[SUSE-SU-2021:3206-1] Security update for the Linux Kernel

Severity Important
Affected Packages 20
CVEs 16

Security update for the Linux Kernel

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2018-9517: Fixed possible memory corruption due to a use after free in pppol2tp_connect (bsc#1108488).
  • CVE-2019-3874: Fixed possible denial of service attack via SCTP socket buffer used by a userspace applications (bnc#1129898).
  • CVE-2019-3900: Fixed an infinite loop issue while handling incoming packets in handle_rx() (bnc#1133374).
  • CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
  • CVE-2021-3653: Missing validation of the int_ctl VMCB field and allows a malicious L1 guest to enable AVIC support for the L2 guest. (bsc#1189399).
  • CVE-2021-3656: Missing validation of the the virt_ext VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).
  • CVE-2021-3679: A lack of CPU resource in tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
  • CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).
  • CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
  • CVE-2021-3759: Unaccounted ipc objects in Linux kernel could have lead to breaking memcg limits and DoS attacks (bsc#1190115).
  • CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)
  • CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).
  • CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).
  • CVE-2021-34556: Fixed side-channel attack via a Speculative Store Bypass via unprivileged BPF program that could have obtain sensitive information from kernel memory (bsc#1188983).
  • CVE-2021-35477: Fixed BPF stack frame pointer which could have been abused to disclose content of arbitrary kernel memory (bsc#1188985).
  • CVE-2020-12770: Fixed sg_remove_request call in a certain failure cases (bsc#1171420).

The following non-security bugs were fixed:

  • ACPI: NFIT: Fix support for virtual SPA ranges (git-fixes).
  • ALSA: seq: Fix racy deletion of subscriber (git-fixes).
  • ASoC: cs42l42: Do not allow SND_SOC_DAIFMT_LEFT_J (git-fixes).
  • ASoC: cs42l42: Fix inversion of ADC Notch Switch control (git-fixes).
  • ASoC: cs42l42: Remove duplicate control for WNF filter frequency (git-fixes).
  • Bluetooth: Move shutdown callback before flushing tx and rx queue (git-fixes).
  • Bluetooth: add timeout sanity check to hci_inquiry (git-fixes).
  • Bluetooth: fix repeated calls to sco_sock_kill (git-fixes).
  • Bluetooth: increase BTNAMSIZ to 21 chars to fix potential buffer overflow (git-fixes).
  • Bluetooth: sco: prevent information leak in sco_conn_defer_accept() (git-fixes).
  • KVM: SVM: Call SEV Guest Decommission if ASID binding fails (12sp5).
  • NFSv4/pNFS: Do not call _nfs4_pnfs_v3_ds_connect multiple times (git-fixes).
  • NFSv4: Initialise connection to the server in nfs4_alloc_client() (bsc#1040364).
  • PCI/MSI: Correct misleading comments (git-fixes).
  • PCI/MSI: Do not set invalid bits in MSI mask (git-fixes).
  • PCI/MSI: Enable and mask MSI-X early (git-fixes).
  • PCI/MSI: Use msi_mask_irq() in pci_msi_shutdown() (git-fixes).
  • PCI: Add Intel VMD devices to pci ids (bsc#1183983).
  • PCI: PM: Enable PME if it can be signaled from D3cold (git-fixes).
  • PCI: hv: Use expected affinity when unmasking IRQ (bsc#1185973).
  • PCI: vmd: Add an additional VMD device id to driver device id table (bsc#1183983).
  • PCI: vmd: Add offset to bus numbers if necessary (bsc#1183983).
  • PCI: vmd: Assign membar addresses from shadow registers (bsc#1183983).
  • PCI: vmd: Filter resource type bits from shadow register (bsc#1183983).
  • PCI: vmd: Fix config addressing when using bus offsets (bsc#1183983).
  • PCI: vmd: Fix shadow offsets to reflect spec changes (bsc#1183983).
  • SUNRPC: Fix the batch tasks count wraparound (git-fixes).
  • SUNRPC: Should wake up the privileged task firstly (git-fixes).
  • SUNRPC: improve error response to over-size gss credential (bsc#1190022).
  • USB: serial: ch341: fix character loss at high transfer rates (git-fixes).
  • USB: serial: ftdi_sio: add device ID for Auto-M3 OP-COM v2 (git-fixes).
  • USB: serial: option: add Telit FD980 composition 0x1056 (git-fixes).
  • USB: usbtmc: Fix RCU stall warning (git-fixes).
  • USB:ehci:fix Kunpeng920 ehci hardware problem (git-fixes).
  • arch/x86/lib/usercopy_64.c: fix __copy_user_flushcache() cache writeback (git-fixes).
  • ath6kl: wmi: fix an error code in ath6kl_wmi_sync_point() (git-fixes).
  • ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (git-fixes).
  • bcma: Fix memory leak for internally-handled cores (git-fixes).
  • bdi: Do not use freezable workqueue (bsc#1189573).
  • blk-mq-sched: Fix blk_mq_sched_alloc_tags() error handling (bsc#1189506).
  • block: fix trace completion for chained bio (bsc#1189505).
  • can: usb: esd_usb2: esd_usb2_rx_event(): fix the interchange of the CAN RX and TX error counters (git-fixes).
  • cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
  • cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
  • cifs: constify get_normalized_path() properly (bsc#1185902).
  • cifs: do not cargo-cult strndup() (bsc#1185902).
  • cifs: do not send tree disconnect to ipc shares (bsc#1185902).
  • cifs: do not share tcp servers with dfs mounts (bsc#1185902).
  • cifs: do not share tcp sessions of dfs connections (bsc#1185902).
  • cifs: fix check of dfs interlinks (bsc#1185902).
  • cifs: fix path comparison and hash calc (bsc#1185902).
  • cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
  • cifs: handle different charsets in dfs cache (bsc#1185902).
  • cifs: keep referral server sessions alive (bsc#1185902).
  • cifs: missing null pointer check in cifs_mount (bsc#1185902).
  • cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
  • cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
  • clk: stm32f4: fix post divisor setup for I2S/SAI PLLs (git-fixes).
  • crypto: ccp - Annotate SEV Firmware file names (bsc#1189268).
  • crypto: nx - Fix RCU warning in nx842_OF_upd_status (git-fixes).
  • crypto: nx - Fix memcpy() over-reading in nonce (git-fixes).
  • crypto: talitos - Do not modify req->cryptlen on decryption (git-fixes).
  • crypto: talitos - fix ECB algs ivsize (git-fixes).
  • crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).
  • dm btree remove: assign new_root only when removal succeeds (git fixes).
  • dm cache metadata: Avoid returning cmd->bm wild pointer on error (git fixes).
  • dm era: Fix bitset memory leaks (git fixes).
  • dm era: Recover committed writeset after crash (git fixes).
  • dm era: Reinitialize bitset cache before digesting a new writeset (git fixes).
  • dm era: Use correct value size in equality function of writeset tree (git fixes).
  • dm era: Verify the data block size hasn't changed (git fixes).
  • dm era: only resize metadata in preresume (git fixes).
  • dm ioctl: fix error return code in target_message (git fixes).
  • dm ioctl: fix out of bounds array access when no devices (git fixes).
  • dm persistent data: packed struct should have an aligned() attribute too (git fixes).
  • dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (git fixes).
  • dm snapshot: fix crash with transient storage and zero chunk size (git fixes).
  • dm snapshot: flush merged data before committing metadata (git fixes).
  • dm snapshot: properly fix a crash when an origin has no snapshots (git fixes).
  • dm space map common: fix division bug in sm_ll_find_free_block() (git fixes).
  • dm table: fix iterate_devices based device capability checks (git fixes).
  • dm thin metadata: Avoid returning cmd->bm wild pointer on error (git fixes).
  • dm verity: fix DM_VERITY_OPTS_MAX value (git-fixes).
  • dm writecache: fix the maximum number of arguments (git-fixes).
  • dm writecache: handle DAX to partitions on persistent memory correctly (git-fixes).
  • dm writecache: remove BUG() and fail gracefully instead (git-fixes).
  • dm zoned: select CONFIG_CRC32 (git-fixes).
  • dm: eliminate potential source of excessive kernel log noise (git fixes).
  • dm: remove invalid sparse __acquires and __releases annotations (git-fixes).
  • ext4: cleanup in-core orphan list if ext4_truncate() failed to get a transaction handle (bsc#1189568).
  • ext4: correct the cache_nr in tracepoint ext4_es_shrink_exit (bsc#1189564).
  • ext4: fix avefreec in find_group_orlov (bsc#1189566).
  • ext4: fix kernel infoleak via ext4_extent_header (bsc#1189562).
  • ext4: remove check for zero nr_to_scan in ext4_es_scan() (bsc#1189565).
  • ext4: use ext4_grp_locked_error in mb_find_extent (bsc#1189567).
  • ftgmac100: Restart MAC HW once (git-fixes).
  • i2c: dev: zero out array used for i2c reads from userspace (git-fixes).
  • i2c: highlander: add IRQ check (git-fixes).
  • i2c: iop3xx: fix deferred probing (git-fixes).
  • i2c: mt65xx: fix IRQ check (git-fixes).
  • i2c: s3c2410: fix IRQ check (git-fixes).
  • i40e: Fix Error I40E_AQ_RC_EINVAL when removing VFs (git-fixes).
  • iio: adc: Fix incorrect exit of for-loop (git-fixes).
  • iio: humidity: hdc100x: Add margin to the conversion time (git-fixes).
  • iommu/amd: Fix extended features logging (bsc#1189269).
  • iommu/arm-smmu-v3: add bit field SFM into GERROR_ERR_MASK (bsc#1189270).
  • iommu/vt-d: Define counter explicitly as unsigned int (bsc#1189271).
  • iommu/vt-d: Fix sysfs leak in alloc_iommu() (bsc#1189272).
  • kABI: Fix kABI after fixing vcpu-id indexed arrays (git-fixes).
  • kABI: s390/ap: Fix hanging ioctl caused by wrong msg counter (bsc#1188982 LTC#193818).
  • mac80211: Fix insufficient headroom issue for AMSDU (git-fixes).
  • md/raid10: properly indicate failure when ending a failed write request (git-fixes).
  • media: go7007: fix memory leak in go7007_usb_probe (git-fixes).
  • media: rtl28xxu: fix zero-length control request (git-fixes).
  • memcg: enable accounting for file lock caches (bsc#1190115).
  • mm, vmscan: guarantee drop_slab_node() termination (VM Functionality, bsc#1189301).
  • mm/memory-failure: unnecessary amount of unmapping (bsc#1189640).
  • mm/memory.c: do_fault: avoid usage of stale vm_area_struct (bsc#1136513).
  • mm/rmap: fix potential pte_unmap on an not mapped pte (git-fixes).
  • mm/thp: unmap_mapping_page() to fix THP truncate_cleanup_page() (bsc#1189569).
  • mm/vmscan: fix infinite loop in drop_slab_node (VM Performance, bsc#1189301).
  • mm: vmscan: scan anonymous pages on file refaults (VM Performance, bsc#1183050).
  • mmc: dw_mmc: Fix issue with uninitialized dma_slave_config (git-fixes).
  • mmc: moxart: Fix issue with uninitialized dma_slave_config (git-fixes).
  • net: lapbether: Remove netif_start_queue / netif_stop_queue (git-fixes).
  • net: mvpp2: Add TCAM entry to drop flow control pause frames (git-fixes).
  • net: mvpp2: prs: fix PPPoE with ipv6 packet parse (git-fixes).
  • net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes).
  • net: usb: Merge cpu_to_le32s + memcpy to put_unaligned_le32 (git-fixes).
  • net: usb: ax88179_178a: remove redundant assignment to variable ret (git-fixes).
  • nfs: fix acl memory leak of posix_acl_create() (git-fixes).
  • nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt context (bsc#1187076).
  • nvme-fc: convert assoc_active flag to bit op (bsc#1187076).
  • nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc#1187076).
  • nvme-fc: fix double-free scenarios on hw queues (bsc#1187076).
  • nvme-fc: fix io timeout to abort I/O (bsc#1187076).
  • nvme-fc: fix racing controller reset and create association (bsc#1187076).
  • nvme-fc: remove err_work work item (bsc#1187076).
  • nvme-fc: remove nvme_fc_terminate_io() (bsc#1187076).
  • nvme-fc: track error_recovery while connecting (bsc#1187076).
  • ocfs2: fix snprintf() checking (bsc#1189581).
  • ocfs2: fix zero out valid data (bsc#1189579).
  • ocfs2: issue zeroout to EOF blocks (bsc#1189582).
  • ocfs2: ocfs2_downconvert_lock failure results in deadlock (bsc#1188439).
  • overflow: Correct check_shl_overflow() comment (git-fixes).
  • overflow: Include header file with SIZE_MAX declaration (git-fixes).
  • ovl: check whiteout in ovl_create_over_whiteout() (bsc#1189846).
  • ovl: filter of trusted xattr results in audit (bsc#1189846).
  • ovl: fix dentry leak in ovl_get_redirect (bsc#1189846).
  • ovl: initialize error in ovl_copy_xattr (bsc#1189846).
  • ovl: relax WARN_ON() on rename to self (bsc#1189846).
  • pcmcia: i82092: fix a null pointer dereference bug (git-fixes).
  • power: supply: max17042: handle fails of reading status register (git-fixes).
  • powerpc/pseries: Fix update of LPAR security flavor after LPM (bsc#1188885 ltc#193722 git-fixes).
  • qlcnic: Fix error code in probe (git-fixes).
  • r8152: Fix potential PM refcount imbalance (git-fixes).
  • XXXXXXX: make sure to verify directory entry for legacy interfaces too (bsc#1189639).
  • regulator: rt5033: Fix n_voltages settings for BUCK and LDO (git-fixes).
  • s390/ap: Fix hanging ioctl caused by wrong msg counter (bsc#1188982 LTC#193818).
  • scsi: core: Add scsi_prot_ref_tag() helper (bsc#1189392).
  • scsi: ibmvfc: Do not wait for initial device scan (bsc#1127650).
  • scsi: libfc: Fix array index out of bound exception (bsc#1188616).
  • scsi: lpfc: Add 256 Gb link speed support (bsc#1189385).
  • scsi: lpfc: Add PCI ID support for LPe37000/LPe38000 series adapters (bsc#1189385).
  • scsi: lpfc: Call discovery state machine when handling PLOGI/ADISC completions (bsc#1189385).
  • scsi: lpfc: Clear outstanding active mailbox during PCI function reset (bsc#1189385).
  • scsi: lpfc: Copyright updates for 12.8.0.11 patches (bsc#1189385).
  • scsi: lpfc: Copyright updates for 14.0.0.0 patches (bsc#1189385).
  • scsi: lpfc: Delay unregistering from transport until GIDFT or ADISC completes (bsc#1189385).
  • scsi: lpfc: Discovery state machine fixes for LOGO handling (bsc#1189385).
  • scsi: lpfc: Enable adisc discovery after RSCN by default (bsc#1189385).
  • scsi: lpfc: Fix KASAN slab-out-of-bounds in lpfc_unreg_rpi() routine (bsc#1189385).
  • scsi: lpfc: Fix NULL ptr dereference with NPIV ports for RDF handling (bsc#1189385).
  • scsi: lpfc: Fix NVMe support reporting in log message (bsc#1189385).
  • scsi: lpfc: Fix cq_id truncation in rq create (bsc#1189385).
  • scsi: lpfc: Fix memory leaks in error paths while issuing ELS RDF/SCR request (bsc#1189385).
  • scsi: lpfc: Fix possible ABBA deadlock in nvmet_xri_aborted() (bsc#1189385).
  • scsi: lpfc: Fix target reset handler from falsely returning FAILURE (bsc#1189385).
  • scsi: lpfc: Improve firmware download logging (bsc#1189385).
  • scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS handling (bsc#1189385).
  • scsi: lpfc: Move initialization of phba->poll_list earlier to avoid crash (git-fixes).
  • scsi: lpfc: Remove REG_LOGIN check requirement to issue an ELS RDF (bsc#1189385).
  • scsi: lpfc: Remove redundant assignment to pointer pcmd (bsc#1189385).
  • scsi: lpfc: Remove use of kmalloc() in trace event logging (bsc#1189385).
  • scsi: lpfc: Revise Topology and RAS support checks for new adapters (bsc#1189385).
  • scsi: lpfc: Skip issuing ADISC when node is in NPR state (bsc#1189385).
  • scsi: lpfc: Skip reg_vpi when link is down for SLI3 in ADISC cmpl path (bsc#1189385).
  • scsi: lpfc: Update lpfc version to 12.8.0.11 (bsc#1189385).
  • scsi: lpfc: Update lpfc version to 14.0.0.0 (bsc#1189385).
  • scsi: lpfc: Use PBDE feature enabled bit to determine PBDE support (bsc#1189385).
  • scsi: lpfc: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189385).
  • scsi: qla2xxx: Add heartbeat check (bsc#1189392).
  • scsi: qla2xxx: Fix error return code in qla82xx_write_flash_dword() (bsc#1189392).
  • scsi: qla2xxx: Fix spelling mistakes 'allloc' -> 'alloc' (bsc#1189384).
  • scsi: qla2xxx: Fix use after free in debug code (bsc#1189384).
  • scsi: qla2xxx: Log PCI address in qla_nvme_unregister_remote_port() (bsc#1189392).
  • scsi: qla2xxx: Remove duplicate declarations (bsc#1189392).
  • scsi: qla2xxx: Remove redundant assignment to rval (bsc#1189392).
  • scsi: qla2xxx: Remove redundant continue statement in a for-loop (bsc#1189392).
  • scsi: qla2xxx: Remove redundant initialization of variable num_cnt (bsc#1189384).
  • scsi: qla2xxx: Remove unused variable 'status' (bsc#1189392).
  • scsi: qla2xxx: Update version to 10.02.00.107-k (bsc#1189384).
  • scsi: qla2xxx: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189392).
  • scsi: qla2xxx: Use the proper SCSI midlayer interfaces for PI (bsc#1189392).
  • scsi: qla2xxx: edif: Add authentication pass + fail bsgs (bsc#1189384).
  • scsi: qla2xxx: edif: Add detection of secure device (bsc#1189384).
  • scsi: qla2xxx: edif: Add doorbell notification for app (bsc#1189384).
  • scsi: qla2xxx: edif: Add encryption to I/O path (bsc#1189384).
  • scsi: qla2xxx: edif: Add extraction of auth_els from the wire (bsc#1189384).
  • scsi: qla2xxx: edif: Add getfcinfo and statistic bsgs (bsc#1189384).
  • scsi: qla2xxx: edif: Add key update (bsc#1189384).
  • scsi: qla2xxx: edif: Add send, receive, and accept for auth_els (bsc#1189384).
  • scsi: qla2xxx: edif: Add start + stop bsgs (bsc#1189392).
  • scsi: qla2xxx: edif: Increment command and completion counts (bsc#1189384).
  • scsi: target: qla2xxx: Wait for stop_phase1 at WWN removal (bsc#1189392).
  • serial: 8250: Mask out floating 16/32-bit bus bits (git-fixes).
  • spi: mediatek: Fix fifo transfer (git-fixes).
  • spi: spi-fsl-dspi: Fix issue with uninitialized dma_slave_config (git-fixes).
  • spi: spi-pic32: Fix issue with uninitialized dma_slave_config (git-fixes).
  • staging: rtl8723bs: Fix a resource leak in sd_int_dpc (git-fixes).
  • virtio_net: Fix error code in probe() (git-fixes).
  • writeback: fix obtain a reference to a freeing memcg css (bsc#1189577).
  • x86/fpu: Limit xstate copy size in xstateregs_set() (bsc#1114648).
  • x86/fpu: Make init_fpstate correct with optimized XSAVE (bsc#1114648).
  • x86/fpu: Reset state for all signal restore failures (bsc#1114648).
  • x86/kvm: fix vcpu-id indexed array sizes (git-fixes).
  • x86/signal: Detect and prevent an alternate signal stack overflow (bsc#1114648).
  • xen/events: Fix race in set_evtchn_to_irq (git-fixes).
Package Affected Version
pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12&sp=5 < 4.12.14-122.88.1
pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-12&sp=5 < 4.12.14-122.88.1
pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-12&sp=5 < 4.12.14-122.88.1
pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-12&sp=5 < 4.12.14-122.88.1
pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12&sp=5 < 4.12.14-122.88.1
pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12&sp=5 < 4.12.14-122.88.1
pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12&sp=5 < 4.12.14-122.88.1
pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12&sp=5 < 4.12.14-122.88.1
pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-12&sp=5 < 4.12.14-122.88.1
pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-12&sp=5 < 4.12.14-122.88.1
pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-12&sp=5 < 4.12.14-122.88.1
pkg:rpm/suse/kernel-default-man?arch=s390x&distro=sles-12&sp=5 < 4.12.14-122.88.1
pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12&sp=5 < 4.12.14-122.88.1
pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-12&sp=5 < 4.12.14-122.88.1
pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-12&sp=5 < 4.12.14-122.88.1
pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-12&sp=5 < 4.12.14-122.88.1
pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12&sp=5 < 4.12.14-122.88.1
pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-12&sp=5 < 4.12.14-122.88.1
pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-12&sp=5 < 4.12.14-122.88.1
pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-12&sp=5 < 4.12.14-122.88.1
ID
SUSE-SU-2021:3206-1
Severity
important
URL
https://www.suse.com/support/update/announcement/2021/suse-su-20213206-1/
Published
2021-09-23T14:17:20
(3 years ago)
Modified
2021-09-23T14:17:20
(3 years ago)
Rights
Copyright 2024 SUSE LLC. All rights reserved.
Other Advisories
Source # ID Name URL
Suse SUSE ratings https://www.suse.com/support/security/rating/
Suse URL of this CSAF notice https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3206-1.json
Suse URL for SUSE-SU-2021:3206-1 https://www.suse.com/support/update/announcement/2021/suse-su-20213206-1/
Suse E-Mail link for SUSE-SU-2021:3206-1 https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html
Bugzilla SUSE Bug 1040364 https://bugzilla.suse.com/1040364
Bugzilla SUSE Bug 1108488 https://bugzilla.suse.com/1108488
Bugzilla SUSE Bug 1114648 https://bugzilla.suse.com/1114648
Bugzilla SUSE Bug 1127650 https://bugzilla.suse.com/1127650
Bugzilla SUSE Bug 1129898 https://bugzilla.suse.com/1129898
Bugzilla SUSE Bug 1133374 https://bugzilla.suse.com/1133374
Bugzilla SUSE Bug 1136513 https://bugzilla.suse.com/1136513
Bugzilla SUSE Bug 1171420 https://bugzilla.suse.com/1171420
Bugzilla SUSE Bug 1183050 https://bugzilla.suse.com/1183050
Bugzilla SUSE Bug 1183983 https://bugzilla.suse.com/1183983
Bugzilla SUSE Bug 1185902 https://bugzilla.suse.com/1185902
Bugzilla SUSE Bug 1185973 https://bugzilla.suse.com/1185973
Bugzilla SUSE Bug 1187076 https://bugzilla.suse.com/1187076
Bugzilla SUSE Bug 1188172 https://bugzilla.suse.com/1188172
Bugzilla SUSE Bug 1188439 https://bugzilla.suse.com/1188439
Bugzilla SUSE Bug 1188616 https://bugzilla.suse.com/1188616
Bugzilla SUSE Bug 1188885 https://bugzilla.suse.com/1188885
Bugzilla SUSE Bug 1188982 https://bugzilla.suse.com/1188982
Bugzilla SUSE Bug 1188983 https://bugzilla.suse.com/1188983
Bugzilla SUSE Bug 1188985 https://bugzilla.suse.com/1188985
Bugzilla SUSE Bug 1189057 https://bugzilla.suse.com/1189057
Bugzilla SUSE Bug 1189262 https://bugzilla.suse.com/1189262
Bugzilla SUSE Bug 1189268 https://bugzilla.suse.com/1189268
Bugzilla SUSE Bug 1189269 https://bugzilla.suse.com/1189269
Bugzilla SUSE Bug 1189270 https://bugzilla.suse.com/1189270
Bugzilla SUSE Bug 1189271 https://bugzilla.suse.com/1189271
Bugzilla SUSE Bug 1189272 https://bugzilla.suse.com/1189272
Bugzilla SUSE Bug 1189291 https://bugzilla.suse.com/1189291
Bugzilla SUSE Bug 1189301 https://bugzilla.suse.com/1189301
Bugzilla SUSE Bug 1189384 https://bugzilla.suse.com/1189384
Bugzilla SUSE Bug 1189385 https://bugzilla.suse.com/1189385
Bugzilla SUSE Bug 1189392 https://bugzilla.suse.com/1189392
Bugzilla SUSE Bug 1189399 https://bugzilla.suse.com/1189399
Bugzilla SUSE Bug 1189400 https://bugzilla.suse.com/1189400
Bugzilla SUSE Bug 1189505 https://bugzilla.suse.com/1189505
Bugzilla SUSE Bug 1189506 https://bugzilla.suse.com/1189506
Bugzilla SUSE Bug 1189562 https://bugzilla.suse.com/1189562
Bugzilla SUSE Bug 1189564 https://bugzilla.suse.com/1189564
Bugzilla SUSE Bug 1189565 https://bugzilla.suse.com/1189565
Bugzilla SUSE Bug 1189566 https://bugzilla.suse.com/1189566
Bugzilla SUSE Bug 1189567 https://bugzilla.suse.com/1189567
Bugzilla SUSE Bug 1189568 https://bugzilla.suse.com/1189568
Bugzilla SUSE Bug 1189569 https://bugzilla.suse.com/1189569
Bugzilla SUSE Bug 1189573 https://bugzilla.suse.com/1189573
Bugzilla SUSE Bug 1189577 https://bugzilla.suse.com/1189577
Bugzilla SUSE Bug 1189579 https://bugzilla.suse.com/1189579
Bugzilla SUSE Bug 1189581 https://bugzilla.suse.com/1189581
Bugzilla SUSE Bug 1189582 https://bugzilla.suse.com/1189582
Bugzilla SUSE Bug 1189639 https://bugzilla.suse.com/1189639
Bugzilla SUSE Bug 1189640 https://bugzilla.suse.com/1189640
Bugzilla SUSE Bug 1189706 https://bugzilla.suse.com/1189706
Bugzilla SUSE Bug 1189846 https://bugzilla.suse.com/1189846
Bugzilla SUSE Bug 1190022 https://bugzilla.suse.com/1190022
Bugzilla SUSE Bug 1190025 https://bugzilla.suse.com/1190025
Bugzilla SUSE Bug 1190115 https://bugzilla.suse.com/1190115
Bugzilla SUSE Bug 1190117 https://bugzilla.suse.com/1190117
CVE SUSE CVE CVE-2018-9517 page https://www.suse.com/security/cve/CVE-2018-9517/
CVE SUSE CVE CVE-2019-3874 page https://www.suse.com/security/cve/CVE-2019-3874/
CVE SUSE CVE CVE-2019-3900 page https://www.suse.com/security/cve/CVE-2019-3900/
CVE SUSE CVE CVE-2020-12770 page https://www.suse.com/security/cve/CVE-2020-12770/
CVE SUSE CVE CVE-2021-34556 page https://www.suse.com/security/cve/CVE-2021-34556/
CVE SUSE CVE CVE-2021-35477 page https://www.suse.com/security/cve/CVE-2021-35477/
CVE SUSE CVE CVE-2021-3640 page https://www.suse.com/security/cve/CVE-2021-3640/
CVE SUSE CVE CVE-2021-3653 page https://www.suse.com/security/cve/CVE-2021-3653/
CVE SUSE CVE CVE-2021-3656 page https://www.suse.com/security/cve/CVE-2021-3656/
CVE SUSE CVE CVE-2021-3679 page https://www.suse.com/security/cve/CVE-2021-3679/
CVE SUSE CVE CVE-2021-3732 page https://www.suse.com/security/cve/CVE-2021-3732/
CVE SUSE CVE CVE-2021-3753 page https://www.suse.com/security/cve/CVE-2021-3753/
CVE SUSE CVE CVE-2021-3759 page https://www.suse.com/security/cve/CVE-2021-3759/
CVE SUSE CVE CVE-2021-38160 page https://www.suse.com/security/cve/CVE-2021-38160/
CVE SUSE CVE CVE-2021-38198 page https://www.suse.com/security/cve/CVE-2021-38198/
CVE SUSE CVE CVE-2021-38204 page https://www.suse.com/security/cve/CVE-2021-38204/
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12&sp=5 suse kernel-syms < 4.12.14-122.88.1 sles-12 x86_64
Affected pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-12&sp=5 suse kernel-syms < 4.12.14-122.88.1 sles-12 s390x
Affected pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-12&sp=5 suse kernel-syms < 4.12.14-122.88.1 sles-12 ppc64le
Affected pkg:rpm/suse/kernel-syms?arch=aarch64&distro=sles-12&sp=5 suse kernel-syms < 4.12.14-122.88.1 sles-12 aarch64
Affected pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12&sp=5 suse kernel-source < 4.12.14-122.88.1 sles-12 noarch
Affected pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12&sp=5 suse kernel-macros < 4.12.14-122.88.1 sles-12 noarch
Affected pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12&sp=5 suse kernel-devel < 4.12.14-122.88.1 sles-12 noarch
Affected pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12&sp=5 suse kernel-default < 4.12.14-122.88.1 sles-12 x86_64
Affected pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-12&sp=5 suse kernel-default < 4.12.14-122.88.1 sles-12 s390x
Affected pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-12&sp=5 suse kernel-default < 4.12.14-122.88.1 sles-12 ppc64le
Affected pkg:rpm/suse/kernel-default?arch=aarch64&distro=sles-12&sp=5 suse kernel-default < 4.12.14-122.88.1 sles-12 aarch64
Affected pkg:rpm/suse/kernel-default-man?arch=s390x&distro=sles-12&sp=5 suse kernel-default-man < 4.12.14-122.88.1 sles-12 s390x
Affected pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12&sp=5 suse kernel-default-devel < 4.12.14-122.88.1 sles-12 x86_64
Affected pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-12&sp=5 suse kernel-default-devel < 4.12.14-122.88.1 sles-12 s390x
Affected pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-12&sp=5 suse kernel-default-devel < 4.12.14-122.88.1 sles-12 ppc64le
Affected pkg:rpm/suse/kernel-default-devel?arch=aarch64&distro=sles-12&sp=5 suse kernel-default-devel < 4.12.14-122.88.1 sles-12 aarch64
Affected pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12&sp=5 suse kernel-default-base < 4.12.14-122.88.1 sles-12 x86_64
Affected pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-12&sp=5 suse kernel-default-base < 4.12.14-122.88.1 sles-12 s390x
Affected pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-12&sp=5 suse kernel-default-base < 4.12.14-122.88.1 sles-12 ppc64le
Affected pkg:rpm/suse/kernel-default-base?arch=aarch64&distro=sles-12&sp=5 suse kernel-default-base < 4.12.14-122.88.1 sles-12 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...