Security update for the Linux Kernel
SUSE Security Update: Security update for the Linux KernelAnnouncement ID: | SUSE-SU-2021:0740-1 |
Rating: | important |
References: | #1065600 #1163592 #1178401 #1178762 #1179014 #1179015 #1179045 #1179082 #1179428 #1179660 #1180058 #1181747 #1181753 #1181843 #1182140 #1182175 |
Cross-References: | CVE-2020-29368 CVE-2020-29374 CVE-2021-26930 CVE-2021-26931 CVE-2021-26932 |
Affected Products: |
|
An update that solves 5 vulnerabilities and has 11 fixes is now available.
Description:
The SUSE Linux Enterprise 15 kernel was updated to receive various
security and bugfixes.
The following security bugs were fixed:
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747). by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).
- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).
The following non-security bugs were fixed:
- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)
- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015).
- rpm/kernel-binary.spec.in: avoid using barewords (bsc#1179014)
- rpm/kernel-binary.spec.in: avoid using more barewords (bsc#1179014) %split_extra still contained two.
- rpm/kernel-binary.spec.in: Fix compressed module handling for in-tree KMP (jsc#SLE-10886) The in-tree KMP that is built with SLE kernels have a different scriptlet that is embedded in kernel-binary.spec.in rather than *.sh files.
- rpm/kernel-binary.spec.in: use grep -E instead of egrep (bsc#1179045) egrep is only a deprecated bash wrapper for "grep -E". So use the latter instead.
- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)
- rpm/kernel-obs-build.spec.in: Add -q option to modprobe calls (bsc#1178401)
- rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).
- rpm/mkspec: do not build kernel-obs-build on x86_32 We want to use 64bit kernel due to various bugs (bsc#1178762 to name one).
- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for SAP 15:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2021-740=1
- SUSE Linux Enterprise Server 15-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-2021-740=1
- SUSE Linux Enterprise Module for Live Patching 15:
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-2021-740=1
- SUSE Linux Enterprise High Performance Computing 15-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2021-740=1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2021-740=1
- SUSE Linux Enterprise High Availability 15:
zypper in -t patch SUSE-SLE-Product-HA-15-2021-740=1
Package List:
- SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
- kernel-default-4.12.14-150.69.1
- kernel-default-base-4.12.14-150.69.1
- kernel-default-debuginfo-4.12.14-150.69.1
- kernel-default-debugsource-4.12.14-150.69.1
- kernel-default-devel-4.12.14-150.69.1
- kernel-default-devel-debuginfo-4.12.14-150.69.1
- kernel-obs-build-4.12.14-150.69.1
- kernel-obs-build-debugsource-4.12.14-150.69.1
- kernel-syms-4.12.14-150.69.1
- kernel-vanilla-base-4.12.14-150.69.1
- kernel-vanilla-base-debuginfo-4.12.14-150.69.1
- kernel-vanilla-debuginfo-4.12.14-150.69.1
- kernel-vanilla-debugsource-4.12.14-150.69.1
- reiserfs-kmp-default-4.12.14-150.69.1
- reiserfs-kmp-default-debuginfo-4.12.14-150.69.1
- SUSE Linux Enterprise Server for SAP 15 (noarch):
- kernel-devel-4.12.14-150.69.1
- kernel-docs-4.12.14-150.69.1
- kernel-macros-4.12.14-150.69.1
- kernel-source-4.12.14-150.69.1
- SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
- kernel-default-4.12.14-150.69.1
- kernel-default-base-4.12.14-150.69.1
- kernel-default-debuginfo-4.12.14-150.69.1
- kernel-default-debugsource-4.12.14-150.69.1
- kernel-default-devel-4.12.14-150.69.1
- kernel-default-devel-debuginfo-4.12.14-150.69.1
- kernel-obs-build-4.12.14-150.69.1
- kernel-obs-build-debugsource-4.12.14-150.69.1
- kernel-syms-4.12.14-150.69.1
- kernel-vanilla-base-4.12.14-150.69.1
- kernel-vanilla-base-debuginfo-4.12.14-150.69.1
- kernel-vanilla-debuginfo-4.12.14-150.69.1
- kernel-vanilla-debugsource-4.12.14-150.69.1
- reiserfs-kmp-default-4.12.14-150.69.1
- reiserfs-kmp-default-debuginfo-4.12.14-150.69.1
- SUSE Linux Enterprise Server 15-LTSS (noarch):
- kernel-devel-4.12.14-150.69.1
- kernel-docs-4.12.14-150.69.1
- kernel-macros-4.12.14-150.69.1
- kernel-source-4.12.14-150.69.1
- SUSE Linux Enterprise Server 15-LTSS (s390x):
- kernel-default-man-4.12.14-150.69.1
- kernel-zfcpdump-debuginfo-4.12.14-150.69.1
- kernel-zfcpdump-debugsource-4.12.14-150.69.1
- SUSE Linux Enterprise Module for Live Patching 15 (ppc64le x86_64):
- kernel-default-debuginfo-4.12.14-150.69.1
- kernel-default-debugsource-4.12.14-150.69.1
- kernel-default-livepatch-4.12.14-150.69.1
- kernel-livepatch-4_12_14-150_69-default-1-1.3.1
- kernel-livepatch-4_12_14-150_69-default-debuginfo-1-1.3.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
- kernel-default-4.12.14-150.69.1
- kernel-default-base-4.12.14-150.69.1
- kernel-default-debuginfo-4.12.14-150.69.1
- kernel-default-debugsource-4.12.14-150.69.1
- kernel-default-devel-4.12.14-150.69.1
- kernel-default-devel-debuginfo-4.12.14-150.69.1
- kernel-obs-build-4.12.14-150.69.1
- kernel-obs-build-debugsource-4.12.14-150.69.1
- kernel-syms-4.12.14-150.69.1
- kernel-vanilla-base-4.12.14-150.69.1
- kernel-vanilla-base-debuginfo-4.12.14-150.69.1
- kernel-vanilla-debuginfo-4.12.14-150.69.1
- kernel-vanilla-debugsource-4.12.14-150.69.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (noarch):
- kernel-devel-4.12.14-150.69.1
- kernel-docs-4.12.14-150.69.1
- kernel-macros-4.12.14-150.69.1
- kernel-source-4.12.14-150.69.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
- kernel-default-4.12.14-150.69.1
- kernel-default-base-4.12.14-150.69.1
- kernel-default-debuginfo-4.12.14-150.69.1
- kernel-default-debugsource-4.12.14-150.69.1
- kernel-default-devel-4.12.14-150.69.1
- kernel-default-devel-debuginfo-4.12.14-150.69.1
- kernel-obs-build-4.12.14-150.69.1
- kernel-obs-build-debugsource-4.12.14-150.69.1
- kernel-syms-4.12.14-150.69.1
- kernel-vanilla-base-4.12.14-150.69.1
- kernel-vanilla-base-debuginfo-4.12.14-150.69.1
- kernel-vanilla-debuginfo-4.12.14-150.69.1
- kernel-vanilla-debugsource-4.12.14-150.69.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (noarch):
- kernel-devel-4.12.14-150.69.1
- kernel-docs-4.12.14-150.69.1
- kernel-macros-4.12.14-150.69.1
- kernel-source-4.12.14-150.69.1
- SUSE Linux Enterprise High Availability 15 (aarch64 ppc64le s390x x86_64):
- cluster-md-kmp-default-4.12.14-150.69.1
- cluster-md-kmp-default-debuginfo-4.12.14-150.69.1
- dlm-kmp-default-4.12.14-150.69.1
- dlm-kmp-default-debuginfo-4.12.14-150.69.1
- gfs2-kmp-default-4.12.14-150.69.1
- gfs2-kmp-default-debuginfo-4.12.14-150.69.1
- kernel-default-debuginfo-4.12.14-150.69.1
- kernel-default-debugsource-4.12.14-150.69.1
- ocfs2-kmp-default-4.12.14-150.69.1
- ocfs2-kmp-default-debuginfo-4.12.14-150.69.1
References:
- https://www.suse.com/security/cve/CVE-2020-29368.html
- https://www.suse.com/security/cve/CVE-2020-29374.html
- https://www.suse.com/security/cve/CVE-2021-26930.html
- https://www.suse.com/security/cve/CVE-2021-26931.html
- https://www.suse.com/security/cve/CVE-2021-26932.html
- https://bugzilla.suse.com/1065600
- https://bugzilla.suse.com/1163592
- https://bugzilla.suse.com/1178401
- https://bugzilla.suse.com/1178762
- https://bugzilla.suse.com/1179014
- https://bugzilla.suse.com/1179015
- https://bugzilla.suse.com/1179045
- https://bugzilla.suse.com/1179082
- https://bugzilla.suse.com/1179428
- https://bugzilla.suse.com/1179660
- https://bugzilla.suse.com/1180058
- https://bugzilla.suse.com/1181747
- https://bugzilla.suse.com/1181753
- https://bugzilla.suse.com/1181843
- https://bugzilla.suse.com/1182140
- https://bugzilla.suse.com/1182175