-Patching-15-SP2-2021-3710=1
    SUSE-SLE-Module-Live-Patching-15-SP2-2021-3711=1
    SUSE-SLE-Module-Live-Patching-15-SP2-2021-3713=1

Package List:

  o SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le s390x
    x86_64):
       kernel-livepatch-5_3_18-24_37-default-14-2.2
       kernel-livepatch-5_3_18-24_37-default-debuginfo-14-2.2
       kernel-livepatch-5_3_18-24_43-default-13-2.2
       kernel-livepatch-5_3_18-24_43-default-debuginfo-13-2.2
       kernel-livepatch-5_3_18-24_46-default-13-2.2
       kernel-livepatch-5_3_18-24_46-default-debuginfo-13-2.2
       kernel-livepatch-5_3_18-24_52-default-11-2.2
       kernel-livepatch-5_3_18-24_52-default-debuginfo-11-2.2
       kernel-livepatch-5_3_18-24_53_4-default-6-2.2
       kernel-livepatch-5_3_18-24_53_4-default-debuginfo-6-2.2
       kernel-livepatch-5_3_18-24_61-default-8-2.2
       kernel-livepatch-5_3_18-24_61-default-debuginfo-8-2.2
       kernel-livepatch-5_3_18-24_64-default-8-2.2
       kernel-livepatch-5_3_18-24_64-default-debuginfo-8-2.2
       kernel-livepatch-SLE15-SP2_Update_11-debugsource-11-2.2
       kernel-livepatch-SLE15-SP2_Update_12-debugsource-8-2.2
       kernel-livepatch-SLE15-SP2_Update_13-debugsource-8-2.2
       kernel-livepatch-SLE15-SP2_Update_15-debugsource-6-2.2
       kernel-livepatch-SLE15-SP2_Update_7-debugsource-14-2.2
       kernel-livepatch-SLE15-SP2_Update_8-debugsource-13-2.2
       kernel-livepatch-SLE15-SP2_Update_9-debugsource-13-2.2


References:

  o https://www.suse.com/security/cve/CVE-2021-3752.html
  o https://www.suse.com/security/cve/CVE-2021-41864.html
  o https://bugzilla.suse.com/1190432
  o https://bugzilla.suse.com/1191318


- --------------------------------------------------------------------------------


SUSE Security Update: Security update for the Linux Kernel (Live Patch 16 for
SLE 12 SP5)

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:3684-1
Rating:            important
References:        #1190432 #1191318 #1192042
Cross-References:  CVE-2021-0935 CVE-2021-3752 CVE-2021-41864
Affected Products:
                   SUSE Linux Enterprise Module for Live Patching 15-SP1
                   SUSE Linux Enterprise Module for Live Patching 15
                   SUSE Linux Enterprise Live Patching 12-SP5
                   SUSE Linux Enterprise Live Patching 12-SP4
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for the Linux Kernel 4.12.14-122_63 fixes several issues.
The following security issues were fixed:

  o CVE-2021-0935: Fixed use after free that could lead to local escalation of
    privilege in ip6_xmit of ip6_output.c (bsc#1192042).
  o CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module
    (bsc#1190432).
  o CVE-2021-41864: Fixed an integer overflow with a resultant out-of-bounds
    write in prealloc_elems_and_freelist in kernel/bpf/stackmap.c (bsc#
    1191318).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Module for Live Patching 15-SP1:
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2021-3697=1
    SUSE-SLE-Module-Live-Patching-15-SP1-2021-3698=1
    SUSE-SLE-Module-Live-Patching-15-SP1-2021-3699=1
    SUSE-SLE-Module-Live-Patching-15-SP1-2021-3700=1
    SUSE-SLE-Module-Live-Patching-15-SP1-2021-3701=1
    SUSE-SLE-Module-Live-Patching-15-SP1-2021-3702=1
    SUSE-SLE-Module-Live-Patching-15-SP1-2021-3703=1
    SUSE-SLE-Module-Live-Patching-15-SP1-2021-3704=1
    SUSE-SLE-Module-Live-Patching-15-SP1-2021-3705=1
  o SUSE Linux Enterprise Module for Live Patching 15:
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-2021-3693=1
    SUSE-SLE-Module-Live-Patching-15-2021-3694=1
    SUSE-SLE-Module-Live-Patching-15-2021-3695=1
    SUSE-SLE-Module-Live-Patching-15-2021-3696=1
  o SUSE Linux Enterprise Live Patching 12-SP5:
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2021-3681=1
    SUSE-SLE-Live-Patching-12-SP5-2021-3682=1
    SUSE-SLE-Live-Patching-12-SP5-2021-3683=1
    SUSE-SLE-Live-Patching-12-SP5-2021-3684=1
    SUSE-SLE-Live-Patching-12-SP5-2021-3685=1
    SUSE-SLE-Live-Patching-12-SP5-2021-3686=1
    SUSE-SLE-Live-Patching-12-SP5-2021-3687=1
    SUSE-SLE-Live-Patching-12-SP5-2021-3688=1
    SUSE-SLE-Live-Patching-12-SP5-2021-3689=1
    SUSE-SLE-Live-Patching-12-SP5-2021-3690=1
    SUSE-SLE-Live-Patching-12-SP5-2021-3691=1
  o SUSE Linux Enterprise Live Patching 12-SP4:
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP4-2021-3676=1
    SUSE-SLE-Live-Patching-12-SP4-2021-3677=1
    SUSE-SLE-Live-Patching-12-SP4-2021-3678=1
    SUSE-SLE-Live-Patching-12-SP4-2021-3679=1
    SUSE-SLE-Live-Patching-12-SP4-2021-3680=1

Package List:

  o SUSE Linux Enterprise Module for Live Patching 15-SP1 (ppc64le x86_64):
       kernel-livepatch-4_12_14-197_67-default-14-2.2
       kernel-livepatch-4_12_14-197_72-default-13-2.2
       kernel-livepatch-4_12_14-197_75-default-13-2.2
       kernel-livepatch-4_12_14-197_78-default-13-2.2
       kernel-livepatch-4_12_14-197_83-default-12-2.2
       kernel-livepatch-4_12_14-197_86-default-11-2.2
       kernel-livepatch-4_12_14-197_89-default-8-2.2
       kernel-livepatch-4_12_14-197_92-default-7-2.2
       kernel-livepatch-4_12_14-197_99-default-5-2.2
  o SUSE Linux Enterprise Module for Live Patching 15 (ppc64le x86_64):
       kernel-livepatch-4_12_14-150_63-default-14-2.2
       kernel-livepatch-4_12_14-150_63-default-debuginfo-14-2.2
       kernel-livepatch-4_12_14-150_69-default-11-2.2
       kernel-livepatch-4_12_14-150_69-default-debuginfo-11-2.2
       kernel-livepatch-4_12_14-150_72-default-8-2.2
       kernel-livepatch-4_12_14-150_72-default-debuginfo-8-2.2
       kernel-livepatch-4_12_14-150_75-default-5-2.2
       kernel-livepatch-4_12_14-150_75-default-debuginfo-5-2.2
  o SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64):
       kgraft-patch-4_12_14-122_51-default-15-2.2
       kgraft-patch-4_12_14-122_54-default-13-2.2
       kgraft-patch-4_12_14-122_57-default-13-2.2
       kgraft-patch-4_12_14-122_63-default-11-2.2
       kgraft-patch-4_12_14-122_66-default-9-2.2
       kgraft-patch-4_12_14-122_71-default-8-2.2
       kgraft-patch-4_12_14-122_74-default-6-2.2
       kgraft-patch-4_12_14-122_77-default-6-2.2
       kgraft-patch-4_12_14-122_80-default-5-2.2
       kgraft-patch-4_12_14-122_83-default-4-2.2
       kgraft-patch-4_12_14-122_88-default-2-2.2
  o SUSE Linux Enterprise Live Patching 12-SP4 (ppc64le s390x x86_64):
       kgraft-patch-4_12_14-95_65-default-13-2.2
       kgraft-patch-4_12_14-95_68-default-12-2.2
       kgraft-patch-4_12_14-95_71-default-11-2.2
       kgraft-patch-4_12_14-95_77-default-7-2.2
       kgraft-patch-4_12_14-95_80-default-5-2.2


References:

  o https://www.suse.com/security/cve/CVE-2021-0935.html
  o https://www.suse.com/security/cve/CVE-2021-3752.html
  o https://www.suse.com/security/cve/CVE-2021-41864.html
  o https://bugzilla.suse.com/1190432
  o https://bugzilla.suse.com/1191318
  o https://bugzilla.suse.com/1192042


- --------------------------------------------------------------------------------


SUSE Security Update: Security update for the Linux Kernel (Live Patch 24 for
SLE 12 SP5)

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:3692-1
Rating:            important
References:        #1191318 #1192042
Cross-References:  CVE-2021-0935 CVE-2021-41864
Affected Products:
                   SUSE Linux Enterprise Live Patching 12-SP5
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 4.12.14-122_91 fixes several issues.
The following security issues were fixed:

  o CVE-2021-0935: Fixed use after free that could lead to local escalation of
    privilege in ip6_xmit of ip6_output.c (bsc#1192042).
  o CVE-2021-41864: Fixed an integer overflow with a resultant out-of-bounds
    write in prealloc_elems_and_freelist in kernel/bpf/stackmap.c (bsc#
    1191318).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Live Patching 12-SP5:
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2021-3692=1

Package List:

  o SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64):
       kgraft-patch-4_12_14-122_91-default-2-2.2


References:

  o https://www.suse.com/security/cve/CVE-2021-0935.html
  o https://www.suse.com/security/cve/CVE-2021-41864.html
  o https://bugzilla.suse.com/1191318
  o https://bugzilla.suse.com/1192042


- --------------------------------------------------------------------------------


SUSE Security Update: Security update for the Linux Kernel (Live 

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:3718-1
Rating:            important
References:        #1191318 #1191646
Cross-References:  CVE-2021-34866 CVE-2021-41864
Affected Products:
                   SUSE Linux Enterprise Module for Live Patching 15-SP3
______________________________________________________________________________

Patch 3 for
SLE 15 SP3)

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 5.3.18-59_13 fixes several issues.
The following security issues were fixed:

  o CVE-2021-34866: Fixed possible eBPF Type Confusion privilege escalation
    vulnerability via eBPF type confusion (bsc#1191646).
  o CVE-2021-41864: Fixed an integer overflow with a resultant out-of-bounds
    write in prealloc_elems_and_freelist in kernel/bpf/stackmap.c (bsc#
    1191318).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Module for Live Patching 15-SP3:
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2021-3718=1
    SUSE-SLE-Module-Live-Patching-15-SP3-2021-3719=1

Package List:

  o SUSE Linux Enterprise Module for Live Patching 15-SP3 (ppc64le s390x
    x86_64):
       kernel-livepatch-5_3_18-59_13-default-6-2.2
       kernel-livepatch-5_3_18-59_13-default-debuginfo-6-2.2
       kernel-livepatch-5_3_18-59_24-default-2-2.2
       kernel-livepatch-5_3_18-59_24-default-debuginfo-2-2.2
       kernel-livepatch-SLE15-SP3_Update_3-debugsource-6-2.2
       kernel-livepatch-SLE15-SP3_Update_6-debugsource-2-2.2


References:

  o https://www.suse.com/security/cve/CVE-2021-34866.html
  o https://www.suse.com/security/cve/CVE-2021-41864.html
  o https://bugzilla.suse.com/1191318
  o https://bugzilla.suse.com/1191646

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=aNmI
-----END PGP SIGNATURE-----