-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.4117
                   Security updates for the Linux Kernel
                              7 December 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           linux kernel
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Root Compromise           -- Existing Account      
                   Increased Privileges      -- Remote/Unauthenticated
                   Overwrite Arbitrary Files -- Existing Account      
                   Create Arbitrary Files    -- Existing Account      
                   Denial of Service         -- Remote/Unauthenticated
                   Access Confidential Data  -- Remote/Unauthenticated
                   Reduced Security          -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-43389 CVE-2021-42739 CVE-2021-42008
                   CVE-2021-40490 CVE-2021-38204 CVE-2021-38198
                   CVE-2021-38160 CVE-2021-37576 CVE-2021-37159
                   CVE-2021-35477 CVE-2021-34981 CVE-2021-34556
                   CVE-2021-33033 CVE-2021-31916 CVE-2021-20322
                   CVE-2021-20265 CVE-2021-3896 CVE-2021-3772
                   CVE-2021-3760 CVE-2021-3753 CVE-2021-3752
                   CVE-2021-3732 CVE-2021-3715 CVE-2021-3679
                   CVE-2021-3659 CVE-2021-3655 CVE-2021-3653
                   CVE-2021-3640 CVE-2021-3542 CVE-2021-0941
                   CVE-2020-14305 CVE-2020-12655 CVE-2020-3702
                   CVE-2020-0429 CVE-2018-16882 CVE-2018-13405
                   CVE-2017-5753  

Reference:         ESB-2021.4089

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2021/suse-su-20213929-1
   https://www.suse.com/support/update/announcement/2021/suse-su-20213933-1
   https://www.suse.com/support/update/announcement/2021/suse-su-20213935-1
   https://www.suse.com/support/update/announcement/2021/suse-su-20213941-1

Comment: This bulletin contains four (4) SUSE security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:3929-1
Rating:            important
References:        #1068032 #1087082 #1098425 #1100416 #1119934 #1129735
                   #1171217 #1171420 #1173346 #1176724 #1183089 #1184673
                   #1186109 #1186390 #1188172 #1188325 #1188563 #1188601
                   #1188838 #1188876 #1188983 #1188985 #1189057 #1189262
                   #1189291 #1189399 #1189706 #1190023 #1190025 #1190067
                   #1190117 #1190159 #1190276 #1190349 #1190351 #1190601
                   #1191193 #1191315 #1191790 #1191958 #1191961 #1192781
                   #802154
Cross-References:  CVE-2017-5753 CVE-2018-13405 CVE-2018-16882 CVE-2020-0429
                   CVE-2020-12655 CVE-2020-14305 CVE-2020-3702 CVE-2021-20265
                   CVE-2021-20322 CVE-2021-31916 CVE-2021-33033 CVE-2021-34556
                   CVE-2021-34981 CVE-2021-3542 CVE-2021-35477 CVE-2021-3640
                   CVE-2021-3653 CVE-2021-3655 CVE-2021-3659 CVE-2021-3679
                   CVE-2021-3715 CVE-2021-37159 CVE-2021-3732 CVE-2021-3752
                   CVE-2021-3753 CVE-2021-37576 CVE-2021-3760 CVE-2021-3772
                   CVE-2021-38160 CVE-2021-38198 CVE-2021-38204 CVE-2021-3896
                   CVE-2021-40490 CVE-2021-42008 CVE-2021-42739 CVE-2021-43389
Affected Products:
                   SUSE Linux Enterprise Server 12-SP2-BCL
______________________________________________________________________________

An update that solves 36 vulnerabilities and has 7 fixes is now available.

Description:

The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various
security and bugfixes.
The following security bugs were fixed:

  o Unprivileged BPF has been disabled by default to reduce attack surface as
    too many security issues have happened in the past (jsc#SLE-22573)


You can reenable via systemctl setting /proc/sys/kernel/
unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

  o CVE-2017-5753: Systems with microprocessors utilizing speculative execution
    and branch prediction may have allowed unauthorized disclosure of
    information to an attacker with local user access via a side-channel
    analysis (bnc#1068032). Additional spectrev1 fixes were added to the eBPF
    code.
  o CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local
    users to create files with an unintended group ownership, in a scenario
    where a directory is SGID to a certain group and is writable by a user who
    is not a member of that group. Here, the non-member can trigger creation of
    a plain file whose group ownership is that group. The intended behavior was
    that the non-member can trigger creation of a directory (but not a plain
    file) whose group ownership is that group. The non-member can escalate
    privileges by making the plain file executable and SGID (bnc#1087082 bnc#
    1100416 bnc#1129735).
  o CVE-2018-16882: A use-after-free issue was found in the way the KVM
    hypervisor processed posted interrupts when nested(=1) virtualization is
    enabled. In nested_get_vmcs12_pages(), in case of an error while processing
    posted interrupt address, it unmaps the 'pi_desc_page' without resetting
    'pi_desc' descriptor address, which is later used in pi_test_and_clear_on
    (). A guest user/process could use this flaw to crash the host kernel
    resulting in DoS or potentially gain privileged access to a system. Kernel
    versions and are vulnerable (bnc#1119934).
  o CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c,
    there is possible memory corruption due to a use after free. This could
    lead to local escalation of privilege with System execution privileges
    needed. User interaction is not needed for exploitation (bnc#1176724).
  o CVE-2020-12655: An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/
    xfs_alloc.c in the Linux kernel Attackers may trigger a sync of excessive
    duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767
    (bnc#1171217).
  o CVE-2020-14305: An out-of-bounds memory write flaw was found in how the
    Linux kernel's Voice Over IP H.323 connection tracking functionality
    handled connections on ipv6 port 1720. This flaw allowed an unauthenticated
    remote user to crash the system, causing a denial of service. The highest
    threat from this vulnerability is to confidentiality, integrity, as well as
    system availability (bnc#1173346).
  o CVE-2020-3702: Specifically timed and handcrafted traffic can cause
    internal errors in a WLAN device that lead to improper layer 2 Wi-Fi
    encryption with a consequent possibility of information disclosure over the
    air for a discrete set of traffic (bnc#1191193).
  o CVE-2021-20265: A flaw was found in the way memory resources were freed in
    the unix_stream_recvmsg function in the Linux kernel when a signal was
    pending. This flaw allowed an unprivileged local user to crash the system
    by exhausting available memory. The highest threat from this vulnerability
    is to system availability (bnc#1183089).
  o CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in
    list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in
    the Linux kernel A bound check failure allowed an attacker with special
    user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory
    leading to a system crash or a leak of internal kernel information. The
    highest threat from this vulnerability is to system availability (bnc#
    1192781).
  o CVE-2021-33033: The Linux kernel has a use-after-free in cipso_v4_genopt in
    net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI
    definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an
    arbitrary value (bnc#1186109 bnc#1186390 bnc#1188876).
  o CVE-2021-34556: In the Linux kernel through 5.13.7, an unprivileged BPF
    program can obtain sensitive information from kernel memory via a
    Speculative Store Bypass side-channel attack because the protection
    mechanism neglects the possibility of uninitialized memory locations on the
    BPF stack (bnc#1188983).
  o CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device
    fails (bsc#1191961).
  o CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).
  o CVE-2021-35477: In the Linux kernel through 5.13.7, an unprivileged BPF
    program can obtain sensitive information from kernel memory via a
    Speculative Store Bypass side-channel attack because a certain preempting
    store operation did not necessarily occur before a store operation that has
    an attacker-controlled value (bnc#1188985).
  o CVE-2021-3640: Fixed a Use-After-Free vulnerability in function
    sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
  o CVE-2021-3653: A flaw was found in the KVM's AMD code for supporting SVM
    nested virtualization. The flaw occurs when processing the VMCB (virtual
    machine control block) provided by the L1 guest to spawn/handle a nested
    guest (L2). Due to improper validation of the "int_ctl" field, this issue
    could allow a malicious L1 to enable AVIC support (Advanced Virtual
    Interrupt Controller) for the L2 guest. As a result, the L2 guest would be
    allowed to read/write physical pages of the host, resulting in a crash of
    the entire system, leak of sensitive data or potential guest-to-host
    escape. (bnc#1189399).
  o CVE-2021-3655: A vulnerability was found in the Linux kernel in versions
    prior to v5.14-rc1. Missing size validations on inbound SCTP packets may
    have allowed the kernel to read uninitialized memory (bnc#1188563).
  o CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net
    /mac802154/llsec.c (bsc#1188876).
  o CVE-2021-3679: A lack of CPU resource in the tracing module functionality
    was found in the way user uses trace ring buffer in a specific way. Only
    privileged local users (with CAP_SYS_ADMIN capability) could use this flaw
    to starve the resources causing denial of service (bnc#1189057).
  o CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c in the Linux
    kernel calls unregister_netdev without checking for the NETREG_REGISTERED
    state, leading to a use-after-free and a double free (bnc#1188601).
  o CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/
    cls_route.c (bsc#1190349).
  o CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can
    reveal files (bsc#1189706).
  o CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's
    bluetooth module. (bsc#1190023)
  o CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#
    1190025).
  o CVE-2021-37576: arch/powerpc/kvm/book3s_rtas.c on the powerpc platform
    allowed KVM guest OS users to cause host OS memory corruption via
    rtas_args.nargs, aka CID-f62f3c20647e (bnc#1188838 bnc#1190276).
  o CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev->
    rf_conn_info object (bsc#1190067).
  o CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
  o CVE-2021-38160: Data corruption or loss could be triggered by an untrusted
    device that supplies a buf->len value exceeding the buffer size in drivers/
    char/virtio_console.c (bsc#1190117)
  o CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computed the
    access permissions of a shadow page, leading to a missing guest protection
    page fault (bnc#1189262).
  o CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate
    attackers to cause a denial of service (use-after-free and panic) by
    removing a MAX-3421 USB device in certain situations (bnc#1189291).
  o CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers
    /isdn/capi/kcapi.c (bsc#1191958).
  o CVE-2021-40490: A race condition was discovered in
    ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the
    Linux kernel (bnc#1190159)
  o CVE-2021-42008: The decode_data function in drivers/net/hamradio/6pack.c in
    the Linux kernel has a slab out-of-bounds write. Input from a process that
    has the CAP_NET_ADMIN capability can lead to root access (bnc#1191315).
  o CVE-2021-42739: The firewire subsystem in the Linux kernel has a buffer
    overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/
    firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bnc#
    1184673).
  o CVE-2021-43389: An issue was discovered in the Linux kernel There was an
    array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/
    isdn/capi/kcapi.c (bnc#1191958).
  o - ipv4: make exception cache less predictible (bsc#1191790,
    CVE-2021-20322).


The following non-security bugs were fixed:

  o Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
  o bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22918)
  o bpf: Disallow unprivileged bpf by default (jsc#SLE-22918).
  o bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#
    1098425).
  o btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway
    balance (bsc#1188325).
  o btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#
    1188325).
  o btrfs: relocation: fix reloc_root lifespan and access (bsc#1188325).
  o config: disable unprivileged BPF by default (jsc#SLE-22918) Backport of
    mainline commit 8a03e56b253e ("bpf: Disallow unprivileged bpf by default")
    only changes kconfig default, used e.g. for "make oldconfig" when the
    config option is missing, but does not update our kernel configs used for
    build. Update also these to make sure unprivileged BPF is really disabled
    by default.
  o kABI: protect struct bpf_map (kabi).
  o s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (bsc#1190601).
  o s390/bpf: Fix branch shortening during codegen pass (bsc#1190601).
  o s390/bpf: Fix optimizing out zero-extensions (bsc#1190601).
  o s390/bpf: Wrap JIT macro parameter usages in parentheses (bsc#1190601).
  o s390: bpf: implement jitting of BPF_ALU | BPF_ARSH | BPF_* (bsc#1190601).
  o scsi: sg: add sg_remove_request in sg_write (bsc#1171420 CVE2020-12770).
  o sctp: check asoc peer.asconf_capable before processing asconf (bsc#
    1190351).
  o sctp: fully initialize v4 addr in some functions (bsc#1188563).
  o sctp: simplify addr copy (bsc#1188563).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Server 12-SP2-BCL:
    zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2021-3929=1

Package List:

  o SUSE Linux Enterprise Server 12-SP2-BCL (noarch):
       kernel-devel-4.4.121-92.161.1
       kernel-macros-4.4.121-92.161.1
       kernel-source-4.4.121-92.161.1
  o SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):
       kernel-default-4.4.121-92.161.1
       kernel-default-base-4.4.121-92.161.1
       kernel-default-base-debuginfo-4.4.121-92.161.1
       kernel-default-debuginfo-4.4.121-92.161.1
       kernel-default-debugsource-4.4.121-92.161.1
       kernel-default-devel-4.4.121-92.161.1
       kernel-syms-4.4.121-92.161.1


References:

  o https://www.suse.com/security/cve/CVE-2017-5753.html
  o https://www.suse.com/security/cve/CVE-2018-13405.html
  o https://www.suse.com/security/cve/CVE-2018-16882.html
  o https://www.suse.com/security/cve/CVE-2020-0429.html
  o https://www.suse.com/security/cve/CVE-2020-12655.html
  o https://www.suse.com/security/cve/CVE-2020-14305.html
  o https://www.suse.com/security/cve/CVE-2020-3702.html
  o https://www.suse.com/security/cve/CVE-2021-20265.html
  o https://www.suse.com/security/cve/CVE-2021-20322.html
  o https://www.suse.com/security/cve/CVE-2021-31916.html
  o https://www.suse.com/security/cve/CVE-2021-33033.html
  o https://www.suse.com/security/cve/CVE-2021-34556.html
  o https://www.suse.com/security/cve/CVE-2021-34981.html
  o https://www.suse.com/security/cve/CVE-2021-3542.html
  o https://www.suse.com/security/cve/CVE-2021-35477.html
  o https://www.suse.com/security/cve/CVE-2021-3640.html
  o https://www.suse.com/security/cve/CVE-2021-3653.html
  o https://www.suse.com/security/cve/CVE-2021-3655.html
  o https://www.suse.com/security/cve/CVE-2021-3659.html
  o https://www.suse.com/security/cve/CVE-2021-3679.html
  o https://www.suse.com/security/cve/CVE-2021-3715.html
  o https://www.suse.com/security/cve/CVE-2021-37159.html
  o https://www.suse.com/security/cve/CVE-2021-3732.html
  o https://www.suse.com/security/cve/CVE-2021-3752.html
  o https://www.suse.com/security/cve/CVE-2021-3753.html
  o https://www.suse.com/security/cve/CVE-2021-37576.html
  o https://www.suse.com/security/cve/CVE-2021-3760.html
  o https://www.suse.com/security/cve/CVE-2021-3772.html
  o https://www.suse.com/security/cve/CVE-2021-38160.html
  o https://www.suse.com/security/cve/CVE-2021-38198.html
  o https://www.suse.com/security/cve/CVE-2021-38204.html
  o https://www.suse.com/security/cve/CVE-2021-3896.html
  o https://www.suse.com/security/cve/CVE-2021-40490.html
  o https://www.suse.com/security/cve/CVE-2021-42008.html
  o https://www.suse.com/security/cve/CVE-2021-42739.html
  o https://www.suse.com/security/cve/CVE-2021-43389.html
  o https://bugzilla.suse.com/1068032
  o https://bugzilla.suse.com/1087082
  o https://bugzilla.suse.com/1098425
  o https://bugzilla.suse.com/1100416
  o https://bugzilla.suse.com/1119934
  o https://bugzilla.suse.com/1129735
  o https://bugzilla.suse.com/1171217
  o https://bugzilla.suse.com/1171420
  o https://bugzilla.suse.com/1173346
  o https://bugzilla.suse.com/1176724
  o https://bugzilla.suse.com/1183089
  o https://bugzilla.suse.com/1184673
  o https://bugzilla.suse.com/1186109
  o https://bugzilla.suse.com/1186390
  o https://bugzilla.suse.com/1188172
  o https://bugzilla.suse.com/1188325
  o https://bugzilla.suse.com/1188563
  o https://bugzilla.suse.com/1188601
  o https://bugzilla.suse.com/1188838
  o https://bugzilla.suse.com/1188876
  o https://bugzilla.suse.com/1188983
  o https://bugzilla.suse.com/1188985
  o https://bugzilla.suse.com/1189057
  o https://bugzilla.suse.com/1189262
  o https://bugzilla.suse.com/1189291
  o https://bugzilla.suse.com/1189399
  o https://bugzilla.suse.com/1189706
  o https://bugzilla.suse.com/1190023
  o https://bugzilla.suse.com/1190025
  o https://bugzilla.suse.com/1190067
  o https://bugzilla.suse.com/1190117
  o https://bugzilla.suse.com/1190159
  o https://bugzilla.suse.com/1190276
  o https://bugzilla.suse.com/1190349
  o https://bugzilla.suse.com/1190351
  o https://bugzilla.suse.com/1190601
  o https://bugzilla.suse.com/1191193
  o https://bugzilla.suse.com/1191315
  o https://bugzilla.suse.com/1191790
  o https://bugzilla.suse.com/1191958
  o https://bugzilla.suse.com/1191961
  o https://bugzilla.suse.com/1192781
  o https://bugzilla.suse.com/802154


- -------------------------------------------------------------------------------


SUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:3933-1
Rating:            important
References:        #1094840 #1133021 #1152489 #1169263 #1170269 #1188601
                   #1190523 #1190795 #1191790 #1191851 #1191958 #1191961
                   #1191980 #1192045 #1192229 #1192273 #1192328 #1192718
                   #1192740 #1192745 #1192750 #1192753 #1192781 #1192802
                   #1192896 #1192906 #1192918
Cross-References:  CVE-2021-0941 CVE-2021-20322 CVE-2021-31916 CVE-2021-34981
                   CVE-2021-37159 CVE-2021-43389
Affected Products:
                   SUSE MicroOS 5.0
                   SUSE Linux Enterprise Workstation Extension 15-SP2
                   SUSE Linux Enterprise Module for Live Patching 15-SP2
                   SUSE Linux Enterprise Module for Legacy Software 15-SP2
                   SUSE Linux Enterprise Module for Development Tools 15-SP2
                   SUSE Linux Enterprise Module for Basesystem 15-SP2
                   SUSE Linux Enterprise High Availability 15-SP2
______________________________________________________________________________

An update that solves 6 vulnerabilities, contains one feature and has 21 fixes
is now available.

Description:

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security
and bugfixes.

The following security bugs were fixed:

  o Unprivileged BPF has been disabled by default to reduce attack surface as
    too many security issues have happened in the past (jsc#SLE-22573)


You can reenable via systemctl setting /proc/sys/kernel/
unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

  o CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out
    of bounds read due to a use after free. This could lead to local escalation
    of privilege with System execution privileges needed. User interaction is
    not needed for exploitation (bnc#1192045).
  o CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in
    list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in
    the Linux kernel A bound check failure allowed an attacker with special
    user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory
    leading to a system crash or a leak of internal kernel information. The
    highest threat from this vulnerability is to system availability (bnc#
    1192781).
  o CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less
    predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
  o CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device
    fails (bsc#1191961).
  o CVE-2021-43389: There was an array-index-out-of-bounds flaw in the
    detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
  o CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called
    unregister_netdev without checking for the NETREG_REGISTERED state, leading
    to a use-after-free and a double free (bnc#1188601).


The following non-security bugs were fixed:

  o ABI: sysfs-kernel-slab: Document some stats (git-fixes).
  o ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).
  o ALSA: ua101: fix division by zero at probe (git-fixes).
  o ALSA: usb-audio: Add Audient iD14 to mixer map quirk table (git-fixes).
  o ALSA: usb-audio: Add Schiit Hel device to mixer map quirk table
    (git-fixes).
  o ASoC: cs42l42: Correct some register default values (git-fixes).
  o ASoC: cs42l42: Defer probe if request_threaded_irq() returns EPROBE_DEFER
    (git-fixes).
  o ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).
  o ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).
  o ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).
  o ASoC: rockchip: Use generic dmaengine code (git-fixes).
  o ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).
  o ath10k: fix control-message timeout (git-fixes).
  o ath10k: fix division by zero in send path (git-fixes).
  o ath10k: fix max antenna gain unit (git-fixes).
  o ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).
  o ath6kl: fix control-message timeout (git-fixes).
  o ath6kl: fix division by zero in send path (git-fixes).
  o ath9k: Fix potential interrupt storm on queue reset (git-fixes).
  o auxdisplay: ht16k33: Connect backlight to fbdev (git-fixes).
  o auxdisplay: ht16k33: Fix frame buffer device blanking (git-fixes).
  o auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string
    (git-fixes).
  o b43: fix a lower bounds test (git-fixes).
  o b43legacy: fix a lower bounds test (git-fixes).
  o Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).
  o Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).
  o bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22573)
  o bpf: Disallow unprivileged bpf by default (jsc#SLE-22573).
  o bpf: Fix potential race in tail call compatibility check (git-fixes).
  o btrfs: block-group: Rework documentation of check_system_chunk function
    (bsc#1192896).
  o btrfs: fix deadlock between chunk allocation and chunk btree modifications
    (bsc#1192896).
  o btrfs: fix memory ordering between normal and ordered work functions
    (git-fixes).
  o btrfs: update comments for chunk allocation -ENOSPC cases (bsc#1192896).
  o cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem
    (git-fixes).
  o config: disable unprivileged BPF by default (jsc#SLE-22573)
  o crypto: caam - disable pkc for non-E SoCs (git-fixes).
  o crypto: qat - detect PFVF collision after ACK (git-fixes).
  o crypto: qat - disregard spurious PFVF interrupts (git-fixes).
  o driver core: add a min_align_mask field to struct device_dma_parameters
    (bsc#1191851).
  o drm/amdgpu: fix warning for overflow check (git-fixes).
  o drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).
  o drm: prevent spectre issue in vmw_execbuf_ioctl (bsc#1192802).
  o drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).
  o drm/v3d: fix wait for TMU write combiner flush (git-fixes).
  o EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell (bsc#
    1152489).
  o exfat: fix erroneous discard when clear cluster bit (git-fixes).
  o exfat: handle wrong stream entry size in exfat_readdir() (git-fixes).
  o exfat: properly set s_time_gran (bsc#1192328).
  o exfat: truncate atimes to 2s granularity (bsc#1192328).
  o firmware/psci: fix application of sizeof to pointer (git-fixes).
  o fuse: fix page stealing (bsc#1192718).
  o genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).
  o gpio: mpc8xxx: Use 'devm_gpiochip_add_data()' to simplify the code and
    avoid a leak (git-fixes).
  o HID: u2fzero: clarify error check and length calculations (git-fixes).
  o HID: u2fzero: properly handle timeouts in usb_submit_urb (git-fixes).
  o hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).
  o hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).
  o hwmon: (pmbus/lm25066) Let compiler determine outer dimension of
    lm25066_coeff (git-fixes).
  o hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).
  o ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
  o ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).
  o ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).
  o ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).
  o iio: dac: ad5446: Fix ad5622_write() return value (git-fixes).
  o Input: elantench - fix misreporting trackpoint coordinates (bsc#1192918).
  o Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).
  o kABI: Fix kABI after 36950f2da1ea (bsc#1191851).
  o kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).
  o KVM: s390: extend kvm_s390_shadow_fault to return entry pointer (bsc#
    1133021).
  o KVM: s390: index kvm->arch.idle_mask by vcpu_idx (bsc#1133021).
  o KVM: s390: split kvm_s390_logical_to_effective (bsc#1133021).
  o KVM: s390: VSIE: correctly handle MVPG when in VSIE (bsc#1133021).
  o libertas: Fix possible memory leak in probe and disconnect (git-fixes).
  o libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).
  o media: cedrus: Fix SUNXI tile size calculation (git-fixes).
  o media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).
  o media: cxd2880-spi: Fix a null pointer dereference on error handling path
    (git-fixes).
  o media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable()
    (git-fixes).
  o media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).
  o media: em28xx: add missing em28xx_close_extension (git-fixes).
  o media: em28xx: Do not use ops->suspend if it is NULL (git-fixes).
  o media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).
  o media: ite-cir: IR receiver stop working after receive overflow
    (git-fixes).
  o media: mtk-vpu: Fix a resource leak in the error handling path of
    'mtk_vpu_probe()' (git-fixes).
  o media: mxl111sf: change mutex_init() location (git-fixes).
  o media: radio-wl1273: Avoid card name truncation (git-fixes).
  o media: si470x: Avoid card name truncation (git-fixes).
  o media: staging/intel-ipu3: css: Fix wrong size comparison imgu_css_fw_init
    (git-fixes).
  o media: TDA1997x: handle short reads of hdmi info frame (git-fixes).
  o media: tm6000: Avoid card name truncation (git-fixes).
  o media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).
  o media: v4l2-ioctl: S_CTRL output the right value (git-fixes).
  o memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe
    (git-fixes).
  o memstick: avoid out-of-range warning (git-fixes).
  o memstick: jmb38x_ms: use appropriate free function in jmb38x_ms_alloc_host
    () (git-fixes).
  o mmc: mxs-mmc: disable regulator on error and in the remove function
    (git-fixes).
  o mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).
  o mmc: sdhci-omap: Fix NULL pointer exception if regulator is not configured
    (git-fixes).
  o mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).
  o mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).
  o mwifiex: fix division by zero in fw download path (git-fixes).
  o mwifiex: Send DELBA requests according to spec (git-fixes).
  o net: dsa: felix: re-enable TX flow control in ocelot_port_flush()
    (git-fixes).
  o net: mscc: ocelot: fix hardware timestamp dequeue logic.
  o net: mscc: ocelot: warn when a PTP IRQ is raised for an unknown skb
    (git-fixes).
  o nvme-pci: set min_align_mask (bsc#1191851).
  o ocfs2: do not zero pages beyond i_size (bsc#1190795).
  o ocfs2: fix data corruption on truncate (bsc#1190795).
  o PCI: aardvark: Do not clear status bits of masked interrupts (git-fixes).
  o PCI: aardvark: Do not spam about PIO Response Status (git-fixes).
  o PCI: aardvark: Do not unmask unused interrupts (git-fixes).
  o PCI: aardvark: Fix checking for link up via LTSSM state (git-fixes).
  o PCI: aardvark: Fix reporting Data Link Layer Link Active (git-fixes).
  o PCI: aardvark: Fix return value of MSI domain .alloc() method (git-fixes).
  o PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG (git-fixes).
  o PCI/ACPI: Check for _OSC support in acpi_pci_osc_control_set() (bsc#
    1169263).
  o PCI/ACPI: Clarify message about _OSC failure (bsc#1169263).
  o PCI/ACPI: Move _OSC query checks to separate function (bsc#1169263).
  o PCI/ACPI: Move supported and control calculations to separate functions
    (bsc#1169263).
  o PCI/ACPI: Remove OSC_PCI_SUPPORT_MASKS and OSC_PCI_CONTROL_MASKS (bsc#
    1169263).
  o PCI/ACPI: Remove unnecessary osc_lock (bsc#1169263).
  o PCI: pci-bridge-emul: Fix emulation of W1C bits (git-fixes).
  o PCI: uniphier: Serialize INTx masking/unmasking and fix the bit operation
    (git-fixes).
  o pinctrl: core: fix possible memory leak in pinctrl_enable() (git-fixes).
  o platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).
  o power: supply: bq27xxx: Fix kernel crash on IRQ handler register error
    (git-fixes).
  o power: supply: max17042_battery: Prevent int underflow in set_soc_threshold
    (git-fixes).
  o power: supply: max17042_battery: use VFSOC for capacity when no rsns
    (git-fixes).
  o power: supply: rt5033 battery: Change voltage values to ca 5V (git-fixes).
  o printk/console: Allow to disable console output by using console="" or
    console=null (bsc#1192753).
  o printk: handle blank console arguments passed in (bsc#1192753).
  o qtnfmac: fix potential Spectre vulnerabilities (bsc#1192802).
  o r8152: add a helper function about setting EEE (git-fixes).
  o r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2
    (git-fixes).
  o r8152: Disable PLA MCU clock speed down (git-fixes).
  o r8152: disable U2P3 for RTL8153B (git-fixes).
  o r8152: divide the tx and rx bottom functions (git-fixes).
  o r8152: do not enable U1U2 with USB_SPEED_HIGH for RTL8153B (git-fixes).
  o r8152: fix runtime resume for linking change (git-fixes).
  o r8152: replace array with linking list for rx information (git-fixes).
  o r8152: reset flow control patch when linking on for RTL8153B (git-fixes).
  o r8152: saving the settings of EEE (git-fixes).
  o r8152: separate the rx buffer size (git-fixes).
  o r8152: use alloc_pages for rx buffer (git-fixes).
  o regulator: dt-bindings: samsung,s5m8767: correct
    s5m8767,pmic-buck-default-dvs-idx property (git-fixes).
  o regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is
    disabled (git-fixes).
  o Revert "ibmvnic: check failover_pending in login response" (bsc#1190523 ltc
    #194510).
  o Revert "platform/x86: i2c-multi-instantiate: Do not create platform device
    for INT3515 ACPI nodes" (git-fixes).
  o Revert "r8152: adjust the settings about MAC clock speed down for RTL8153"
    (git-fixes).
  o Revert "scsi: ufs: fix a missing check of devm_reset_control_get"
    (git-fixes).
  o Revert "x86/kvm: fix vcpu-id indexed array sizes" (git-fixes).
  o rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request
    (git-fixes).
  o rsi: fix control-message timeout (git-fixes).
  o rsi: Fix module dev_oper_mode parameter description (git-fixes).
  o rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).
  o rtl8187: fix control-message timeouts (git-fixes).
  o s390/qeth: fix deadlock during failing recovery (git-fixes).
  o s390/qeth: Fix deadlock in remove_discipline (git-fixes).
  o s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).
  o scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe()
    (git-fixes).
  o scsi: BusLogic: Fix missing pr_cont() use (git-fixes).
  o scsi: core: Fix spelling in a source code comment (git-fixes).
  o scsi: csiostor: Add module softdep on cxgb4 (git-fixes).
  o scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn() (git-fixes).
  o scsi: dc395: Fix error case unwinding (git-fixes).
  o scsi: fdomain: Fix error return code in fdomain_probe() (git-fixes).
  o scsi: FlashPoint: Rename si_flags field (git-fixes).
  o scsi: iscsi: Fix iface sysfs attr detection (git-fixes).
  o scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).
  o scsi: mpt3sas: Fix error return value in _scsih_expander_add() (git-fixes).
  o scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).
  o scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).
  o scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).
  o scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()
    (git-fixes).
  o scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).
  o scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).
  o scsi: snic: Fix an error message (git-fixes).
  o scsi: ufs-pci: Add quirk for broken auto-hibernate for Intel EHL
    (git-fixes).
  o scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).
  o serial: 8250_dw: Drop wrong use of ACPI_PTR() (git-fixes).
  o serial: xilinx_uartps: Fix race condition causing stuck TX (git-fixes).
  o staging: r8712u: fix control-message timeout (git-fixes).
  o staging: rtl8192u: fix control-message timeouts (git-fixes).
  o stmmac: platform: Fix signedness bug in stmmac_probe_config_dt()
    (git-fixes).
  o swiotlb: add a IO_TLB_SIZE define (bsc#1191851).
  o swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).
  o swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single (bsc#1191851).
  o swiotlb: factor out an io_tlb_offset helper (bsc#1191851).
  o swiotlb: factor out a nr_slots helper (bsc#1191851).
  o swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).
  o swiotlb: respect min_align_mask (bsc#1191851).
  o swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).
  o tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).
  o tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker
    together (bsc#1192745).
  o Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
  o usb: gadget: hid: fix error code in do_config() (git-fixes).
  o usb: iowarrior: fix control-message timeouts (git-fixes).
  o usb: max-3421: Use driver data instead of maintaining a list of bound
    devices (git-fixes).
  o usb: musb: Balance list entry in musb_gadget_queue (git-fixes).
  o usbnet: fix error return code in usbnet_probe() (git-fixes).
  o usbnet: sanity check for maxpacket (git-fixes).
  o usb: serial: keyspan: fix memleak on probe errors (git-fixes).
  o video: fbdev: chipsfb: use memset_io() instead of memset() (git-fixes).
  o virtio-gpu: fix possible memory allocation failure (git-fixes).
  o wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two's complement
    (git-fixes).
  o wcn36xx: add proper DMA memory barriers in rx path (git-fixes).
  o wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).
  o x86/ioapic: Force affinity setup before startup (bsc#1152489).
  o x86/msi: Force affinity setup before startup (bsc#1152489).
  o x86/sme: Use #define USE_EARLY_PGTABLE_L5 in mem_encrypt_identity.c (bsc#
    1152489).
  o x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).
  o xen: Fix implicit type conversion (git-fixes).
  o xen-pciback: Fix return in pm_ctrl_init() (git-fixes).
  o xfs: do not allow log writes if the data device is readonly (bsc#1192229).
  o zram-avoid-race-between-zram_remove-and-disksize_sto.patch: (bsc#1170269).
  o zram-don-t-fail-to-remove-zram-during-unloading-modu.patch: (bsc#1170269).
  o zram-fix-race-between-zram_reset_device-and-disksize.patch: (bsc#1170269).
  o zram-replace-fsync_bdev-with-sync_blockdev.patch: (bsc#1170269).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE MicroOS 5.0:
    zypper in -t patch SUSE-SUSE-MicroOS-5.0-2021-3933=1
  o SUSE Linux Enterprise Workstation Extension 15-SP2:
    zypper in -t patch SUSE-SLE-Product-WE-15-SP2-2021-3933=1
  o SUSE Linux Enterprise Module for Live Patching 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2021-3933=1
  o SUSE Linux Enterprise Module for Legacy Software 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Legacy-15-SP2-2021-3933=1
  o SUSE Linux Enterprise Module for Development Tools 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP2-2021-3933=1
  o SUSE Linux Enterprise Module for Basesystem 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-3933=1
  o SUSE Linux Enterprise High Availability 15-SP2:
    zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2021-3933=1

Package List:

  o SUSE MicroOS 5.0 (aarch64 x86_64):
       kernel-default-5.3.18-24.96.1
       kernel-default-base-5.3.18-24.96.1.9.44.1
       kernel-default-debuginfo-5.3.18-24.96.1
       kernel-default-debugsource-5.3.18-24.96.1
  o SUSE Linux Enterprise Workstation Extension 15-SP2 (x86_64):
       kernel-default-debuginfo-5.3.18-24.96.1
       kernel-default-debugsource-5.3.18-24.96.1
       kernel-default-extra-5.3.18-24.96.1
       kernel-default-extra-debuginfo-5.3.18-24.96.1
       kernel-preempt-extra-5.3.18-24.96.1
       kernel-preempt-extra-debuginfo-5.3.18-24.96.1
  o SUSE Linux Enterprise Module for Live Patching 15-SP2 (ppc64le s390x
    x86_64):
       kernel-default-debuginfo-5.3.18-24.96.1
       kernel-default-debugsource-5.3.18-24.96.1
       kernel-default-livepatch-5.3.18-24.96.1
       kernel-default-livepatch-devel-5.3.18-24.96.1
       kernel-livepatch-5_3_18-24_96-default-1-5.3.1
       kernel-livepatch-5_3_18-24_96-default-debuginfo-1-5.3.1
       kernel-livepatch-SLE15-SP2_Update_22-debugsource-1-5.3.1
  o SUSE Linux Enterprise Module for Legacy Software 15-SP2 (aarch64 ppc64le
    s390x x86_64):
       kernel-default-debuginfo-5.3.18-24.96.1
       kernel-default-debugsource-5.3.18-24.96.1
       reiserfs-kmp-default-5.3.18-24.96.1
       reiserfs-kmp-default-debuginfo-5.3.18-24.96.1
  o SUSE Linux Enterprise Module for Development Tools 15-SP2 (aarch64 ppc64le
    s390x x86_64):
       kernel-obs-build-5.3.18-24.96.1
       kernel-obs-build-debugsource-5.3.18-24.96.1
       kernel-syms-5.3.18-24.96.1
  o SUSE Linux Enterprise Module for Development Tools 15-SP2 (aarch64 x86_64):
       kernel-preempt-debuginfo-5.3.18-24.96.1
       kernel-preempt-debugsource-5.3.18-24.96.1
       kernel-preempt-devel-5.3.18-24.96.1
       kernel-preempt-devel-debuginfo-5.3.18-24.96.1
  o SUSE Linux Enterprise Module for Development Tools 15-SP2 (noarch):
       kernel-docs-5.3.18-24.96.1
       kernel-source-5.3.18-24.96.1
  o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x
    x86_64):
       kernel-default-5.3.18-24.96.1
       kernel-default-base-5.3.18-24.96.1.9.44.1
       kernel-default-debuginfo-5.3.18-24.96.1
       kernel-default-debugsource-5.3.18-24.96.1
       kernel-default-devel-5.3.18-24.96.1
       kernel-default-devel-debuginfo-5.3.18-24.96.1
  o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 x86_64):
       kernel-preempt-5.3.18-24.96.1
       kernel-preempt-debuginfo-5.3.18-24.96.1
       kernel-preempt-debugsource-5.3.18-24.96.1
  o SUSE Linux Enterprise Module for Basesystem 15-SP2 (noarch):
       kernel-devel-5.3.18-24.96.1
       kernel-macros-5.3.18-24.96.1
  o SUSE Linux Enterprise High Availability 15-SP2 (aarch64 ppc64le s390x
    x86_64):
       cluster-md-kmp-default-5.3.18-24.96.1
       cluster-md-kmp-default-debuginfo-5.3.18-24.96.1
       dlm-kmp-default-5.3.18-24.96.1
       dlm-kmp-default-debuginfo-5.3.18-24.96.1
       gfs2-kmp-default-5.3.18-24.96.1
       gfs2-kmp-default-debuginfo-5.3.18-24.96.1
       kernel-default-debuginfo-5.3.18-24.96.1
       kernel-default-debugsource-5.3.18-24.96.1
       ocfs2-kmp-default-5.3.18-24.96.1
       ocfs2-kmp-default-debuginfo-5.3.18-24.96.1


References:

  o https://www.suse.com/security/cve/CVE-2021-0941.html
  o https://www.suse.com/security/cve/CVE-2021-20322.html
  o https://www.suse.com/security/cve/CVE-2021-31916.html
  o https://www.suse.com/security/cve/CVE-2021-34981.html
  o https://www.suse.com/security/cve/CVE-2021-37159.html
  o https://www.suse.com/security/cve/CVE-2021-43389.html
  o https://bugzilla.suse.com/1094840
  o https://bugzilla.suse.com/1133021
  o https://bugzilla.suse.com/1152489
  o https://bugzilla.suse.com/1169263
  o https://bugzilla.suse.com/1170269
  o https://bugzilla.suse.com/1188601
  o https://bugzilla.suse.com/1190523
  o https://bugzilla.suse.com/1190795
  o https://bugzilla.suse.com/1191790
  o https://bugzilla.suse.com/1191851
  o https://bugzilla.suse.com/1191958
  o https://bugzilla.suse.com/1191961
  o https://bugzilla.suse.com/1191980
  o https://bugzilla.suse.com/1192045
  o https://bugzilla.suse.com/1192229
  o https://bugzilla.suse.com/1192273
  o https://bugzilla.suse.com/1192328
  o https://bugzilla.suse.com/1192718
  o https://bugzilla.suse.com/1192740
  o https://bugzilla.suse.com/1192745
  o https://bugzilla.suse.com/1192750
  o https://bugzilla.suse.com/1192753
  o https://bugzilla.suse.com/1192781
  o https://bugzilla.suse.com/1192802
  o https://bugzilla.suse.com/1192896
  o https://bugzilla.suse.com/1192906
  o https://bugzilla.suse.com/1192918


- ---------------------------------------------------------------------------------


SUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:3935-1
Rating:            important
References:        #1073928 #1098425 #1100416 #1119934 #1129735 #1171217
                   #1171420 #1173346 #1176724 #1177666 #1181158 #1181854
                   #1181855 #1183089 #1184673 #1185726 #1185727 #1185758
                   #1185973 #1186109 #1186390 #1188172 #1188563 #1188601
                   #1188838 #1188876 #1188983 #1188985 #1189057 #1189262
                   #1189278 #1189291 #1189399 #1189420 #1189706 #1190022
                   #1190023 #1190025 #1190067 #1190117 #1190159 #1190194
                   #1190349 #1190351 #1190601 #1190717 #1191193 #1191315
                   #1191790 #1191801 #1191958 #1191961 #1192267 #1192400
                   #1192775 #1192781
Cross-References:  CVE-2017-17862 CVE-2017-17864 CVE-2018-13405 CVE-2018-16882
                   CVE-2020-0429 CVE-2020-12655 CVE-2020-14305 CVE-2020-3702
                   CVE-2020-4788 CVE-2021-20265 CVE-2021-20322 CVE-2021-31916
                   CVE-2021-33033 CVE-2021-34556 CVE-2021-34981 CVE-2021-3542
                   CVE-2021-35477 CVE-2021-3640 CVE-2021-3653 CVE-2021-3655
                   CVE-2021-3659 CVE-2021-3679 CVE-2021-3715 CVE-2021-37159
                   CVE-2021-3732 CVE-2021-3752 CVE-2021-3753 CVE-2021-37576
                   CVE-2021-3760 CVE-2021-3772 CVE-2021-38160 CVE-2021-38198
                   CVE-2021-38204 CVE-2021-3896 CVE-2021-40490 CVE-2021-42008
                   CVE-2021-42739 CVE-2021-43389
Affected Products:
                   SUSE OpenStack Cloud Crowbar 8
                   SUSE OpenStack Cloud 8
                   SUSE Linux Enterprise Server for SAP 12-SP3
                   SUSE Linux Enterprise Server 12-SP3-LTSS
                   SUSE Linux Enterprise Server 12-SP3-BCL
                   SUSE Linux Enterprise High Availability 12-SP3
                   HPE Helion Openstack 8
______________________________________________________________________________

An update that solves 38 vulnerabilities and has 18 fixes is now available.

Description:

The SUSE Linux Enterprise 12 SP3 LTSS kernel was updated to receive various
security and bugfixes.
The following security bugs were fixed:

  o Unprivileged BPF has been disabled by default to reduce attack surface as
    too many security issues have happened in the past (jsc#SLE-22573)


You can reenable via systemctl setting /proc/sys/kernel/
unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

  o CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in
    list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in
    the Linux kernel A bound check failure allowed an attacker with special
    user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory
    leading to a system crash or a leak of internal kernel information. The
    highest threat from this vulnerability is to system availability (bnc#
    1192781).
  o CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less
    predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
  o CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device
    fails (bsc#1191961).
  o CVE-2020-12655: An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/
    xfs_alloc.c. Attackers may trigger a sync of excessive duration via an XFS
    v5 image with crafted metadata, aka CID-d0c7feaf8767 (bnc#1171217).
  o CVE-2021-43389: There was an array-index-out-of-bounds flaw in the
    detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
  o CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called
    unregister_netdev without checking for the NETREG_REGISTERED state, leading
    to a use-after-free and a double free (bnc#1188601).
  o CVE-2021-34556: An unprivileged BPF program can obtain sensitive
    information from kernel memory via a Speculative Store Bypass side-channel
    attack because the protection mechanism neglects the possibility of
    uninitialized memory locations on the BPF stack (bnc#1188983).
  o CVE-2021-35477: An unprivileged BPF program can obtain sensitive
    information from kernel memory via a Speculative Store Bypass side-channel
    attack because a certain preempting store operation did not necessarily
    occur before a store operation that has an attacker-controlled value (bnc#
    1188985).
  o CVE-2017-17862: kernel/bpf/verifier.c in the Linux kernel ignores
    unreachable code, even though it would still be processed by JIT compilers.
    This behavior, also considered an improper branch-pruning logic issue,
    could possibly be used by local users for denial of service (bnc#1073928).
  o CVE-2017-17864: kernel/bpf/verifier.c in the Linux kernel mishandled
    states_equal comparisons between the pointer data type and the
    UNKNOWN_VALUE data type, which allowed local users to obtain potentially
    sensitive address information, aka a "pointer leak (bnc#1073928).
  o CVE-2021-20265: A flaw was found in the way memory resources were freed in
    the unix_stream_recvmsg function in the Linux kernel when a signal was
    pending. This flaw allowed an unprivileged local user to crash the system
    by exhausting available memory. The highest threat from this vulnerability
    is to system availability (bnc#1183089).
  o CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
  o CVE-2021-3655: Missing size validations on inbound SCTP packets may have
    allowed the kernel to read uninitialized memory (bnc#1188563).
  o CVE-2018-13405: The inode_init_owner function in fs/inode.c in the Linux
    kernel allowed local users to create files with an unintended group
    ownership, in a scenario where a directory is SGID to a certain group and
    is writable by a user who is not a member of that group. Here, the
    non-member can trigger creation of a plain file whose group ownership is
    that group. The intended behavior was that the non-member can trigger
    creation of a directory (but not a plain file) whose group ownership is
    that group. The non-member can escalate privileges by making the plain file
    executable and SGID (bnc#1100416 bnc#1129735).
  o CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev->
    rf_conn_info object (bsc#1190067).
  o CVE-2021-42739: The firewire subsystem in the Linux kernel has a buffer
    overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/
    firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bnc#
    1184673).
  o CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).
  o CVE-2021-33033: The Linux kernel has a use-after-free in cipso_v4_genopt in
    net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI
    definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an
    arbitrary value (bnc#1186109 bnc#1186390 bnc#1188876).
  o CVE-2020-14305: An out-of-bounds memory write flaw was found in how the
    Linux kernel's Voice Over IP H.323 connection tracking functionality
    handled connections on ipv6 port 1720. This flaw allowed an unauthenticated
    remote user to crash the system, causing a denial of service. The highest
    threat from this vulnerability is to confidentiality, integrity, as well as
    system availability (bnc#1173346).
  o CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/
    cls_route.c (bsc#1190349).
  o CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers
    /isdn/capi/kcapi.c (bsc#1191958).
  o CVE-2021-42008: The decode_data function in drivers/net/hamradio/6pack.c in
    the Linux kernel has a slab out-of-bounds write. Input from a process that
    has the CAP_NET_ADMIN capability can lead to root access (bnc#1191315).
  o CVE-2020-3702: Specifically timed and handcrafted traffic can cause
    internal errors in a WLAN device that lead to improper layer 2 Wi-Fi
    encryption with a consequent possibility of information disclosure over the
    air for a discrete set of traffic (bnc#1191193).
  o CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's
    bluetooth module. (bsc#1190023)
  o CVE-2021-40490: A race condition was discovered in
    ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the
    Linux kernel (bnc#1190159 bnc#1192775)
  o CVE-2021-3640: Fixed a Use-After-Free vulnerability in function
    sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
  o CVE-2021-38160: Data corruption or loss could be triggered by an untrusted
    device that supplies a buf->len value exceeding the buffer size in drivers/
    char/virtio_console.c (bsc#1190117)
  o CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#
    1190025).
  o CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can
    reveal files (bsc#1189706).
  o CVE-2021-3653: A flaw was found in the KVM's AMD code for supporting SVM
    nested virtualization. The flaw occurs when processing the VMCB (virtual
    machine control block) provided by the L1 guest to spawn/handle a nested
    guest (L2). Due to improper validation of the "int_ctl" field, this issue
    could allow a malicious L1 to enable AVIC support (Advanced Virtual
    Interrupt Controller) for the L2 guest. As a result, the L2 guest would be
    allowed to read/write physical pages of the host, resulting in a crash of
    the entire system, leak of sensitive data or potential guest-to-host
    escape. This flaw affects Linux kernel versions prior to 5.14-rc7 (bnc#
    1189399 bnc#1189420).
  o CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel
    incorrectly computes the access permissions of a shadow page, leading to a
    missing guest protection page fault (bnc#1189262 bnc#1189278).
  o CVE-2021-38204: drivers/usb/host/max3421-hcd.c in the Linux kernel allowed
    physically proximate attackers to cause a denial of service (use-after-free
    and panic) by removing a MAX-3421 USB device in certain situations (bnc#
    1189291).
  o CVE-2021-3679: A lack of CPU resource in the Linux kernel tracing module
    functionality in versions prior to 5.14-rc3 was found in the way user uses
    trace ring buffer in a specific way. Only privileged local users (with
    CAP_SYS_ADMIN capability) could use this flaw to starve the resources
    causing denial of service (bnc#1189057).
  o CVE-2018-16882: A use-after-free issue was found in the way the Linux
    kernel's KVM hypervisor processed posted interrupts when nested(=1)
    virtualization is enabled. In nested_get_vmcs12_pages(), in case of an
    error while processing posted interrupt address, it unmaps the
    'pi_desc_page' without resetting 'pi_desc' descriptor address, which is
    later used in pi_test_and_clear_on(). A guest user/process could use this
    flaw to crash the host kernel resulting in DoS or potentially gain
    privileged access to a system. Kernel versions and are vulnerable (bnc#
    1119934).
  o CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c,
    there is possible memory corruption due to a use after free. This could
    lead to local escalation of privilege with System execution privileges
    needed. User interaction is not needed for exploitation (bnc#1176724).
  o CVE-2020-4788: IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could
    allow a local user to obtain sensitive information from the data in the L1
    cache under extenuating circumstances. IBM X-Force ID: 189296 (bnc#1177666
    bnc#1181158).
  o CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net
    /mac802154/llsec.c (bsc#1188876).
  o CVE-2021-37576: arch/powerpc/kvm/book3s_rtas.c in the Linux kernel on the
    powerpc platform allowed KVM guest OS users to cause host OS memory
    corruption via rtas_args.nargs, aka CID-f62f3c20647e (bnc#1188838).


The following non-security bugs were fixed:

  o PCI: hv: Use expected affinity when unmasking IRQ (bsc#1185973).
  o SUNRPC: improve error response to over-size gss credential (bsc#1190022).
  o Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
  o blacklist.conf: Drop a line that was added by mistake
  o bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22918)
  o bpf: Disallow unprivileged bpf by default (jsc#SLE-22918).
  o bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#
    1098425).
  o config: disable unprivileged BPF by default (jsc#SLE-22918)
  o cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#
    1185758,bsc#1192400).
  o ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).
  o hv: mana: adjust mana_select_queue to old API (jsc#SLE-18779, bsc#1185727).
  o hv: mana: declare vzalloc (jsc#SLE-18779, bsc#1185726).
  o hv: mana: fake bitmap API (jsc#SLE-18779, bsc#1185726).
  o hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#
    1185727).
  o kABI: protect struct bpf_map (kabi).
  o mm: replace open coded page to virt conversion with page_to_virt() (jsc#
    SLE-18779, bsc#1185727).
  o net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#
    1181854 bsc#1181855).
  o net/mlx4_en: Handle TX error CQE (bsc#1181854 bsc#1181855).
  o net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779,
    bsc#1185727).
  o net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#
    SLE-18779, bsc#1185727).
  o net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185727).
  o net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779,
    bsc#1185727).
  o net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#
    1191801).
  o net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185727).
  o net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#
    SLE-18779, bsc#1185727).
  o net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185727).
  o net: mana: remove redundant initialization of variable err (jsc#SLE-18779,
    bsc#1185727).
  o net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
  o s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (bsc#1190601).
  o s390/bpf: Fix branch shortening during codegen pass (bsc#1190601).
  o s390/bpf: Fix optimizing out zero-extensions (bsc#1190601).
  o s390/bpf: Wrap JIT macro parameter usages in parentheses (bsc#1190601).
  o s390: bpf: implement jitting of BPF_ALU | BPF_ARSH | BPF_* (bsc#1190601).
  o scsi: sg: add sg_remove_request in sg_write (bsc#1171420 CVE2020-12770).
  o sctp: check asoc peer.asconf_capable before processing asconf (bsc#
    1190351).
  o sctp: fully initialize v4 addr in some functions (bsc#1188563).
  o sctp: simplify addr copy (bsc#1188563).
  o x86/CPU: Add more Icelake model numbers (bsc#1185758,bsc#1192400).
  o x86/tlb: Flush global mappings when KAISER is disabled (bsc#1190194).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE OpenStack Cloud Crowbar 8:
    zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2021-3935=1
  o SUSE OpenStack Cloud 8:
    zypper in -t patch SUSE-OpenStack-Cloud-8-2021-3935=1
  o SUSE Linux Enterprise Server for SAP 12-SP3:
    zypper in -t patch SUSE-SLE-SAP-12-SP3-2021-3935=1
  o SUSE Linux Enterprise Server 12-SP3-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-2021-3935=1
  o SUSE Linux Enterprise Server 12-SP3-BCL:
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2021-3935=1
  o SUSE Linux Enterprise High Availability 12-SP3:
    zypper in -t patch SUSE-SLE-HA-12-SP3-2021-3935=1
  o HPE Helion Openstack 8:
    zypper in -t patch HPE-Helion-OpenStack-8-2021-3935=1

Package List:

  o SUSE OpenStack Cloud Crowbar 8 (x86_64):
       kernel-default-4.4.180-94.150.1
       kernel-default-base-4.4.180-94.150.1
       kernel-default-base-debuginfo-4.4.180-94.150.1
       kernel-default-debuginfo-4.4.180-94.150.1
       kernel-default-debugsource-4.4.180-94.150.1
       kernel-default-devel-4.4.180-94.150.1
       kernel-default-kgraft-4.4.180-94.150.1
       kernel-syms-4.4.180-94.150.1
       kgraft-patch-4_4_180-94_150-default-1-4.3.1
       kgraft-patch-4_4_180-94_150-default-debuginfo-1-4.3.1
  o SUSE OpenStack Cloud Crowbar 8 (noarch):
       kernel-devel-4.4.180-94.150.1
       kernel-macros-4.4.180-94.150.1
       kernel-source-4.4.180-94.150.1
  o SUSE OpenStack Cloud 8 (noarch):
       kernel-devel-4.4.180-94.150.1
       kernel-macros-4.4.180-94.150.1
       kernel-source-4.4.180-94.150.1
  o SUSE OpenStack Cloud 8 (x86_64):
       kernel-default-4.4.180-94.150.1
       kernel-default-base-4.4.180-94.150.1
       kernel-default-base-debuginfo-4.4.180-94.150.1
       kernel-default-debuginfo-4.4.180-94.150.1
       kernel-default-debugsource-4.4.180-94.150.1
       kernel-default-devel-4.4.180-94.150.1
       kernel-default-kgraft-4.4.180-94.150.1
       kernel-syms-4.4.180-94.150.1
       kgraft-patch-4_4_180-94_150-default-1-4.3.1
       kgraft-patch-4_4_180-94_150-default-debuginfo-1-4.3.1
  o SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64):
       kernel-default-4.4.180-94.150.1
       kernel-default-base-4.4.180-94.150.1
       kernel-default-base-debuginfo-4.4.180-94.150.1
       kernel-default-debuginfo-4.4.180-94.150.1
       kernel-default-debugsource-4.4.180-94.150.1
       kernel-default-devel-4.4.180-94.150.1
       kernel-default-kgraft-4.4.180-94.150.1
       kernel-syms-4.4.180-94.150.1
       kgraft-patch-4_4_180-94_150-default-1-4.3.1
       kgraft-patch-4_4_180-94_150-default-debuginfo-1-4.3.1
  o SUSE Linux Enterprise Server for SAP 12-SP3 (noarch):
       kernel-devel-4.4.180-94.150.1
       kernel-macros-4.4.180-94.150.1
       kernel-source-4.4.180-94.150.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64):
       kernel-default-4.4.180-94.150.1
       kernel-default-base-4.4.180-94.150.1
       kernel-default-base-debuginfo-4.4.180-94.150.1
       kernel-default-debuginfo-4.4.180-94.150.1
       kernel-default-debugsource-4.4.180-94.150.1
       kernel-default-devel-4.4.180-94.150.1
       kernel-syms-4.4.180-94.150.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (ppc64le x86_64):
       kernel-default-kgraft-4.4.180-94.150.1
       kgraft-patch-4_4_180-94_150-default-1-4.3.1
       kgraft-patch-4_4_180-94_150-default-debuginfo-1-4.3.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (noarch):
       kernel-devel-4.4.180-94.150.1
       kernel-macros-4.4.180-94.150.1
       kernel-source-4.4.180-94.150.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (s390x):
       kernel-default-man-4.4.180-94.150.1
  o SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):
       kernel-default-4.4.180-94.150.1
       kernel-default-base-4.4.180-94.150.1
       kernel-default-base-debuginfo-4.4.180-94.150.1
       kernel-default-debuginfo-4.4.180-94.150.1
       kernel-default-debugsource-4.4.180-94.150.1
       kernel-default-devel-4.4.180-94.150.1
       kernel-syms-4.4.180-94.150.1
  o SUSE Linux Enterprise Server 12-SP3-BCL (noarch):
       kernel-devel-4.4.180-94.150.1
       kernel-macros-4.4.180-94.150.1
       kernel-source-4.4.180-94.150.1
  o SUSE Linux Enterprise High Availability 12-SP3 (ppc64le s390x x86_64):
       cluster-md-kmp-default-4.4.180-94.150.1
       cluster-md-kmp-default-debuginfo-4.4.180-94.150.1
       dlm-kmp-default-4.4.180-94.150.1
       dlm-kmp-default-debuginfo-4.4.180-94.150.1
       gfs2-kmp-default-4.4.180-94.150.1
       gfs2-kmp-default-debuginfo-4.4.180-94.150.1
       kernel-default-debuginfo-4.4.180-94.150.1
       kernel-default-debugsource-4.4.180-94.150.1
       ocfs2-kmp-default-4.4.180-94.150.1
       ocfs2-kmp-default-debuginfo-4.4.180-94.150.1
  o HPE Helion Openstack 8 (noarch):
       kernel-devel-4.4.180-94.150.1
       kernel-macros-4.4.180-94.150.1
       kernel-source-4.4.180-94.150.1
  o HPE Helion Openstack 8 (x86_64):
       kernel-default-4.4.180-94.150.1
       kernel-default-base-4.4.180-94.150.1
       kernel-default-base-debuginfo-4.4.180-94.150.1
       kernel-default-debuginfo-4.4.180-94.150.1
       kernel-default-debugsource-4.4.180-94.150.1
       kernel-default-devel-4.4.180-94.150.1
       kernel-default-kgraft-4.4.180-94.150.1
       kernel-syms-4.4.180-94.150.1
       kgraft-patch-4_4_180-94_150-default-1-4.3.1
       kgraft-patch-4_4_180-94_150-default-debuginfo-1-4.3.1


References:

  o https://www.suse.com/security/cve/CVE-2017-17862.html
  o https://www.suse.com/security/cve/CVE-2017-17864.html
  o https://www.suse.com/security/cve/CVE-2018-13405.html
  o https://www.suse.com/security/cve/CVE-2018-16882.html
  o https://www.suse.com/security/cve/CVE-2020-0429.html
  o https://www.suse.com/security/cve/CVE-2020-12655.html
  o https://www.suse.com/security/cve/CVE-2020-14305.html
  o https://www.suse.com/security/cve/CVE-2020-3702.html
  o https://www.suse.com/security/cve/CVE-2020-4788.html
  o https://www.suse.com/security/cve/CVE-2021-20265.html
  o https://www.suse.com/security/cve/CVE-2021-20322.html
  o https://www.suse.com/security/cve/CVE-2021-31916.html
  o https://www.suse.com/security/cve/CVE-2021-33033.html
  o https://www.suse.com/security/cve/CVE-2021-34556.html
  o https://www.suse.com/security/cve/CVE-2021-34981.html
  o https://www.suse.com/security/cve/CVE-2021-3542.html
  o https://www.suse.com/security/cve/CVE-2021-35477.html
  o https://www.suse.com/security/cve/CVE-2021-3640.html
  o https://www.suse.com/security/cve/CVE-2021-3653.html
  o https://www.suse.com/security/cve/CVE-2021-3655.html
  o https://www.suse.com/security/cve/CVE-2021-3659.html
  o https://www.suse.com/security/cve/CVE-2021-3679.html
  o https://www.suse.com/security/cve/CVE-2021-3715.html
  o https://www.suse.com/security/cve/CVE-2021-37159.html
  o https://www.suse.com/security/cve/CVE-2021-3732.html
  o https://www.suse.com/security/cve/CVE-2021-3752.html
  o https://www.suse.com/security/cve/CVE-2021-3753.html
  o https://www.suse.com/security/cve/CVE-2021-37576.html
  o https://www.suse.com/security/cve/CVE-2021-3760.html
  o https://www.suse.com/security/cve/CVE-2021-3772.html
  o https://www.suse.com/security/cve/CVE-2021-38160.html
  o https://www.suse.com/security/cve/CVE-2021-38198.html
  o https://www.suse.com/security/cve/CVE-2021-38204.html
  o https://www.suse.com/security/cve/CVE-2021-3896.html
  o https://www.suse.com/security/cve/CVE-2021-40490.html
  o https://www.suse.com/security/cve/CVE-2021-42008.html
  o https://www.suse.com/security/cve/CVE-2021-42739.html
  o https://www.suse.com/security/cve/CVE-2021-43389.html
  o https://bugzilla.suse.com/1073928
  o https://bugzilla.suse.com/1098425
  o https://bugzilla.suse.com/1100416
  o https://bugzilla.suse.com/1119934
  o https://bugzilla.suse.com/1129735
  o https://bugzilla.suse.com/1171217
  o https://bugzilla.suse.com/1171420
  o https://bugzilla.suse.com/1173346
  o https://bugzilla.suse.com/1176724
  o https://bugzilla.suse.com/1177666
  o https://bugzilla.suse.com/1181158
  o https://bugzilla.suse.com/1181854
  o https://bugzilla.suse.com/1181855
  o https://bugzilla.suse.com/1183089
  o https://bugzilla.suse.com/1184673
  o https://bugzilla.suse.com/1185726
  o https://bugzilla.suse.com/1185727
  o https://bugzilla.suse.com/1185758
  o https://bugzilla.suse.com/1185973
  o https://bugzilla.suse.com/1186109
  o https://bugzilla.suse.com/1186390
  o https://bugzilla.suse.com/1188172
  o https://bugzilla.suse.com/1188563
  o https://bugzilla.suse.com/1188601
  o https://bugzilla.suse.com/1188838
  o https://bugzilla.suse.com/1188876
  o https://bugzilla.suse.com/1188983
  o https://bugzilla.suse.com/1188985
  o https://bugzilla.suse.com/1189057
  o https://bugzilla.suse.com/1189262
  o https://bugzilla.suse.com/1189278
  o https://bugzilla.suse.com/1189291
  o https://bugzilla.suse.com/1189399
  o https://bugzilla.suse.com/1189420
  o https://bugzilla.suse.com/1189706
  o https://bugzilla.suse.com/1190022
  o https://bugzilla.suse.com/1190023
  o https://bugzilla.suse.com/1190025
  o https://bugzilla.suse.com/1190067
  o https://bugzilla.suse.com/1190117
  o https://bugzilla.suse.com/1190159
  o https://bugzilla.suse.com/1190194
  o https://bugzilla.suse.com/1190349
  o https://bugzilla.suse.com/1190351
  o https://bugzilla.suse.com/1190601
  o https://bugzilla.suse.com/1190717
  o https://bugzilla.suse.com/1191193
  o https://bugzilla.suse.com/1191315
  o https://bugzilla.suse.com/1191790
  o https://bugzilla.suse.com/1191801
  o https://bugzilla.suse.com/1191958
  o https://bugzilla.suse.com/1191961
  o https://bugzilla.suse.com/1192267
  o https://bugzilla.suse.com/1192400
  o https://bugzilla.suse.com/1192775
  o https://bugzilla.suse.com/1192781


- --------------------------------------------------------------------------------


SUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:3941-1
Rating:            important
References:        #1152489 #1169263 #1170269 #1184924 #1190523 #1190795
                   #1191790 #1191961 #1192045 #1192217 #1192273 #1192328
                   #1192375 #1192473 #1192718 #1192740 #1192745 #1192750
                   #1192753 #1192758 #1192781 #1192802 #1192896 #1192906
                   #1192918
Cross-References:  CVE-2021-0941 CVE-2021-20322 CVE-2021-31916 CVE-2021-34981
Affected Products:
                   SUSE MicroOS 5.1
                   SUSE Linux Enterprise Workstation Extension 15-SP3
                   SUSE Linux Enterprise Module for Live Patching 15-SP3
                   SUSE Linux Enterprise Module for Legacy Software 15-SP3
                   SUSE Linux Enterprise Module for Development Tools 15-SP3
                   SUSE Linux Enterprise Module for Basesystem 15-SP3
                   SUSE Linux Enterprise High Availability 15-SP3
______________________________________________________________________________

An update that solves four vulnerabilities, contains one feature and has 21
fixes is now available.

Description:

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security
and bugfixes.
The following security bugs were fixed:

  o Unprivileged BPF has been disabled by default to reduce attack surface as
    too many security issues have happened in the past (jsc#SLE-22573)


You can reenable via systemctl setting /proc/sys/kernel/
unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

  o CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out
    of bounds read due to a use after free. This could lead to local escalation
    of privilege with System execution privileges needed. User interaction is
    not needed for exploitation (bnc#1192045 ).
  o CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in
    list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in
    the Linux kernel A bound check failure allowed an attacker with special
    user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory
    leading to a system crash or a leak of internal kernel information. The
    highest threat from this vulnerability is to system availability (bnc#
    1192781).
  o CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less
    predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
  o CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device
    fails (bsc#1191961).


The following non-security bugs were fixed:

  o ABI: sysfs-kernel-slab: Document some stats (git-fixes).
  o ALSA: hda: fix general protection fault in azx_runtime_idle (git-fixes).
  o ALSA: hda: Free card instance properly at probe errors (git-fixes).
  o ALSA: usb-audio: Add Audient iD14 to mixer map quirk table (git-fixes).
  o ALSA: usb-audio: Add minimal-mute notion in dB mapping table (bsc#1192375).
  o ALSA: usb-audio: Add Schiit Hel device to mixer map quirk table
    (git-fixes).
  o ALSA: usb-audio: Fix dB level of Bose Revolve+ SoundLink (bsc#1192375).
  o ALSA: usb-audio: Use int for dB map values (bsc#1192375).
  o ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE (bsc#1192473).
  o auxdisplay: ht16k33: Connect backlight to fbdev (git-fixes).
  o auxdisplay: ht16k33: Fix frame buffer device blanking (git-fixes).
  o auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string
    (git-fixes).
  o bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22573)
  o bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22574)
  o bpf: Disallow unprivileged bpf by default (jsc#SLE-22573).
  o bpf: Disallow unprivileged bpf by default (jsc#SLE-22574).
  o bpf: Fix BPF_JIT kconfig symbol dependency (git-fixes jsc#SLE-22574).
  o bpf: Fix potential race in tail call compatibility check (git-fixes).
  o bpf, kconfig: Add consolidated menu entry for bpf with core options (jsc#
    SLE-22574).
  o btrfs: block-group: Rework documentation of check_system_chunk function
    (bsc#1192896).
  o btrfs: fix deadlock between chunk allocation and chunk btree modifications
    (bsc#1192896).
  o btrfs: fix memory ordering between normal and ordered work functions
    (git-fixes).
  o btrfs: update comments for chunk allocation -ENOSPC cases (bsc#1192896).
  o cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem
    (git-fixes).
  o config: disable unprivileged BPF by default (jsc#SLE-22573) Backport of
    mainline commit 8a03e56b253e ("bpf: Disallow unprivileged bpf by default")
    only changes kconfig default, used e.g. for "make oldconfig" when the
    config option is missing, but does not update our kernel configs used for
    build. Update also these to make sure unprivileged BPF is really disabled
    by default.
  o crypto: caam - disable pkc for non-E SoCs (git-fixes).
  o crypto: qat - detect PFVF collision after ACK (git-fixes).
  o crypto: qat - disregard spurious PFVF interrupts (git-fixes).
  o drm/i915: Introduce intel_hpd_hotplug_irqs() (bsc#1192758).
  o drm: prevent spectre issue in vmw_execbuf_ioctl (bsc#1192802).
  o EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell (bsc#
    1152489).
  o Eradicate Patch-mainline: No The pre-commit check can reject this
    deprecated tag then.
  o exfat: fix erroneous discard when clear cluster bit (git-fixes).
  o exfat: handle wrong stream entry size in exfat_readdir() (git-fixes).
  o exfat: properly set s_time_gran (bsc#1192328).
  o exfat: truncate atimes to 2s granularity (bsc#1192328).
  o Fix problem with missing installkernel on Tumbleweed.
  o fuse: fix page stealing (bsc#1192718).
  o gpio: mpc8xxx: Use 'devm_gpiochip_add_data()' to simplify the code and
    avoid a leak (git-fixes).
  o gpio/rockchip: add driver for rockchip gpio (bsc#1192217).
  o gpio/rockchip: drop irq_gc_lock/irq_gc_unlock for irq set type (bsc#
    1192217).
  o gpio/rockchip: extended debounce support is only available on v2 (bsc#
    1192217).
  o gpio/rockchip: fetch deferred output settings on probe (bsc#1192217).
  o gpio/rockchip: fix get_direction value handling (bsc#1192217).
  o gpio/rockchip: support next version gpio controller (bsc#1192217).
  o gpio/rockchip: use struct rockchip_gpio_regs for gpio controller (bsc#
    1192217).
  o HID: u2fzero: clarify error check and length calculations (git-fixes).
  o HID: u2fzero: properly handle timeouts in usb_submit_urb (git-fixes).
  o ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
  o ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).
  o ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).
  o iio: dac: ad5446: Fix ad5622_write() return value (git-fixes).
  o Input: elantench - fix misreporting trackpoint coordinates (bsc#1192918).
  o kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).
  o mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).
  o Move upstreamed sound fix into sorted section
  o net: dsa: felix: re-enable TX flow control in ocelot_port_flush()
    (git-fixes).
  o net: mscc: ocelot: fix hardware timestamp dequeue logic.
  o net: mscc: ocelot: warn when a PTP IRQ is raised for an unknown skb
    (git-fixes).
  o net/smc: Correct smc link connection counter in case of smc client
    (git-fixes).
  o net/smc: fix 'workqueue leaked lock' in smc_conn_abort_work (git-fixes).
  o ocfs2: do not zero pages beyond i_size (bsc#1190795).
  o ocfs2: fix data corruption on truncate (bsc#1190795).
  o PCI: aardvark: Do not clear status bits of masked interrupts (git-fixes).
  o PCI: aardvark: Do not spam about PIO Response Status (git-fixes).
  o PCI: aardvark: Do not unmask unused interrupts (git-fixes).
  o PCI: aardvark: Fix checking for link up via LTSSM state (git-fixes).
  o PCI: aardvark: Fix reporting Data Link Layer Link Active (git-fixes).
  o PCI: aardvark: Fix return value of MSI domain .alloc() method (git-fixes).
  o PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG (git-fixes).
  o PCI/ACPI: Check for _OSC support in acpi_pci_osc_control_set() (bsc#
    1169263).
  o PCI/ACPI: Clarify message about _OSC failure (bsc#1169263).
  o PCI/ACPI: Move _OSC query checks to separate function (bsc#1169263).
  o PCI/ACPI: Move supported and control calculations to separate functions
    (bsc#1169263).
  o PCI/ACPI: Remove OSC_PCI_SUPPORT_MASKS and OSC_PCI_CONTROL_MASKS (bsc#
    1169263).
  o PCI/ACPI: Remove unnecessary osc_lock (bsc#1169263).
  o PCI: pci-bridge-emul: Fix emulation of W1C bits (git-fixes).
  o PCI: uniphier: Serialize INTx masking/unmasking and fix the bit operation
    (git-fixes).
  o pinctrl: core: fix possible memory leak in pinctrl_enable() (git-fixes).
  o pinctrl: pinctrl-rockchip: Fix a bunch of kerneldoc misdemeanours (bsc#
    1192217).
  o pinctrl/rockchip: add a queue for deferred pin output settings on probe
    (bsc#1192217).
  o pinctrl/rockchip: add pinctrl device to gpio bank struct (bsc#1192217).
  o pinctrl: rockchip: add rk3308 SoC support (bsc#1192217).
  o pinctrl: rockchip: add support for rk3568 (bsc#1192217).
  o pinctrl/rockchip: always enable clock for gpio controller (bsc#1192217).
  o pinctrl: rockchip: clear int status when driver probed (bsc#1192217).
  o pinctrl: rockchip: create irq mapping in gpio_to_irq (bsc#1192217).
  o pinctrl: rockchip: do coding style for mux route struct (bsc#1192217).
  o pinctrl/rockchip: drop the gpio related codes (bsc#1192217).
  o pinctrl: rockchip: enable gpio pclk for rockchip_gpio_to_irq (bsc#1192217).
  o pinctrl: rockchip: make driver be tristate module (bsc#1192217).
  o pinctrl: rockchip: Replace HTTP links with HTTPS ones (bsc#1192217).
  o pinctrl: rockchip: return ENOMEM instead of EINVAL if allocation fails (bsc
    #1192217).
  o pinctrl/rockchip: separate struct rockchip_pin_bank to a head file (bsc#
    1192217).
  o power: supply: bq27xxx: Fix kernel crash on IRQ handler register error
    (git-fixes).
  o power: supply: max17042_battery: Prevent int underflow in set_soc_threshold
    (git-fixes).
  o power: supply: max17042_battery: use VFSOC for capacity when no rsns
    (git-fixes).
  o power: supply: rt5033-battery: Change voltage values to 5V (git-fixes).
  o printk/console: Allow to disable console output by using console="" or
    console=null (bsc#1192753).
  o printk: handle blank console arguments passed in (bsc#1192753).
  o qtnfmac: fix potential Spectre vulnerabilities (bsc#1192802).
  o r8152: add a helper function about setting EEE (git-fixes).
  o r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2
    (git-fixes).
  o r8152: Disable PLA MCU clock speed down (git-fixes).
  o r8152: disable U2P3 for RTL8153B (git-fixes).
  o r8152: divide the tx and rx bottom functions (git-fixes).
  o r8152: do not enable U1U2 with USB_SPEED_HIGH for RTL8153B (git-fixes).
  o r8152: fix runtime resume for linking change (git-fixes).
  o r8152: replace array with linking list for rx information (git-fixes).
  o r8152: reset flow control patch when linking on for RTL8153B (git-fixes).
  o r8152: saving the settings of EEE (git-fixes).
  o r8152: separate the rx buffer size (git-fixes).
  o r8152: use alloc_pages for rx buffer (git-fixes).
  o random: fix crash on multiple early calls to add_bootloader_randomness()
    (bsc#1184924)
  o Revert "ibmvnic: check failover_pending in login response" (bsc#1190523 ltc
    #194510).
  o Revert "platform/x86: i2c-multi-instantiate: Do not create platform device
    for INT3515 ACPI nodes" (git-fixes).
  o Revert "r8152: adjust the settings about MAC clock speed down for RTL8153"
    (git-fixes).
  o Revert "scsi: ufs: fix a missing check of devm_reset_control_get"
    (git-fixes).
  o Revert "x86/kvm: fix vcpu-id indexed array sizes" (git-fixes).
  o rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request
    (git-fixes).
  o s390/dasd: fix use after free in dasd path handling (git-fixes).
  o s390/pci: fix use after free of zpci_dev (git-fixes).
  o s390/pci: fix zpci_zdev_put() on reserve (git-fixes).
  o s390/qeth: fix deadlock during failing recovery (git-fixes).
  o s390/qeth: Fix deadlock in remove_discipline (git-fixes).
  o s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).
  o s390/topology: clear thread/group maps for offline cpus (git-fixes).
  o scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe()
    (git-fixes).
  o scsi: BusLogic: Fix missing pr_cont() use (git-fixes).
  o scsi: core: Fix spelling in a source code comment (git-fixes).
  o scsi: csiostor: Add module softdep on cxgb4 (git-fixes).
  o scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn() (git-fixes).
  o scsi: dc395: Fix error case unwinding (git-fixes).
  o scsi: fdomain: Fix error return code in fdomain_probe() (git-fixes).
  o scsi: FlashPoint: Rename si_flags field (git-fixes).
  o scsi: iscsi: Fix iface sysfs attr detection (git-fixes).
  o scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).
  o scsi: mpt3sas: Fix error return value in _scsih_expander_add() (git-fixes).
  o scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).
  o scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).
  o scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).
  o scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()
    (git-fixes).
  o scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).
  o scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).
  o scsi: snic: Fix an error message (git-fixes).
  o scsi: ufs-pci: Add quirk for broken auto-hibernate for Intel EHL
    (git-fixes).
  o scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).
  o serial: 8250_dw: Drop wrong use of ACPI_PTR() (git-fixes).
  o serial: xilinx_uartps: Fix race condition causing stuck TX (git-fixes).
  o staging: r8712u: fix control-message timeout (git-fixes).
  o staging: rtl8192u: fix control-message timeouts (git-fixes).
  o stmmac: platform: Fix signedness bug in stmmac_probe_config_dt()
    (git-fixes).
  o tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker
    together (bsc#1192745).
  o Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
  o Update config files: pull BPF configs together
  o usb: gadget: hid: fix error code in do_config() (git-fixes).
  o USB: iowarrior: fix control-message timeouts (git-fixes).
  o usb: max-3421: Use driver data instead of maintaining a list of bound
    devices (git-fixes).
  o usb: musb: Balance list entry in musb_gadget_queue (git-fixes).
  o USB: serial: keyspan: fix memleak on probe errors (git-fixes).
  o video: fbdev: chipsfb: use memset_io() instead of memset() (git-fixes).
  o x86/sme: Use #define USE_EARLY_PGTABLE_L5 in mem_encrypt_identity.c (bsc#
    1152489).
  o x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).
  o xen-pciback: Fix return in pm_ctrl_init() (git-fixes).
  o xen: Fix implicit type conversion (git-fixes).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE MicroOS 5.1:
    zypper in -t patch SUSE-SUSE-MicroOS-5.1-2021-3941=1
  o SUSE Linux Enterprise Workstation Extension 15-SP3:
    zypper in -t patch SUSE-SLE-Product-WE-15-SP3-2021-3941=1
  o SUSE Linux Enterprise Module for Live Patching 15-SP3:
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2021-3941=1
  o SUSE Linux Enterprise Module for Legacy Software 15-SP3:
    zypper in -t patch SUSE-SLE-Module-Legacy-15-SP3-2021-3941=1
  o SUSE Linux Enterprise Module for Development Tools 15-SP3:
    zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2021-3941=1
  o SUSE Linux Enterprise Module for Basesystem 15-SP3:
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2021-3941=1
  o SUSE Linux Enterprise High Availability 15-SP3:
    zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2021-3941=1

Package List:

  o SUSE MicroOS 5.1 (aarch64 s390x x86_64):
       kernel-default-5.3.18-59.37.2
       kernel-default-base-5.3.18-59.37.2.18.23.3
       kernel-default-debuginfo-5.3.18-59.37.2
       kernel-default-debugsource-5.3.18-59.37.2
  o SUSE Linux Enterprise Workstation Extension 15-SP3 (x86_64):
       kernel-default-debuginfo-5.3.18-59.37.2
       kernel-default-debugsource-5.3.18-59.37.2
       kernel-default-extra-5.3.18-59.37.2
       kernel-default-extra-debuginfo-5.3.18-59.37.2
       kernel-preempt-debuginfo-5.3.18-59.37.2
       kernel-preempt-debugsource-5.3.18-59.37.2
       kernel-preempt-extra-5.3.18-59.37.2
       kernel-preempt-extra-debuginfo-5.3.18-59.37.2
  o SUSE Linux Enterprise Module for Live Patching 15-SP3 (ppc64le s390x
    x86_64):
       kernel-default-debuginfo-5.3.18-59.37.2
       kernel-default-debugsource-5.3.18-59.37.2
       kernel-default-livepatch-5.3.18-59.37.2
       kernel-default-livepatch-devel-5.3.18-59.37.2
       kernel-livepatch-5_3_18-59_37-default-1-7.3.2
       kernel-livepatch-5_3_18-59_37-default-debuginfo-1-7.3.2
       kernel-livepatch-SLE15-SP3_Update_10-debugsource-1-7.3.2
  o SUSE Linux Enterprise Module for Legacy Software 15-SP3 (aarch64 ppc64le
    s390x x86_64):
       kernel-default-debuginfo-5.3.18-59.37.2
       kernel-default-debugsource-5.3.18-59.37.2
       reiserfs-kmp-default-5.3.18-59.37.2
       reiserfs-kmp-default-debuginfo-5.3.18-59.37.2
  o SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le
    s390x x86_64):
       kernel-obs-build-5.3.18-59.37.3
       kernel-obs-build-debugsource-5.3.18-59.37.3
       kernel-syms-5.3.18-59.37.1
  o SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 x86_64):
       kernel-preempt-debuginfo-5.3.18-59.37.2
       kernel-preempt-debugsource-5.3.18-59.37.2
       kernel-preempt-devel-5.3.18-59.37.2
       kernel-preempt-devel-debuginfo-5.3.18-59.37.2
  o SUSE Linux Enterprise Module for Development Tools 15-SP3 (noarch):
       kernel-docs-5.3.18-59.37.2
       kernel-source-5.3.18-59.37.2
  o SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x
    x86_64):
       kernel-default-5.3.18-59.37.2
       kernel-default-base-5.3.18-59.37.2.18.23.3
       kernel-default-debuginfo-5.3.18-59.37.2
       kernel-default-debugsource-5.3.18-59.37.2
       kernel-default-devel-5.3.18-59.37.2
       kernel-default-devel-debuginfo-5.3.18-59.37.2
  o SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 x86_64):
       kernel-preempt-5.3.18-59.37.2
       kernel-preempt-debuginfo-5.3.18-59.37.2
       kernel-preempt-debugsource-5.3.18-59.37.2
  o SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64):
       kernel-64kb-5.3.18-59.37.2
       kernel-64kb-debuginfo-5.3.18-59.37.2
       kernel-64kb-debugsource-5.3.18-59.37.2
       kernel-64kb-devel-5.3.18-59.37.2
       kernel-64kb-devel-debuginfo-5.3.18-59.37.2
  o SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch):
       kernel-devel-5.3.18-59.37.2
       kernel-macros-5.3.18-59.37.2
  o SUSE Linux Enterprise Module for Basesystem 15-SP3 (s390x):
       kernel-zfcpdump-5.3.18-59.37.2
       kernel-zfcpdump-debuginfo-5.3.18-59.37.2
       kernel-zfcpdump-debugsource-5.3.18-59.37.2
  o SUSE Linux Enterprise High Availability 15-SP3 (aarch64 ppc64le s390x
    x86_64):
       cluster-md-kmp-default-5.3.18-59.37.2
       cluster-md-kmp-default-debuginfo-5.3.18-59.37.2
       dlm-kmp-default-5.3.18-59.37.2
       dlm-kmp-default-debuginfo-5.3.18-59.37.2
       gfs2-kmp-default-5.3.18-59.37.2
       gfs2-kmp-default-debuginfo-5.3.18-59.37.2
       kernel-default-debuginfo-5.3.18-59.37.2
       kernel-default-debugsource-5.3.18-59.37.2
       ocfs2-kmp-default-5.3.18-59.37.2
       ocfs2-kmp-default-debuginfo-5.3.18-59.37.2


References:

  o https://www.suse.com/security/cve/CVE-2021-0941.html
  o https://www.suse.com/security/cve/CVE-2021-20322.html
  o https://www.suse.com/security/cve/CVE-2021-31916.html
  o https://www.suse.com/security/cve/CVE-2021-34981.html
  o https://bugzilla.suse.com/1152489
  o https://bugzilla.suse.com/1169263
  o https://bugzilla.suse.com/1170269
  o https://bugzilla.suse.com/1184924
  o https://bugzilla.suse.com/1190523
  o https://bugzilla.suse.com/1190795
  o https://bugzilla.suse.com/1191790
  o https://bugzilla.suse.com/1191961
  o https://bugzilla.suse.com/1192045
  o https://bugzilla.suse.com/1192217
  o https://bugzilla.suse.com/1192273
  o https://bugzilla.suse.com/1192328
  o https://bugzilla.suse.com/1192375
  o https://bugzilla.suse.com/1192473
  o https://bugzilla.suse.com/1192718
  o https://bugzilla.suse.com/1192740
  o https://bugzilla.suse.com/1192745
  o https://bugzilla.suse.com/1192750
  o https://bugzilla.suse.com/1192753
  o https://bugzilla.suse.com/1192758
  o https://bugzilla.suse.com/1192781
  o https://bugzilla.suse.com/1192802
  o https://bugzilla.suse.com/1192896
  o https://bugzilla.suse.com/1192906
  o https://bugzilla.suse.com/1192918

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYa6TXeNLKJtyKPYoAQiggxAAqZRlcNRBbVzoAVrvuP4ShZlcDVtjzx6u
odq7L9E8HleLVIpDDf54pYxnOzfc5O4jU+Zd7//2XgSfCnBb/P2JeoSjWkDvZ4Uw
uDsujYNxvn1OBTxcObwEbc9b4oF/5/pkRXQ1esGJPDr0ksFwuR3EODh/vPheZYsc
WSfWb49iNApxuIIDVF1Ki5Xq6sOt8ZO8uH2YWHZxAxwkCkzp95O4ifXmelvzS3+N
XfHssz8DQfwJqQbStEOUTHVVd0QwsBNtl2ysDhvS+oUt1TdvCmF2apHbyqFMaLOp
Ml0pLJbbVBR9i4R/eRHo7v9s4h0gE65LLFy3AKycAVMjmV8iGoJsKsQMcId5tpXe
kSclV/BgReobgcN4hXecR30xuJA/fW3rKYmrSbN6szeBCQID4pvYjWLblw74TW+l
MczQHpeUX+A/1fIDZYzYSZOjZp25tEZ0MsGaVLuQ0TwVNMraFxv7Kt+T4cDkHVup
Gw6lUO/wkZJFdM9vMUgu+RMxnjQrA1xDGztPldDq4e+uk1Xx3w7lneAZsVo3B+dc
nCBwFjAg8uTNt57ObMVcLhjwvSt0Bw+GIGnt8SWvMe9solc7CfXL84eEKwtrS7NC
2b/uGBrsbKlw2b+HJlXZwUyGUyWLFDxaXWihN1ZcOEZ1IiXrN5xZmtnJ3PDgTM8y
qko4TouCtGc=
=5CWQ
-----END PGP SIGNATURE-----