-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.0614
                   Security update for the Linux Kernel
                             11 February 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Linux Kernel
Publisher:         SUSE
Operating System:  SUSE
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-0435 CVE-2022-0330 CVE-2022-0322
                   CVE-2021-45486 CVE-2021-45095 CVE-2021-44733
                   CVE-2021-43976 CVE-2021-43975 CVE-2021-39657
                   CVE-2021-39648 CVE-2021-33098 CVE-2021-28715
                   CVE-2021-28714 CVE-2021-28713 CVE-2021-28712
                   CVE-2021-28711 CVE-2021-4202 CVE-2021-4197
                   CVE-2021-4159 CVE-2021-4149 CVE-2021-4135
                   CVE-2021-4083 CVE-2021-4002 CVE-2021-3564
                   CVE-2021-0935 CVE-2021-0920 CVE-2020-27820
                   CVE-2019-15126 CVE-2019-9503 CVE-2019-9502
                   CVE-2019-9501 CVE-2019-9500 CVE-2018-25020

Reference:         ASB-2021.0239
                   ASB-2021.0232
                   ESB-2022.0604
                   ESB-2022.0565

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2022/suse-su-20220366-1

Comment: CVSS (Max):  8.1* CVE-2022-0435 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: SUSE
         * Not all CVSS available when published

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

Announcement ID:   SUSE-SU-2022:0366-1
Rating:            critical
References:        #1071995 #1124431 #1167162 #1169514 #1172073 #1179599
                   #1184804 #1185377 #1186207 #1186222 #1187167 #1189305
                   #1189841 #1190358 #1190428 #1191229 #1191241 #1191384
                   #1191731 #1192032 #1192267 #1192740 #1192845 #1192847
                   #1192877 #1192946 #1193306 #1193440 #1193442 #1193575
                   #1193669 #1193727 #1193731 #1193767 #1193861 #1193864
                   #1193867 #1193927 #1194001 #1194048 #1194087 #1194227
                   #1194302 #1194516 #1194529 #1194880 #1194888 #1194985
                   #1195166 #1195254
Cross-References:  CVE-2018-25020 CVE-2019-15126 CVE-2020-27820 CVE-2021-0920
                   CVE-2021-0935 CVE-2021-28711 CVE-2021-28712 CVE-2021-28713
                   CVE-2021-28714 CVE-2021-28715 CVE-2021-33098 CVE-2021-3564
                   CVE-2021-39648 CVE-2021-39657 CVE-2021-4002 CVE-2021-4083
                   CVE-2021-4135 CVE-2021-4149 CVE-2021-4197 CVE-2021-4202
                   CVE-2021-43975 CVE-2021-43976 CVE-2021-44733 CVE-2021-45095
                   CVE-2021-45486 CVE-2022-0322 CVE-2022-0330
Affected Products:
                   SUSE CaaS Platform 4.0
                   SUSE Enterprise Storage 6
                   SUSE Linux Enterprise High Availability 15-SP1
                   SUSE Linux Enterprise High Performance Computing 15-SP1
                   SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
                   SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
                   SUSE Linux Enterprise Module for Live Patching 15-SP1
                   SUSE Linux Enterprise Server 15-SP1
                   SUSE Linux Enterprise Server 15-SP1-BCL
                   SUSE Linux Enterprise Server 15-SP1-LTSS
                   SUSE Linux Enterprise Server for SAP 15-SP1
                   SUSE Linux Enterprise Server for SAP Applications 15-SP1
                   SUSE Linux Enterprise Storage 6
                   SUSE Manager Proxy 4.0
                   SUSE Manager Server 4.0
______________________________________________________________________________

An update that solves 27 vulnerabilities and has 23 fixes is now available.

Description:

The SUSE Linux Enterprise 15 SP1 LTSS kernel was updated to receive various
security and bugfixes.
The following security bugs were fixed:

  o CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate
    domain record count on input (bsc#1195254).
  o CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#
    1194880).
  o CVE-2021-45486: Fixed an information leak because the hash table is very
    small in net/ipv4/route.c (bnc#1194087).
  o CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c
    (bnc#1193867).
  o CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in
    the TEE subsystem, that could have occured because of a race condition in
    tee_shm_get_from_id during an attempt to free a shared memory object (bnc#
    1193767).
  o CVE-2021-43976: Fixed a flaw that could allow an attacker (who can connect
    a crafted USB device) to cause a denial of service. (bnc#1192847)
  o CVE-2021-43975: Fixed a flaw in hw_atl_utils_fw_rpc_wait that could allow
    an attacker (who can introduce a crafted device) to trigger an
    out-of-bounds write via a crafted length value. (bsc#1192845)
  o CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#
    1194529).
  o CVE-2021-4197: Use cgroup open-time credentials for process migraton perm
    checks (bsc#1194302).
  o CVE-2021-4159: Fixed kernel ptr leak vulnerability via BPF in
    coerce_reg_to_size (bsc#1194227).
  o CVE-2021-4149: Fixed btrfs unlock newly allocated extent buffer after error
    (bsc#1194001).
  o CVE-2021-4135: Fixed zero-initialize memory inside netdevsim for new map's
    value in function nsim_bpf_map_alloc (bsc#1193927).
  o CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage
    collection for Unix domain socket file handlers when users call close() and
    fget() simultaneouslyand can potentially trigger a race condition (bnc#
    1193727).
  o CVE-2021-4002: Fixed incorrect TLBs flush in hugetlbfs after
    huge_pmd_unshare (bsc#1192946).
  o CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in
    ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local
    information disclosure with System execution privileges needed (bnc#
    1193864).
  o CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a
    race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead
    to local information disclosure with System execution privileges needed.
    User interaction is not needed for exploitation (bnc#1193861).
  o CVE-2021-3564: Fixed double-free memory corruption in the Linux kernel HCI
    device initialization subsystem that could have been used by attaching
    malicious HCI TTY Bluetooth devices. A local user could use this flaw to
    crash the system (bnc#1186207).
  o CVE-2021-33098: Fixed a potential denial of service in Intel(R) Ethernet
    ixgbe driver due to improper input validation. (bsc#1192877)
  o CVE-2021-28715: Fixed issue with xen/netback to do not queue unlimited
    number of packages (XSA-392) (bsc#1193442).
  o CVE-2021-28714: Fixed issue with xen/netback to handle rx queue stall
    detection (XSA-392) (bsc#1193442).
  o CVE-2021-28713: Fixed issue with xen/console to harden hvc_xen against
    event channel storms (XSA-391) (bsc#1193440).
  o CVE-2021-28712: Fixed issue with xen/netfront to harden netfront against
    event channel storms (XSA-391) (bsc#1193440).
  o CVE-2021-28711: Fixed issue with xen/blkfront to harden blkfront against
    event channel storms (XSA-391) (bsc#1193440).
  o CVE-2021-0935: Fixed possible out of bounds write in ip6_xmit of
    ip6_output.c due to a use after free. This could lead to local escalation
    of privilege with System execution privileges needed. User interaction is
    not needed for exploitation (bnc#1192032).
  o CVE-2021-0920: Fixed a local privilege escalation due to an use after free
    bug in unix_gc (bsc#1193731).
  o CVE-2020-27820: Fixed a vulnerability where a use-after-frees in nouveau's
    postclose() handler could happen if removing device (bsc#1179599).
  o CVE-2019-15126: Fixed a vulnerability in Broadcom and Cypress Wi-Fi chips,
    used in RPi family of devices aka "Kr00k". (bsc#1167162)
  o CVE-2018-25020: Fixed an overflow in the BPF subsystem due to a mishandling
    of a long jump over an instruction sequence where inner instructions
    require substantial expansions into multiple BPF instructions. This affects
    kernel/bpf/core.c and net/core/filter.c (bnc#1193575).


The following non-security bugs were fixed:

  o Bluetooth: fix the erroneous flush_work() order (git-fixes).
  o Build: Add obsolete_rebuilds_subpackage (boo#1172073 bsc#1191731).
  o ICMPv6: Add ICMPv6 Parameter Problem, code 3 definition (bsc#1191241 bsc#
    1195166).
  o IPv6: reply ICMP error if the first fragment do not include all headers
    (bsc#1191241).
  o elfcore: fix building with clang (bsc#1169514).
  o hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
  o ipv6/netfilter: Discard first fragment not including all headers (bsc#
    1191241 bsc#1195166).
  o kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).
  o kernel-binary.spec.in Stop templating the scriptlets for subpackages (bsc#
    1190358).
  o kernel-binary.spec.in: add zstd to BuildRequires if used
  o kernel-binary.spec.in: make sure zstd is supported by kmod if used
  o kernel-binary.spec: Check for no kernel signing certificates. Also remove
    unused variable.
  o kernel-binary.spec: Define $image as rpm macro (bsc#1189841).
  o kernel-binary.spec: Do not fail silently when KMP is empty (bsc#1190358).
    Copy the code from kernel-module-subpackage that deals with empty KMPs.
  o kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167).
  o kernel-binary.spec: Fix kernel-default-base scriptlets after packaging
    merge.
  o kernel-binary.spec: Require dwarves for kernel-binary-devel when BTF is
    enabled (jsc#SLE-17288).
  o kernel-binary.spec: suse-kernel-rpm-scriptlets required for uninstall as
    well.
  o kernel-cert-subpackage: Fix certificate location in scriptlets (bsc#
    1189841).
  o kernel-source.spec: install-kernel-tools also required on 15.4
  o kernel-spec-macros: Since rpm 4.17 %verbose is unusable (bsc#1191229). The
    semantic changed in an incompatible way so invoking the macro now causes a
    build failure.
  o kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
  o livepatch: Avoid CPU hogging with cond_resched (bsc#1071995).
  o memstick: rtsx_usb_ms: fix UAF (bsc#1194516).
  o moxart: fix potential use-after-free on remove path (bsc#1194516).
  o net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
  o net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
  o net: Using proper atomic helper (bsc#1186222).
  o net: ipv6: Discard next-hop MTU less than minimum link MTU (bsc#1191241).
  o net: mana: Add RX fencing (bsc#1193506).
  o net: mana: Add XDP support (bsc#1193506).
  o net: mana: Allow setting the number of queues while the NIC is down (bsc#
    1193506).
  o net: mana: Fix spelling mistake "calledd" -> "called" (bsc#1193506).
  o net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (bsc#
    1193506).
  o net: mana: Improve the HWC error handling (bsc#1193506).
  o net: mana: Support hibernation and kexec (bsc#1193506).
  o net: mana: Use kcalloc() instead of kzalloc() (bsc#1193506).
  o objtool: Support Clang non-section symbols in ORC generation (bsc#1169514).
  o post.sh: detect /usr mountpoint too
  o recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
  o recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#
    1192267).
  o rpm/kernel-binary.spec.in: Use kmod-zstd provide. This makes it possible to
    use kmod with ZSTD support on non-Tumbleweed.
  o rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release had
    arbitrary values in staging, we can't use it for dependencies. The
    filesystem one has to be enough (boo#1184804).
  o rpm/kernel-binary.spec.in: do not strip vmlinux again (bsc#1193306).
  o rpm/kernel-binary.spec: Use only non-empty certificates.
  o rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305).
  o rpm/kernel-source.rpmlintrc: ignore new include/config files.
  o rpm/kernel-source.spec.in: do some more for vanilla_only.
  o rpm: Abolish image suffix (bsc#1189841).
  o rpm: Abolish scritplet templating (bsc#1189841). Outsource kernel-binary
    and KMP scriptlets to suse-module-tools.
  o rpm: Define $certs as rpm macro (bsc#1189841).
  o rpm: Fold kernel-devel and kernel-source scriptlets into spec files (bsc#
    1189841).
  o rpm: fix kmp install path
  o rpm: use _rpmmacrodir (boo#1191384)
  o tty: hvc: replace BUG_ON() with negative return value.
  o vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888).
  o x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (bsc#1169514).
  o xen/blkfront: do not take local copy of a request from the ring page
    (git-fixes).
  o xen/blkfront: do not trust the backend response data blindly (git-fixes).
  o xen/blkfront: read response from backend only once (git-fixes).
  o xen/netfront: disentangle tx_skb_freelist (git-fixes).
  o xen/netfront: do not read data from request on the ring page (git-fixes).
  o xen/netfront: do not trust the backend response data blindly (git-fixes).
  o xen/netfront: read response from backend only once (git-fixes).
  o xen: sync include/xen/interface/io/ring.h with Xen's newest version
    (git-fixes).
  o xfrm: fix MTU regression (bsc#1185377, bsc#1194048).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Server for SAP 15-SP1:
    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-366=1
  o SUSE Linux Enterprise Server 15-SP1-LTSS:
    zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-366=1
  o SUSE Linux Enterprise Server 15-SP1-BCL:
    zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-366=1
  o SUSE Linux Enterprise Module for Live Patching 15-SP1:
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2022-366=1
  o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-366=1
  o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-366=1
  o SUSE Linux Enterprise High Availability 15-SP1:
    zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2022-366=1
  o SUSE Enterprise Storage 6:
    zypper in -t patch SUSE-Storage-6-2022-366=1
  o SUSE CaaS Platform 4.0:
    To install this update, use the SUSE CaaS Platform 'skuba' tool. I will
    inform you if it detects new updates and let you then trigger updating of
    the complete cluster in a controlled way.

Package List:

  o SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
       kernel-default-4.12.14-197.105.1
       kernel-default-base-4.12.14-197.105.1
       kernel-default-base-debuginfo-4.12.14-197.105.1
       kernel-default-debuginfo-4.12.14-197.105.1
       kernel-default-debugsource-4.12.14-197.105.1
       kernel-default-devel-4.12.14-197.105.1
       kernel-default-devel-debuginfo-4.12.14-197.105.1
       kernel-obs-build-4.12.14-197.105.1
       kernel-obs-build-debugsource-4.12.14-197.105.1
       kernel-syms-4.12.14-197.105.1
       reiserfs-kmp-default-4.12.14-197.105.1
       reiserfs-kmp-default-debuginfo-4.12.14-197.105.1
  o SUSE Linux Enterprise Server for SAP 15-SP1 (noarch):
       kernel-devel-4.12.14-197.105.1
       kernel-docs-4.12.14-197.105.1
       kernel-macros-4.12.14-197.105.1
       kernel-source-4.12.14-197.105.1
  o SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):
       kernel-default-4.12.14-197.105.1
       kernel-default-base-4.12.14-197.105.1
       kernel-default-base-debuginfo-4.12.14-197.105.1
       kernel-default-debuginfo-4.12.14-197.105.1
       kernel-default-debugsource-4.12.14-197.105.1
       kernel-default-devel-4.12.14-197.105.1
       kernel-default-devel-debuginfo-4.12.14-197.105.1
       kernel-obs-build-4.12.14-197.105.1
       kernel-obs-build-debugsource-4.12.14-197.105.1
       kernel-syms-4.12.14-197.105.1
       reiserfs-kmp-default-4.12.14-197.105.1
       reiserfs-kmp-default-debuginfo-4.12.14-197.105.1
  o SUSE Linux Enterprise Server 15-SP1-LTSS (noarch):
       kernel-devel-4.12.14-197.105.1
       kernel-docs-4.12.14-197.105.1
       kernel-macros-4.12.14-197.105.1
       kernel-source-4.12.14-197.105.1
  o SUSE Linux Enterprise Server 15-SP1-LTSS (s390x):
       kernel-default-man-4.12.14-197.105.1
       kernel-zfcpdump-debuginfo-4.12.14-197.105.1
       kernel-zfcpdump-debugsource-4.12.14-197.105.1
  o SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
       kernel-default-4.12.14-197.105.1
       kernel-default-base-4.12.14-197.105.1
       kernel-default-base-debuginfo-4.12.14-197.105.1
       kernel-default-debuginfo-4.12.14-197.105.1
       kernel-default-debugsource-4.12.14-197.105.1
       kernel-default-devel-4.12.14-197.105.1
       kernel-default-devel-debuginfo-4.12.14-197.105.1
       kernel-obs-build-4.12.14-197.105.1
       kernel-obs-build-debugsource-4.12.14-197.105.1
       kernel-syms-4.12.14-197.105.1
       reiserfs-kmp-default-4.12.14-197.105.1
       reiserfs-kmp-default-debuginfo-4.12.14-197.105.1
  o SUSE Linux Enterprise Server 15-SP1-BCL (noarch):
       kernel-devel-4.12.14-197.105.1
       kernel-docs-4.12.14-197.105.1
       kernel-macros-4.12.14-197.105.1
       kernel-source-4.12.14-197.105.1
  o SUSE Linux Enterprise Module for Live Patching 15-SP1 (ppc64le x86_64):
       kernel-default-debuginfo-4.12.14-197.105.1
       kernel-default-debugsource-4.12.14-197.105.1
       kernel-default-livepatch-4.12.14-197.105.1
       kernel-default-livepatch-devel-4.12.14-197.105.1
       kernel-livepatch-4_12_14-197_105-default-1-3.3.1
  o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64
    x86_64):
       kernel-default-4.12.14-197.105.1
       kernel-default-base-4.12.14-197.105.1
       kernel-default-base-debuginfo-4.12.14-197.105.1
       kernel-default-debuginfo-4.12.14-197.105.1
       kernel-default-debugsource-4.12.14-197.105.1
       kernel-default-devel-4.12.14-197.105.1
       kernel-default-devel-debuginfo-4.12.14-197.105.1
       kernel-obs-build-4.12.14-197.105.1
       kernel-obs-build-debugsource-4.12.14-197.105.1
       kernel-syms-4.12.14-197.105.1
  o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (noarch):
       kernel-devel-4.12.14-197.105.1
       kernel-docs-4.12.14-197.105.1
       kernel-macros-4.12.14-197.105.1
       kernel-source-4.12.14-197.105.1
  o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64
    x86_64):
       kernel-default-4.12.14-197.105.1
       kernel-default-base-4.12.14-197.105.1
       kernel-default-base-debuginfo-4.12.14-197.105.1
       kernel-default-debuginfo-4.12.14-197.105.1
       kernel-default-debugsource-4.12.14-197.105.1
       kernel-default-devel-4.12.14-197.105.1
       kernel-default-devel-debuginfo-4.12.14-197.105.1
       kernel-obs-build-4.12.14-197.105.1
       kernel-obs-build-debugsource-4.12.14-197.105.1
       kernel-syms-4.12.14-197.105.1
  o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (noarch):
       kernel-devel-4.12.14-197.105.1
       kernel-docs-4.12.14-197.105.1
       kernel-macros-4.12.14-197.105.1
       kernel-source-4.12.14-197.105.1
  o SUSE Linux Enterprise High Availability 15-SP1 (aarch64 ppc64le s390x
    x86_64):
       cluster-md-kmp-default-4.12.14-197.105.1
       cluster-md-kmp-default-debuginfo-4.12.14-197.105.1
       dlm-kmp-default-4.12.14-197.105.1
       dlm-kmp-default-debuginfo-4.12.14-197.105.1
       gfs2-kmp-default-4.12.14-197.105.1
       gfs2-kmp-default-debuginfo-4.12.14-197.105.1
       kernel-default-debuginfo-4.12.14-197.105.1
       kernel-default-debugsource-4.12.14-197.105.1
       ocfs2-kmp-default-4.12.14-197.105.1
       ocfs2-kmp-default-debuginfo-4.12.14-197.105.1
  o SUSE Enterprise Storage 6 (aarch64 x86_64):
       kernel-default-4.12.14-197.105.1
       kernel-default-base-4.12.14-197.105.1
       kernel-default-base-debuginfo-4.12.14-197.105.1
       kernel-default-debuginfo-4.12.14-197.105.1
       kernel-default-debugsource-4.12.14-197.105.1
       kernel-default-devel-4.12.14-197.105.1
       kernel-default-devel-debuginfo-4.12.14-197.105.1
       kernel-obs-build-4.12.14-197.105.1
       kernel-obs-build-debugsource-4.12.14-197.105.1
       kernel-syms-4.12.14-197.105.1
       reiserfs-kmp-default-4.12.14-197.105.1
       reiserfs-kmp-default-debuginfo-4.12.14-197.105.1
  o SUSE Enterprise Storage 6 (noarch):
       kernel-devel-4.12.14-197.105.1
       kernel-docs-4.12.14-197.105.1
       kernel-macros-4.12.14-197.105.1
       kernel-source-4.12.14-197.105.1
  o SUSE CaaS Platform 4.0 (x86_64):
       kernel-default-4.12.14-197.105.1
       kernel-default-base-4.12.14-197.105.1
       kernel-default-base-debuginfo-4.12.14-197.105.1
       kernel-default-debuginfo-4.12.14-197.105.1
       kernel-default-debugsource-4.12.14-197.105.1
       kernel-default-devel-4.12.14-197.105.1
       kernel-default-devel-debuginfo-4.12.14-197.105.1
       kernel-obs-build-4.12.14-197.105.1
       kernel-obs-build-debugsource-4.12.14-197.105.1
       kernel-syms-4.12.14-197.105.1
       reiserfs-kmp-default-4.12.14-197.105.1
       reiserfs-kmp-default-debuginfo-4.12.14-197.105.1
  o SUSE CaaS Platform 4.0 (noarch):
       kernel-devel-4.12.14-197.105.1
       kernel-docs-4.12.14-197.105.1
       kernel-macros-4.12.14-197.105.1
       kernel-source-4.12.14-197.105.1


References:

  o https://www.suse.com/security/cve/CVE-2018-25020.html
  o https://www.suse.com/security/cve/CVE-2019-15126.html
  o https://www.suse.com/security/cve/CVE-2020-27820.html
  o https://www.suse.com/security/cve/CVE-2021-0920.html
  o https://www.suse.com/security/cve/CVE-2021-0935.html
  o https://www.suse.com/security/cve/CVE-2021-28711.html
  o https://www.suse.com/security/cve/CVE-2021-28712.html
  o https://www.suse.com/security/cve/CVE-2021-28713.html
  o https://www.suse.com/security/cve/CVE-2021-28714.html
  o https://www.suse.com/security/cve/CVE-2021-28715.html
  o https://www.suse.com/security/cve/CVE-2021-33098.html
  o https://www.suse.com/security/cve/CVE-2021-3564.html
  o https://www.suse.com/security/cve/CVE-2021-39648.html
  o https://www.suse.com/security/cve/CVE-2021-39657.html
  o https://www.suse.com/security/cve/CVE-2021-4002.html
  o https://www.suse.com/security/cve/CVE-2021-4083.html
  o https://www.suse.com/security/cve/CVE-2021-4135.html
  o https://www.suse.com/security/cve/CVE-2021-4149.html
  o https://www.suse.com/security/cve/CVE-2021-4197.html
  o https://www.suse.com/security/cve/CVE-2021-4202.html
  o https://www.suse.com/security/cve/CVE-2021-43975.html
  o https://www.suse.com/security/cve/CVE-2021-43976.html
  o https://www.suse.com/security/cve/CVE-2021-44733.html
  o https://www.suse.com/security/cve/CVE-2021-45095.html
  o https://www.suse.com/security/cve/CVE-2021-45486.html
  o https://www.suse.com/security/cve/CVE-2022-0322.html
  o https://www.suse.com/security/cve/CVE-2022-0330.html
  o https://bugzilla.suse.com/1071995
  o https://bugzilla.suse.com/1124431
  o https://bugzilla.suse.com/1167162
  o https://bugzilla.suse.com/1169514
  o https://bugzilla.suse.com/1172073
  o https://bugzilla.suse.com/1179599
  o https://bugzilla.suse.com/1184804
  o https://bugzilla.suse.com/1185377
  o https://bugzilla.suse.com/1186207
  o https://bugzilla.suse.com/1186222
  o https://bugzilla.suse.com/1187167
  o https://bugzilla.suse.com/1189305
  o https://bugzilla.suse.com/1189841
  o https://bugzilla.suse.com/1190358
  o https://bugzilla.suse.com/1190428
  o https://bugzilla.suse.com/1191229
  o https://bugzilla.suse.com/1191241
  o https://bugzilla.suse.com/1191384
  o https://bugzilla.suse.com/1191731
  o https://bugzilla.suse.com/1192032
  o https://bugzilla.suse.com/1192267
  o https://bugzilla.suse.com/1192740
  o https://bugzilla.suse.com/1192845
  o https://bugzilla.suse.com/1192847
  o https://bugzilla.suse.com/1192877
  o https://bugzilla.suse.com/1192946
  o https://bugzilla.suse.com/1193306
  o https://bugzilla.suse.com/1193440
  o https://bugzilla.suse.com/1193442
  o https://bugzilla.suse.com/1193575
  o https://bugzilla.suse.com/1193669
  o https://bugzilla.suse.com/1193727
  o https://bugzilla.suse.com/1193731
  o https://bugzilla.suse.com/1193767
  o https://bugzilla.suse.com/1193861
  o https://bugzilla.suse.com/1193864
  o https://bugzilla.suse.com/1193867
  o https://bugzilla.suse.com/1193927
  o https://bugzilla.suse.com/1194001
  o https://bugzilla.suse.com/1194048
  o https://bugzilla.suse.com/1194087
  o https://bugzilla.suse.com/1194227
  o https://bugzilla.suse.com/1194302
  o https://bugzilla.suse.com/1194516
  o https://bugzilla.suse.com/1194529
  o https://bugzilla.suse.com/1194880
  o https://bugzilla.suse.com/1194888
  o https://bugzilla.suse.com/1194985
  o https://bugzilla.suse.com/1195166
  o https://bugzilla.suse.com/1195254

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=jdaa
-----END PGP SIGNATURE-----