suse-su-2021:1301-1
Vulnerability from csaf_suse
Published
2021-04-21 12:30
Modified
2021-04-21 12:30
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).
- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).
- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).
- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).
- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).
- CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc#1184512).
- CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ).
- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194).
The following non-security bugs were fixed:
- ALSA: aloop: Fix initialization of controls (git-fixes).
- ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes).
- appletalk: Fix skb allocation size in loopback case (git-fixes).
- ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes).
- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes).
- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).
- ASoC: max98373: Added 30ms turn on/off time delay (git-fixes).
- ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes).
- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).
- ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes).
- atl1c: fix error return code in atl1c_probe() (git-fixes).
- atl1e: fix error return code in atl1e_probe() (git-fixes).
- batman-adv: initialize 'struct batadv_tvlv_tt_vlan_data'->reserved field (git-fixes).
- bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518).
- brcmfmac: clear EAP/association status bits on linkdown events (git-fixes).
- bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs_debug: use %pd instead of messing with ->d_name (bsc#1181507).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: New optype for session operations (bsc#1181507).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- clk: fix invalid usage of list cursor in register (git-fixes).
- clk: fix invalid usage of list cursor in unregister (git-fixes).
- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).
- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).
- drm/amdgpu: check alignment on CPU page for bo map (git-fixes).
- drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes).
- drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074).
- drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes).
- drm/msm: Ratelimit invalid-fence message (git-fixes).
- drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes).
- enetc: Fix reporting of h/w packet counters (git-fixes).
- fuse: fix bad inode (bsc#1184211).
- fuse: fix live lock in fuse_iget() (bsc#1184211).
- i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025).
- i40e: Fix sparse error: 'vsi->netdev' could be null (jsc#SLE-8025).
- ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926).
- kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- libbpf: Fix INSTALL flag order (bsc#1155518).
- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).
- mac80211: choose first enabled channel for monitor (git-fixes).
- mac80211: fix TXQ AC confusion (git-fixes).
- mISDN: fix crash in fritzpci (git-fixes).
- net: atheros: switch from 'pci_' to 'dma_' API (git-fixes).
- net: b44: fix error return code in b44_init_one() (git-fixes).
- net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes).
- net: hns3: Remove the left over redundant check & assignment (bsc#1154353).
- net: lantiq: Wait for the GPHY firmware to be ready (git-fixes).
- net/mlx5: Fix PPLM register mapping (jsc#SLE-8464).
- net: pasemi: fix error return code in pasemi_mac_open() (git-fixes).
- net: phy: broadcom: Only advertise EEE for supported modes (git-fixes).
- net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes).
- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)
- net: wan/lmc: unregister device when no matching device is found (git-fixes).
- platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes).
- platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes).
- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).
- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).
- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).
- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- powerpc/pseries/ras: Remove unused variable 'status' (bsc#1065729).
- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).
- powerpc/sstep: Fix darn emulation (bsc#1156395).
- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395).
- powerpc/sstep: Fix load-store and update emulation (bsc#1156395).
- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).
- RAS/CEC: Correct ce_add_elem()'s returned values (bsc#1152489).
- rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc#1184514)
- scsi: ibmvfc: Fix invalid state machine BUG_ON() (bsc#1184647 ltc#191231).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- soc/fsl: qbman: fix conflicting alignment attributes (git-fixes).
- thermal/core: Add NULL pointer check before using cooling device stats (git-fixes).
- USB: cdc-acm: downgrade message to debug (git-fixes).
- USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes).
- USBip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes).
- USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes).
- x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc#1152489).
- x86/ioapic: Ignore IRQ2 again (bsc#1152489).
- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (bsc#1152489).
- xen/events: fix setting irq affinity (bsc#1184583).
Patchnames
SUSE-2021-1301,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1301
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).\n- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).\n- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).\n- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).\n- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).\n- CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc#1184512).\n- CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ).\n- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194).\n\nThe following non-security bugs were fixed:\n\n- ALSA: aloop: Fix initialization of controls (git-fixes).\n- ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes).\n- appletalk: Fix skb allocation size in loopback case (git-fixes).\n- ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes).\n- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes).\n- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).\n- ASoC: max98373: Added 30ms turn on/off time delay (git-fixes).\n- ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes).\n- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).\n- ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes).\n- atl1c: fix error return code in atl1c_probe() (git-fixes).\n- atl1e: fix error return code in atl1e_probe() (git-fixes).\n- batman-adv: initialize \u0027struct batadv_tvlv_tt_vlan_data\u0027-\u003ereserved field (git-fixes).\n- bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518).\n- brcmfmac: clear EAP/association status bits on linkdown events (git-fixes).\n- bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes).\n- cifs: change noisy error message to FYI (bsc#1181507).\n- cifs_debug: use %pd instead of messing with -\u003ed_name (bsc#1181507).\n- cifs: do not send close in compound create+close requests (bsc#1181507).\n- cifs: New optype for session operations (bsc#1181507).\n- cifs: print MIDs in decimal notation (bsc#1181507).\n- cifs: return proper error code in statfs(2) (bsc#1181507).\n- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).\n- clk: fix invalid usage of list cursor in register (git-fixes).\n- clk: fix invalid usage of list cursor in unregister (git-fixes).\n- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).\n- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).\n- drm/amdgpu: check alignment on CPU page for bo map (git-fixes).\n- drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes).\n- drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074).\n- drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes).\n- drm/msm: Ratelimit invalid-fence message (git-fixes).\n- drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes).\n- enetc: Fix reporting of h/w packet counters (git-fixes).\n- fuse: fix bad inode (bsc#1184211).\n- fuse: fix live lock in fuse_iget() (bsc#1184211).\n- i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025).\n- i40e: Fix sparse error: \u0027vsi-\u003enetdev\u0027 could be null (jsc#SLE-8025).\n- ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926).\n- kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).\n- libbpf: Fix INSTALL flag order (bsc#1155518).\n- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).\n- mac80211: choose first enabled channel for monitor (git-fixes).\n- mac80211: fix TXQ AC confusion (git-fixes).\n- mISDN: fix crash in fritzpci (git-fixes).\n- net: atheros: switch from \u0027pci_\u0027 to \u0027dma_\u0027 API (git-fixes).\n- net: b44: fix error return code in b44_init_one() (git-fixes).\n- net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes).\n- net: hns3: Remove the left over redundant check \u0026 assignment (bsc#1154353).\n- net: lantiq: Wait for the GPHY firmware to be ready (git-fixes).\n- net/mlx5: Fix PPLM register mapping (jsc#SLE-8464).\n- net: pasemi: fix error return code in pasemi_mac_open() (git-fixes).\n- net: phy: broadcom: Only advertise EEE for supported modes (git-fixes).\n- net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes).\n- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)\n- net: wan/lmc: unregister device when no matching device is found (git-fixes).\n- platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes).\n- platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes).\n- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).\n- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).\n- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).\n- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).\n- powerpc/pseries/ras: Remove unused variable \u0027status\u0027 (bsc#1065729).\n- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).\n- powerpc/sstep: Fix darn emulation (bsc#1156395).\n- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395).\n- powerpc/sstep: Fix load-store and update emulation (bsc#1156395).\n- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).\n- RAS/CEC: Correct ce_add_elem()\u0027s returned values (bsc#1152489).\n- rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc#1184514) \n- scsi: ibmvfc: Fix invalid state machine BUG_ON() (bsc#1184647 ltc#191231).\n- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).\n- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).\n- soc/fsl: qbman: fix conflicting alignment attributes (git-fixes).\n- thermal/core: Add NULL pointer check before using cooling device stats (git-fixes).\n- USB: cdc-acm: downgrade message to debug (git-fixes).\n- USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes).\n- USBip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes).\n- USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes).\n- x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc#1152489).\n- x86/ioapic: Ignore IRQ2 again (bsc#1152489).\n- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (bsc#1152489).\n- xen/events: fix setting irq affinity (bsc#1184583).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-1301,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1301", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1301-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:1301-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211301-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:1301-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" }, { "category": "self", "summary": "SUSE Bug 1047233", "url": "https://bugzilla.suse.com/1047233" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1113295", "url": "https://bugzilla.suse.com/1113295" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1155518", "url": "https://bugzilla.suse.com/1155518" }, { "category": "self", "summary": "SUSE Bug 1156395", "url": "https://bugzilla.suse.com/1156395" }, { "category": "self", "summary": "SUSE Bug 1178181", "url": "https://bugzilla.suse.com/1178181" }, { "category": "self", "summary": "SUSE Bug 1181507", "url": "https://bugzilla.suse.com/1181507" }, { "category": "self", "summary": "SUSE Bug 1183405", "url": "https://bugzilla.suse.com/1183405" }, { "category": "self", "summary": "SUSE Bug 1184074", "url": "https://bugzilla.suse.com/1184074" }, { "category": "self", "summary": "SUSE Bug 1184120", "url": "https://bugzilla.suse.com/1184120" }, { "category": "self", "summary": "SUSE Bug 1184194", "url": "https://bugzilla.suse.com/1184194" }, { "category": "self", "summary": "SUSE Bug 1184211", "url": "https://bugzilla.suse.com/1184211" }, { "category": "self", "summary": "SUSE Bug 1184388", "url": "https://bugzilla.suse.com/1184388" }, { "category": "self", "summary": "SUSE Bug 1184391", "url": "https://bugzilla.suse.com/1184391" }, { "category": "self", "summary": "SUSE Bug 1184393", "url": "https://bugzilla.suse.com/1184393" }, { "category": "self", "summary": "SUSE Bug 1184509", "url": "https://bugzilla.suse.com/1184509" }, { "category": "self", "summary": "SUSE Bug 1184511", "url": "https://bugzilla.suse.com/1184511" }, { "category": "self", "summary": "SUSE Bug 1184512", "url": "https://bugzilla.suse.com/1184512" }, { "category": "self", "summary": "SUSE Bug 1184514", "url": "https://bugzilla.suse.com/1184514" }, { "category": "self", "summary": "SUSE Bug 1184583", "url": "https://bugzilla.suse.com/1184583" }, { "category": "self", "summary": "SUSE Bug 1184647", "url": "https://bugzilla.suse.com/1184647" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25670 page", "url": "https://www.suse.com/security/cve/CVE-2020-25670/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25671 page", "url": "https://www.suse.com/security/cve/CVE-2020-25671/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25672 page", "url": "https://www.suse.com/security/cve/CVE-2020-25672/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25673 page", "url": "https://www.suse.com/security/cve/CVE-2020-25673/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36310 page", "url": "https://www.suse.com/security/cve/CVE-2020-36310/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36311 page", "url": "https://www.suse.com/security/cve/CVE-2020-36311/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36312 page", "url": "https://www.suse.com/security/cve/CVE-2020-36312/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28950 page", "url": "https://www.suse.com/security/cve/CVE-2021-28950/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-29154 page", "url": "https://www.suse.com/security/cve/CVE-2021-29154/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30002 page", "url": "https://www.suse.com/security/cve/CVE-2021-30002/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3483 page", "url": "https://www.suse.com/security/cve/CVE-2021-3483/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2021-04-21T12:30:05Z", "generator": { "date": "2021-04-21T12:30:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:1301-1", "initial_release_date": "2021-04-21T12:30:05Z", "revision_history": [ { "date": "2021-04-21T12:30:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-5.3.18-18.44.1.noarch", "product": { "name": "kernel-devel-azure-5.3.18-18.44.1.noarch", "product_id": "kernel-devel-azure-5.3.18-18.44.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-5.3.18-18.44.1.noarch", "product": { "name": "kernel-source-azure-5.3.18-18.44.1.noarch", "product_id": "kernel-source-azure-5.3.18-18.44.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-5.3.18-18.44.1.x86_64", "product": { "name": "cluster-md-kmp-azure-5.3.18-18.44.1.x86_64", "product_id": "cluster-md-kmp-azure-5.3.18-18.44.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-5.3.18-18.44.1.x86_64", "product": { "name": "dlm-kmp-azure-5.3.18-18.44.1.x86_64", "product_id": "dlm-kmp-azure-5.3.18-18.44.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-5.3.18-18.44.1.x86_64", "product": { "name": "gfs2-kmp-azure-5.3.18-18.44.1.x86_64", "product_id": "gfs2-kmp-azure-5.3.18-18.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-5.3.18-18.44.1.x86_64", "product": { "name": "kernel-azure-5.3.18-18.44.1.x86_64", "product_id": "kernel-azure-5.3.18-18.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-5.3.18-18.44.1.x86_64", "product": { "name": "kernel-azure-devel-5.3.18-18.44.1.x86_64", "product_id": "kernel-azure-devel-5.3.18-18.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-5.3.18-18.44.1.x86_64", "product": { "name": "kernel-azure-extra-5.3.18-18.44.1.x86_64", "product_id": "kernel-azure-extra-5.3.18-18.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-5.3.18-18.44.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-5.3.18-18.44.1.x86_64", "product_id": "kernel-azure-livepatch-devel-5.3.18-18.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-5.3.18-18.44.1.x86_64", "product": { "name": "kernel-syms-azure-5.3.18-18.44.1.x86_64", "product_id": "kernel-syms-azure-5.3.18-18.44.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-5.3.18-18.44.1.x86_64", "product": { "name": "kselftests-kmp-azure-5.3.18-18.44.1.x86_64", "product_id": "kselftests-kmp-azure-5.3.18-18.44.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-5.3.18-18.44.1.x86_64", "product": { "name": "ocfs2-kmp-azure-5.3.18-18.44.1.x86_64", "product_id": "ocfs2-kmp-azure-5.3.18-18.44.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-5.3.18-18.44.1.x86_64", "product": { "name": "reiserfs-kmp-azure-5.3.18-18.44.1.x86_64", "product_id": "reiserfs-kmp-azure-5.3.18-18.44.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-5.3.18-18.44.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64" }, "product_reference": "kernel-azure-5.3.18-18.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-5.3.18-18.44.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64" }, "product_reference": "kernel-azure-devel-5.3.18-18.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-5.3.18-18.44.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch" }, "product_reference": "kernel-devel-azure-5.3.18-18.44.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-5.3.18-18.44.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch" }, "product_reference": "kernel-source-azure-5.3.18-18.44.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-5.3.18-18.44.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" }, "product_reference": "kernel-syms-azure-5.3.18-18.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25670", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25670" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25670", "url": "https://www.suse.com/security/cve/CVE-2020-25670" }, { "category": "external", "summary": "SUSE Bug 1178181 for CVE-2020-25670", "url": "https://bugzilla.suse.com/1178181" }, { "category": "external", "summary": "SUSE Bug 1194680 for CVE-2020-25670", "url": "https://bugzilla.suse.com/1194680" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-04-21T12:30:05Z", "details": "important" } ], "title": "CVE-2020-25670" }, { "cve": "CVE-2020-25671", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25671" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25671", "url": "https://www.suse.com/security/cve/CVE-2020-25671" }, { "category": "external", "summary": "SUSE Bug 1178181 for CVE-2020-25671", "url": "https://bugzilla.suse.com/1178181" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-04-21T12:30:05Z", "details": "important" } ], "title": "CVE-2020-25671" }, { "cve": "CVE-2020-25672", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25672" } ], "notes": [ { "category": "general", "text": "A memory leak vulnerability was found in Linux kernel in llcp_sock_connect", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25672", "url": "https://www.suse.com/security/cve/CVE-2020-25672" }, { "category": "external", "summary": "SUSE Bug 1178181 for CVE-2020-25672", "url": "https://bugzilla.suse.com/1178181" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-04-21T12:30:05Z", "details": "important" } ], "title": "CVE-2020-25672" }, { "cve": "CVE-2020-25673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25673" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25673", "url": "https://www.suse.com/security/cve/CVE-2020-25673" }, { "category": "external", "summary": "SUSE Bug 1178181 for CVE-2020-25673", "url": "https://bugzilla.suse.com/1178181" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-04-21T12:30:05Z", "details": "important" } ], "title": "CVE-2020-25673" }, { "cve": "CVE-2020-36310", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36310" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.8. arch/x86/kvm/svm/svm.c allows a set_memory_region_test infinite loop for certain nested page faults, aka CID-e72436bc3a52.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36310", "url": "https://www.suse.com/security/cve/CVE-2020-36310" }, { "category": "external", "summary": "SUSE Bug 1184512 for CVE-2020-36310", "url": "https://bugzilla.suse.com/1184512" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-04-21T12:30:05Z", "details": "moderate" } ], "title": "CVE-2020-36310" }, { "cve": "CVE-2020-36311", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36311" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.9. arch/x86/kvm/svm/sev.c allows attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions), aka CID-7be74942f184.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36311", "url": "https://www.suse.com/security/cve/CVE-2020-36311" }, { "category": "external", "summary": "SUSE Bug 1184511 for CVE-2020-36311", "url": "https://bugzilla.suse.com/1184511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-04-21T12:30:05Z", "details": "moderate" } ], "title": "CVE-2020-36311" }, { "cve": "CVE-2020-36312", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36312" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.8.10. virt/kvm/kvm_main.c has a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure, aka CID-f65886606c2d.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36312", "url": "https://www.suse.com/security/cve/CVE-2020-36312" }, { "category": "external", "summary": "SUSE Bug 1184509 for CVE-2020-36312", "url": "https://bugzilla.suse.com/1184509" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-04-21T12:30:05Z", "details": "low" } ], "title": "CVE-2020-36312" }, { "cve": "CVE-2021-28950", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28950" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/fuse/fuse_i.h in the Linux kernel before 5.11.8. A \"stall on CPU\" can occur because a retry loop continually finds the same bad inode, aka CID-775c5033a0d1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28950", "url": "https://www.suse.com/security/cve/CVE-2021-28950" }, { "category": "external", "summary": "SUSE Bug 1184194 for CVE-2021-28950", "url": "https://bugzilla.suse.com/1184194" }, { "category": "external", "summary": "SUSE Bug 1184211 for CVE-2021-28950", "url": "https://bugzilla.suse.com/1184211" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-04-21T12:30:05Z", "details": "moderate" } ], "title": "CVE-2021-28950" }, { "cve": "CVE-2021-29154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-29154" } ], "notes": [ { "category": "general", "text": "BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-29154", "url": "https://www.suse.com/security/cve/CVE-2021-29154" }, { "category": "external", "summary": "SUSE Bug 1184391 for CVE-2021-29154", "url": "https://bugzilla.suse.com/1184391" }, { "category": "external", "summary": "SUSE Bug 1184710 for CVE-2021-29154", "url": "https://bugzilla.suse.com/1184710" }, { "category": "external", "summary": "SUSE Bug 1186408 for CVE-2021-29154", "url": "https://bugzilla.suse.com/1186408" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-04-21T12:30:05Z", "details": "important" } ], "title": "CVE-2021-29154" }, { "cve": "CVE-2021-30002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30002" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments, aka CID-fb18802a338b.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30002", "url": "https://www.suse.com/security/cve/CVE-2021-30002" }, { "category": "external", "summary": "SUSE Bug 1184120 for CVE-2021-30002", "url": "https://bugzilla.suse.com/1184120" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-04-21T12:30:05Z", "details": "moderate" } ], "title": "CVE-2021-30002" }, { "cve": "CVE-2021-3483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3483" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3483", "url": "https://www.suse.com/security/cve/CVE-2021-3483" }, { "category": "external", "summary": "SUSE Bug 1184393 for CVE-2021-3483", "url": "https://bugzilla.suse.com/1184393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-04-21T12:30:05Z", "details": "moderate" } ], "title": "CVE-2021-3483" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…