openSUSE Security Announce
Threads by month
- ----- 2024 -----
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
November 2021
- 1 participants
- 64 discussions
openSUSE-SU-2021:3815-1: important: Security update for netcdf
by opensuse-security@opensuse.org 30 Nov '21
by opensuse-security@opensuse.org 30 Nov '21
30 Nov '21
openSUSE Security Update: Security update for netcdf
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:3815-1
Rating: important
References: #1191856
Cross-References: CVE-2019-20005 CVE-2019-20006 CVE-2019-20007
CVE-2019-20198 CVE-2019-20199 CVE-2019-20200
CVE-2019-20201 CVE-2019-20202 CVE-2021-26220
CVE-2021-26221 CVE-2021-26222 CVE-2021-30485
CVE-2021-31229 CVE-2021-31347 CVE-2021-31348
CVE-2021-31598
CVSS scores:
CVE-2019-20005 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20005 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20006 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2019-20006 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20007 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20007 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20198 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20198 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20199 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20199 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20200 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20200 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20201 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20201 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20202 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20202 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-26220 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-26221 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-26222 (SUSE): 6 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H
CVE-2021-30485 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-30485 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-31229 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-31347 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-31348 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-31348 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-31598 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-31598 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that fixes 16 vulnerabilities is now available.
Description:
This update for netcdf fixes the following issues:
- Fixed multiple vulnerabilities in ezXML: CVE-2019-20007, CVE-2019-20006,
CVE-2019-20201, CVE-2019-20202, CVE-2019-20199, CVE-2019-20200,
CVE-2019-20198, CVE-2021-26221, CVE-2021-26222, CVE-2021-30485,
CVE-2021-31229, CVE-2021-31347, CVE-2021-31348, CVE-2021-31598
(bsc#1191856) Note:
* CVE-2021-26220 https://sourceforge.net/p/ezxml/bugs/23 not relevant
for netcdf: code isn't used.
* CVE-2019-20005 https://sourceforge.net/p/ezxml/bugs/14 Issue cannot
be reproduced and no patch is available upstream.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2021-3815=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le x86_64):
libnetcdf-gnu-openmpi1-hpc-4.6.1-10.7.2
libnetcdf_4_6_1-gnu-hpc-4.6.1-10.7.2
libnetcdf_4_6_1-gnu-hpc-debuginfo-4.6.1-10.7.2
libnetcdf_4_6_1-gnu-mpich-hpc-4.6.1-10.7.2
libnetcdf_4_6_1-gnu-mpich-hpc-debuginfo-4.6.1-10.7.2
libnetcdf_4_6_1-gnu-mvapich2-hpc-4.6.1-10.7.2
libnetcdf_4_6_1-gnu-mvapich2-hpc-debuginfo-4.6.1-10.7.2
libnetcdf_4_6_1-gnu-openmpi1-hpc-4.6.1-10.7.2
libnetcdf_4_6_1-gnu-openmpi1-hpc-debuginfo-4.6.1-10.7.2
libnetcdf_4_6_1-gnu-openmpi2-hpc-4.6.1-10.7.2
libnetcdf_4_6_1-gnu-openmpi2-hpc-debuginfo-4.6.1-10.7.2
netcdf_4_6_1-gnu-hpc-4.6.1-10.7.2
netcdf_4_6_1-gnu-hpc-debuginfo-4.6.1-10.7.2
netcdf_4_6_1-gnu-hpc-devel-4.6.1-10.7.2
netcdf_4_6_1-gnu-hpc-devel-data-4.6.1-10.7.2
netcdf_4_6_1-gnu-hpc-devel-debuginfo-4.6.1-10.7.2
netcdf_4_6_1-gnu-hpc-devel-static-4.6.1-10.7.2
netcdf_4_6_1-gnu-mpich-hpc-4.6.1-10.7.2
netcdf_4_6_1-gnu-mpich-hpc-debuginfo-4.6.1-10.7.2
netcdf_4_6_1-gnu-mpich-hpc-debugsource-4.6.1-10.7.2
netcdf_4_6_1-gnu-mpich-hpc-devel-4.6.1-10.7.2
netcdf_4_6_1-gnu-mpich-hpc-devel-debuginfo-4.6.1-10.7.2
netcdf_4_6_1-gnu-mpich-hpc-devel-static-4.6.1-10.7.2
netcdf_4_6_1-gnu-mvapich2-hpc-4.6.1-10.7.2
netcdf_4_6_1-gnu-mvapich2-hpc-debuginfo-4.6.1-10.7.2
netcdf_4_6_1-gnu-mvapich2-hpc-debugsource-4.6.1-10.7.2
netcdf_4_6_1-gnu-mvapich2-hpc-devel-4.6.1-10.7.2
netcdf_4_6_1-gnu-mvapich2-hpc-devel-debuginfo-4.6.1-10.7.2
netcdf_4_6_1-gnu-mvapich2-hpc-devel-static-4.6.1-10.7.2
netcdf_4_6_1-gnu-openmpi1-hpc-4.6.1-10.7.2
netcdf_4_6_1-gnu-openmpi1-hpc-debuginfo-4.6.1-10.7.2
netcdf_4_6_1-gnu-openmpi1-hpc-devel-4.6.1-10.7.2
netcdf_4_6_1-gnu-openmpi1-hpc-devel-debuginfo-4.6.1-10.7.2
netcdf_4_6_1-gnu-openmpi1-hpc-devel-static-4.6.1-10.7.2
netcdf_4_6_1-gnu-openmpi2-hpc-4.6.1-10.7.2
netcdf_4_6_1-gnu-openmpi2-hpc-debuginfo-4.6.1-10.7.2
netcdf_4_6_1-gnu-openmpi2-hpc-devel-4.6.1-10.7.2
netcdf_4_6_1-gnu-openmpi2-hpc-devel-debuginfo-4.6.1-10.7.2
netcdf_4_6_1-gnu-openmpi2-hpc-devel-static-4.6.1-10.7.2
- openSUSE Leap 15.3 (noarch):
netcdf-gnu-openmpi1-hpc-4.6.1-10.7.2
netcdf-gnu-openmpi1-hpc-devel-4.6.1-10.7.2
References:
https://www.suse.com/security/cve/CVE-2019-20005.html
https://www.suse.com/security/cve/CVE-2019-20006.html
https://www.suse.com/security/cve/CVE-2019-20007.html
https://www.suse.com/security/cve/CVE-2019-20198.html
https://www.suse.com/security/cve/CVE-2019-20199.html
https://www.suse.com/security/cve/CVE-2019-20200.html
https://www.suse.com/security/cve/CVE-2019-20201.html
https://www.suse.com/security/cve/CVE-2019-20202.html
https://www.suse.com/security/cve/CVE-2021-26220.html
https://www.suse.com/security/cve/CVE-2021-26221.html
https://www.suse.com/security/cve/CVE-2021-26222.html
https://www.suse.com/security/cve/CVE-2021-30485.html
https://www.suse.com/security/cve/CVE-2021-31229.html
https://www.suse.com/security/cve/CVE-2021-31347.html
https://www.suse.com/security/cve/CVE-2021-31348.html
https://www.suse.com/security/cve/CVE-2021-31598.html
https://bugzilla.suse.com/1191856
1
0
openSUSE-SU-2021:1513-1: moderate: Security update for tor
by opensuse-security@opensuse.org 29 Nov '21
by opensuse-security@opensuse.org 29 Nov '21
29 Nov '21
openSUSE Security Update: Security update for tor
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:1513-1
Rating: moderate
References: #1192658
Cross-References: CVE-2021-22929
Affected Products:
openSUSE Leap 15.2
openSUSE Backports SLE-15-SP3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for tor fixes the following issues:
tor 0.4.6.8:
* Improving reporting of general overload state for DNS timeout errors by
relays
* Regenerate fallback directories for October 2021
* Bug fixes for onion services
* CVE-2021-22929: do not log v2 onion services access attempt warnings on
disk excessively (TROVE-2021-008, boo#1192658)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-1513=1
- openSUSE Backports SLE-15-SP3:
zypper in -t patch openSUSE-2021-1513=1
Package List:
- openSUSE Leap 15.2 (x86_64):
tor-0.4.6.8-lp152.2.18.1
tor-debuginfo-0.4.6.8-lp152.2.18.1
tor-debugsource-0.4.6.8-lp152.2.18.1
- openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64):
tor-0.4.6.8-bp153.2.9.1
References:
https://www.suse.com/security/cve/CVE-2021-22929.html
https://bugzilla.suse.com/1192658
1
0
openSUSE-SU-2021:1505-1: important: Security update for netcdf
by opensuse-security@opensuse.org 26 Nov '21
by opensuse-security@opensuse.org 26 Nov '21
26 Nov '21
openSUSE Security Update: Security update for netcdf
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:1505-1
Rating: important
References: #1191856
Cross-References: CVE-2019-20005 CVE-2019-20006 CVE-2019-20007
CVE-2019-20198 CVE-2019-20199 CVE-2019-20200
CVE-2019-20201 CVE-2019-20202 CVE-2021-26220
CVE-2021-26221 CVE-2021-26222 CVE-2021-30485
CVE-2021-31229 CVE-2021-31347 CVE-2021-31348
CVE-2021-31598
CVSS scores:
CVE-2019-20005 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20005 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20006 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2019-20006 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20007 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20007 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20198 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20198 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20199 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20199 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20200 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20200 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20201 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20201 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20202 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20202 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-26220 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-26221 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-26222 (SUSE): 6 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H
CVE-2021-30485 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-30485 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-31229 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-31347 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-31348 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-31348 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-31598 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-31598 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that fixes 16 vulnerabilities is now available.
Description:
This update for netcdf fixes the following issues:
- Fixed multiple vulnerabilities in ezXML: CVE-2019-20007, CVE-2019-20006,
CVE-2019-20201, CVE-2019-20202, CVE-2019-20199, CVE-2019-20200,
CVE-2019-20198, CVE-2021-26221, CVE-2021-26222, CVE-2021-30485,
CVE-2021-31229, CVE-2021-31347, CVE-2021-31348, CVE-2021-31598
(bsc#1191856) Note:
* CVE-2021-26220 https://sourceforge.net/p/ezxml/bugs/23 not relevant
for netcdf: code isn't used.
* CVE-2019-20005 https://sourceforge.net/p/ezxml/bugs/14 Issue cannot
be reproduced and no patch is available upstream.
This update was imported from the SUSE:SLE-15-SP2:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-1505=1
Package List:
- openSUSE Leap 15.2 (x86_64):
libnetcdf-gnu-hpc-4.7.3-lp152.2.6.1
libnetcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1
libnetcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1
libnetcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1
libnetcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1
libnetcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1
libnetcdf_4_7_3-gnu-hpc-debuginfo-4.7.3-lp152.2.6.1
libnetcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1
libnetcdf_4_7_3-gnu-mpich-hpc-debuginfo-4.7.3-lp152.2.6.1
libnetcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1
libnetcdf_4_7_3-gnu-mvapich2-hpc-debuginfo-4.7.3-lp152.2.6.1
libnetcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1
libnetcdf_4_7_3-gnu-openmpi2-hpc-debuginfo-4.7.3-lp152.2.6.1
libnetcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1
libnetcdf_4_7_3-gnu-openmpi3-hpc-debuginfo-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-hpc-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-hpc-debuginfo-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-hpc-debugsource-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-hpc-devel-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-hpc-devel-debuginfo-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-hpc-devel-static-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-mpich-hpc-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-mpich-hpc-debuginfo-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-mpich-hpc-debugsource-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-mpich-hpc-devel-debuginfo-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-mpich-hpc-devel-static-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-mvapich2-hpc-debuginfo-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-mvapich2-hpc-debugsource-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-mvapich2-hpc-devel-debuginfo-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-mvapich2-hpc-devel-static-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-openmpi2-hpc-debuginfo-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-openmpi2-hpc-debugsource-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-openmpi2-hpc-devel-debuginfo-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-openmpi2-hpc-devel-static-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-openmpi3-hpc-debuginfo-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-openmpi3-hpc-debugsource-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-openmpi3-hpc-devel-debuginfo-4.7.3-lp152.2.6.1
netcdf_4_7_3-gnu-openmpi3-hpc-devel-static-4.7.3-lp152.2.6.1
- openSUSE Leap 15.2 (noarch):
netcdf-gnu-hpc-4.7.3-lp152.2.6.1
netcdf-gnu-hpc-devel-4.7.3-lp152.2.6.1
netcdf-gnu-mpich-hpc-4.7.3-lp152.2.6.1
netcdf-gnu-mpich-hpc-devel-4.7.3-lp152.2.6.1
netcdf-gnu-mvapich2-hpc-4.7.3-lp152.2.6.1
netcdf-gnu-mvapich2-hpc-devel-4.7.3-lp152.2.6.1
netcdf-gnu-openmpi2-hpc-4.7.3-lp152.2.6.1
netcdf-gnu-openmpi2-hpc-devel-4.7.3-lp152.2.6.1
netcdf-gnu-openmpi3-hpc-4.7.3-lp152.2.6.1
netcdf-gnu-openmpi3-hpc-devel-4.7.3-lp152.2.6.1
References:
https://www.suse.com/security/cve/CVE-2019-20005.html
https://www.suse.com/security/cve/CVE-2019-20006.html
https://www.suse.com/security/cve/CVE-2019-20007.html
https://www.suse.com/security/cve/CVE-2019-20198.html
https://www.suse.com/security/cve/CVE-2019-20199.html
https://www.suse.com/security/cve/CVE-2019-20200.html
https://www.suse.com/security/cve/CVE-2019-20201.html
https://www.suse.com/security/cve/CVE-2019-20202.html
https://www.suse.com/security/cve/CVE-2021-26220.html
https://www.suse.com/security/cve/CVE-2021-26221.html
https://www.suse.com/security/cve/CVE-2021-26222.html
https://www.suse.com/security/cve/CVE-2021-30485.html
https://www.suse.com/security/cve/CVE-2021-31229.html
https://www.suse.com/security/cve/CVE-2021-31347.html
https://www.suse.com/security/cve/CVE-2021-31348.html
https://www.suse.com/security/cve/CVE-2021-31598.html
https://bugzilla.suse.com/1191856
1
0
openSUSE-SU-2021:3805-1: important: Security update for netcdf
by opensuse-security@opensuse.org 25 Nov '21
by opensuse-security@opensuse.org 25 Nov '21
25 Nov '21
openSUSE Security Update: Security update for netcdf
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:3805-1
Rating: important
References: #1191856
Cross-References: CVE-2019-20005 CVE-2019-20006 CVE-2019-20007
CVE-2019-20198 CVE-2019-20199 CVE-2019-20200
CVE-2019-20201 CVE-2019-20202 CVE-2021-26220
CVE-2021-26221 CVE-2021-26222 CVE-2021-30485
CVE-2021-31229 CVE-2021-31347 CVE-2021-31348
CVE-2021-31598
CVSS scores:
CVE-2019-20005 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20005 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20006 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2019-20006 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20007 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20007 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20198 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20198 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20199 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20199 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20200 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20200 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20201 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20201 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20202 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20202 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-26220 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-26221 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-26222 (SUSE): 6 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H
CVE-2021-30485 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-30485 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-31229 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-31347 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-31348 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-31348 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-31598 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-31598 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that fixes 16 vulnerabilities is now available.
Description:
This update for netcdf fixes the following issues:
- Fixed multiple vulnerabilities in ezXML: CVE-2019-20007, CVE-2019-20006,
CVE-2019-20201, CVE-2019-20202, CVE-2019-20199, CVE-2019-20200,
CVE-2019-20198, CVE-2021-26221, CVE-2021-26222, CVE-2021-30485,
CVE-2021-31229, CVE-2021-31347, CVE-2021-31348, CVE-2021-31598
(bsc#1191856) Note:
* CVE-2021-26220 https://sourceforge.net/p/ezxml/bugs/23 not relevant
for netcdf: code isn't used.
* CVE-2019-20005 https://sourceforge.net/p/ezxml/bugs/14 Issue cannot
be reproduced and no patch is available upstream.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2021-3805=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le x86_64):
libnetcdf_4_7_3-gnu-hpc-4.7.3-3.7.2
libnetcdf_4_7_3-gnu-hpc-debuginfo-4.7.3-3.7.2
libnetcdf_4_7_3-gnu-mpich-hpc-4.7.3-3.7.2
libnetcdf_4_7_3-gnu-mpich-hpc-debuginfo-4.7.3-3.7.2
libnetcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-3.7.2
libnetcdf_4_7_3-gnu-mvapich2-hpc-debuginfo-4.7.3-3.7.2
libnetcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-3.7.2
libnetcdf_4_7_3-gnu-openmpi2-hpc-debuginfo-4.7.3-3.7.2
libnetcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-3.7.2
libnetcdf_4_7_3-gnu-openmpi3-hpc-debuginfo-4.7.3-3.7.2
netcdf_4_7_3-gnu-hpc-4.7.3-3.7.2
netcdf_4_7_3-gnu-hpc-debuginfo-4.7.3-3.7.2
netcdf_4_7_3-gnu-hpc-debugsource-4.7.3-3.7.2
netcdf_4_7_3-gnu-hpc-devel-4.7.3-3.7.2
netcdf_4_7_3-gnu-hpc-devel-debuginfo-4.7.3-3.7.2
netcdf_4_7_3-gnu-hpc-devel-static-4.7.3-3.7.2
netcdf_4_7_3-gnu-mpich-hpc-4.7.3-3.7.2
netcdf_4_7_3-gnu-mpich-hpc-debuginfo-4.7.3-3.7.2
netcdf_4_7_3-gnu-mpich-hpc-debugsource-4.7.3-3.7.2
netcdf_4_7_3-gnu-mpich-hpc-devel-4.7.3-3.7.2
netcdf_4_7_3-gnu-mpich-hpc-devel-debuginfo-4.7.3-3.7.2
netcdf_4_7_3-gnu-mpich-hpc-devel-static-4.7.3-3.7.2
netcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-3.7.2
netcdf_4_7_3-gnu-mvapich2-hpc-debuginfo-4.7.3-3.7.2
netcdf_4_7_3-gnu-mvapich2-hpc-debugsource-4.7.3-3.7.2
netcdf_4_7_3-gnu-mvapich2-hpc-devel-4.7.3-3.7.2
netcdf_4_7_3-gnu-mvapich2-hpc-devel-debuginfo-4.7.3-3.7.2
netcdf_4_7_3-gnu-mvapich2-hpc-devel-static-4.7.3-3.7.2
netcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-3.7.2
netcdf_4_7_3-gnu-openmpi2-hpc-debuginfo-4.7.3-3.7.2
netcdf_4_7_3-gnu-openmpi2-hpc-debugsource-4.7.3-3.7.2
netcdf_4_7_3-gnu-openmpi2-hpc-devel-4.7.3-3.7.2
netcdf_4_7_3-gnu-openmpi2-hpc-devel-debuginfo-4.7.3-3.7.2
netcdf_4_7_3-gnu-openmpi2-hpc-devel-static-4.7.3-3.7.2
netcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-3.7.2
netcdf_4_7_3-gnu-openmpi3-hpc-debuginfo-4.7.3-3.7.2
netcdf_4_7_3-gnu-openmpi3-hpc-debugsource-4.7.3-3.7.2
netcdf_4_7_3-gnu-openmpi3-hpc-devel-4.7.3-3.7.2
netcdf_4_7_3-gnu-openmpi3-hpc-devel-debuginfo-4.7.3-3.7.2
netcdf_4_7_3-gnu-openmpi3-hpc-devel-static-4.7.3-3.7.2
References:
https://www.suse.com/security/cve/CVE-2019-20005.html
https://www.suse.com/security/cve/CVE-2019-20006.html
https://www.suse.com/security/cve/CVE-2019-20007.html
https://www.suse.com/security/cve/CVE-2019-20198.html
https://www.suse.com/security/cve/CVE-2019-20199.html
https://www.suse.com/security/cve/CVE-2019-20200.html
https://www.suse.com/security/cve/CVE-2019-20201.html
https://www.suse.com/security/cve/CVE-2019-20202.html
https://www.suse.com/security/cve/CVE-2021-26220.html
https://www.suse.com/security/cve/CVE-2021-26221.html
https://www.suse.com/security/cve/CVE-2021-26222.html
https://www.suse.com/security/cve/CVE-2021-30485.html
https://www.suse.com/security/cve/CVE-2021-31229.html
https://www.suse.com/security/cve/CVE-2021-31347.html
https://www.suse.com/security/cve/CVE-2021-31348.html
https://www.suse.com/security/cve/CVE-2021-31598.html
https://bugzilla.suse.com/1191856
1
0
openSUSE-SU-2021:3804-1: important: Security update for netcdf
by opensuse-security@opensuse.org 25 Nov '21
by opensuse-security@opensuse.org 25 Nov '21
25 Nov '21
openSUSE Security Update: Security update for netcdf
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:3804-1
Rating: important
References: #1191856
Cross-References: CVE-2019-20005 CVE-2019-20006 CVE-2019-20007
CVE-2019-20198 CVE-2019-20199 CVE-2019-20200
CVE-2019-20201 CVE-2019-20202 CVE-2021-26220
CVE-2021-26221 CVE-2021-26222 CVE-2021-30485
CVE-2021-31229 CVE-2021-31347 CVE-2021-31348
CVE-2021-31598
CVSS scores:
CVE-2019-20005 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20005 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20006 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2019-20006 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20007 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20007 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20198 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20198 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20199 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20199 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20200 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20200 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20201 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20201 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20202 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-20202 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-26220 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-26221 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-26222 (SUSE): 6 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H
CVE-2021-30485 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-30485 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-31229 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-31347 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-31348 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-31348 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-31598 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-31598 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that fixes 16 vulnerabilities is now available.
Description:
This update for netcdf fixes the following issues:
- Fixed multiple vulnerabilities in ezXML: CVE-2019-20007, CVE-2019-20006,
CVE-2019-20201, CVE-2019-20202, CVE-2019-20199, CVE-2019-20200,
CVE-2019-20198, CVE-2021-26221, CVE-2021-26222, CVE-2021-30485,
CVE-2021-31229, CVE-2021-31347, CVE-2021-31348, CVE-2021-31598
(bsc#1191856) Note:
* CVE-2021-26220 https://sourceforge.net/p/ezxml/bugs/23 not relevant
for netcdf: code isn't used.
* CVE-2019-20005 https://sourceforge.net/p/ezxml/bugs/14 Issue cannot
be reproduced and no patch is available upstream.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2021-3804=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le x86_64):
libnetcdf13-4.6.1-5.7.1
libnetcdf13-debuginfo-4.6.1-5.7.1
libnetcdf13-openmpi-4.6.1-5.7.1
libnetcdf13-openmpi-debuginfo-4.6.1-5.7.1
netcdf-openmpi-4.6.1-5.7.1
netcdf-openmpi-debuginfo-4.6.1-5.7.1
netcdf-openmpi-devel-4.6.1-5.7.1
netcdf-openmpi-devel-data-4.6.1-5.7.1
netcdf-openmpi-devel-debuginfo-4.6.1-5.7.1
netcdf-openmpi-devel-static-4.6.1-5.7.1
- openSUSE Leap 15.3 (x86_64):
libnetcdf13-32bit-4.6.1-5.7.1
libnetcdf13-32bit-debuginfo-4.6.1-5.7.1
libnetcdf13-openmpi-32bit-4.6.1-5.7.1
libnetcdf13-openmpi-32bit-debuginfo-4.6.1-5.7.1
References:
https://www.suse.com/security/cve/CVE-2019-20005.html
https://www.suse.com/security/cve/CVE-2019-20006.html
https://www.suse.com/security/cve/CVE-2019-20007.html
https://www.suse.com/security/cve/CVE-2019-20198.html
https://www.suse.com/security/cve/CVE-2019-20199.html
https://www.suse.com/security/cve/CVE-2019-20200.html
https://www.suse.com/security/cve/CVE-2019-20201.html
https://www.suse.com/security/cve/CVE-2019-20202.html
https://www.suse.com/security/cve/CVE-2021-26220.html
https://www.suse.com/security/cve/CVE-2021-26221.html
https://www.suse.com/security/cve/CVE-2021-26222.html
https://www.suse.com/security/cve/CVE-2021-30485.html
https://www.suse.com/security/cve/CVE-2021-31229.html
https://www.suse.com/security/cve/CVE-2021-31347.html
https://www.suse.com/security/cve/CVE-2021-31348.html
https://www.suse.com/security/cve/CVE-2021-31598.html
https://bugzilla.suse.com/1191856
1
0
openSUSE-SU-2021:3806-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 25 Nov '21
by opensuse-security@opensuse.org 25 Nov '21
25 Nov '21
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:3806-1
Rating: important
References: #1094840 #1133021 #1152489 #1154353 #1157177
#1167773 #1169263 #1170269 #1176940 #1180749
#1184924 #1188601 #1190523 #1190795 #1191628
#1191790 #1191851 #1191958 #1191961 #1191980
#1192045 #1192217 #1192229 #1192267 #1192273
#1192288 #1192328 #1192375 #1192473 #1192549
#1192718 #1192740 #1192745 #1192750 #1192753
#1192758 #1192781 #1192802 #1192896 #1192906
#1192918 SLE-22573
Cross-References: CVE-2021-0941 CVE-2021-20322 CVE-2021-31916
CVE-2021-34981 CVE-2021-37159 CVE-2021-43389
CVSS scores:
CVE-2021-0941 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-20322 (SUSE): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CVE-2021-31916 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-31916 (SUSE): 6.8 CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-34981 (SUSE): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2021-37159 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-37159 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-43389 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that solves 6 vulnerabilities, contains one
feature and has 35 fixes is now available.
Description:
The SUSE Linux Enterprise 15 SP3 kernel for Azure was updated to receive
various security and bugfixes.
The following security bugs were fixed:
- Unprivileged BPF has been disabled by default to reduce attack surface
as too many security issues have happened in the past (jsc#SLE-22573)
You can reenable via systemctl setting
/proc/sys/kernel/unprivileged_bpf_disabled to 0.
(kernel.unprivileged_bpf_disabled = 0)
- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible
out of bounds read due to a use after free. This could lead to local
escalation of privilege with System execution privileges needed. User
interaction is not needed for exploitation (bnc#1192045).
- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in
list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module
in the Linux kernel A bound check failure allowed an attacker with
special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds
memory leading to a system crash or a leak of internal kernel
information. The highest threat from this vulnerability is to system
availability (bnc#1192781).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less
predictive to avoid information leaks about UDP ports in use.
(bsc#1191790)
- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device
fails (bsc#1191961).
- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the
detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called
unregister_netdev without checking for the NETREG_REGISTERED state,
leading to a use-after-free and a double free (bnc#1188601).
The following non-security bugs were fixed:
- ABI: sysfs-kernel-slab: Document some stats (git-fixes).
- ALSA: hda: fix general protection fault in azx_runtime_idle (git-fixes).
- ALSA: hda: Free card instance properly at probe errors (git-fixes).
- ALSA: hda/realtek: Fix mic mute LED for the HP Spectre x360 14
(git-fixes).
- ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).
- ALSA: hda: Use position buffer for SKL+ again (git-fixes).
- ALSA: ua101: fix division by zero at probe (git-fixes).
- ALSA: uapi: Fix a C++ style comment in asound.h (git-fixes).
- ALSA: usb-audio: Add Audient iD14 to mixer map quirk table (git-fixes).
- ALSA: usb-audio: Add minimal-mute notion in dB mapping table
(bsc#1192375).
- ALSA: usb-audio: Add Schiit Hel device to mixer map quirk table
(git-fixes).
- ALSA: usb-audio: Fix dB level of Bose Revolve+ SoundLink (bsc#1192375).
- ALSA: usb-audio: Use int for dB map values (bsc#1192375).
- ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE (bsc#1192473).
- ASoC: cs42l42: Correct some register default values (git-fixes).
- ASoC: cs42l42: Defer probe if request_threaded_irq() returns
EPROBE_DEFER (git-fixes).
- ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).
- ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).
- ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).
- ASoC: rockchip: Use generic dmaengine code (git-fixes).
- ASoC: SOF: topology: do not power down primary core during topology
removal (git-fixes).
- ASoC: topology: Fix stub for snd_soc_tplg_component_remove() (git-fixes).
- ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).
- ath10k: fix control-message timeout (git-fixes).
- ath10k: fix division by zero in send path (git-fixes).
- ath10k: fix max antenna gain unit (git-fixes).
- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).
- ath10k: sdio: Add missing BH locking around napi_schdule() (git-fixes).
- ath6kl: fix control-message timeout (git-fixes).
- ath6kl: fix division by zero in send path (git-fixes).
- ath9k: Fix potential interrupt storm on queue reset (git-fixes).
- auxdisplay: ht16k33: Connect backlight to fbdev (git-fixes).
- auxdisplay: ht16k33: Fix frame buffer device blanking (git-fixes).
- auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string
(git-fixes).
- b43: fix a lower bounds test (git-fixes).
- b43legacy: fix a lower bounds test (git-fixes).
- blacklist.conf: 5c9d706f6133 ("bpf: Fix BPF_LSM kconfig symbol
dependency") Not needed since 30897832d8b9 ("bpf: Allow local storage to
be used from LSM programs") is not backported.
- Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).
- Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).
- bnxt_en: Fix TX timeout when TX ring size is set to the smallest
(git-fixes).
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22573)
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22574)
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22573).
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22574).
- bpf: Fix BPF_JIT kconfig symbol dependency (git-fixes jsc#SLE-22574).
- bpf: Fix potential race in tail call compatibility check (git-fixes).
- bpf, kconfig: Add consolidated menu entry for bpf with core options
(jsc#SLE-22574).
- btrfs: block-group: Rework documentation of check_system_chunk function
(bsc#1192896).
- btrfs: fix deadlock between chunk allocation and chunk btree
modifications (bsc#1192896).
- btrfs: fix memory ordering between normal and ordered work functions
(git-fixes).
- btrfs: update comments for chunk allocation -ENOSPC cases (bsc#1192896).
- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem
(git-fixes).
- config: disable unprivileged BPF by default (jsc#SLE-22573)
- crypto: caam - disable pkc for non-E SoCs (git-fixes).
- crypto: qat - detect PFVF collision after ACK (git-fixes).
- crypto: qat - disregard spurious PFVF interrupts (git-fixes).
- driver core: add a min_align_mask field to struct device_dma_parameters
(bsc#1191851).
- drm/amdgpu/display: add quirk handling for stutter mode (git-fixes).
- drm/amdgpu: fix warning for overflow check (git-fixes).
- drm/amdgpu/gmc6: fix DMA mask from 44 to 40 bits (git-fixes).
- drm/i915: Introduce intel_hpd_hotplug_irqs() (bsc#1192758).
- drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).
- drm/msm: potential error pointer dereference in init() (git-fixes).
- drm/msm: uninitialized variable in msm_gem_import() (git-fixes).
- drm: prevent spectre issue in vmw_execbuf_ioctl (bsc#1192802).
- drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).
- drm/ttm: stop calling tt_swapin in vm_access (git-fixes).
- drm/v3d: fix wait for TMU write combiner flush (git-fixes).
- EDAC/amd64: Set proper family type for Family 19h Models 20h-2Fh
(bsc#1192288).
- EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell
(bsc#1152489).
- Eradicate Patch-mainline: No The pre-commit check can reject this
deprecated tag then.
- exfat: fix erroneous discard when clear cluster bit (git-fixes).
- exfat: handle wrong stream entry size in exfat_readdir() (git-fixes).
- exfat: properly set s_time_gran (bsc#1192328).
- exfat: truncate atimes to 2s granularity (bsc#1192328).
- firmware/psci: fix application of sizeof to pointer (git-fixes).
- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).
- fuse: fix page stealing (bsc#1192718).
- genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).
- gpio: mpc8xxx: Use 'devm_gpiochip_add_data()' to simplify the code and
avoid a leak (git-fixes).
- gpio/rockchip: add driver for rockchip gpio (bsc#1192217).
- gpio/rockchip: drop irq_gc_lock/irq_gc_unlock for irq set type
(bsc#1192217).
- gpio/rockchip: extended debounce support is only available on v2
(bsc#1192217).
- gpio/rockchip: fetch deferred output settings on probe (bsc#1192217).
- gpio/rockchip: fix get_direction value handling (bsc#1192217).
- gpio/rockchip: support next version gpio controller (bsc#1192217).
- gpio/rockchip: use struct rockchip_gpio_regs for gpio controller
(bsc#1192217).
- gve: Avoid freeing NULL pointer (git-fixes).
- gve: Correct available tx qpl check (git-fixes).
- gve: fix gve_get_stats() (git-fixes).
- gve: Properly handle errors in gve_assign_qpl (bsc#1176940).
- gve: report 64bit tx_bytes counter from gve_handle_report_stats()
(bsc#1176940).
- HID: u2fzero: clarify error check and length calculations (git-fixes).
- HID: u2fzero: properly handle timeouts in usb_submit_urb (git-fixes).
- hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).
- hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).
- hwmon: (pmbus/lm25066) Let compiler determine outer dimension of
lm25066_coeff (git-fixes).
- hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).
- i40e: Fix ATR queue selection (git-fixes).
- i40e: fix endless loop under rtnl (git-fixes).
- i40e: Fix freeing of uninitialized misc IRQ vector (git-fixes).
- iavf: fix double unlock of crit_lock (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523
ltc#194510).
- ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).
- ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).
- ice: Add missing E810 device ids (jsc#SLE-7966 bsc#1157177).
- iio: dac: ad5446: Fix ad5622_write() return value (git-fixes).
- Input: elantench - fix misreporting trackpoint coordinates (bsc#1192918).
- Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).
- ionic: do not remove netdev->dev_addr when syncing uc list (bsc#1167773).
- iwlwifi: mvm: fix some kerneldoc issues (git-fixes).
- ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup (git-fixes).
- kABI: Fix kABI after 36950f2da1ea (bsc#1191851).
- kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).
- KVM: s390: extend kvm_s390_shadow_fault to return entry pointer
(bsc#1133021).
- KVM: s390: index kvm->arch.idle_mask by vcpu_idx (bsc#1133021).
- KVM: s390: split kvm_s390_logical_to_effective (bsc#1133021).
- KVM: s390: VSIE: correctly handle MVPG when in VSIE (bsc#1133021).
- libertas: Fix possible memory leak in probe and disconnect (git-fixes).
- libertas_tf: Fix possible memory leak in probe and disconnect
(git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).
- media: cxd2880-spi: Fix a null pointer dereference on error handling
path (git-fixes).
- media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable()
(git-fixes).
- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).
- media: em28xx: add missing em28xx_close_extension (git-fixes).
- media: em28xx: Do not use ops->suspend if it is NULL (git-fixes).
- media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).
- media: ite-cir: IR receiver stop working after receive overflow
(git-fixes).
- media: mtk-vpu: Fix a resource leak in the error handling path of
'mtk_vpu_probe()' (git-fixes).
- media: mxl111sf: change mutex_init() location (git-fixes).
- media: radio-wl1273: Avoid card name truncation (git-fixes).
- media: si470x: Avoid card name truncation (git-fixes).
- media: staging/intel-ipu3: css: Fix wrong size comparison
imgu_css_fw_init (git-fixes).
- media: TDA1997x: handle short reads of hdmi info frame (git-fixes).
- media: tm6000: Avoid card name truncation (git-fixes).
- media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).
- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).
- memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe
(git-fixes).
- memstick: avoid out-of-range warning (git-fixes).
- memstick: jmb38x_ms: use appropriate free function in
jmb38x_ms_alloc_host() (git-fixes).
- mlx5: count all link events (git-fixes).
- mlxsw: thermal: Fix out-of-bounds memory accesses (git-fixes).
- mmc: mxs-mmc: disable regulator on error and in the remove function
(git-fixes).
- mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).
- mmc: sdhci-omap: Fix NULL pointer exception if regulator is not
configured (git-fixes).
- mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).
- Move upstreamed sound fix into sorted section
- mt76: mt7615: fix endianness warning in mt7615_mac_write_txwi
(git-fixes).
- mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).
- mt76: mt7915: fix muar_idx in mt7915_mcu_alloc_sta_req() (git-fixes).
- mt76: mt7915: fix possible infinite loop release semaphore (git-fixes).
- mt76: mt7915: fix sta_rec_wtbl tag len (git-fixes).
- mwifiex: fix division by zero in fw download path (git-fixes).
- mwifiex: Send DELBA requests according to spec (git-fixes).
- net/af_unix: fix a data-race in unix_dgram_poll (bsc#1154353).
- net: bridge: use nla_total_size_64bit() in br_get_linkxstats_size()
(git-fixes).
- net: dsa: felix: re-enable TX flow control in ocelot_port_flush()
(git-fixes).
- net: hns3: fix vf reset workqueue cannot exit (bsc#1154353).
- net/mlx4_en: Do not allow aRFS for encapsulated packets (git-fixes).
- net/mlx4_en: Resolve bad operstate value (git-fixes).
- net/mlx5e: Mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
- net/mlx5: Fix unpublish devlink parameters (jsc#SLE-8464).
- net/mlx5: FWTrace, cancel work on alloc pd error flow (git-fixes).
- net: mscc: ocelot: fix hardware timestamp dequeue logic.
- net: mscc: ocelot: warn when a PTP IRQ is raised for an unknown skb
(git-fixes).
- net/smc: Correct smc link connection counter in case of smc client
(git-fixes).
- net/smc: fix 'workqueue leaked lock' in smc_conn_abort_work (git-fixes).
- nvme-pci: set min_align_mask (bsc#1191851).
- ocfs2: do not zero pages beyond i_size (bsc#1190795).
- ocfs2: fix data corruption on truncate (bsc#1190795).
- PCI: aardvark: Do not clear status bits of masked interrupts (git-fixes).
- PCI: aardvark: Do not spam about PIO Response Status (git-fixes).
- PCI: aardvark: Do not unmask unused interrupts (git-fixes).
- PCI: aardvark: Fix checking for link up via LTSSM state (git-fixes).
- PCI: aardvark: Fix reporting Data Link Layer Link Active (git-fixes).
- PCI: aardvark: Fix return value of MSI domain .alloc() method
(git-fixes).
- PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG (git-fixes).
- PCI/ACPI: Check for _OSC support in acpi_pci_osc_control_set()
(bsc#1169263).
- PCI/ACPI: Clarify message about _OSC failure (bsc#1169263).
- PCI/ACPI: Move _OSC query checks to separate function (bsc#1169263).
- PCI/ACPI: Move supported and control calculations to separate functions
(bsc#1169263).
- PCI/ACPI: Remove OSC_PCI_SUPPORT_MASKS and OSC_PCI_CONTROL_MASKS
(bsc#1169263).
- PCI/ACPI: Remove unnecessary osc_lock (bsc#1169263).
- PCI: pci-bridge-emul: Fix emulation of W1C bits (git-fixes).
- PCI: uniphier: Serialize INTx masking/unmasking and fix the bit
operation (git-fixes).
- pinctrl: core: fix possible memory leak in pinctrl_enable() (git-fixes).
- pinctrl: pinctrl-rockchip: Fix a bunch of kerneldoc misdemeanours
(bsc#1192217).
- pinctrl/rockchip: add a queue for deferred pin output settings on probe
(bsc#1192217).
- pinctrl/rockchip: add pinctrl device to gpio bank struct (bsc#1192217).
- pinctrl: rockchip: add rk3308 SoC support (bsc#1192217).
- pinctrl: rockchip: add support for rk3568 (bsc#1192217).
- pinctrl/rockchip: always enable clock for gpio controller (bsc#1192217).
- pinctrl: rockchip: clear int status when driver probed (bsc#1192217).
- pinctrl: rockchip: create irq mapping in gpio_to_irq (bsc#1192217).
- pinctrl: rockchip: do coding style for mux route struct (bsc#1192217).
- pinctrl/rockchip: drop the gpio related codes (bsc#1192217).
- pinctrl: rockchip: enable gpio pclk for rockchip_gpio_to_irq
(bsc#1192217).
- pinctrl: rockchip: make driver be tristate module (bsc#1192217).
- pinctrl: rockchip: Replace HTTP links with HTTPS ones (bsc#1192217).
- pinctrl: rockchip: return ENOMEM instead of EINVAL if allocation fails
(bsc#1192217).
- pinctrl/rockchip: separate struct rockchip_pin_bank to a head file
(bsc#1192217).
- platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).
- PM: sleep: Do not let "syscore" devices runtime-suspend during system
transitions (git-fixes).
- power: supply: bq27xxx: Fix kernel crash on IRQ handler register error
(git-fixes).
- power: supply: max17042_battery: Prevent int underflow in
set_soc_threshold (git-fixes).
- power: supply: max17042_battery: use VFSOC for capacity when no rsns
(git-fixes).
- printk/console: Allow to disable console output by using console="" or
console=null (bsc#1192753).
- printk: handle blank console arguments passed in (bsc#1192753).
- qed: Fix missing error code in qed_slowpath_start() (git-fixes).
- qed: Handle management FW error (git-fixes).
- qed: rdma - do not wait for resources under hw error recovery flow
(git-fixes).
- qtnfmac: fix potential Spectre vulnerabilities (bsc#1192802).
- r8152: add a helper function about setting EEE (git-fixes).
- r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2
(git-fixes).
- r8152: Disable PLA MCU clock speed down (git-fixes).
- r8152: disable U2P3 for RTL8153B (git-fixes).
- r8152: divide the tx and rx bottom functions (git-fixes).
- r8152: do not enable U1U2 with USB_SPEED_HIGH for RTL8153B (git-fixes).
- r8152: fix runtime resume for linking change (git-fixes).
- r8152: replace array with linking list for rx information (git-fixes).
- r8152: reset flow control patch when linking on for RTL8153B (git-fixes).
- r8152: saving the settings of EEE (git-fixes).
- r8152: separate the rx buffer size (git-fixes).
- r8152: use alloc_pages for rx buffer (git-fixes).
- random: fix crash on multiple early calls to add_bootloader_randomness()
(bsc#1184924)
- README.BRANCH: Add Oscar Salvador as SLE15-SP3 maintainer
- regulator: dt-bindings: samsung,s5m8767: correct
s5m8767,pmic-buck-default-dvs-idx property (git-fixes).
- regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is
disabled (git-fixes).
- Revert "ibmvnic: check failover_pending in login response" (bsc#1190523
ltc#194510).
- Revert "platform/x86: i2c-multi-instantiate: Do not create platform
device for INT3515 ACPI nodes" (git-fixes).
- Revert "r8152: adjust the settings about MAC clock speed down for
RTL8153" (git-fixes).
- Revert "scsi: ufs: fix a missing check of devm_reset_control_get"
(git-fixes).
- Revert "x86/kvm: fix vcpu-id indexed array sizes" (git-fixes).
- rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request
(git-fixes).
- rsi: fix control-message timeout (git-fixes).
- rsi: Fix module dev_oper_mode parameter description (git-fixes).
- rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).
- rtl8187: fix control-message timeouts (git-fixes).
- s390/dasd: fix use after free in dasd path handling (git-fixes).
- s390/pci: fix use after free of zpci_dev (git-fixes).
- s390/pci: fix zpci_zdev_put() on reserve (git-fixes).
- s390/qeth: fix deadlock during failing recovery (git-fixes).
- s390/qeth: Fix deadlock in remove_discipline (git-fixes).
- s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).
- s390/topology: clear thread/group maps for offline cpus (git-fixes).
- scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe()
(git-fixes).
- scsi: BusLogic: Fix missing pr_cont() use (git-fixes).
- scsi: core: Fix spelling in a source code comment (git-fixes).
- scsi: csiostor: Add module softdep on cxgb4 (git-fixes).
- scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn()
(git-fixes).
- scsi: dc395: Fix error case unwinding (git-fixes).
- scsi: fdomain: Fix error return code in fdomain_probe() (git-fixes).
- scsi: FlashPoint: Rename si_flags field (git-fixes).
- scsi: iscsi: Fix iface sysfs attr detection (git-fixes).
- scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).
- scsi: mpt3sas: Fix error return value in _scsih_expander_add()
(git-fixes).
- scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).
- scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).
- scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).
- scsi: qla2xxx: Fix a memory leak in an error path of
qla2x00_process_els() (git-fixes).
- scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).
- scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).
- scsi: snic: Fix an error message (git-fixes).
- scsi: ufs-pci: Add quirk for broken auto-hibernate for Intel EHL
(git-fixes).
- scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).
- serial: 8250_dw: Drop wrong use of ACPI_PTR() (git-fixes).
- serial: xilinx_uartps: Fix race condition causing stuck TX (git-fixes).
- staging: r8712u: fix control-message timeout (git-fixes).
- staging: rtl8192u: fix control-message timeouts (git-fixes).
- stmmac: platform: Fix signedness bug in stmmac_probe_config_dt()
(git-fixes).
- swiotlb: add a IO_TLB_SIZE define (bsc#1191851).
- swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).
- swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single
(bsc#1191851).
- swiotlb: factor out an io_tlb_offset helper (bsc#1191851).
- swiotlb: factor out a nr_slots helper (bsc#1191851).
- swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).
- swiotlb: respect min_align_mask (bsc#1191851).
- swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).
- tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).
- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker
together (bsc#1192745).
- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
- Update
patches.suse/NFS-Do-uncached-readdir-when-we-re-seeking-a-cookie-.patch
(bsc#1191628 bsc#1192549). dir_cookie is a pointer to the cookie in
older kernels, not the cookie itself.
- Update patch reference for AMDGPU fix (bsc#1180749)
- usb: gadget: hid: fix error code in do_config() (git-fixes).
- USB: iowarrior: fix control-message timeouts (git-fixes).
- usb: max-3421: Use driver data instead of maintaining a list of bound
devices (git-fixes).
- usb: musb: Balance list entry in musb_gadget_queue (git-fixes).
- usbnet: fix error return code in usbnet_probe() (git-fixes).
- usbnet: sanity check for maxpacket (git-fixes).
- USB: serial: keyspan: fix memleak on probe errors (git-fixes).
- video: fbdev: chipsfb: use memset_io() instead of memset() (git-fixes).
- virtio-gpu: fix possible memory allocation failure (git-fixes).
- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two's
complement (git-fixes).
- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).
- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).
- x86/ioapic: Force affinity setup before startup (bsc#1152489).
- x86/msi: Force affinity setup before startup (bsc#1152489).
- x86/reboot: Limit Dell Optiplex 990 quirk to early BIOS versions
(bsc#1152489).
- x86/sme: Use #define USE_EARLY_PGTABLE_L5 in mem_encrypt_identity.c
(bsc#1152489).
- x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).
- xen: Fix implicit type conversion (git-fixes).
- xen-pciback: Fix return in pm_ctrl_init() (git-fixes).
- xfs: do not allow log writes if the data device is readonly
(bsc#1192229).
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2021-3806=1
Package List:
- openSUSE Leap 15.3 (x86_64):
cluster-md-kmp-azure-5.3.18-38.31.1
cluster-md-kmp-azure-debuginfo-5.3.18-38.31.1
dlm-kmp-azure-5.3.18-38.31.1
dlm-kmp-azure-debuginfo-5.3.18-38.31.1
gfs2-kmp-azure-5.3.18-38.31.1
gfs2-kmp-azure-debuginfo-5.3.18-38.31.1
kernel-azure-5.3.18-38.31.1
kernel-azure-debuginfo-5.3.18-38.31.1
kernel-azure-debugsource-5.3.18-38.31.1
kernel-azure-devel-5.3.18-38.31.1
kernel-azure-devel-debuginfo-5.3.18-38.31.1
kernel-azure-extra-5.3.18-38.31.1
kernel-azure-extra-debuginfo-5.3.18-38.31.1
kernel-azure-livepatch-devel-5.3.18-38.31.1
kernel-azure-optional-5.3.18-38.31.1
kernel-azure-optional-debuginfo-5.3.18-38.31.1
kernel-syms-azure-5.3.18-38.31.1
kselftests-kmp-azure-5.3.18-38.31.1
kselftests-kmp-azure-debuginfo-5.3.18-38.31.1
ocfs2-kmp-azure-5.3.18-38.31.1
ocfs2-kmp-azure-debuginfo-5.3.18-38.31.1
reiserfs-kmp-azure-5.3.18-38.31.1
reiserfs-kmp-azure-debuginfo-5.3.18-38.31.1
- openSUSE Leap 15.3 (noarch):
kernel-devel-azure-5.3.18-38.31.1
kernel-source-azure-5.3.18-38.31.1
References:
https://www.suse.com/security/cve/CVE-2021-0941.html
https://www.suse.com/security/cve/CVE-2021-20322.html
https://www.suse.com/security/cve/CVE-2021-31916.html
https://www.suse.com/security/cve/CVE-2021-34981.html
https://www.suse.com/security/cve/CVE-2021-37159.html
https://www.suse.com/security/cve/CVE-2021-43389.html
https://bugzilla.suse.com/1094840
https://bugzilla.suse.com/1133021
https://bugzilla.suse.com/1152489
https://bugzilla.suse.com/1154353
https://bugzilla.suse.com/1157177
https://bugzilla.suse.com/1167773
https://bugzilla.suse.com/1169263
https://bugzilla.suse.com/1170269
https://bugzilla.suse.com/1176940
https://bugzilla.suse.com/1180749
https://bugzilla.suse.com/1184924
https://bugzilla.suse.com/1188601
https://bugzilla.suse.com/1190523
https://bugzilla.suse.com/1190795
https://bugzilla.suse.com/1191628
https://bugzilla.suse.com/1191790
https://bugzilla.suse.com/1191851
https://bugzilla.suse.com/1191958
https://bugzilla.suse.com/1191961
https://bugzilla.suse.com/1191980
https://bugzilla.suse.com/1192045
https://bugzilla.suse.com/1192217
https://bugzilla.suse.com/1192229
https://bugzilla.suse.com/1192267
https://bugzilla.suse.com/1192273
https://bugzilla.suse.com/1192288
https://bugzilla.suse.com/1192328
https://bugzilla.suse.com/1192375
https://bugzilla.suse.com/1192473
https://bugzilla.suse.com/1192549
https://bugzilla.suse.com/1192718
https://bugzilla.suse.com/1192740
https://bugzilla.suse.com/1192745
https://bugzilla.suse.com/1192750
https://bugzilla.suse.com/1192753
https://bugzilla.suse.com/1192758
https://bugzilla.suse.com/1192781
https://bugzilla.suse.com/1192802
https://bugzilla.suse.com/1192896
https://bugzilla.suse.com/1192906
https://bugzilla.suse.com/1192918
1
0
openSUSE-SU-2021:1501-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 24 Nov '21
by opensuse-security@opensuse.org 24 Nov '21
24 Nov '21
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:1501-1
Rating: important
References: #1094840 #1133021 #1152489 #1169263 #1170269
#1188601 #1190523 #1190795 #1191790 #1191851
#1191958 #1191961 #1191980 #1192045 #1192229
#1192267 #1192273 #1192328 #1192718 #1192740
#1192745 #1192750 #1192753 #1192781 #1192802
#1192896 #1192906 #1192918 SLE-22573
Cross-References: CVE-2021-0941 CVE-2021-20322 CVE-2021-31916
CVE-2021-34981 CVE-2021-37159 CVE-2021-43389
CVSS scores:
CVE-2021-0941 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-20322 (SUSE): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CVE-2021-31916 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-31916 (SUSE): 6.8 CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-34981 (SUSE): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2021-37159 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-37159 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-43389 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that solves 6 vulnerabilities, contains one
feature and has 22 fixes is now available.
Description:
The openSUSE Leap 15.2 kernel was updated to receive various security and
bugfixes.
The following security bugs were fixed:
- Unprivileged BPF has been disabled by default to reduce attack surface
as too many security issues have happened in the past (jsc#SLE-22573)
You can reenable via systemctl setting
/proc/sys/kernel/unprivileged_bpf_disabled to 0.
(kernel.unprivileged_bpf_disabled = 0)
- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible
out of bounds read due to a use after free. This could lead to local
escalation of privilege with System execution privileges needed. User
interaction is not needed for exploitation (bnc#1192045).
- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in
list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module
in the Linux kernel A bound check failure allowed an attacker with
special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds
memory leading to a system crash or a leak of internal kernel
information. The highest threat from this vulnerability is to system
availability (bnc#1192781).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less
predictive to avoid information leaks about UDP ports in use.
(bsc#1191790)
- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device
fails (bsc#1191961).
- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the
detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called
unregister_netdev without checking for the NETREG_REGISTERED state,
leading to a use-after-free and a double free (bnc#1188601).
The following non-security bugs were fixed:
- ABI: sysfs-kernel-slab: Document some stats (git-fixes).
- ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).
- ALSA: ua101: fix division by zero at probe (git-fixes).
- ALSA: usb-audio: Add Audient iD14 to mixer map quirk table (git-fixes).
- ALSA: usb-audio: Add Schiit Hel device to mixer map quirk table
(git-fixes).
- ASoC: cs42l42: Correct some register default values (git-fixes).
- ASoC: cs42l42: Defer probe if request_threaded_irq() returns
EPROBE_DEFER (git-fixes).
- ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).
- ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).
- ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).
- ASoC: rockchip: Use generic dmaengine code (git-fixes).
- ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).
- ath10k: fix control-message timeout (git-fixes).
- ath10k: fix division by zero in send path (git-fixes).
- ath10k: fix max antenna gain unit (git-fixes).
- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).
- ath6kl: fix control-message timeout (git-fixes).
- ath6kl: fix division by zero in send path (git-fixes).
- ath9k: Fix potential interrupt storm on queue reset (git-fixes).
- auxdisplay: ht16k33: Connect backlight to fbdev (git-fixes).
- auxdisplay: ht16k33: Fix frame buffer device blanking (git-fixes).
- auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string
(git-fixes).
- b43: fix a lower bounds test (git-fixes).
- b43legacy: fix a lower bounds test (git-fixes).
- Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).
- Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22573)
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22573).
- bpf: Fix potential race in tail call compatibility check (git-fixes).
- btrfs: block-group: Rework documentation of check_system_chunk function
(bsc#1192896).
- btrfs: fix deadlock between chunk allocation and chunk btree
modifications (bsc#1192896).
- btrfs: fix memory ordering between normal and ordered work functions
(git-fixes).
- btrfs: update comments for chunk allocation -ENOSPC cases (bsc#1192896).
- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem
(git-fixes).
- config: disable unprivileged BPF by default (jsc#SLE-22573) Backport of
mainline commit 8a03e56b253e ("bpf: Disallow unprivileged bpf by
default") only changes kconfig default, used e.g. for "make oldconfig"
when the config option is missing, but does not update our kernel
configs used for build. Update also these to make sure unprivileged BPF
is really disabled by default.
- crypto: caam - disable pkc for non-E SoCs (git-fixes).
- crypto: qat - detect PFVF collision after ACK (git-fixes).
- crypto: qat - disregard spurious PFVF interrupts (git-fixes).
- driver core: add a min_align_mask field to struct device_dma_parameters
(bsc#1191851).
- drm/amdgpu: fix warning for overflow check (git-fixes).
- drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).
- drm: prevent spectre issue in vmw_execbuf_ioctl (bsc#1192802).
- drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).
- drm/v3d: fix wait for TMU write combiner flush (git-fixes).
- EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell
(bsc#1152489).
- Eradicate Patch-mainline: No The pre-commit check can reject this
deprecated tag then.
- exfat: fix erroneous discard when clear cluster bit (git-fixes).
- exfat: handle wrong stream entry size in exfat_readdir() (git-fixes).
- exfat: properly set s_time_gran (bsc#1192328).
- exfat: truncate atimes to 2s granularity (bsc#1192328).
- firmware/psci: fix application of sizeof to pointer (git-fixes).
- Fix problem with missing installkernel on Tumbleweed.
- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).
- fuse: fix page stealing (bsc#1192718).
- genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).
- gpio: mpc8xxx: Use 'devm_gpiochip_add_data()' to simplify the code and
avoid a leak (git-fixes).
- HID: u2fzero: clarify error check and length calculations (git-fixes).
- HID: u2fzero: properly handle timeouts in usb_submit_urb (git-fixes).
- hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).
- hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).
- hwmon: (pmbus/lm25066) Let compiler determine outer dimension of
lm25066_coeff (git-fixes).
- hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523
ltc#194510).
- ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).
- ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).
- iio: dac: ad5446: Fix ad5622_write() return value (git-fixes).
- Input: elantench - fix misreporting trackpoint coordinates (bsc#1192918).
- Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).
- kABI: Fix kABI after 36950f2da1ea (bsc#1191851).
- kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).
- KVM: s390: extend kvm_s390_shadow_fault to return entry pointer
(bsc#1133021).
- KVM: s390: index kvm->arch.idle_mask by vcpu_idx (bsc#1133021).
- KVM: s390: split kvm_s390_logical_to_effective (bsc#1133021).
- KVM: s390: VSIE: correctly handle MVPG when in VSIE (bsc#1133021).
- libertas: Fix possible memory leak in probe and disconnect (git-fixes).
- libertas_tf: Fix possible memory leak in probe and disconnect
(git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).
- media: cxd2880-spi: Fix a null pointer dereference on error handling
path (git-fixes).
- media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable()
(git-fixes).
- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).
- media: em28xx: add missing em28xx_close_extension (git-fixes).
- media: em28xx: Do not use ops->suspend if it is NULL (git-fixes).
- media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).
- media: ite-cir: IR receiver stop working after receive overflow
(git-fixes).
- media: mtk-vpu: Fix a resource leak in the error handling path of
'mtk_vpu_probe()' (git-fixes).
- media: mxl111sf: change mutex_init() location (git-fixes).
- media: radio-wl1273: Avoid card name truncation (git-fixes).
- media: si470x: Avoid card name truncation (git-fixes).
- media: staging/intel-ipu3: css: Fix wrong size comparison
imgu_css_fw_init (git-fixes).
- media: TDA1997x: handle short reads of hdmi info frame (git-fixes).
- media: tm6000: Avoid card name truncation (git-fixes).
- media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).
- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).
- memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe
(git-fixes).
- memstick: avoid out-of-range warning (git-fixes).
- memstick: jmb38x_ms: use appropriate free function in
jmb38x_ms_alloc_host() (git-fixes).
- mmc: mxs-mmc: disable regulator on error and in the remove function
(git-fixes).
- mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).
- mmc: sdhci-omap: Fix NULL pointer exception if regulator is not
configured (git-fixes).
- mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).
- mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).
- mwifiex: fix division by zero in fw download path (git-fixes).
- mwifiex: Send DELBA requests according to spec (git-fixes).
- net: dsa: felix: re-enable TX flow control in ocelot_port_flush()
(git-fixes).
- net: mscc: ocelot: fix hardware timestamp dequeue logic.
- net: mscc: ocelot: warn when a PTP IRQ is raised for an unknown skb
(git-fixes).
- nvme-pci: set min_align_mask (bsc#1191851).
- ocfs2: do not zero pages beyond i_size (bsc#1190795).
- ocfs2: fix data corruption on truncate (bsc#1190795).
- PCI: aardvark: Do not clear status bits of masked interrupts (git-fixes).
- PCI: aardvark: Do not spam about PIO Response Status (git-fixes).
- PCI: aardvark: Do not unmask unused interrupts (git-fixes).
- PCI: aardvark: Fix checking for link up via LTSSM state (git-fixes).
- PCI: aardvark: Fix reporting Data Link Layer Link Active (git-fixes).
- PCI: aardvark: Fix return value of MSI domain .alloc() method
(git-fixes).
- PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG (git-fixes).
- PCI/ACPI: Check for _OSC support in acpi_pci_osc_control_set()
(bsc#1169263).
- PCI/ACPI: Clarify message about _OSC failure (bsc#1169263).
- PCI/ACPI: Move _OSC query checks to separate function (bsc#1169263).
- PCI/ACPI: Move supported and control calculations to separate functions
(bsc#1169263).
- PCI/ACPI: Remove OSC_PCI_SUPPORT_MASKS and OSC_PCI_CONTROL_MASKS
(bsc#1169263).
- PCI/ACPI: Remove unnecessary osc_lock (bsc#1169263).
- PCI: pci-bridge-emul: Fix emulation of W1C bits (git-fixes).
- PCI: uniphier: Serialize INTx masking/unmasking and fix the bit
operation (git-fixes).
- pinctrl: core: fix possible memory leak in pinctrl_enable() (git-fixes).
- platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).
- power: supply: bq27xxx: Fix kernel crash on IRQ handler register error
(git-fixes).
- power: supply: max17042_battery: Prevent int underflow in
set_soc_threshold (git-fixes).
- power: supply: max17042_battery: use VFSOC for capacity when no rsns
(git-fixes).
- printk/console: Allow to disable console output by using console="" or
console=null (bsc#1192753).
- printk: handle blank console arguments passed in (bsc#1192753).
- qtnfmac: fix potential Spectre vulnerabilities (bsc#1192802).
- r8152: add a helper function about setting EEE (git-fixes).
- r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2
(git-fixes).
- r8152: Disable PLA MCU clock speed down (git-fixes).
- r8152: disable U2P3 for RTL8153B (git-fixes).
- r8152: divide the tx and rx bottom functions (git-fixes).
- r8152: do not enable U1U2 with USB_SPEED_HIGH for RTL8153B (git-fixes).
- r8152: fix runtime resume for linking change (git-fixes).
- r8152: replace array with linking list for rx information (git-fixes).
- r8152: reset flow control patch when linking on for RTL8153B (git-fixes).
- r8152: saving the settings of EEE (git-fixes).
- r8152: separate the rx buffer size (git-fixes).
- r8152: use alloc_pages for rx buffer (git-fixes).
- regulator: dt-bindings: samsung,s5m8767: correct
s5m8767,pmic-buck-default-dvs-idx property (git-fixes).
- regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is
disabled (git-fixes).
- Revert "ibmvnic: check failover_pending in login response" (bsc#1190523
ltc#194510).
- Revert "platform/x86: i2c-multi-instantiate: Do not create platform
device for INT3515 ACPI nodes" (git-fixes).
- Revert "r8152: adjust the settings about MAC clock speed down for
RTL8153" (git-fixes).
- Revert "scsi: ufs: fix a missing check of devm_reset_control_get"
(git-fixes).
- Revert "x86/kvm: fix vcpu-id indexed array sizes" (git-fixes).
- rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request
(git-fixes).
- rsi: fix control-message timeout (git-fixes).
- rsi: Fix module dev_oper_mode parameter description (git-fixes).
- rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).
- rtl8187: fix control-message timeouts (git-fixes).
- s390/qeth: fix deadlock during failing recovery (git-fixes).
- s390/qeth: Fix deadlock in remove_discipline (git-fixes).
- s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).
- scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe()
(git-fixes).
- scsi: BusLogic: Fix missing pr_cont() use (git-fixes).
- scsi: core: Fix spelling in a source code comment (git-fixes).
- scsi: csiostor: Add module softdep on cxgb4 (git-fixes).
- scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn()
(git-fixes).
- scsi: dc395: Fix error case unwinding (git-fixes).
- scsi: fdomain: Fix error return code in fdomain_probe() (git-fixes).
- scsi: FlashPoint: Rename si_flags field (git-fixes).
- scsi: iscsi: Fix iface sysfs attr detection (git-fixes).
- scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).
- scsi: mpt3sas: Fix error return value in _scsih_expander_add()
(git-fixes).
- scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).
- scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).
- scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).
- scsi: qla2xxx: Fix a memory leak in an error path of
qla2x00_process_els() (git-fixes).
- scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).
- scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).
- scsi: snic: Fix an error message (git-fixes).
- scsi: ufs-pci: Add quirk for broken auto-hibernate for Intel EHL
(git-fixes).
- scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).
- serial: 8250_dw: Drop wrong use of ACPI_PTR() (git-fixes).
- serial: xilinx_uartps: Fix race condition causing stuck TX (git-fixes).
- staging: r8712u: fix control-message timeout (git-fixes).
- staging: rtl8192u: fix control-message timeouts (git-fixes).
- stmmac: platform: Fix signedness bug in stmmac_probe_config_dt()
(git-fixes).
- swiotlb: add a IO_TLB_SIZE define (bsc#1191851).
- swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).
- swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single
(bsc#1191851).
- swiotlb: factor out an io_tlb_offset helper (bsc#1191851).
- swiotlb: factor out a nr_slots helper (bsc#1191851).
- swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).
- swiotlb: respect min_align_mask (bsc#1191851).
- swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).
- tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).
- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker
together (bsc#1192745).
- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
- usb: gadget: hid: fix error code in do_config() (git-fixes).
- USB: iowarrior: fix control-message timeouts (git-fixes).
- usb: max-3421: Use driver data instead of maintaining a list of bound
devices (git-fixes).
- usb: musb: Balance list entry in musb_gadget_queue (git-fixes).
- usbnet: fix error return code in usbnet_probe() (git-fixes).
- usbnet: sanity check for maxpacket (git-fixes).
- USB: serial: keyspan: fix memleak on probe errors (git-fixes).
- video: fbdev: chipsfb: use memset_io() instead of memset() (git-fixes).
- virtio-gpu: fix possible memory allocation failure (git-fixes).
- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two's
complement (git-fixes).
- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).
- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).
- x86/ioapic: Force affinity setup before startup (bsc#1152489).
- x86/msi: Force affinity setup before startup (bsc#1152489).
- x86/sme: Use #define USE_EARLY_PGTABLE_L5 in mem_encrypt_identity.c
(bsc#1152489).
- x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).
- xen: Fix implicit type conversion (git-fixes).
- xen-pciback: Fix return in pm_ctrl_init() (git-fixes).
- xfs: do not allow log writes if the data device is readonly
(bsc#1192229).
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-1501=1
Package List:
- openSUSE Leap 15.2 (noarch):
kernel-devel-5.3.18-lp152.106.1
kernel-docs-5.3.18-lp152.106.1
kernel-docs-html-5.3.18-lp152.106.1
kernel-macros-5.3.18-lp152.106.1
kernel-source-5.3.18-lp152.106.1
kernel-source-vanilla-5.3.18-lp152.106.1
- openSUSE Leap 15.2 (x86_64):
kernel-debug-5.3.18-lp152.106.1
kernel-debug-debuginfo-5.3.18-lp152.106.1
kernel-debug-debugsource-5.3.18-lp152.106.1
kernel-debug-devel-5.3.18-lp152.106.1
kernel-debug-devel-debuginfo-5.3.18-lp152.106.1
kernel-default-5.3.18-lp152.106.1
kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1
kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1
kernel-default-debuginfo-5.3.18-lp152.106.1
kernel-default-debugsource-5.3.18-lp152.106.1
kernel-default-devel-5.3.18-lp152.106.1
kernel-default-devel-debuginfo-5.3.18-lp152.106.1
kernel-kvmsmall-5.3.18-lp152.106.1
kernel-kvmsmall-debuginfo-5.3.18-lp152.106.1
kernel-kvmsmall-debugsource-5.3.18-lp152.106.1
kernel-kvmsmall-devel-5.3.18-lp152.106.1
kernel-kvmsmall-devel-debuginfo-5.3.18-lp152.106.1
kernel-obs-build-5.3.18-lp152.106.1
kernel-obs-build-debugsource-5.3.18-lp152.106.1
kernel-obs-qa-5.3.18-lp152.106.1
kernel-preempt-5.3.18-lp152.106.1
kernel-preempt-debuginfo-5.3.18-lp152.106.1
kernel-preempt-debugsource-5.3.18-lp152.106.1
kernel-preempt-devel-5.3.18-lp152.106.1
kernel-preempt-devel-debuginfo-5.3.18-lp152.106.1
kernel-syms-5.3.18-lp152.106.1
References:
https://www.suse.com/security/cve/CVE-2021-0941.html
https://www.suse.com/security/cve/CVE-2021-20322.html
https://www.suse.com/security/cve/CVE-2021-31916.html
https://www.suse.com/security/cve/CVE-2021-34981.html
https://www.suse.com/security/cve/CVE-2021-37159.html
https://www.suse.com/security/cve/CVE-2021-43389.html
https://bugzilla.suse.com/1094840
https://bugzilla.suse.com/1133021
https://bugzilla.suse.com/1152489
https://bugzilla.suse.com/1169263
https://bugzilla.suse.com/1170269
https://bugzilla.suse.com/1188601
https://bugzilla.suse.com/1190523
https://bugzilla.suse.com/1190795
https://bugzilla.suse.com/1191790
https://bugzilla.suse.com/1191851
https://bugzilla.suse.com/1191958
https://bugzilla.suse.com/1191961
https://bugzilla.suse.com/1191980
https://bugzilla.suse.com/1192045
https://bugzilla.suse.com/1192229
https://bugzilla.suse.com/1192267
https://bugzilla.suse.com/1192273
https://bugzilla.suse.com/1192328
https://bugzilla.suse.com/1192718
https://bugzilla.suse.com/1192740
https://bugzilla.suse.com/1192745
https://bugzilla.suse.com/1192750
https://bugzilla.suse.com/1192753
https://bugzilla.suse.com/1192781
https://bugzilla.suse.com/1192802
https://bugzilla.suse.com/1192896
https://bugzilla.suse.com/1192906
https://bugzilla.suse.com/1192918
1
0
openSUSE-SU-2021:1502-1: important: Security update for bind
by opensuse-security@opensuse.org 24 Nov '21
by opensuse-security@opensuse.org 24 Nov '21
24 Nov '21
openSUSE Security Update: Security update for bind
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:1502-1
Rating: important
References: #1192146
Cross-References: CVE-2021-25219
CVSS scores:
CVE-2021-25219 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-25219 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for bind fixes the following issues:
- CVE-2021-25219: Fixed lame cache that could have been abused to severely
degrade resolver performance (bsc#1192146).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-1502=1
Package List:
- openSUSE Leap 15.2 (i586 x86_64):
bind-9.16.6-lp152.14.25.1
bind-chrootenv-9.16.6-lp152.14.25.1
bind-debuginfo-9.16.6-lp152.14.25.1
bind-debugsource-9.16.6-lp152.14.25.1
bind-devel-9.16.6-lp152.14.25.1
bind-utils-9.16.6-lp152.14.25.1
bind-utils-debuginfo-9.16.6-lp152.14.25.1
libbind9-1600-9.16.6-lp152.14.25.1
libbind9-1600-debuginfo-9.16.6-lp152.14.25.1
libdns1605-9.16.6-lp152.14.25.1
libdns1605-debuginfo-9.16.6-lp152.14.25.1
libirs-devel-9.16.6-lp152.14.25.1
libirs1601-9.16.6-lp152.14.25.1
libirs1601-debuginfo-9.16.6-lp152.14.25.1
libisc1606-9.16.6-lp152.14.25.1
libisc1606-debuginfo-9.16.6-lp152.14.25.1
libisccc1600-9.16.6-lp152.14.25.1
libisccc1600-debuginfo-9.16.6-lp152.14.25.1
libisccfg1600-9.16.6-lp152.14.25.1
libisccfg1600-debuginfo-9.16.6-lp152.14.25.1
libns1604-9.16.6-lp152.14.25.1
libns1604-debuginfo-9.16.6-lp152.14.25.1
- openSUSE Leap 15.2 (x86_64):
bind-devel-32bit-9.16.6-lp152.14.25.1
libbind9-1600-32bit-9.16.6-lp152.14.25.1
libbind9-1600-32bit-debuginfo-9.16.6-lp152.14.25.1
libdns1605-32bit-9.16.6-lp152.14.25.1
libdns1605-32bit-debuginfo-9.16.6-lp152.14.25.1
libirs1601-32bit-9.16.6-lp152.14.25.1
libirs1601-32bit-debuginfo-9.16.6-lp152.14.25.1
libisc1606-32bit-9.16.6-lp152.14.25.1
libisc1606-32bit-debuginfo-9.16.6-lp152.14.25.1
libisccc1600-32bit-9.16.6-lp152.14.25.1
libisccc1600-32bit-debuginfo-9.16.6-lp152.14.25.1
libisccfg1600-32bit-9.16.6-lp152.14.25.1
libisccfg1600-32bit-debuginfo-9.16.6-lp152.14.25.1
libns1604-32bit-9.16.6-lp152.14.25.1
libns1604-32bit-debuginfo-9.16.6-lp152.14.25.1
- openSUSE Leap 15.2 (noarch):
bind-doc-9.16.6-lp152.14.25.1
python3-bind-9.16.6-lp152.14.25.1
References:
https://www.suse.com/security/cve/CVE-2021-25219.html
https://bugzilla.suse.com/1192146
1
0
openSUSE-SU-2021:1500-1: important: Security update for java-1_8_0-openjdk
by opensuse-security@opensuse.org 24 Nov '21
by opensuse-security@opensuse.org 24 Nov '21
24 Nov '21
openSUSE Security Update: Security update for java-1_8_0-openjdk
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:1500-1
Rating: important
References: #1191901 #1191903 #1191904 #1191905 #1191906
#1191909 #1191910 #1191911 #1191912 #1191913
#1191914
Cross-References: CVE-2021-35550 CVE-2021-35556 CVE-2021-35559
CVE-2021-35561 CVE-2021-35564 CVE-2021-35565
CVE-2021-35567 CVE-2021-35578 CVE-2021-35586
CVE-2021-35588 CVE-2021-35603
CVSS scores:
CVE-2021-35550 (NVD) : 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2021-35550 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2021-35556 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-35556 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-35559 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-35561 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-35561 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-35564 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2021-35564 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2021-35565 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-35565 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-35567 (NVD) : 6.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
CVE-2021-35567 (SUSE): 6.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
CVE-2021-35578 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-35578 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-35586 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-35586 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-35588 (NVD) : 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2021-35588 (SUSE): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2021-35603 (NVD) : 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2021-35603 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that fixes 11 vulnerabilities is now available.
Description:
This update for java-1_8_0-openjdk fixes the following issues:
Update to version OpenJDK 8u312 (October 2021 CPU):
- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS
(bsc#1191901).
- CVE-2021-35556: Fixed excessive memory allocation in RTFParser
(bsc#1191910).
- CVE-2021-35559: Fixed excessive memory allocation in RTFReader
(bsc#1191911).
- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet
(bsc#1191912).
- CVE-2021-35564: Fixed certificates with end dates too far in the future
can corrupt keystore (bsc#1191913).
- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session
close (bsc#1191909).
- CVE-2021-35567: Fixed incorrect principal selection when using Kerberos
Constrained Delegation (bsc#1191903).
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake
(bsc#1191904).
- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader
(bsc#1191914).
- CVE-2021-35588: Fixed incomplete validation of inner class references in
ClassFileParser (bsc#1191905)
- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes
(bsc#1191906).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-1500=1
Package List:
- openSUSE Leap 15.2 (i586 x86_64):
java-1_8_0-openjdk-1.8.0.312-lp152.2.18.2
java-1_8_0-openjdk-accessibility-1.8.0.312-lp152.2.18.2
java-1_8_0-openjdk-debuginfo-1.8.0.312-lp152.2.18.2
java-1_8_0-openjdk-debugsource-1.8.0.312-lp152.2.18.2
java-1_8_0-openjdk-demo-1.8.0.312-lp152.2.18.2
java-1_8_0-openjdk-demo-debuginfo-1.8.0.312-lp152.2.18.2
java-1_8_0-openjdk-devel-1.8.0.312-lp152.2.18.2
java-1_8_0-openjdk-devel-debuginfo-1.8.0.312-lp152.2.18.2
java-1_8_0-openjdk-headless-1.8.0.312-lp152.2.18.2
java-1_8_0-openjdk-headless-debuginfo-1.8.0.312-lp152.2.18.2
java-1_8_0-openjdk-src-1.8.0.312-lp152.2.18.2
- openSUSE Leap 15.2 (noarch):
java-1_8_0-openjdk-javadoc-1.8.0.312-lp152.2.18.2
References:
https://www.suse.com/security/cve/CVE-2021-35550.html
https://www.suse.com/security/cve/CVE-2021-35556.html
https://www.suse.com/security/cve/CVE-2021-35559.html
https://www.suse.com/security/cve/CVE-2021-35561.html
https://www.suse.com/security/cve/CVE-2021-35564.html
https://www.suse.com/security/cve/CVE-2021-35565.html
https://www.suse.com/security/cve/CVE-2021-35567.html
https://www.suse.com/security/cve/CVE-2021-35578.html
https://www.suse.com/security/cve/CVE-2021-35586.html
https://www.suse.com/security/cve/CVE-2021-35588.html
https://www.suse.com/security/cve/CVE-2021-35603.html
https://bugzilla.suse.com/1191901
https://bugzilla.suse.com/1191903
https://bugzilla.suse.com/1191904
https://bugzilla.suse.com/1191905
https://bugzilla.suse.com/1191906
https://bugzilla.suse.com/1191909
https://bugzilla.suse.com/1191910
https://bugzilla.suse.com/1191911
https://bugzilla.suse.com/1191912
https://bugzilla.suse.com/1191913
https://bugzilla.suse.com/1191914
1
0
openSUSE-SU-2021:3772-1: important: Security update for redis
by opensuse-security@opensuse.org 23 Nov '21
by opensuse-security@opensuse.org 23 Nov '21
23 Nov '21
openSUSE Security Update: Security update for redis
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:3772-1
Rating: important
References: #1191299 #1191300 #1191302 #1191303 #1191304
#1191305 #1191306
Cross-References: CVE-2021-32626 CVE-2021-32627 CVE-2021-32628
CVE-2021-32672 CVE-2021-32675 CVE-2021-32687
CVE-2021-32762 CVE-2021-41099
CVSS scores:
CVE-2021-32626 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-32626 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-32627 (NVD) : 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-32627 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-32628 (NVD) : 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-32628 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-32672 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVE-2021-32672 (SUSE): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
CVE-2021-32675 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-32675 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-32687 (NVD) : 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-32687 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-32762 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-32762 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-41099 (NVD) : 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-41099 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that fixes 8 vulnerabilities is now available.
Description:
This update for redis fixes the following issues:
- CVE-2021-32627: Fixed integer to heap buffer overflows with streams
(bsc#1191305).
- CVE-2021-32628: Fixed integer to heap buffer overflows handling
ziplist-encoded data types (bsc#1191305).
- CVE-2021-32687: Fixed integer to heap buffer overflow with intsets
(bsc#1191302).
- CVE-2021-32762: Fixed integer to heap buffer overflow issue in redis-cli
and redis-sentinel (bsc#1191300).
- CVE-2021-32626: Fixed heap buffer overflow caused by specially crafted
Lua scripts (bsc#1191306).
- CVE-2021-32672: Fixed random heap reading issue with Lua Debugger
(bsc#1191304).
- CVE-2021-32675: Fixed Denial Of Service when processing RESP request
payloads with a large number of elements on many connections
(bsc#1191303).
- CVE-2021-41099: Fixed integer to heap buffer overflow handling certain
string commands and network payloads (bsc#1191299).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2021-3772=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
redis-6.0.14-6.8.1
redis-debuginfo-6.0.14-6.8.1
redis-debugsource-6.0.14-6.8.1
References:
https://www.suse.com/security/cve/CVE-2021-32626.html
https://www.suse.com/security/cve/CVE-2021-32627.html
https://www.suse.com/security/cve/CVE-2021-32628.html
https://www.suse.com/security/cve/CVE-2021-32672.html
https://www.suse.com/security/cve/CVE-2021-32675.html
https://www.suse.com/security/cve/CVE-2021-32687.html
https://www.suse.com/security/cve/CVE-2021-32762.html
https://www.suse.com/security/cve/CVE-2021-41099.html
https://bugzilla.suse.com/1191299
https://bugzilla.suse.com/1191300
https://bugzilla.suse.com/1191302
https://bugzilla.suse.com/1191303
https://bugzilla.suse.com/1191304
https://bugzilla.suse.com/1191305
https://bugzilla.suse.com/1191306
1
0