Malware Devil

Monday, February 15, 2021

ESB-2021.0554 – [SUSE] Linux Kernel: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0554
                   Security update for the Linux Kernel
                             15 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Linux Kernel
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Root Compromise                 -- Existing Account      
                   Access Privileged Data          -- Existing Account      
                   Denial of Service               -- Existing Account      
                   Access Confidential Data        -- Existing Account      
                   Unauthorised Access             -- Existing Account      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-20177 CVE-2021-3348 CVE-2021-3347
                   CVE-2021-0342 CVE-2020-36158 CVE-2020-29569
                   CVE-2020-29568 CVE-2020-28374 CVE-2020-27835
                   CVE-2020-25639  

Reference:         ESB-2021.0530
                   ESB-2021.0526
                   ESB-2021.0348

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2021/suse-su-20210433-1

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:0433-1
Rating:            important
References:        #1046305 #1046306 #1046540 #1046542 #1046648 #1050242
                   #1050244 #1050536 #1050538 #1050545 #1056653 #1056657
                   #1056787 #1064802 #1066129 #1073513 #1074220 #1075020
                   #1086282 #1086301 #1086313 #1086314 #1098633 #1103990
                   #1103991 #1103992 #1104270 #1104277 #1104279 #1104353
                   #1104427 #1104742 #1104745 #1109837 #1111981 #1112178
                   #1112374 #1113956 #1119113 #1126206 #1126390 #1127354
                   #1127371 #1129770 #1136348 #1144912 #1149032 #1163727
                   #1172145 #1174206 #1176831 #1176846 #1178036 #1178049
                   #1178372 #1178631 #1178684 #1178900 #1179093 #1179508
                   #1179509 #1179563 #1179573 #1179575 #1179878 #1180008
                   #1180130 #1180559 #1180562 #1180676 #1180765 #1180812
                   #1180859 #1180891 #1180912 #1181001 #1181018 #1181170
                   #1181230 #1181231 #1181349 #1181425 #1181504 #1181553
                   #1181645
Cross-References:  CVE-2020-25639 CVE-2020-27835 CVE-2020-28374 CVE-2020-29568
                   CVE-2020-29569 CVE-2020-36158 CVE-2021-0342 CVE-2021-20177
                   CVE-2021-3347 CVE-2021-3348
Affected Products:
                   SUSE Linux Enterprise Real Time Extension 12-SP5
______________________________________________________________________________

An update that solves 10 vulnerabilities and has 75 fixes is now available.

Description:

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
and bugfixes.

The following security bugs were fixed:

  o CVE-2021-3347: A use-after-free was discovered in the PI futexes during
    fault handling, allowing local users to execute code in the kernel (bnc#
    1181349).
  o CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be
    triggered by local attackers (with access to the nbd device) via an I/O
    request at a certain point during device setup (bnc#1181504).
  o CVE-2021-20177: Fixed a kernel panic related to iptables string matching
    rules. A privileged user could insert a rule which could lead to denial of
    service (bnc#1180765).
  o CVE-2021-0342: In tun_get_user of tun.c, there is possible memory
    corruption due to a use after free. This could lead to local escalation of
    privilege with System execution privileges required. (bnc#1180812)
  o CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found,
    specifically in the way user calls Ioctl after open dev file and fork. A
    local user could use this flaw to crash the system (bnc#1179878).
  o CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#
    1176846).
  o CVE-2020-29569: Fixed a potential privilege escalation and information
    leaks related to the PV block backend, as used by Xen (bnc#1179509).
  o CVE-2020-29568: Fixed a denial of service issue, related to processing
    watch events (bnc#1179508).
  o CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
  o CVE-2020-36158: Fixed a potential remote code execution in the Marvell
    mwifiex driver (bsc#1180559).


The following non-security bugs were fixed:

  o ACPI: PNP: compare the string length in the matching_id() (git-fixes).
  o ACPI: scan: Harden acpi_device_add() against device ID overflows
    (git-fixes).
  o ACPI: scan: Make acpi_bus_get_device() clear return pointer on error
    (git-fixes).
  o ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI
    (git-fixes).
  o ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1
    (git-fixes).
  o ACPICA: Do not increment operation_region reference counts for field units
    (git-fixes).
  o ALSA: ca0106: fix error code handling (git-fixes).
  o ALSA: ctl: allow TLV read operation for callback type of element in locked
    case (git-fixes).
  o ALSA: doc: Fix reference to mixart.rst (git-fixes).
  o ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).
  o ALSA: firewire-tascam: Fix integer overflow in midi_port_work()
    (git-fixes).
  o ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO
    (git-fixes).
  o ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
  o ALSA: hda/hdmi: always check pin power status in i915 pin fixup
    (git-fixes).
  o ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged
    (git-fixes).
  o ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255
    (git-fixes).
  o ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation
    P520 (git-fixes).
  o ALSA: hda/via: Add minimum mute flag (git-fixes).
  o ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).
  o ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table
    (git-fixes).
  o ALSA: hda: Fix potential race in unsol event handler (git-fixes).
  o ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
  o ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).
  o ALSA: line6: Perform sanity check for each URB creation (git-fixes).
  o ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).
  o ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
  o ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
  o ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check
    (git-fixes).
  o ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info()
    (git-fixes).
  o ALSA: timer: Limit max amount of slave instances (git-fixes).
  o ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).
  o ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).
  o ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
  o ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
  o ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
  o ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S
    (git-fixes).
  o ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S
    (git-fixes).
  o ALSA: usb-audio: Disable sample read check if firmware does not give back
    (git-fixes).
  o ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).
  o ALSA: usb-audio: Fix control 'access overflow' errors from chmap
    (git-fixes).
  o ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
  o ALSA: usb-audio: Fix race against the error recovery URB submission
    (git-fixes).
  o ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).
  o ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).
  o ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices
    (git-fixes).
  o ASoC: Intel: haswell: Add missing pm_ops (git-fixes).
  o ASoC: dapm: remove widget from dirty list on free (git-fixes).
  o ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed
    (git-fixes).
  o ASoC: pcm3168a: The codec does not support S32_LE (git-fixes).
  o ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes).
  o ASoC: sti: fix possible sleep-in-atomic (git-fixes).
  o ASoC: wm8904: fix regcache handling (git-fixes).
  o ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes).
  o Bluetooth: Fix advertising duplicated flags (git-fixes).
  o Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).
  o EDAC/amd64: Fix PCI component registration (bsc#1112178).
  o HID: Improve Windows Precision Touchpad detection (git-fixes).
  o HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).
  o HID: core: Correctly handle ReportSize being zero (git-fixes).
  o HID: core: check whether Usage Page item is after Usage ID items
    (git-fixes).
  o HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
  o HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
  o HID: intel-ish-hid: fix wrong error handling in ishtp_cl_alloc_tx_ring()
    (git-fixes).
  o HID: logitech-hidpp: Silence intermittent get_battery_capacity errors
    (git-fixes).
  o IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (bsc#
    1103991).
  o Input: atmel_mxt_ts - disable IRQ across suspend (git-fixes).
  o Input: cm109 - do not stomp on control URB (git-fixes).
  o Input: cros_ec_keyb - send 'scancodes' in addition to key events
    (git-fixes).
  o Input: goodix - add upside-down quirk for Teclast X98 Pro tablet
    (git-fixes).
  o Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
  o Input: i8042 - allow insmod to succeed on devices without an i8042
    controller (git-fixes).
  o Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).
  o KVM: SVM: Initialize prev_ga_tag before use (bsc#1180912).
  o NFC: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).
  o NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock
    (git-fixes).
  o NFS: nfs_igrab_and_active must first reference the superblock (git-fixes).
  o NFS: switch nfsiod to be an UNBOUND workqueue (git-fixes).
  o NFSv4.2: condition READDIR's mask for security label based on LSM state
    (git-fixes).
  o PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).
  o PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge
    (git-fixes).
  o PCI: Do not disable decoding when mmio_always_on is set (git-fixes).
  o PM / hibernate: memory_bm_find_bit(): Tighten node optimisation
    (git-fixes).
  o PM: ACPI: Output correct message on target power state (git-fixes).
  o PM: hibernate: Freeze kernel threads in software_resume() (git-fixes).
  o PM: hibernate: remove the bogus call to get_gendisk() in software_resume()
    (git-fixes).
  o RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#
    1103992).
  o RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1050244 ).
  o RDMA/bnxt_re: Do not report transparent vlan from QP1 (bsc#1104742).
  o RDMA/cma: Do not overwrite sgid_attr after device is released (bsc#
    1103992).
  o RDMA/core: Ensure security pkey modify is not lost (bsc#1046306 ).
  o RDMA/core: Fix pkey and port assignment in get_new_pps (bsc#1046306).
  o RDMA/core: Fix protection fault in get_pkey_idx_qp_list (bsc#1046306).
  o RDMA/core: Fix reported speed and width (bsc#1046306 ).
  o RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#
    1103992).
  o RDMA/core: Fix use of logical OR in get_new_pps (bsc#1046306 ).
  o RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1104427).
  o RDMA/hns: Bugfix for slab-out-of-bounds when unloading hip08 driver (bsc#
    1104427).
  o RDMA/hns: Fix cmdq parameter of querying pf timer resource (bsc#1104427 bsc
    #1126206).
  o RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1104427 ).
  o RDMA/hns: bugfix for slab-out-of-bounds when loading hip08 driver (bsc#
    1104427).
  o RDMA/iw_cxgb4: Fix incorrect function parameters (bsc#1136348 jsc#
    SLE-4684).
  o RDMA/iw_cxgb4: initiate CLOSE when entering TERM (bsc#1136348 jsc#
    SLE-4684).
  o RDMA/mlx5: Add init2init as a modify command (bsc#1103991 ).
  o RDMA/mlx5: Fix typo in enum name (bsc#1103991).
  o RDMA/mlx5: Fix wrong free of blue flame register on error (bsc#1103991).
  o RDMA/qedr: Fix inline size returned for iWARP (bsc#1050545 ).
  o SUNRPC: cache: ignore timestamp written to 'flush' file (bsc#1178036).
  o USB: Fix: Do not skip endpoint descriptors with maxpacket=0 (git-fixes).
  o USB: Skip endpoints with 0 maxpacket length (git-fixes).
  o USB: UAS: introduce a quirk to set no_write_same (git-fixes).
  o USB: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
  o USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
  o USB: ehci: fix an interrupt calltrace error (git-fixes).
  o USB: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
  o USB: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
  o USB: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
  o USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).
  o USB: ldusb: use unsigned size format specifiers (git-fixes).
  o USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).
  o USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set
    (git-fixes).
  o USB: yurex: fix control-URB timeout handling (git-fixes).
  o __netif_receive_skb_core: pass skb by reference (bsc#1109837).
  o arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#
    1180130).
  o arm64: pgtable: Fix pte_accessible() (bsc#1180130).
  o ata/libata: Fix usage of page address by page_address in
    ata_scsi_mode_select_xlat function (git-fixes).
  o ath10k: fix backtrace on coredump (git-fixes).
  o ath10k: fix get invalid tx rate for Mesh metric (git-fixes).
  o ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq
    (git-fixes).
  o ath9k_htc: Discard undersized packets (git-fixes).
  o ath9k_htc: Modify byte order for an error message (git-fixes).
  o ath9k_htc: Silence undersized packet warnings (git-fixes).
  o ath9k_htc: Use appropriate rs_datalen type (git-fixes).
  o backlight: lp855x: Ensure regulators are disabled on probe failure
    (git-fixes).
  o bnxt_en: Do not query FW when netif_running() is false (bsc#1086282).
  o bnxt_en: Fix accumulation of bp->net_stats_prev (bsc#1104745 ).
  o bnxt_en: Improve stats context resource accounting with RDMA driver loaded
    (bsc#1104745).
  o bnxt_en: Release PCI regions when DMA mask setup fails during probe
    (git-fixes).
  o bnxt_en: Reset rings if ring reservation fails during open() (bsc#1086282).
  o bnxt_en: fix HWRM error when querying VF temperature (bsc#1104745).
  o bnxt_en: fix error return code in bnxt_init_board() (git-fixes).
  o bnxt_en: fix error return code in bnxt_init_one() (bsc#1050242 ).
  o bnxt_en: read EEPROM A2h address using page 0 (git-fixes).
  o bnxt_en: return proper error codes in bnxt_show_temp (bsc#1104745).
  o bonding: set dev->needed_headroom in bond_setup_by_slave() (git-fixes).
  o btrfs: add a flag to iterate_inodes_from_logical to find all
  o btrfs: add a flag to iterate_inodes_from_logical to find all extent refs
    for uncompressed extents (bsc#1174206).
  o btrfs: add a flag to iterate_inodes_from_logical to find all extent refs
    for uncompressed extents (bsc#1174206).
  o btrfs: add a flags argument to LOGICAL_INO and call it LOGICAL_INO_V2 (bsc#
    1174206).
  o btrfs: increase output size for LOGICAL_INO_V2 ioctl (bsc#1174206).
  o btrfs: qgroup: do not try to wait flushing if we're already holding a
    transaction (bsc#1179575).
  o caif: no need to check return value of debugfs_create functions
    (git-fixes).
  o can: c_can: c_can_power_up(): fix error handling (git-fixes).
  o can: dev: prevent potential information leak in can_fill_info()
    (git-fixes).
  o can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).
  o cfg80211: initialize rekey_data (git-fixes).
  o cfg80211: regulatory: Fix inconsistent format argument (git-fixes).
  o chelsio/chtls: correct function return and return type (bsc#1104270).
  o chelsio/chtls: correct netdevice for vlan interface (bsc#1104270 ).
  o chelsio/chtls: fix a double free in chtls_setkey() (bsc#1104270 ).
  o chelsio/chtls: fix always leaking ctrl_skb (bsc#1104270 ).
  o chelsio/chtls: fix deadlock issue (bsc#1104270).
  o chelsio/chtls: fix memory leaks caused by a race (bsc#1104270 ).
  o chelsio/chtls: fix memory leaks in CPL handlers (bsc#1104270 ).
  o chelsio/chtls: fix panic during unload reload chtls (bsc#1104270 ).
  o chelsio/chtls: fix socket lock (bsc#1104270).
  o chelsio/chtls: fix tls record info to user (bsc#1104270 ).
  o chtls: Added a check to avoid NULL pointer dereference (bsc#1104270).
  o chtls: Fix chtls resources release sequence (bsc#1104270 ).
  o chtls: Fix hardware tid leak (bsc#1104270).
  o chtls: Remove invalid set_tcb call (bsc#1104270).
  o chtls: Replace skb_dequeue with skb_peek (bsc#1104270 ).
  o clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes).
  o clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
  o clk: qcom: Allow constant ratio freq tables for rcg (git-fixes).
  o clk: qcom: msm8916: Fix the address location of pll->config_reg
    (git-fixes).
  o clk: s2mps11: Fix a resource leak in error handling paths in the probe
    function (git-fixes).
  o clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).
  o clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
  o clk: tegra: Fix Tegra PMC clock out parents (git-fixes).
  o clk: tegra: Fix duplicated SE clock entry (git-fixes).
  o clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
  o clk: ti: composite: fix memory leak (git-fixes).
  o clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes).
  o clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes).
  o cpumap: Avoid warning when CONFIG_DEBUG_PER_CPU_MAPS is enabled (bsc#
    1109837).
  o cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).
  o cxgb4/cxgb4vf: fix flow control display for auto negotiation (bsc#1046540
    bsc#1046542).
  o cxgb4: fix SGE queue dump destination buffer context (bsc#1073513).
  o cxgb4: fix adapter crash due to wrong MC size (bsc#1073513).
  o cxgb4: fix all-mask IP address comparison (bsc#1064802 bsc#1066129).
  o cxgb4: fix large delays in PTP synchronization (bsc#1046540 bsc#1046648).
  o cxgb4: fix the panic caused by non smac rewrite (bsc#1064802 bsc#1066129).
  o cxgb4: fix thermal zone device registration (bsc#1104279 bsc#1104277).
  o cxgb4: fix throughput drop during Tx backpressure (bsc#1127354 bsc#
    1127371).
  o cxgb4: move DCB version extern to header file (bsc#1104279 ).
  o cxgb4: remove cast when saving IPv4 partial checksum (bsc#1074220).
  o cxgb4: set up filter action after rewrites (bsc#1064802 bsc#1066129).
  o cxgb4: use correct type for all-mask IP address comparison (bsc#1064802 bsc
    #1066129).
  o cxgb4: use unaligned conversion for fetching timestamp (bsc#1046540 bsc#
    1046648).
  o dmaengine: xilinx_dma: check dma_async_device_register return value
    (git-fixes).
  o dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).
  o docs: Fix reST markup when linking to sections (git-fixes).
  o drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a
    driver developer is foolish (git-fixes).
  o drivers: net: xgene: Fix the order of the arguments of 'alloc_etherdev_mqs
    ()' (git-fixes).
  o drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1113956)
  o drm/amdkfd: Put ACPI table after using it (bsc#1129770) Backporting
    changes: * context changes
  o drm/atomic: put state on error path (git-fixes).
  o drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (bsc#
    1129770)
  o drm/i915: Check for all subplatform bits (git-fixes).
  o drm/i915: Clear the repeater bit on HDCP disable (bsc#1112178) Backporting
    changes: * context changes
  o drm/i915: Fix sha_text population code (bsc#1112178) Backporting changes: *
    context changes
  o drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1129770)
    Backporting changes: * context changes * moved num_mixers from struct
    dpu_crtc_state to struct dpu_crtc
  o drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1129770) Backporting
    changes: * context changes
  o drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1129770)
    Backporting changes: * context changes * removed reference to
    msm_gem_is_locked()
  o drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).
  o drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields
    (git-fixes).
  o drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).
  o drm/tve200: Fix handling of platform_get_irq() error (bsc#1129770)
  o drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset() (bsc#
    1112178) Backporting changes: * context changes
  o drm: sun4i: hdmi: Fix inverted HPD result (bsc#1112178) Backporting
    changes: * context changes
  o drm: sun4i: hdmi: Remove extra HPD polling (bsc#1112178)
  o ehci: fix EHCI host controller initialization sequence (git-fixes).
  o ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).
  o fbcon: Fix user font detection test at fbcon_resize(). (bsc#1112178)
    Backporting changes: * updated path drivers/video/fbcon/core to drivers/
    video/console
  o fbcon: Remove the superfluous break (bsc#1129770) Backporting changes: *
    updated path drivers/video/fbcon/core to drivers/video/console * context
    changes
  o firmware: qcom: scm: Ensure 'a0' status code is treated as signed
    (git-fixes).
  o floppy: reintroduce O_NDELAY fix (boo#1181018).
  o futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).
  o futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349
    bsc#1149032).
  o futex: Fix incorrect should_fail_futex() handling (bsc#1181349).
  o futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).
  o futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).
  o futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).
  o futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).
  o futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#
    1149032).
  o geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).
  o gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).
  o gpio: gpio-grgpio: fix possible sleep-in-atomic-context bugs in
    grgpio_irq_map/unmap() (git-fixes).
  o gpio: max77620: Add missing dependency on GPIOLIB_IRQCHIP (git-fixes).
  o gpio: max77620: Fixup debounce delays (git-fixes).
  o gpio: max77620: Use correct unit for debounce times (git-fixes).
  o gpio: mpc8xxx: Add platform device to gpiochip->parent (git-fixes).
  o gpio: mvebu: fix potential user-after-free on probe (git-fixes).
  o gpiolib: acpi: Add honor_wakeup module-option + quirk mechanism
    (git-fixes).
  o gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 BYT + AXP288
    model (git-fixes).
  o gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 CHT + AXP288
    model (git-fixes).
  o gpiolib: acpi: Correct comment for HP x2 10 honor_wakeup quirk (git-fixes).
  o gpiolib: acpi: Rework honor_wakeup option into an ignore_wake option
    (git-fixes).
  o gpiolib: acpi: Turn dmi_system_id table into a generic quirk table
    (git-fixes).
  o gpiolib: fix up emulated open drain outputs (git-fixes).
  o hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).
  o hwmon: (jc42) Fix name to have no illegal characters (git-fixes).
  o i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).
  o i2c: i801: Fix resume bug (git-fixes).
  o i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).
  o i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets
    (git-fixes).
  o i2c: pxa: clear all master action bits in i2c_pxa_stop_message()
    (git-fixes).
  o i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).
  o i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).
  o i40e: avoid premature Rx buffer reuse (bsc#1111981).
  o igb: Report speed and duplex as unknown when device is runtime suspended
    (git-fixes).
  o igc: fix link speed advertising (jsc#SLE-4799).
  o iio: ad5504: Fix setting power-down state (git-fixes).
  o iio: adc: max1027: Reset the device at probe time (git-fixes).
  o iio: bmp280: fix compensation of humidity (git-fixes).
  o iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw()
    (git-fixes).
  o iio: fix center temperature of bmc150-accel-core (git-fixes).
  o iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting
    (git-fixes).
  o iio: light: bh1750: Resolve compiler warning and make code more readable
    (git-fixes).
  o iio: srf04: fix wrong limitation in distance measuring (git-fixes).
  o iio:imu:bmi160: Fix too large a buffer (git-fixes).
  o iommu/vt-d: Do not dereference iommu_device if IOMMU_API is not built (bsc#
    1181001, jsc#ECO-3191).
  o iommu/vt-d: Gracefully handle DMAR units with no supported address widths
    (bsc#1181001, jsc#ECO-3191).
  o ipw2x00: Fix -Wcast-function-type (git-fixes).
  o irqchip/alpine-msi: Fix freeing of interrupts on allocation error path
    (git-fixes).
  o iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
  o iwlwifi: mvm: fix unaligned read of rx_pkt_status (git-fixes).
  o iwlwifi: pcie: limit memory read spin time (git-fixes).
  o ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (bsc#1109837).
  o ixgbe: avoid premature Rx buffer reuse (bsc#1109837 ).
  o kABI workaround for HD-audio generic parser (git-fixes).
  o kABI: Fix kABI for extended APIC-ID support (bsc#1181001, jsc#ECO-3191).
  o lockd: do not use interval-based rebinding over TCP (git-fixes).
  o locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#
    1149032).
  o mac80211: Check port authorization in the ieee80211_tx_dequeue() case
    (git-fixes).
  o mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).
  o mac80211: fix authentication with iwlwifi/mvm (git-fixes).
  o mac80211: fix use of skb payload instead of header (git-fixes).
  o md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#
    1163727).
  o md-cluster: fix safemode_delay value when converting to clustered bitmap
    (bsc#1163727).
  o md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
  o md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
  o md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
  o md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
  o md/cluster: block reshape with remote resync job (bsc#1163727).
  o md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
  o md/raid10: initialize r10_bio->read_slot before use (git-fixes).
  o md: fix a warning caused by a race between concurrent md_ioctl()s
    (git-fixes).
  o media: am437x-vpfe: Setting STD to current value is not an error
    (git-fixes).
  o media: cec-funcs.h: add status_req checks (git-fixes).
  o media: cx88: Fix some error handling path in 'cx8800_initdev()'
    (git-fixes).
  o media: gp8psk: initialize stats at power control logic (git-fixes).
  o media: gspca: Fix memory leak in probe (git-fixes).
  o media: i2c: mt9v032: fix enum mbus codes and frame sizes (git-fixes).
  o media: i2c: ov2659: Fix missing 720p register config (git-fixes).
  o media: i2c: ov2659: fix s_stream return value (git-fixes).
  o media: msi2500: assign SPI bus number dynamically (git-fixes).
  o media: platform: add missing put_device() call in mtk_jpeg_probe() and
    mtk_jpeg_remove() (git-patches).
  o media: pvrusb2: Fix oops on tear-down when radio support is not present
    (git-fixes).
  o media: si470x-i2c: add missed operations in remove (git-fixes).
  o media: sti: bdisp: fix a possible sleep-in-atomic-context bug in
    bdisp_device_run() (git-fixes).
  o media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
  o media: ti-vpe: vpe: Make sure YUYV is set as default format (git-fixes).
  o media: ti-vpe: vpe: ensure buffers are cleaned up properly in abort cases
    (git-fixes).
  o media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence
    number (git-fixes).
  o media: ti-vpe: vpe: fix a v4l2-compliance failure about invalid sizeimage
    (git-fixes).
  o media: ti-vpe: vpe: fix a v4l2-compliance failure causing a kernel panic
    (git-fixes).
  o media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel
    format (git-fixes).
  o media: v4l2-core: fix touch support in v4l_g_fmt (git-fixes).
  o media: v4l2-device.h: Explicitly compare grp{id,mask} to zero in
    v4l2_device macros (git-fixes).
  o mei: bus: do not clean driver pointer (git-fixes).
  o mei: protect mei_cl_mtu from null dereference (git-fixes).
  o mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).
  o misc: vmw_vmci: fix kernel info-leak by initializing dbells in
    vmci_ctx_get_chkpt_doorbells() (git-fixes).
  o misdn: dsp: select CONFIG_BITREVERSE (git-fixes).
  o mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).
  o mlxsw: destroy workqueue when trap_register in mlxsw_emad_init (bsc#
    1112374).
  o mlxsw: spectrum: Do not modify cloned SKBs during xmit (git-fixes).
  o mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case
    reload fails (bsc#1112374).
  o mlxsw: switchx2: Do not modify cloned SKBs during xmit (git-fixes).
  o mm, page_alloc: fix core hung in free_pcppages_bulk() (git fixes (mm/
    hotplug)).
  o mm/page_alloc: fix watchdog soft lockups during set_zone_contiguous() (git
    fixes (mm/pgalloc)).
  o mm/rmap: map_pte() was not handling private ZONE_DEVICE page properly (git
    fixes (mm/hmm)).
  o mm/slab: use memzero_explicit() in kzfree() (git fixes (mm/slab)).
  o mm: do not wake kswapd prematurely when watermark boosting is disabled (git
    fixes (mm/vmscan)).
  o mm: hwpoison: disable memory error handling on 1GB hugepage (git fixes (mm/
    hwpoison)).
  o mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).
  o module: delay kobject uevent until after module init call (bsc#1178631).
  o nbd: Fix memory leak in nbd_add_socket (bsc#1181504).
  o net/af_iucv: always register net_device notifier (git-fixes).
  o net/af_iucv: fix null pointer dereference on shutdown (bsc#1179563 LTC#
    190108).
  o net/af_iucv: set correct sk_protocol for child sockets (git-fixes).
  o net/filter: Permit reading NET in load_bytes_relative when MAC not set (bsc
    #1109837).
  o net/liquidio: Delete driver version assignment (git-fixes).
  o net/liquidio: Delete non-working LIQUIDIO_PACKAGE check (git-fixes).
  o net/mlx4_en: Avoid scheduling restart task if it is already running
    (git-fixes).
  o net/mlx5: Add handling of port type in rule deletion (bsc#1103991).
  o net/mlx5: Fix memory leak on flow table creation error flow (bsc#1046305).
  o net/mlx5e: Fix VLAN cleanup flow (git-fixes).
  o net/mlx5e: Fix VLAN create flow (git-fixes).
  o net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).
  o net/mlx5e: Fix two double free cases (bsc#1046305).
  o net/mlx5e: IPoIB, Drop multicast packets that this interface sent (bsc#
    1075020).
  o net/mlx5e: TX, Fix consumer index of error cqe dump (bsc#1103990 ).
  o net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (bsc#
    1103990).
  o net/sched: act_tunnel_key: fix OOB write in case of IPv6 ERSPAN tunnels
    (bsc#1109837).
  o net/smc: cancel event worker during device removal (git-fixes).
  o net/smc: check for valid ib_client_data (git-fixes).
  o net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).
  o net/smc: receive pending data after RCV_SHUTDOWN (git-fixes).
  o net/smc: receive returns without data (git-fixes).
  o net/sonic: Add mutual exclusion for accessing shared state (git-fixes).
  o net: atlantic: fix potential error handling (git-fixes).
  o net: atlantic: fix use after free kasan warn (git-fixes).
  o net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).
  o net: bcmgenet: reapply manual settings to the PHY (git-fixes).
  o net: broadcom/bcmsysport: Fix signedness in bcm_sysport_probe()
    (git-fixes).
  o net: cbs: Fix software cbs to consider packet sending time (bsc#1109837).
  o net: dsa: LAN9303: select REGMAP when LAN9303 enable (git-fixes).
  o net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL (git-fixes).
  o net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).
  o net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it
    anymore in mlx4_en_xmit() (git-fixes).
  o net: ethernet: stmmac: Fix signedness bug in ipq806x_gmac_of_parse()
    (git-fixes).
  o net: freescale: fec: Fix ethtool -d runtime PM (git-fixes).
  o net: hns3: add a missing uninit debugfs when unload driver (bsc#1104353).
  o net: hns3: add compatible handling for command HCLGE_OPC_PF_RST_DONE
    (git-fixes).
  o net: hns3: add management table after IMP reset (bsc#1104353 ).
  o net: hns3: check reset interrupt status when reset fails (git-fixes).
  o net: hns3: clear reset interrupt status in hclge_irq_handle() (git-fixes).
  o net: hns3: fix a TX timeout issue (bsc#1104353).
  o net: hns3: fix a wrong reset interrupt status mask (git-fixes).
  o net: hns3: fix error VF index when setting VLAN offload (bsc#1104353).
  o net: hns3: fix error handling for desc filling (bsc#1104353 ).
  o net: hns3: fix for not calculating TX BD send size correctly (bsc#1126390).
  o net: hns3: fix interrupt clearing error for VF (bsc#1104353 ).
  o net: hns3: fix mis-counting IRQ vector numbers issue (bsc#1104353).
  o net: hns3: fix shaper parameter algorithm (bsc#1104353 ).
  o net: hns3: fix the number of queues actually used by ARQ (bsc#1104353).
  o net: hns3: fix use-after-free when doing self test (bsc#1104353 ).
  o net: hns3: reallocate SSU' buffer size when pfc_en changes (bsc#1104353).
  o net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (bsc#
    1098633).
  o net: mvpp2: Fix error return code in mvpp2_open() (bsc#1119113 ).
  o net: mvpp2: fix pkt coalescing int-threshold configuration (bsc#1098633).
  o net: phy: Allow BCM54616S PHY to setup internal TX/RX clock delay
    (git-fixes).
  o net: phy: Avoid multiple suspends (git-fixes).
  o net: phy: broadcom: Fix RGMII delays configuration for BCM54210E
    (git-fixes).
  o net: phy: micrel: Discern KSZ8051 and KSZ8795 PHYs (git-fixes).
  o net: phy: micrel: make sure the factory test bit is cleared (git-fixes).
  o net: qca_spi: Move reset_count to struct qcaspi (git-fixes).
  o net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).
  o net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).
  o net: stmmac: Do not accept invalid MTU values (git-fixes).
  o net: stmmac: Enable 16KB buffer size (git-fixes).
  o net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).
  o net: stmmac: dwmac-meson8b: Fix signedness bug in probe (git-fixes).
  o net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).
  o net: stmmac: fix length of PTP clock's name string (git-fixes).
  o net: stmmac: gmac4+: Not all Unicast addresses may be available
    (git-fixes).
  o net: sunrpc: interpret the return value of kstrtou32 correctly (git-fixes).
  o net: team: fix memory leak in __team_options_register (git-fixes).
  o net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).
  o net: usb: lan78xx: Fix error message format specifier (git-fixes).
  o net: usb: sr9800: fix uninitialized local variable (git-fixes).
  o net: vlan: avoid leaks on register_vlan_dev() failures (git-fixes).
  o net_failover: fixed rollback in net_failover_open() (bsc#1109837).
  o net_sched: let qdisc_put() accept NULL pointer (bsc#1056657 bsc#1056653 bsc
    #1056787).
  o nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).
  o nfp: validate the return code from dev_queue_xmit() (git-fixes).
  o nfs_common: need lock during iterate through the list (git-fixes).
  o nfsd4: readdirplus shouldn't return parent of export (git-fixes).
  o nfsd: Fix message level for normal termination (git-fixes).
  o pNFS: Mark layout for return if return-on-close was not sent (git-fixes).
  o page_frag: Recover from memory pressure (git fixes (mm/pgalloc)).
  o parport: load lowlevel driver if ports not found (git-fixes).
  o pinctrl: amd: fix __iomem annotation in amd_gpio_irq_handler() (git-fixes).
  o pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).
  o pinctrl: amd: remove debounce filter setting in IRQ type setting
    (git-fixes).
  o pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).
  o pinctrl: baytrail: Avoid clearing debounce value when turning it off
    (git-fixes).
  o pinctrl: merrifield: Set default bias in case no particular value given
    (git-fixes).
  o pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B (git-fixes).
  o platform/x86: acer-wmi: add automatic keyboard background light toggle key
    as KEY_LIGHTS_TOGGLE (git-fixes).
  o power: supply: bq27xxx_battery: Silence deferred-probe error (git-fixes).
  o powerpc/pci: Fix broken INTx configuration via OF (bsc#1172145 ltc#184630).
  o powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#
    184630).
  o powerpc/pci: Remove legacy debug code (bsc#1172145 ltc#184630 git-fixes).
  o powerpc/pci: Use of_irq_parse_and_map_pci() helper (bsc#1172145 ltc#
    184630).
  o powerpc/perf: Add generic compat mode pmu driver (bsc#1178900 ltc#189284).
  o powerpc/perf: Fix crashes with generic_compat_pmu & BHRB (bsc#1178900 ltc#
    189284 git-fixes).
  o powerpc/perf: init pmu from core-book3s (bsc#1178900 ltc#189284).
  o powerpc: Convert to using %pOF instead of full_name (bsc#1172145 ltc#
    184630).
  o qed: Fix race condition between scheduling and destroying the slowpath
    workqueue (bsc#1086314 bsc#1086313 bsc#1086301).
  o qed: Fix use after free in qed_chain_free (bsc#1050536 bsc#1050538).
  o r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).
  o radeon: insert 10ms sleep in dce5_crtc_load_lut (git-fixes).
  o regmap: debugfs: check count when read regmap file (git-fixes).
  o regmap: dev_get_regmap_match(): fix string comparison (git-fixes).
  o regulator: max8907: Fix the usage of uninitialized variable in
    max8907_regulator_probe() (git-fixes).
  o regulator: pfuze100-regulator: Variable "val" in pfuze100_regulator_probe()
    could be uninitialized (git-fixes).
  o regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/
    ti_abb_clear_all_txdone (git-fixes).
  o remoteproc: Fix wrong rvring index computation (git-fixes).
  o rfkill: Fix incorrect check to avoid NULL pointer dereference (git-fixes).
  o rtc: 88pm860x: fix possible race condition (git-fixes).
  o rtl8xxxu: fix RTL8723BU connection failure issue after warm reboot
    (git-fixes).
  o rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() (git-fixes).
  o rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349
    bsc#1149032).
  o s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).
  o s390/dasd: fix hanging device offline processing (bsc#1144912).
  o s390/dasd: fix list corruption of lcu list (bsc#1181170 LTC#190915).
  o s390/dasd: fix list corruption of pavgroup group list (bsc#1181170 LTC#
    190915).
  o s390/dasd: prevent inconsistent LCU device data (bsc#1181170 LTC#190915).
  o s390/qeth: delay draining the TX buffers (git-fixes).
  o s390/qeth: fix L2 header access in qeth_l3_osa_features_check()
    (git-fixes).
  o s390/qeth: fix deadlock during recovery (git-fixes).
  o s390/qeth: fix locking for discipline setup / removal (git-fixes).
  o s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).
  o sched/fair: Fix enqueue_task_fair warning (bsc#1179093).
  o sched/fair: Fix enqueue_task_fair() warning some more (bsc#1179093).
  o sched/fair: Fix reordering of enqueue/dequeue_task_fair() (bsc#1179093).
  o sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list (bsc#1179093).
  o sched/fair: Reorder enqueue/dequeue_task_fair path (bsc#1179093).
  o scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049, git-fixes).
  o scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#
    1181425 ltc#188252).
  o scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#
    1180891).
  o scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).
  o scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).
  o scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).
  o scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#
    1180891).
  o scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#
    1180891).
  o scsi: lpfc: Fix error log messages being logged following SCSI task mgnt
    (bsc#1180891).
  o scsi: lpfc: Fix target reset failing (bsc#1180891).
  o scsi: lpfc: Fix vport create logging (bsc#1180891).
  o scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).
  o scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework
    (bsc#1180891).
  o scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue
    state (bsc#1180891).
  o scsi: lpfc: Simplify bool comparison (bsc#1180891).
  o scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).
  o scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc
    #1180891).
  o serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).
  o serial: amba-pl011: Make sure we initialize the port.lock spinlock
    (git-fixes).
  o serial: ar933x_uart: set UART_CS_{RX,TX}_READY_ORIDE (git-fixes).
  o serial: mvebu-uart: fix tx lost characters at power off (git-fixes).
  o serial: txx9: add missing platform_driver_unregister() on error in
    serial_txx9_init (git-fixes).
  o serial_core: Check for port state when tty is in error state (git-fixes).
  o soc: imx: gpc: fix power up sequencing (git-fixes).
  o spi: Add call to spi_slave_abort() function when spidev driver is released
    (git-fixes).
  o spi: Fix memory leak on splited transfers (git-fixes).
  o spi: cadence: cache reference clock rate during probe (git-fixes).
  o spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).
  o spi: dw: Fix Rx-only DMA transfers (git-fixes).
  o spi: dw: Return any value retrieved from the dma_transfer callback
    (git-fixes).
  o spi: img-spfi: fix potential double release (git-fixes).
  o spi: pxa2xx: Add missed security checks (git-fixes).
  o spi: spi-cavium-thunderx: Add missing pci_release_regions() (git-fixes).
  o spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).
  o spi: spidev: fix a potential use-after-free in spidev_release()
    (git-fixes).
  o spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path
    (git-fixes).
  o spi: st-ssc4: add missed pm_runtime_disable (git-fixes).
  o spi: tegra20-slink: add missed clk_unprepare (git-fixes).
  o staging: comedi: check validity of wMaxPacketSize of usb endpoints found
    (git-fixes).
  o staging: comedi: gsc_hpdi: check dma_alloc_coherent() return value
    (git-fixes).
  o staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21
    (git-fixes).
  o staging: rtl8188eu: Add device id for MERCUSYS MW150US v2 (git-fixes).
  o staging: rtl8188eu: fix possible null dereference (git-fixes).
  o staging: rtl8192u: fix multiple memory leaks on error path (git-fixes).
  o staging: vt6656: set usb_set_intfdata on driver fail (git-fixes).
  o staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb()
    (git-fixes).
  o staging: wlan-ng: properly check endpoint types (git-fixes).
  o team: set dev->needed_headroom in team_setup_by_port() (git-fixes).
  o thunderbolt: Use 32-bit writes when writing ring producer/consumer
    (git-fixes).
  o tty: always relink the port (git-fixes).
  o tty: link tty and port before configuring it as console (git-fixes).
  o tty: synclink_gt: Adjust indentation in several functions (git-fixes).
  o tty: synclinkmp: Adjust indentation in several functions (git-fixes).
  o tty:serial:mvebu-uart:fix a wrong return (git-fixes).
  o tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (bsc#
    1109837).
  o usb: chipidea: ci_hdrc_imx: add missing put_device() call in
    usbmisc_get_init_data() (git-fixes).
  o usb: dwc2: Fix IN FIFO allocation (git-fixes).
  o usb: dwc3: remove the call trace of USBx_GFLADJ (git-fixes).
  o usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion
    (git-fixes).
  o usb: fsl: Check memory resource before releasing it (git-fixes).
  o usb: gadget: composite: Fix possible double free memory bug (git-fixes).
  o usb: gadget: configfs: Fix missing spin_lock_init() (git-fixes).
  o usb: gadget: configfs: Preserve function ordering after bind failure
    (git-fixes).
  o usb: gadget: configfs: fix concurrent issue between composite APIs
    (git-fixes).
  o usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).
  o usb: gadget: ffs: ffs_aio_cancel(): Save/restore IRQ flags (git-fixes).
  o usb: gadget: fix wrong endpoint desc (git-fixes).
  o usb: gadget: goku_udc: fix potential crashes in probe (git-fixes).
  o usb: gadget: net2280: fix memory leak on probe error handling paths
    (git-fixes).
  o usb: gadget: select CONFIG_CRC32 (git-fixes).
  o usb: gadget: serial: fix Tx stall after buffer overflow (git-fixes).
  o usb: gadget: udc: fix possible sleep-in-atomic-context bugs in gr_probe()
    (git-fixes).
  o usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init
    () (git-fixes).
  o usb: hso: Fix debug compile warning on sparc32 (git-fixes).
  o usb: musb: omap2430: Get rid of musb .set_vbus for omap2430 glue
    (git-fixes).
  o usb: udc: core: Use lock when write to soft_connect (git-fixes).
  o usb: usbfs: Suppress problematic bind and unbind uevents (git-fixes).
  o usblp: poison URBs upon disconnect (git-fixes).
  o veth: Adjust hard_start offset on redirect XDP frames (bsc#1109837).
  o vfio iommu: Add dma available capability (bsc#1179573 LTC#190106).
  o vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181231).
  o vhost/vsock: fix vhost vsock cid hashing inconsistent (git-fixes).
  o video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).
  o virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer
    (git-fixes).
  o vt: Reject zero-sized screen buffer size (git-fixes).
  o vt: do not hardcode the mem allocation upper bound (git-fixes).
  o wan: ds26522: select CONFIG_BITREVERSE (git-fixes).
  o watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
  o watchdog: da9062: No need to ping manually before setting timeout
    (git-fixes).
  o watchdog: da9062: do not ping the hw during stop() (git-fixes).
  o watchdog: qcom: Avoid context switch in restart handler (git-fixes).
  o watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
  o wil6210: select CONFIG_CRC32 (git-fixes).
  o wireless: Use linux/stddef.h instead of stddef.h (git-fixes).
  o wireless: Use offsetof instead of custom macro (git-fixes).
  o x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1181001,
    jsc#ECO-3191).
  o x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#
    1181001, jsc#ECO-3191).
  o x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).
  o x86/i8259: Use printk_deferred() to prevent deadlock (bsc#1112178).
  o x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181001, jsc#
    ECO-3191).
  o x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).
  o x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).
  o x86/mm/numa: Remove uninitialized_var() usage (bsc#1112178).
  o x86/mm: Fix leak of pmd ptlock (bsc#1112178).
  o x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181001, jsc#
    ECO-3191).
  o x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#
    1112178).
  o x86/resctrl: Do not move a task to the same resource group (bsc#1112178).
  o x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR
    (bsc#1112178).
  o xdp: Fix xsk_generic_xmit errno (bsc#1109837).
  o xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
  o xhci: make sure TRB is fully written before giving it to the controller
    (git-fixes).
  o xhci: tegra: Delay for disabling LFPS detector (git-fixes).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Real Time Extension 12-SP5:
    zypper in -t patch SUSE-SLE-RT-12-SP5-2021-433=1

Package List:

  o SUSE Linux Enterprise Real Time Extension 12-SP5 (noarch):
       kernel-devel-rt-4.12.14-10.31.1
       kernel-source-rt-4.12.14-10.31.1
  o SUSE Linux Enterprise Real Time Extension 12-SP5 (x86_64):
       cluster-md-kmp-rt-4.12.14-10.31.1
       cluster-md-kmp-rt-debuginfo-4.12.14-10.31.1
       dlm-kmp-rt-4.12.14-10.31.1
       dlm-kmp-rt-debuginfo-4.12.14-10.31.1
       gfs2-kmp-rt-4.12.14-10.31.1
       gfs2-kmp-rt-debuginfo-4.12.14-10.31.1
       kernel-rt-4.12.14-10.31.1
       kernel-rt-base-4.12.14-10.31.1
       kernel-rt-base-debuginfo-4.12.14-10.31.1
       kernel-rt-debuginfo-4.12.14-10.31.1
       kernel-rt-debugsource-4.12.14-10.31.1
       kernel-rt-devel-4.12.14-10.31.1
       kernel-rt-devel-debuginfo-4.12.14-10.31.1
       kernel-rt_debug-4.12.14-10.31.1
       kernel-rt_debug-debuginfo-4.12.14-10.31.1
       kernel-rt_debug-debugsource-4.12.14-10.31.1
       kernel-rt_debug-devel-4.12.14-10.31.1
       kernel-rt_debug-devel-debuginfo-4.12.14-10.31.1
       kernel-syms-rt-4.12.14-10.31.1
       ocfs2-kmp-rt-4.12.14-10.31.1
       ocfs2-kmp-rt-debuginfo-4.12.14-10.31.1


References:

  o https://www.suse.com/security/cve/CVE-2020-25639.html
  o https://www.suse.com/security/cve/CVE-2020-27835.html
  o https://www.suse.com/security/cve/CVE-2020-28374.html
  o https://www.suse.com/security/cve/CVE-2020-29568.html
  o https://www.suse.com/security/cve/CVE-2020-29569.html
  o https://www.suse.com/security/cve/CVE-2020-36158.html
  o https://www.suse.com/security/cve/CVE-2021-0342.html
  o https://www.suse.com/security/cve/CVE-2021-20177.html
  o https://www.suse.com/security/cve/CVE-2021-3347.html
  o https://www.suse.com/security/cve/CVE-2021-3348.html
  o https://bugzilla.suse.com/1046305
  o https://bugzilla.suse.com/1046306
  o https://bugzilla.suse.com/1046540
  o https://bugzilla.suse.com/1046542
  o https://bugzilla.suse.com/1046648
  o https://bugzilla.suse.com/1050242
  o https://bugzilla.suse.com/1050244
  o https://bugzilla.suse.com/1050536
  o https://bugzilla.suse.com/1050538
  o https://bugzilla.suse.com/1050545
  o https://bugzilla.suse.com/1056653
  o https://bugzilla.suse.com/1056657
  o https://bugzilla.suse.com/1056787
  o https://bugzilla.suse.com/1064802
  o https://bugzilla.suse.com/1066129
  o https://bugzilla.suse.com/1073513
  o https://bugzilla.suse.com/1074220
  o https://bugzilla.suse.com/1075020
  o https://bugzilla.suse.com/1086282
  o https://bugzilla.suse.com/1086301
  o https://bugzilla.suse.com/1086313
  o https://bugzilla.suse.com/1086314
  o https://bugzilla.suse.com/1098633
  o https://bugzilla.suse.com/1103990
  o https://bugzilla.suse.com/1103991
  o https://bugzilla.suse.com/1103992
  o https://bugzilla.suse.com/1104270
  o https://bugzilla.suse.com/1104277
  o https://bugzilla.suse.com/1104279
  o https://bugzilla.suse.com/1104353
  o https://bugzilla.suse.com/1104427
  o https://bugzilla.suse.com/1104742
  o https://bugzilla.suse.com/1104745
  o https://bugzilla.suse.com/1109837
  o https://bugzilla.suse.com/1111981
  o https://bugzilla.suse.com/1112178
  o https://bugzilla.suse.com/1112374
  o https://bugzilla.suse.com/1113956
  o https://bugzilla.suse.com/1119113
  o https://bugzilla.suse.com/1126206
  o https://bugzilla.suse.com/1126390
  o https://bugzilla.suse.com/1127354
  o https://bugzilla.suse.com/1127371
  o https://bugzilla.suse.com/1129770
  o https://bugzilla.suse.com/1136348
  o https://bugzilla.suse.com/1144912
  o https://bugzilla.suse.com/1149032
  o https://bugzilla.suse.com/1163727
  o https://bugzilla.suse.com/1172145
  o https://bugzilla.suse.com/1174206
  o https://bugzilla.suse.com/1176831
  o https://bugzilla.suse.com/1176846
  o https://bugzilla.suse.com/1178036
  o https://bugzilla.suse.com/1178049
  o https://bugzilla.suse.com/1178372
  o https://bugzilla.suse.com/1178631
  o https://bugzilla.suse.com/1178684
  o https://bugzilla.suse.com/1178900
  o https://bugzilla.suse.com/1179093
  o https://bugzilla.suse.com/1179508
  o https://bugzilla.suse.com/1179509
  o https://bugzilla.suse.com/1179563
  o https://bugzilla.suse.com/1179573
  o https://bugzilla.suse.com/1179575
  o https://bugzilla.suse.com/1179878
  o https://bugzilla.suse.com/1180008
  o https://bugzilla.suse.com/1180130
  o https://bugzilla.suse.com/1180559
  o https://bugzilla.suse.com/1180562
  o https://bugzilla.suse.com/1180676
  o https://bugzilla.suse.com/1180765
  o https://bugzilla.suse.com/1180812
  o https://bugzilla.suse.com/1180859
  o https://bugzilla.suse.com/1180891
  o https://bugzilla.suse.com/1180912
  o https://bugzilla.suse.com/1181001
  o https://bugzilla.suse.com/1181018
  o https://bugzilla.suse.com/1181170
  o https://bugzilla.suse.com/1181230
  o https://bugzilla.suse.com/1181231
  o https://bugzilla.suse.com/1181349
  o https://bugzilla.suse.com/1181425
  o https://bugzilla.suse.com/1181504
  o https://bugzilla.suse.com/1181553
  o https://bugzilla.suse.com/1181645

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYCnaPeNLKJtyKPYoAQiCvw//avA56xnZAHQ4/rgOjstv8CUMxx5AMVbI
8WzjSOm+SMguug2mnDiWHebfhHXcTfTK9CDdxbeocnk/fKG/6o1L4udHDJ5Y0ANb
MuPqMm+L8LfKYwb65pvnAd8QFJ9ZPGcoA3XawIY8q5qWsxaAhh1S86scVaygz2xE
KIlZpLxhxKU1r9Vi6YWhh7hTcedQRAA17uKyogdQtwcqHwaubcgNtzg2BqK1qBnl
Xdzv7K6+hDb1ijsGQSf6LVogewRlQp2eJP+qco2D2OpRiTF6MjALl3Hv2/EHD8Jz
P4zPePMrj/sKC3rOVcZPnOkAFBOw292Lj683cyCHcV8G2vz0AThuxojSUmIdUjBZ
fYFdvGWO+AgnUyQKtvC4VgSEluW3yzOJxKoFGNZbHcvO4ZH3RFMqxhVIPWJmYnSs
9Lg5ylMM182jotCXCg8hsACAphBvi3MCqJFO9JZVWTlxBne+MYpo/TvwVwoWjEFs
Uwthd/8uPuczZfXBo31RPpHXLxvaAwPCP91UaVJLK8uz4Pp6++VvDNG+0drzr9k9
ow6IX01XKP9LPPxl8QQC4X8H1YHEBk1x8/UWGpNP4/j0hrCXyV4fwtYOQQ+2C5DK
CJlIAltlDbOmpZwOroiN0JXml6D5ZmydFRPHvdzSYfPaxaNnpjS7/anAi3i2c3ZR
hs7tNtac4Jw=
=XSIm
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0554 – [SUSE] Linux Kernel: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/02/15/esb-2021-0554-suse-linux-kernel-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0554-suse-linux-kernel-multiple-vulnerabilities

ESB-2021.0552 – [SUSE] Linux Kernel: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0552
                   Security update for the Linux Kernel
                             15 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Linux Kernel
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Root Compromise                 -- Existing Account      
                   Access Privileged Data          -- Existing Account      
                   Denial of Service               -- Existing Account      
                   Access Confidential Data        -- Existing Account      
                   Unauthorised Access             -- Existing Account      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-3347 CVE-2020-36158 CVE-2020-29661
                   CVE-2020-29660 CVE-2020-29569 CVE-2020-29568
                   CVE-2020-28974 CVE-2020-28915 CVE-2020-27825
                   CVE-2020-27786 CVE-2020-27777 CVE-2020-27673
                   CVE-2020-27068 CVE-2020-25669 CVE-2020-25668
                   CVE-2020-25285 CVE-2020-25211 CVE-2020-15437
                   CVE-2020-15436 CVE-2020-11668 CVE-2020-0466
                   CVE-2020-0465 CVE-2020-0444 CVE-2019-20934
                   CVE-2019-19063 CVE-2019-6133 

Reference:         ESB-2021.0543
                   ESB-2021.0525
                   ESB-2021.0365

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2021/suse-su-20210437-1

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:0437-1
Rating:            important
References:        #1070943 #1121826 #1121872 #1157298 #1168952 #1173942
                   #1176395 #1176485 #1177411 #1178123 #1178182 #1178589
                   #1178622 #1178886 #1179107 #1179140 #1179141 #1179204
                   #1179419 #1179508 #1179509 #1179601 #1179616 #1179663
                   #1179666 #1179745 #1179877 #1179960 #1179961 #1180008
                   #1180027 #1180028 #1180029 #1180030 #1180031 #1180032
                   #1180052 #1180086 #1180559 #1180562 #1181349 #969755
Cross-References:  CVE-2019-19063 CVE-2019-20934 CVE-2019-6133 CVE-2020-0444
                   CVE-2020-0465 CVE-2020-0466 CVE-2020-11668 CVE-2020-15436
                   CVE-2020-15437 CVE-2020-25211 CVE-2020-25285 CVE-2020-25668
                   CVE-2020-25669 CVE-2020-27068 CVE-2020-27673 CVE-2020-27777
                   CVE-2020-27786 CVE-2020-27825 CVE-2020-28915 CVE-2020-28974
                   CVE-2020-29568 CVE-2020-29569 CVE-2020-29660 CVE-2020-29661
                   CVE-2020-36158 CVE-2021-3347
Affected Products:
                   SUSE OpenStack Cloud 7
                   SUSE Linux Enterprise Server for SAP 12-SP2
                   SUSE Linux Enterprise Server 12-SP2-LTSS
                   SUSE Linux Enterprise Server 12-SP2-BCL
                   SUSE Linux Enterprise High Availability 12-SP2
______________________________________________________________________________

An update that solves 26 vulnerabilities and has 16 fixes is now available.

Description:

The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security
and bugfixes.

The following security bugs were fixed:


  o CVE-2021-3347: A use-after-free was discovered in the PI futexes during
    fault handling, allowing local users to execute code in the kernel (bnc#
    1181349).
  o CVE-2020-29569: Fixed a potential privilege escalation and information
    leaks related to the PV block backend, as used by Xen (bnc#1179509).
  o CVE-2020-29568: Fixed a denial of service issue, related to processing
    watch events (bnc#1179508).
  o CVE-2020-25211: Fixed a flaw where a local attacker was able to inject
    conntrack netlink configuration that could cause a denial of service or
    trigger the use of incorrect protocol numbers in
    ctnetlink_parse_tuple_filter (bnc#1176395).
  o CVE-2020-0444: Fixed a bad kfree due to a logic error in
    audit_data_to_entry (bnc#1180027).
  o CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c
    that could have led to local privilege escalation (bnc#1180029).
  o CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl
    and ep_loop_check_proc of eventpoll.c (bnc#1180031).
  o CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c
    which could have allowed local users to gain privileges or cause a denial
    of service (bsc#1179141).
  o CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check
    in the nl80211_policy policy of nl80211.c (bnc#1180086).
  o CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction
    Services (RTAS) interface, affecting guests running on top of PowerVM or
    KVM hypervisors (bnc#1179107).
  o CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation
    (bnc#1179601).
  o CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc
    #1179960).
  o CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may
    have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
  o CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a
    use-after-free attack against TIOCSPGRP (bsc#1179745).
  o CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have
    been used by local attackers to read privileged information or potentially
    crash the kernel (bsc#1178589).
  o CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have
    been used by local attackers to read kernel memory (bsc#1178886).
  o CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#
    1178182).
  o CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/
    hugetlb.c could be used by local attackers to corrupt memory, cause a NULL
    pointer dereference, or possibly have unspecified other impact (bnc#1176485
    ).
  o CVE-2020-15437: Fixed a null pointer dereference which could have allowed
    local users to cause a denial of service (bsc#1179140).
  o CVE-2020-36158: Fixed a potential remote code execution in the Marvell
    mwifiex driver (bsc#1180559).
  o CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink
    camera USB driver (bnc#1168952).
  o CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
  o CVE-2020-27673: Fixed an issue where rogue guests could have caused denial
    of service of Dom0 via high frequency events (XSA-332 bsc#1177411)
  o CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA
    fault statistics were inappropriately freed (bsc#1179663).
  o CVE-2019-19063: Fixed two memory leaks in the rtl_usb_probe() which could
    eventually have allowed attackers to cause a denial of service (memory
    consumption) (bnc#1157298 ).
  o CVE-2019-6133: Fixed an issue where the "start time" protection mechanism
    could have been bypassed and therefore authorization decisions are
    improperly cached (bsc#1128172).


The following non-security bugs were fixed:

  o HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
  o epoll: Keep a reference on files added to the check list (bsc#1180031).
  o fix regression in "epoll: Keep a reference on files added to the check
    list" (bsc#1180031, git-fixes).
  o futex,rt_mutex: Fix rt_mutex_cleanup_proxy_lock() (bsc#969755).
  o futex,rt_mutex: Introduce rt_mutex_init_waiter() (bsc#969755).
  o futex,rt_mutex: Provide futex specific rt_mutex API (bsc#969755).
  o futex,rt_mutex: Restructure rt_mutex_finish_proxy_lock() (bsc#969755).
  o futex: Avoid freeing an active timer (bsc#969755).
  o futex: Avoid violating the 10th rule of futex (bsc#969755).
  o futex: Change locking rules (bsc#969755).
  o futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#969755).
  o futex: Drop hb->lock before enqueueing on the rtmutex (bsc#969755).
  o futex: Fix OWNER_DEAD fixup (bsc#969755).
  o futex: Fix incorrect should_fail_futex() handling (bsc#969755).
  o futex: Fix more put_pi_state() vs. exit_pi_state_list() races (bsc#969755).
  o futex: Fix pi_state->owner serialization (bsc#969755).
  o futex: Fix small (and harmless looking) inconsistencies (bsc#969755).
  o futex: Futex_unlock_pi() determinism (bsc#969755).
  o futex: Handle early deadlock return correctly (bsc#969755).
  o futex: Handle transient "ownerless" rtmutex state correctly (bsc#969755).
  o futex: Pull rt_mutex_futex_unlock() out from under hb->lock (bsc#969755).
  o futex: Rework futex_lock_pi() to use rt_mutex_*_proxy_lock() (bsc#969755).
  o futex: Rework inconsistent rt_mutex/futex_q state (bsc#969755).
  o locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#
    969755).
  o mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault()
    (bsc#1179204).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE OpenStack Cloud 7:
    zypper in -t patch SUSE-OpenStack-Cloud-7-2021-437=1
  o SUSE Linux Enterprise Server for SAP 12-SP2:
    zypper in -t patch SUSE-SLE-SAP-12-SP2-2021-437=1
  o SUSE Linux Enterprise Server 12-SP2-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP2-2021-437=1
  o SUSE Linux Enterprise Server 12-SP2-BCL:
    zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2021-437=1
  o SUSE Linux Enterprise High Availability 12-SP2:
    zypper in -t patch SUSE-SLE-HA-12-SP2-2021-437=1

Package List:

  o SUSE OpenStack Cloud 7 (s390x x86_64):
       kernel-default-4.4.121-92.149.1
       kernel-default-base-4.4.121-92.149.1
       kernel-default-base-debuginfo-4.4.121-92.149.1
       kernel-default-debuginfo-4.4.121-92.149.1
       kernel-default-debugsource-4.4.121-92.149.1
       kernel-default-devel-4.4.121-92.149.1
       kernel-syms-4.4.121-92.149.1
  o SUSE OpenStack Cloud 7 (noarch):
       kernel-devel-4.4.121-92.149.1
       kernel-macros-4.4.121-92.149.1
       kernel-source-4.4.121-92.149.1
  o SUSE OpenStack Cloud 7 (x86_64):
       kgraft-patch-4_4_121-92_149-default-1-3.3.1
  o SUSE OpenStack Cloud 7 (s390x):
       kernel-default-man-4.4.121-92.149.1
  o SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64):
       kernel-default-4.4.121-92.149.1
       kernel-default-base-4.4.121-92.149.1
       kernel-default-base-debuginfo-4.4.121-92.149.1
       kernel-default-debuginfo-4.4.121-92.149.1
       kernel-default-debugsource-4.4.121-92.149.1
       kernel-default-devel-4.4.121-92.149.1
       kernel-syms-4.4.121-92.149.1
       kgraft-patch-4_4_121-92_149-default-1-3.3.1
  o SUSE Linux Enterprise Server for SAP 12-SP2 (noarch):
       kernel-devel-4.4.121-92.149.1
       kernel-macros-4.4.121-92.149.1
       kernel-source-4.4.121-92.149.1
  o SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le s390x x86_64):
       kernel-default-4.4.121-92.149.1
       kernel-default-base-4.4.121-92.149.1
       kernel-default-base-debuginfo-4.4.121-92.149.1
       kernel-default-debuginfo-4.4.121-92.149.1
       kernel-default-debugsource-4.4.121-92.149.1
       kernel-default-devel-4.4.121-92.149.1
       kernel-syms-4.4.121-92.149.1
  o SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le x86_64):
       kgraft-patch-4_4_121-92_149-default-1-3.3.1
  o SUSE Linux Enterprise Server 12-SP2-LTSS (noarch):
       kernel-devel-4.4.121-92.149.1
       kernel-macros-4.4.121-92.149.1
       kernel-source-4.4.121-92.149.1
  o SUSE Linux Enterprise Server 12-SP2-LTSS (s390x):
       kernel-default-man-4.4.121-92.149.1
  o SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):
       kernel-default-4.4.121-92.149.1
       kernel-default-base-4.4.121-92.149.1
       kernel-default-base-debuginfo-4.4.121-92.149.1
       kernel-default-debuginfo-4.4.121-92.149.1
       kernel-default-debugsource-4.4.121-92.149.1
       kernel-default-devel-4.4.121-92.149.1
       kernel-syms-4.4.121-92.149.1
  o SUSE Linux Enterprise Server 12-SP2-BCL (noarch):
       kernel-devel-4.4.121-92.149.1
       kernel-macros-4.4.121-92.149.1
       kernel-source-4.4.121-92.149.1
  o SUSE Linux Enterprise High Availability 12-SP2 (ppc64le s390x x86_64):
       cluster-md-kmp-default-4.4.121-92.149.1
       cluster-md-kmp-default-debuginfo-4.4.121-92.149.1
       cluster-network-kmp-default-4.4.121-92.149.1
       cluster-network-kmp-default-debuginfo-4.4.121-92.149.1
       dlm-kmp-default-4.4.121-92.149.1
       dlm-kmp-default-debuginfo-4.4.121-92.149.1
       gfs2-kmp-default-4.4.121-92.149.1
       gfs2-kmp-default-debuginfo-4.4.121-92.149.1
       kernel-default-debuginfo-4.4.121-92.149.1
       kernel-default-debugsource-4.4.121-92.149.1
       ocfs2-kmp-default-4.4.121-92.149.1
       ocfs2-kmp-default-debuginfo-4.4.121-92.149.1


References:

  o https://www.suse.com/security/cve/CVE-2019-19063.html
  o https://www.suse.com/security/cve/CVE-2019-20934.html
  o https://www.suse.com/security/cve/CVE-2019-6133.html
  o https://www.suse.com/security/cve/CVE-2020-0444.html
  o https://www.suse.com/security/cve/CVE-2020-0465.html
  o https://www.suse.com/security/cve/CVE-2020-0466.html
  o https://www.suse.com/security/cve/CVE-2020-11668.html
  o https://www.suse.com/security/cve/CVE-2020-15436.html
  o https://www.suse.com/security/cve/CVE-2020-15437.html
  o https://www.suse.com/security/cve/CVE-2020-25211.html
  o https://www.suse.com/security/cve/CVE-2020-25285.html
  o https://www.suse.com/security/cve/CVE-2020-25668.html
  o https://www.suse.com/security/cve/CVE-2020-25669.html
  o https://www.suse.com/security/cve/CVE-2020-27068.html
  o https://www.suse.com/security/cve/CVE-2020-27673.html
  o https://www.suse.com/security/cve/CVE-2020-27777.html
  o https://www.suse.com/security/cve/CVE-2020-27786.html
  o https://www.suse.com/security/cve/CVE-2020-27825.html
  o https://www.suse.com/security/cve/CVE-2020-28915.html
  o https://www.suse.com/security/cve/CVE-2020-28974.html
  o https://www.suse.com/security/cve/CVE-2020-29568.html
  o https://www.suse.com/security/cve/CVE-2020-29569.html
  o https://www.suse.com/security/cve/CVE-2020-29660.html
  o https://www.suse.com/security/cve/CVE-2020-29661.html
  o https://www.suse.com/security/cve/CVE-2020-36158.html
  o https://www.suse.com/security/cve/CVE-2021-3347.html
  o https://bugzilla.suse.com/1070943
  o https://bugzilla.suse.com/1121826
  o https://bugzilla.suse.com/1121872
  o https://bugzilla.suse.com/1157298
  o https://bugzilla.suse.com/1168952
  o https://bugzilla.suse.com/1173942
  o https://bugzilla.suse.com/1176395
  o https://bugzilla.suse.com/1176485
  o https://bugzilla.suse.com/1177411
  o https://bugzilla.suse.com/1178123
  o https://bugzilla.suse.com/1178182
  o https://bugzilla.suse.com/1178589
  o https://bugzilla.suse.com/1178622
  o https://bugzilla.suse.com/1178886
  o https://bugzilla.suse.com/1179107
  o https://bugzilla.suse.com/1179140
  o https://bugzilla.suse.com/1179141
  o https://bugzilla.suse.com/1179204
  o https://bugzilla.suse.com/1179419
  o https://bugzilla.suse.com/1179508
  o https://bugzilla.suse.com/1179509
  o https://bugzilla.suse.com/1179601
  o https://bugzilla.suse.com/1179616
  o https://bugzilla.suse.com/1179663
  o https://bugzilla.suse.com/1179666
  o https://bugzilla.suse.com/1179745
  o https://bugzilla.suse.com/1179877
  o https://bugzilla.suse.com/1179960
  o https://bugzilla.suse.com/1179961
  o https://bugzilla.suse.com/1180008
  o https://bugzilla.suse.com/1180027
  o https://bugzilla.suse.com/1180028
  o https://bugzilla.suse.com/1180029
  o https://bugzilla.suse.com/1180030
  o https://bugzilla.suse.com/1180031
  o https://bugzilla.suse.com/1180032
  o https://bugzilla.suse.com/1180052
  o https://bugzilla.suse.com/1180086
  o https://bugzilla.suse.com/1180559
  o https://bugzilla.suse.com/1180562
  o https://bugzilla.suse.com/1181349
  o https://bugzilla.suse.com/969755

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=emsm
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0552 – [SUSE] Linux Kernel: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/02/15/esb-2021-0552-suse-linux-kernel-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0552-suse-linux-kernel-multiple-vulnerabilities

ESB-2021.0551 – [SUSE] Linux Kernel: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0551
                   Security update for the Linux Kernel
                             15 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Linux Kernel
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Root Compromise                 -- Existing Account      
                   Access Privileged Data          -- Existing Account      
                   Denial of Service               -- Existing Account      
                   Access Confidential Data        -- Existing Account      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-3348 CVE-2021-3347 CVE-2020-36158
                   CVE-2020-29661 CVE-2020-29660 CVE-2020-29569
                   CVE-2020-29568 CVE-2020-29371 CVE-2020-28974
                   CVE-2020-28915 CVE-2020-28374 CVE-2020-27835
                   CVE-2020-27825 CVE-2020-27786 CVE-2020-27777
                   CVE-2020-27068 CVE-2020-25669 CVE-2020-25639
                   CVE-2020-25211 CVE-2020-15437 CVE-2020-15436
                   CVE-2020-11668 CVE-2020-10781 CVE-2020-4788
                   CVE-2020-0466 CVE-2020-0465 CVE-2020-0444
                   CVE-2019-20934 CVE-2019-20806 

Reference:         ESB-2021.0543
                   ESB-2021.0527
                   ESB-2021.0501

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2021/suse-su-20210438-1

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:0438-1
Rating:            important
References:        #1144912 #1149032 #1163840 #1168952 #1172199 #1173074
                   #1173942 #1176395 #1176846 #1177666 #1178182 #1178272
                   #1178372 #1178589 #1178590 #1178684 #1178886 #1179071
                   #1179107 #1179140 #1179141 #1179419 #1179429 #1179508
                   #1179509 #1179601 #1179616 #1179663 #1179666 #1179745
                   #1179877 #1179878 #1179895 #1179960 #1179961 #1180008
                   #1180027 #1180028 #1180029 #1180030 #1180031 #1180032
                   #1180052 #1180086 #1180559 #1180562 #1180676 #1181001
                   #1181158 #1181349 #1181504 #1181553 #1181645
Cross-References:  CVE-2019-20806 CVE-2019-20934 CVE-2020-0444 CVE-2020-0465
                   CVE-2020-0466 CVE-2020-10781 CVE-2020-11668 CVE-2020-15436
                   CVE-2020-15437 CVE-2020-25211 CVE-2020-25639 CVE-2020-25669
                   CVE-2020-27068 CVE-2020-27777 CVE-2020-27786 CVE-2020-27825
                   CVE-2020-27835 CVE-2020-28374 CVE-2020-28915 CVE-2020-28974
                   CVE-2020-29371 CVE-2020-29568 CVE-2020-29569 CVE-2020-29660
                   CVE-2020-29661 CVE-2020-36158 CVE-2020-4788 CVE-2021-3347
                   CVE-2021-3348
Affected Products:
                   SUSE Linux Enterprise Server for SAP 15
                   SUSE Linux Enterprise Server 15-LTSS
                   SUSE Linux Enterprise Module for Live Patching 15
                   SUSE Linux Enterprise High Performance Computing 15-LTSS
                   SUSE Linux Enterprise High Performance Computing 15-ESPOS
                   SUSE Linux Enterprise High Availability 15
______________________________________________________________________________

An update that solves 29 vulnerabilities and has 24 fixes is now available.

Description:

The SUSE Linux Enterprise 15 kernel was updated to receive various security and
bugfixes.

The following security bugs were fixed:

  o CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be
    triggered by local attackers (with access to the nbd device) via an I/O
    request at a certain point during device setup (bnc#1181504).
  o CVE-2021-3347: A use-after-free was discovered in the PI futexes during
    fault handling, allowing local users to execute code in the kernel (bnc#
    1181349).
  o CVE-2020-25211: Fixed a buffer overflow in ctnetlink_parse_tuple_filter()
    which could be triggered by a local attackers by injecting conntrack
    netlink configuration (bnc#1176395).
  o CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found,
    specifically in the way user calls Ioctl after open dev file and fork. A
    local user could use this flaw to crash the system (bnc#1179878).
  o CVE-2020-29569: Fixed a potential privilege escalation and information
    leaks related to the PV block backend, as used by Xen (bnc#1179509).
  o CVE-2020-29568: Fixed a denial of service issue, related to processing
    watch events (bnc#1179508).
  o CVE-2020-0444: Fixed a bad kfree due to a logic error in
    audit_data_to_entry (bnc#1180027).
  o CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c
    that could have led to local privilege escalation (bnc#1180029).
  o CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl
    and ep_loop_check_proc of eventpoll.c (bnc#1180031).
  o CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed
    a local user to obtain sensitive information from the data in the L1 cache
    under extenuating circumstances (bsc#1177666).
  o CVE-2020-10781: A flaw was found in the ZRAM kernel module, where a user
    with a local account and the ability to read the /sys/class/zram-control/
    hot_add file can create ZRAM device nodes in the /dev/ directory. This read
    allocates kernel memory and is not accounted for a user that triggers the
    creation of that ZRAM device. With this vulnerability, continually reading
    the device may consume a large amount of system memory and cause the
    Out-of-Memory (OOM) killer to activate and terminate random userspace
    processes, possibly making the system inoperable (bnc#1173074).
  o CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c
    which could have allowed local users to gain privileges or cause a denial
    of service (bsc#1179141).
  o CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check
    in the nl80211_policy policy of nl80211.c (bnc#1180086).
  o CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#
    1176846).
  o CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction
    Services (RTAS) interface, affecting guests running on top of PowerVM or
    KVM hypervisors (bnc#1179107).
  o CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation
    (bnc#1179601).
  o CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc
    #1179960).
  o CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may
    have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
  o CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a
    use-after-free attack against TIOCSPGRP (bsc#1179745).
  o CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have
    been used by local attackers to read privileged information or potentially
    crash the kernel (bsc#1178589).
  o CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have
    been used by local attackers to read kernel memory (bsc#1178886).
  o CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
  o CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#
    1178182).
  o CVE-2020-29371: An issue was discovered in romfs_dev_read in fs/romfs/
    storage.c where uninitialized memory leaks to userspace (bnc#1179429).
  o CVE-2020-15437: Fixed a null pointer dereference which could have allowed
    local users to cause a denial of service(bsc#1179140).
  o CVE-2020-36158: Fixed a potential remote code execution in the Marvell
    mwifiex driver (bsc#1180559).
  o CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink
    camera USB driver (bnc#1168952).
  o CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA
    fault statistics were inappropriately freed (bsc#1179663).
  o CVE-2019-20806: Fixed a NULL pointer dereference in tw5864_handle_frame()
    in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of
    service (bnc#1172199).


The following non-security bugs were fixed:

  o blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1163840
    bsc#1179071).
  o blk-mq: make sure that line break can be printed (bsc#1163840 bsc#1179071).
  o epoll: Keep a reference on files added to the check list (bsc#1180031).
  o fix regression in "epoll: Keep a reference on files added to the check
    list" (bsc#1180031, git-fixes).
  o futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).
  o futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349
    bsc#1149032).
  o futex: Fix incorrect should_fail_futex() handling (bsc#1181349).
  o futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).
  o futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).
  o futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).
  o futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).
  o futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#
    1149032).
  o HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
  o iommu/vt-d: Do not dereference iommu_device if IOMMU_API is not built (bsc#
    1181001, jsc#ECO-3191).
  o iommu/vt-d: Gracefully handle DMAR units with no supported address widths
    (bsc#1181001, jsc#ECO-3191).
  o kABI: Fix kABI for extended APIC-ID support (bsc#1181001, jsc#ECO-3191).
  o locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#
    1149032).
  o nbd: Fix memory leak in nbd_add_socket (bsc#1181504).
  o net/x25: prevent a couple of overflows (bsc#1178590).
  o rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349
    bsc#1149032).
  o s390/dasd: fix hanging device offline processing (bsc#1144912).
  o scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1178272).
  o x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1181001,
    jsc#ECO-3191).
  o x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#
    1181001, jsc#ECO-3191).
  o x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181001, jsc#
    ECO-3191).
  o x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).
  o x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).
  o x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181001, jsc#
    ECO-3191).
  o x86/tracing: Introduce a static key for exception tracing (bsc#1179895).
  o x86/traps: Simplify pagefault tracing logic (bsc#1179895).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Server for SAP 15:
    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2021-438=1
  o SUSE Linux Enterprise Server 15-LTSS:
    zypper in -t patch SUSE-SLE-Product-SLES-15-2021-438=1
  o SUSE Linux Enterprise Module for Live Patching 15:
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-2021-438=1
  o SUSE Linux Enterprise High Performance Computing 15-LTSS:
    zypper in -t patch SUSE-SLE-Product-HPC-15-2021-438=1
  o SUSE Linux Enterprise High Performance Computing 15-ESPOS:
    zypper in -t patch SUSE-SLE-Product-HPC-15-2021-438=1
  o SUSE Linux Enterprise High Availability 15:
    zypper in -t patch SUSE-SLE-Product-HA-15-2021-438=1

Package List:

  o SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
       kernel-default-4.12.14-150.66.1
       kernel-default-base-4.12.14-150.66.1
       kernel-default-debuginfo-4.12.14-150.66.1
       kernel-default-debugsource-4.12.14-150.66.1
       kernel-default-devel-4.12.14-150.66.1
       kernel-default-devel-debuginfo-4.12.14-150.66.1
       kernel-obs-build-4.12.14-150.66.1
       kernel-obs-build-debugsource-4.12.14-150.66.1
       kernel-syms-4.12.14-150.66.1
       kernel-vanilla-base-4.12.14-150.66.1
       kernel-vanilla-base-debuginfo-4.12.14-150.66.1
       kernel-vanilla-debuginfo-4.12.14-150.66.1
       kernel-vanilla-debugsource-4.12.14-150.66.1
       reiserfs-kmp-default-4.12.14-150.66.1
       reiserfs-kmp-default-debuginfo-4.12.14-150.66.1
  o SUSE Linux Enterprise Server for SAP 15 (noarch):
       kernel-devel-4.12.14-150.66.1
       kernel-docs-4.12.14-150.66.1
       kernel-macros-4.12.14-150.66.1
       kernel-source-4.12.14-150.66.1
  o SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
       kernel-default-4.12.14-150.66.1
       kernel-default-base-4.12.14-150.66.1
       kernel-default-debuginfo-4.12.14-150.66.1
       kernel-default-debugsource-4.12.14-150.66.1
       kernel-default-devel-4.12.14-150.66.1
       kernel-default-devel-debuginfo-4.12.14-150.66.1
       kernel-obs-build-4.12.14-150.66.1
       kernel-obs-build-debugsource-4.12.14-150.66.1
       kernel-syms-4.12.14-150.66.1
       kernel-vanilla-base-4.12.14-150.66.1
       kernel-vanilla-base-debuginfo-4.12.14-150.66.1
       kernel-vanilla-debuginfo-4.12.14-150.66.1
       kernel-vanilla-debugsource-4.12.14-150.66.1
       reiserfs-kmp-default-4.12.14-150.66.1
       reiserfs-kmp-default-debuginfo-4.12.14-150.66.1
  o SUSE Linux Enterprise Server 15-LTSS (noarch):
       kernel-devel-4.12.14-150.66.1
       kernel-docs-4.12.14-150.66.1
       kernel-macros-4.12.14-150.66.1
       kernel-source-4.12.14-150.66.1
  o SUSE Linux Enterprise Server 15-LTSS (s390x):
       kernel-default-man-4.12.14-150.66.1
       kernel-zfcpdump-debuginfo-4.12.14-150.66.1
       kernel-zfcpdump-debugsource-4.12.14-150.66.1
  o SUSE Linux Enterprise Module for Live Patching 15 (ppc64le x86_64):
       kernel-default-debuginfo-4.12.14-150.66.1
       kernel-default-debugsource-4.12.14-150.66.1
       kernel-default-livepatch-4.12.14-150.66.1
       kernel-livepatch-4_12_14-150_66-default-1-1.3.1
       kernel-livepatch-4_12_14-150_66-default-debuginfo-1-1.3.1
  o SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
       kernel-default-4.12.14-150.66.1
       kernel-default-base-4.12.14-150.66.1
       kernel-default-debuginfo-4.12.14-150.66.1
       kernel-default-debugsource-4.12.14-150.66.1
       kernel-default-devel-4.12.14-150.66.1
       kernel-default-devel-debuginfo-4.12.14-150.66.1
       kernel-obs-build-4.12.14-150.66.1
       kernel-obs-build-debugsource-4.12.14-150.66.1
       kernel-syms-4.12.14-150.66.1
       kernel-vanilla-base-4.12.14-150.66.1
       kernel-vanilla-base-debuginfo-4.12.14-150.66.1
       kernel-vanilla-debuginfo-4.12.14-150.66.1
       kernel-vanilla-debugsource-4.12.14-150.66.1
  o SUSE Linux Enterprise High Performance Computing 15-LTSS (noarch):
       kernel-devel-4.12.14-150.66.1
       kernel-docs-4.12.14-150.66.1
       kernel-macros-4.12.14-150.66.1
       kernel-source-4.12.14-150.66.1
  o SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
       kernel-default-4.12.14-150.66.1
       kernel-default-base-4.12.14-150.66.1
       kernel-default-debuginfo-4.12.14-150.66.1
       kernel-default-debugsource-4.12.14-150.66.1
       kernel-default-devel-4.12.14-150.66.1
       kernel-default-devel-debuginfo-4.12.14-150.66.1
       kernel-obs-build-4.12.14-150.66.1
       kernel-obs-build-debugsource-4.12.14-150.66.1
       kernel-syms-4.12.14-150.66.1
       kernel-vanilla-base-4.12.14-150.66.1
       kernel-vanilla-base-debuginfo-4.12.14-150.66.1
       kernel-vanilla-debuginfo-4.12.14-150.66.1
       kernel-vanilla-debugsource-4.12.14-150.66.1
  o SUSE Linux Enterprise High Performance Computing 15-ESPOS (noarch):
       kernel-devel-4.12.14-150.66.1
       kernel-docs-4.12.14-150.66.1
       kernel-macros-4.12.14-150.66.1
       kernel-source-4.12.14-150.66.1
  o SUSE Linux Enterprise High Availability 15 (aarch64 ppc64le s390x x86_64):
       cluster-md-kmp-default-4.12.14-150.66.1
       cluster-md-kmp-default-debuginfo-4.12.14-150.66.1
       dlm-kmp-default-4.12.14-150.66.1
       dlm-kmp-default-debuginfo-4.12.14-150.66.1
       gfs2-kmp-default-4.12.14-150.66.1
       gfs2-kmp-default-debuginfo-4.12.14-150.66.1
       kernel-default-debuginfo-4.12.14-150.66.1
       kernel-default-debugsource-4.12.14-150.66.1
       ocfs2-kmp-default-4.12.14-150.66.1
       ocfs2-kmp-default-debuginfo-4.12.14-150.66.1


References:

  o https://www.suse.com/security/cve/CVE-2019-20806.html
  o https://www.suse.com/security/cve/CVE-2019-20934.html
  o https://www.suse.com/security/cve/CVE-2020-0444.html
  o https://www.suse.com/security/cve/CVE-2020-0465.html
  o https://www.suse.com/security/cve/CVE-2020-0466.html
  o https://www.suse.com/security/cve/CVE-2020-10781.html
  o https://www.suse.com/security/cve/CVE-2020-11668.html
  o https://www.suse.com/security/cve/CVE-2020-15436.html
  o https://www.suse.com/security/cve/CVE-2020-15437.html
  o https://www.suse.com/security/cve/CVE-2020-25211.html
  o https://www.suse.com/security/cve/CVE-2020-25639.html
  o https://www.suse.com/security/cve/CVE-2020-25669.html
  o https://www.suse.com/security/cve/CVE-2020-27068.html
  o https://www.suse.com/security/cve/CVE-2020-27777.html
  o https://www.suse.com/security/cve/CVE-2020-27786.html
  o https://www.suse.com/security/cve/CVE-2020-27825.html
  o https://www.suse.com/security/cve/CVE-2020-27835.html
  o https://www.suse.com/security/cve/CVE-2020-28374.html
  o https://www.suse.com/security/cve/CVE-2020-28915.html
  o https://www.suse.com/security/cve/CVE-2020-28974.html
  o https://www.suse.com/security/cve/CVE-2020-29371.html
  o https://www.suse.com/security/cve/CVE-2020-29568.html
  o https://www.suse.com/security/cve/CVE-2020-29569.html
  o https://www.suse.com/security/cve/CVE-2020-29660.html
  o https://www.suse.com/security/cve/CVE-2020-29661.html
  o https://www.suse.com/security/cve/CVE-2020-36158.html
  o https://www.suse.com/security/cve/CVE-2020-4788.html
  o https://www.suse.com/security/cve/CVE-2021-3347.html
  o https://www.suse.com/security/cve/CVE-2021-3348.html
  o https://bugzilla.suse.com/1144912
  o https://bugzilla.suse.com/1149032
  o https://bugzilla.suse.com/1163840
  o https://bugzilla.suse.com/1168952
  o https://bugzilla.suse.com/1172199
  o https://bugzilla.suse.com/1173074
  o https://bugzilla.suse.com/1173942
  o https://bugzilla.suse.com/1176395
  o https://bugzilla.suse.com/1176846
  o https://bugzilla.suse.com/1177666
  o https://bugzilla.suse.com/1178182
  o https://bugzilla.suse.com/1178272
  o https://bugzilla.suse.com/1178372
  o https://bugzilla.suse.com/1178589
  o https://bugzilla.suse.com/1178590
  o https://bugzilla.suse.com/1178684
  o https://bugzilla.suse.com/1178886
  o https://bugzilla.suse.com/1179071
  o https://bugzilla.suse.com/1179107
  o https://bugzilla.suse.com/1179140
  o https://bugzilla.suse.com/1179141
  o https://bugzilla.suse.com/1179419
  o https://bugzilla.suse.com/1179429
  o https://bugzilla.suse.com/1179508
  o https://bugzilla.suse.com/1179509
  o https://bugzilla.suse.com/1179601
  o https://bugzilla.suse.com/1179616
  o https://bugzilla.suse.com/1179663
  o https://bugzilla.suse.com/1179666
  o https://bugzilla.suse.com/1179745
  o https://bugzilla.suse.com/1179877
  o https://bugzilla.suse.com/1179878
  o https://bugzilla.suse.com/1179895
  o https://bugzilla.suse.com/1179960
  o https://bugzilla.suse.com/1179961
  o https://bugzilla.suse.com/1180008
  o https://bugzilla.suse.com/1180027
  o https://bugzilla.suse.com/1180028
  o https://bugzilla.suse.com/1180029
  o https://bugzilla.suse.com/1180030
  o https://bugzilla.suse.com/1180031
  o https://bugzilla.suse.com/1180032
  o https://bugzilla.suse.com/1180052
  o https://bugzilla.suse.com/1180086
  o https://bugzilla.suse.com/1180559
  o https://bugzilla.suse.com/1180562
  o https://bugzilla.suse.com/1180676
  o https://bugzilla.suse.com/1181001
  o https://bugzilla.suse.com/1181158
  o https://bugzilla.suse.com/1181349
  o https://bugzilla.suse.com/1181504
  o https://bugzilla.suse.com/1181553
  o https://bugzilla.suse.com/1181645

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=NjZu
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0551 – [SUSE] Linux Kernel: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/02/15/esb-2021-0551-suse-linux-kernel-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0551-suse-linux-kernel-multiple-vulnerabilities

ESB-2021.0549 – [UNIX/Linux][Debian] xterm: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0549
                           xterm security update
                             15 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           xterm
Publisher:         Debian
Operating System:  Debian GNU/Linux
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Reduced Security                -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-27135  

Original Bulletin: 
   https://www.debian.org/lts/security/2021/dla-2558

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running xterm check for an updated version of the software for their
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -----------------------------------------------------------------------
Debian LTS Advisory DLA-2558-1              debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Utkarsh Gupta
February 14, 2021                           https://wiki.debian.org/LTS
- - -----------------------------------------------------------------------

Package        : xterm
Version        : 327-2+deb9u1
CVE ID         : CVE-2021-27135
Debian Bug     : 982439

xterm through Patch #365 allows remote attackers to cause a
denial of service (segmentation fault) or possibly have
unspecified other impact via a crafted UTF-8 character sequence.

For Debian 9 stretch, this problem has been fixed in version
327-2+deb9u1.

We recommend that you upgrade your xterm packages.

For the detailed security status of xterm please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/xterm

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=iI1E
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ho5l
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0549 – [UNIX/Linux][Debian] xterm: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/02/15/esb-2021-0549-unix-linuxdebian-xterm-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0549-unix-linuxdebian-xterm-multiple-vulnerabilities

ESB-2021.0550 – [Debian] subversion: Denial of service – Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0550
                        subversion security update
                             15 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           subversion
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-17525  

Reference:         ESB-2021.0531

Original Bulletin: 
   http://www.debian.org/security/2021/dsa-4851

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4851-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
February 13, 2021                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : subversion
CVE ID         : CVE-2020-17525
Debian Bug     : 982464

Thomas Akesson discovered a remotely triggerable vulnerability in the
mod_authz_svn module in Subversion, a version control system. When using
in-repository authz rules with the AuthzSVNReposRelativeAccessFile
option an unauthenticated remote client can take advantage of this flaw
to cause a denial of service by sending a request for a non-existing
repository URL.

For the stable distribution (buster), this problem has been fixed in
version 1.10.4-1+deb10u2.

We recommend that you upgrade your subversion packages.

For the detailed security status of subversion please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/subversion

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

- -----BEGIN PGP SIGNATURE-----
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=vgyS
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYCnHkuNLKJtyKPYoAQgQwhAAk4cooj4YO3dbazwVh9sH2h9qCUKqCH8Q
n8igAbQFdI6DRxOOGKx2HAt2dtrlM7jOYj9+Xb/5d5+ghSIYT2gDCfMuWk7ru3t3
2dXjvq/8zEomIcSzZGhFLw5wd5O/MWIDHUamRvJTTzPZh6RFWmi0GTxJ2TxxTO0O
WkuQVHMe3iNLp55st7Or3gXyDxXZvIvXgkZeh26m0JJ2lrdTZZF+UFhBz2nTMVR4
ocJFz4uBBcfTdGDqE6xj6WBjwp1z6dA7cOajH52V2QoOuWhQ+0Dyc6IWlA5jL6ck
c0U8aSDNZkAVmYyOAPaFtDkHBagBh4qnCsVVDBvlHH2+UWKmqXM+vXkouJKR6sMx
5nhDmyoUBkQ7bDsOvg+d+SuLObb2TkiEfwZEUZyvlFL4ZmwolPbpuQ66fjYPLHwk
AlHs97DBrcpg6yfNrszT1lJrEQc4st2Wl6j+xFfdUbBeXF3sK8O8wFYZBb+tUFnx
kAXLl9fEDykAuXZQJwGfbuXTc6Hgk80nAG4kVVkHUtgYxGFYmo0jAuDDXuQj17ww
2OPzrOXfWVtgxqgMhr5BosWzwoFL6IaVk/2pTR1+p8gAxOA+HPArVsl0bfHGhIfD
SUu6+QROGjjikauVbUZeWUy9MT/RCumTOvHpvVxUB802f6DUIJg4eYn5OXWz5pKc
UoUTemH1iIA=
=+Jxa
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0550 – [Debian] subversion: Denial of service – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2021/02/15/esb-2021-0550-debian-subversion-denial-of-service-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0550-debian-subversion-denial-of-service-remote-unauthenticated

ESB-2021.0542 – [SUSE] SUSE Manager Client Tools: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0542
            Security Beta update for SUSE Manager Client Tools
                             15 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           SUSE Manager Client Tools
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Unauthorised Access             -- Remote/Unauthenticated
                   Access Confidential Data        -- Existing Account      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-25592 CVE-2020-17490 CVE-2020-16846
                   CVE-2019-17361  

Reference:         ESB-2021.0441
                   ESB-2021.0275
                   ESB-2020.4395
                   ESB-2020.4300

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2021/suse-su-202114624-1
   https://www.suse.com/support/update/announcement/2021/suse-su-202114623-1

Comment: This bulletin contains two (2) SUSE security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security Beta update for SUSE Manager Client Tools

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:14624-1
Rating:            moderate
References:        #1083110 #1157479 #1158441 #1159284 #1162504 #1163981
                   #1165425 #1167556 #1169604 #1171257 #1171461 #1172211
                   #1173909 #1173911 #1175549 #1176293 #1176823 #1178319
                   #1178361 #1178362 #1178485 #1179566 #1180584
Cross-References:  CVE-2019-17361 CVE-2020-16846 CVE-2020-17490 CVE-2020-25592
Affected Products:
                   SUSE Manager Ubuntu 18.04-CLIENT-TOOLS-BETA
______________________________________________________________________________

An update that solves four vulnerabilities and has 19 fixes is now available.

Description:

This update fixes the following issues:
prometheus-exporter-exporter:

  o Initial release (Closes: #968029).


salt:

  o Remove deprecated warning that breaks minion execution when
    "server_id_use_crc" opts is missing
  o Revert wrong zypper patch to support vendorchanges flags on pkg.install
  o Force zyppnotify to prefer Packages.db than Packages if it exists
  o Allow vendor change option with zypper
  o Add pkg.services_need_restart
  o Fix for file.check_perms to work with numeric uid/gid
  o Virt: more network support Add more network and PCI/USB host devices
    passthrough support to virt module and states
  o Bigvm backports
  o Virt consoles, CPU tuning and topology, and memory tuning.
  o Fix pkg states when DEB package has "all" arch
  o Do not force beacons configuration to be a list. Revert https://github.com/
    saltstack/salt/pull/58655
  o Drop wrong virt capabilities code after rebasing patches
  o Update to Salt release version 3002.2
  o See release notes: https://docs.saltstack.com/en/latest/topics/releases/
    3002.2.html
  o Force zyppnotify to prefer Packages.db than Packages if it exists
  o Allow vendor change option with zypper
  o Add pkg.services_need_restart
  o Bigvm backports: virt consoles, CPU tuning and topology, and memory tuning.
  o Fix for file.check_perms to work with numeric uid/gid
  o Change 'Requires(pre)' to 'Requires' for salt-minion package (bsc#1083110)
  o Set passphrase for salt-ssh keys to empty string (bsc#1178485)
  o Properly validate eauth credentials and tokens on SSH calls made by Salt
    API (bsc#1178319) (bsc#1178362) (bsc#1178361) (CVE-2020-25592)
    (CVE-2020-17490) (CVE-2020-16846)
  o Fix novendorchange handling in zypperpkg module
  o Remove msgpack = 1.0.0 (bsc#1171257)
  o Fix the registration of libvirt pool and nodedev events
  o Accept nested namespaces in spacewalk.api runner function. (bsc#1172211)
  o Info_installed works without status attr now (bsc#1171461)
  o Prevent sporious "salt-api" stuck processes when managing SSH minions
    because of logging deadlock (bsc#1159284)
  o Avoid segfault from "salt-api" under certain conditions of heavy load
    managing SSH minions (bsc#1169604)
  o Update to Salt version 3000 See release notes: https://docs.saltstack.com/
    en/latest/topics/releases/3000.html loop: fix variable names for
    until_no_eval
  o Enable building and installation for Fedora
  o Disable python2 build on Tumbleweed We are removing the python2 interpreter
    from openSUSE (SLE16). As such disable salt building for python2 there.
  o Sanitize grains loaded from roster_grains.json cache during "state.pkg"
  o Build: Buildequire pkgconfig(systemd) instead of systemd pkgconfig(systemd)
    is provided by systemd, so this is de-facto no change. But inside the Open
    Build Service (OBS), the same symbol is also provided by systemd-mini,
    which exists to shorten build-chains by only enabling what other packages
    need to successfully build
  o Backport saltutil state module to 2019.2 codebase (bsc#1167556)
  o Add new custom SUSE capability for saltutil state module
  o Virt._get_domain: don't raise an exception if there is no VM
  o Adds test for zypper abbreviation fix
  o Improved storage pool or network handling
  o Better import cache handline
  o Requiring python3-distro only for openSUSE/SLE >= 15
  o Use full option name instead of undocumented abbreviation for zypper
  o Python-distro is only needed for > Python 3.7. Removing it for Python 2
  o RHEL/CentOS 8 uses platform-python instead of python3
  o Enable build for Python 3.8
  o Update to Salt version 2019.2.3 (CVE-2019-17361) (bsc#1163981) (bsc#
    1162504) See release notes:
    https://docs.saltstack.com/en/latest/topics/releases/2019.2.3.html
  o Enable passing grains to start event based on 'start_event_grains'
    configuration parameter
  o Support for Btrfs and XFS in parted and mkfs added Adds virt.(pool|network)
    _get_xml functions Various libvirt updates
  o Let salt-ssh use platform-python on RHEL8 (bsc#1158441)
  o Fix StreamClosedError issue (bsc#1157479)
  o Requires vs BuildRequires
  o Limiting M2Crypto to >= SLE15
  o Replacing pycrypto with M2Crypto (bsc#1165425)
  o Update to 2019.2.2 release zypperpkg: understand product type
  o Enable usage of downloadonly parameter for apt module
  o Add new "salt-standalone-formulas-configuration" package


spacecmd:

  o Fix spacecmd with no parameters produces traceback on SLE 11 SP4 (bsc#
    1176823)
  o Fixed "non-advanced" package search when using multiple package names (bsc#
    1180584)
  o Added '-r REVISION' option to the 'configchannel_updateinitsls' command
    (bsc#1179566)
  o Fix: internal: workaround for future tee of logs translation

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Manager Ubuntu 18.04-CLIENT-TOOLS-BETA:
    zypper in -t patch suse-ubu184ct-client-tools-beta-202101-14624=1

Package List:

  o SUSE Manager Ubuntu 18.04-CLIENT-TOOLS-BETA (amd64):
       prometheus-exporter-exporter-0.4.0-1
  o SUSE Manager Ubuntu 18.04-CLIENT-TOOLS-BETA (all):
       salt-common-3002.2+ds-1+27.28.2
       salt-minion-3002.2+ds-1+27.28.2
       spacecmd-4.2.4-2.15.1


References:

  o https://www.suse.com/security/cve/CVE-2019-17361.html
  o https://www.suse.com/security/cve/CVE-2020-16846.html
  o https://www.suse.com/security/cve/CVE-2020-17490.html
  o https://www.suse.com/security/cve/CVE-2020-25592.html
  o https://bugzilla.suse.com/1083110
  o https://bugzilla.suse.com/1157479
  o https://bugzilla.suse.com/1158441
  o https://bugzilla.suse.com/1159284
  o https://bugzilla.suse.com/1162504
  o https://bugzilla.suse.com/1163981
  o https://bugzilla.suse.com/1165425
  o https://bugzilla.suse.com/1167556
  o https://bugzilla.suse.com/1169604
  o https://bugzilla.suse.com/1171257
  o https://bugzilla.suse.com/1171461
  o https://bugzilla.suse.com/1172211
  o https://bugzilla.suse.com/1173909
  o https://bugzilla.suse.com/1173911
  o https://bugzilla.suse.com/1175549
  o https://bugzilla.suse.com/1176293
  o https://bugzilla.suse.com/1176823
  o https://bugzilla.suse.com/1178319
  o https://bugzilla.suse.com/1178361
  o https://bugzilla.suse.com/1178362
  o https://bugzilla.suse.com/1178485
  o https://bugzilla.suse.com/1179566
  o https://bugzilla.suse.com/1180584

- --------------------------------------------------------------------------------

SUSE Security Update: Security Beta update for SUSE Manager Client Tools

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:14624-1
Rating:            moderate
References:        #1083110 #1157479 #1158441 #1159284 #1162504 #1163981
                   #1165425 #1167556 #1169604 #1171257 #1171461 #1172211
                   #1173909 #1173911 #1175549 #1176293 #1176823 #1178319
                   #1178361 #1178362 #1178485 #1179566 #1180584
Cross-References:  CVE-2019-17361 CVE-2020-16846 CVE-2020-17490 CVE-2020-25592
Affected Products:
                   SUSE Manager Ubuntu 18.04-CLIENT-TOOLS-BETA
______________________________________________________________________________

An update that solves four vulnerabilities and has 19 fixes is now available.

Description:

This update fixes the following issues:
prometheus-exporter-exporter:

  o Initial release (Closes: #968029).


salt:

  o Remove deprecated warning that breaks minion execution when
    "server_id_use_crc" opts is missing
  o Revert wrong zypper patch to support vendorchanges flags on pkg.install
  o Force zyppnotify to prefer Packages.db than Packages if it exists
  o Allow vendor change option with zypper
  o Add pkg.services_need_restart
  o Fix for file.check_perms to work with numeric uid/gid
  o Virt: more network support Add more network and PCI/USB host devices
    passthrough support to virt module and states
  o Bigvm backports
  o Virt consoles, CPU tuning and topology, and memory tuning.
  o Fix pkg states when DEB package has "all" arch
  o Do not force beacons configuration to be a list. Revert https://github.com/
    saltstack/salt/pull/58655
  o Drop wrong virt capabilities code after rebasing patches
  o Update to Salt release version 3002.2
  o See release notes: https://docs.saltstack.com/en/latest/topics/releases/
    3002.2.html
  o Force zyppnotify to prefer Packages.db than Packages if it exists
  o Allow vendor change option with zypper
  o Add pkg.services_need_restart
  o Bigvm backports: virt consoles, CPU tuning and topology, and memory tuning.
  o Fix for file.check_perms to work with numeric uid/gid
  o Change 'Requires(pre)' to 'Requires' for salt-minion package (bsc#1083110)
  o Set passphrase for salt-ssh keys to empty string (bsc#1178485)
  o Properly validate eauth credentials and tokens on SSH calls made by Salt
    API (bsc#1178319) (bsc#1178362) (bsc#1178361) (CVE-2020-25592)
    (CVE-2020-17490) (CVE-2020-16846)
  o Fix novendorchange handling in zypperpkg module
  o Remove msgpack = 1.0.0 (bsc#1171257)
  o Fix the registration of libvirt pool and nodedev events
  o Accept nested namespaces in spacewalk.api runner function. (bsc#1172211)
  o Info_installed works without status attr now (bsc#1171461)
  o Prevent sporious "salt-api" stuck processes when managing SSH minions
    because of logging deadlock (bsc#1159284)
  o Avoid segfault from "salt-api" under certain conditions of heavy load
    managing SSH minions (bsc#1169604)
  o Update to Salt version 3000 See release notes: https://docs.saltstack.com/
    en/latest/topics/releases/3000.html loop: fix variable names for
    until_no_eval
  o Enable building and installation for Fedora
  o Disable python2 build on Tumbleweed We are removing the python2 interpreter
    from openSUSE (SLE16). As such disable salt building for python2 there.
  o Sanitize grains loaded from roster_grains.json cache during "state.pkg"
  o Build: Buildequire pkgconfig(systemd) instead of systemd pkgconfig(systemd)
    is provided by systemd, so this is de-facto no change. But inside the Open
    Build Service (OBS), the same symbol is also provided by systemd-mini,
    which exists to shorten build-chains by only enabling what other packages
    need to successfully build
  o Backport saltutil state module to 2019.2 codebase (bsc#1167556)
  o Add new custom SUSE capability for saltutil state module
  o Virt._get_domain: don't raise an exception if there is no VM
  o Adds test for zypper abbreviation fix
  o Improved storage pool or network handling
  o Better import cache handline
  o Requiring python3-distro only for openSUSE/SLE >= 15
  o Use full option name instead of undocumented abbreviation for zypper
  o Python-distro is only needed for > Python 3.7. Removing it for Python 2
  o RHEL/CentOS 8 uses platform-python instead of python3
  o Enable build for Python 3.8
  o Update to Salt version 2019.2.3 (CVE-2019-17361) (bsc#1163981) (bsc#
    1162504) See release notes:
    https://docs.saltstack.com/en/latest/topics/releases/2019.2.3.html
  o Enable passing grains to start event based on 'start_event_grains'
    configuration parameter
  o Support for Btrfs and XFS in parted and mkfs added Adds virt.(pool|network)
    _get_xml functions Various libvirt updates
  o Let salt-ssh use platform-python on RHEL8 (bsc#1158441)
  o Fix StreamClosedError issue (bsc#1157479)
  o Requires vs BuildRequires
  o Limiting M2Crypto to >= SLE15
  o Replacing pycrypto with M2Crypto (bsc#1165425)
  o Update to 2019.2.2 release zypperpkg: understand product type
  o Enable usage of downloadonly parameter for apt module
  o Add new "salt-standalone-formulas-configuration" package


spacecmd:

  o Fix spacecmd with no parameters produces traceback on SLE 11 SP4 (bsc#
    1176823)
  o Fixed "non-advanced" package search when using multiple package names (bsc#
    1180584)
  o Added '-r REVISION' option to the 'configchannel_updateinitsls' command
    (bsc#1179566)
  o Fix: internal: workaround for future tee of logs translation

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Manager Ubuntu 18.04-CLIENT-TOOLS-BETA:
    zypper in -t patch suse-ubu184ct-client-tools-beta-202101-14624=1

Package List:

  o SUSE Manager Ubuntu 18.04-CLIENT-TOOLS-BETA (amd64):
       prometheus-exporter-exporter-0.4.0-1
  o SUSE Manager Ubuntu 18.04-CLIENT-TOOLS-BETA (all):
       salt-common-3002.2+ds-1+27.28.2
       salt-minion-3002.2+ds-1+27.28.2
       spacecmd-4.2.4-2.15.1


References:

  o https://www.suse.com/security/cve/CVE-2019-17361.html
  o https://www.suse.com/security/cve/CVE-2020-16846.html
  o https://www.suse.com/security/cve/CVE-2020-17490.html
  o https://www.suse.com/security/cve/CVE-2020-25592.html
  o https://bugzilla.suse.com/1083110
  o https://bugzilla.suse.com/1157479
  o https://bugzilla.suse.com/1158441
  o https://bugzilla.suse.com/1159284
  o https://bugzilla.suse.com/1162504
  o https://bugzilla.suse.com/1163981
  o https://bugzilla.suse.com/1165425
  o https://bugzilla.suse.com/1167556
  o https://bugzilla.suse.com/1169604
  o https://bugzilla.suse.com/1171257
  o https://bugzilla.suse.com/1171461
  o https://bugzilla.suse.com/1172211
  o https://bugzilla.suse.com/1173909
  o https://bugzilla.suse.com/1173911
  o https://bugzilla.suse.com/1175549
  o https://bugzilla.suse.com/1176293
  o https://bugzilla.suse.com/1176823
  o https://bugzilla.suse.com/1178319
  o https://bugzilla.suse.com/1178361
  o https://bugzilla.suse.com/1178362
  o https://bugzilla.suse.com/1178485
  o https://bugzilla.suse.com/1179566
  o https://bugzilla.suse.com/1180584

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=d0xU
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0542 – [SUSE] SUSE Manager Client Tools: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/02/15/esb-2021-0542-suse-suse-manager-client-tools-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0542-suse-suse-manager-client-tools-multiple-vulnerabilities

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...