8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
7.9 High
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:M/Au:N/C:C/I:C/A:C
An update that solves 43 vulnerabilities, contains one
feature and has 26 fixes is now available.
Description:
The SUSE Linux Enterprise 15 SP1 LTSS kernel was updated to receive
various security and bugfixes.
The following security bugs were fixed:
Unprivileged BPF has been disabled by default to reduce attack surface
as too many security issues have happened in the past (jsc#SLE-22573)
You can reenable via systemctl setting
/proc/sys/kernel/unprivileged_bpf_disabled to 0.
(kernel.unprivileged_bpf_disabled = 0)
CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible
out of bounds read due to a use after free. This could lead to local
escalation of privilege with System execution privileges needed. User
interaction is not needed for exploitation (bnc#1192045).
CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in
list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module
in the Linux kernel A bound check failure allowed an attacker with
special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds
memory leading to a system crash or a leak of internal kernel
information. The highest threat from this vulnerability is to system
availability (bnc#1192781).
CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less
predictive to avoid information leaks about UDP ports in use.
(bsc#1191790)
CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device
fails (bsc#1191961).
CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c in the
Linux kernel calls unregister_netdev without checking for the
NETREG_REGISTERED state, leading to a use-after-free and a double free
(bnc#1188601).
CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
CVE-2021-3655: Missing size validations on inbound SCTP packets may have
allowed the kernel to read uninitialized memory (bnc#1188563).
CVE-2021-33033: The Linux kernel has a use-after-free in cipso_v4_genopt
in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for
the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to
writing an arbitrary value (bnc#1186109 bnc#1186390 bnc#1188876).
CVE-2021-3760: Fixed a use-after-free vulnerability with the
ndev->rf_conn_info object (bsc#1190067).
CVE-2021-42739: The firewire subsystem in the Linux kernel has a buffer
overflow related to drivers/media/firewire/firedtv-avc.c and
drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled
bounds checking (bnc#1184673).
CVE-2021-3542: Fixed heap buffer overflow in firedtv driver
(bsc#1186063).
CVE-2018-13405: The inode_init_owner function in fs/inode.c in the Linux
kernel allowed local users to create files with an unintended group
ownership, in a scenario where a directory is SGID to a certain group
and is writable by a user who is not a member of that group. Here, the
non-member can trigger creation of a plain file whose group ownership is
that group. The intended behavior was that the non-member can trigger
creation of a directory (but not a plain file) whose group ownership is
that group. The non-member can escalate privileges by making the plain
file executable and SGID (bnc#1100416 bnc#1129735).
CVE-2021-3715: Fixed a use-after-free in route4_change() in
net/sched/cls_route.c (bsc#1190349).
CVE-2021-34556: An unprivileged BPF program can obtain sensitive
information from kernel memory via a Speculative Store Bypass
side-channel attack because the protection mechanism neglects the
possibility of uninitialized memory locations on the BPF stack
(bnc#1188983).
CVE-2021-35477: An unprivileged BPF program can obtain sensitive
information from kernel memory via a Speculative Store Bypass
side-channel attack because a certain preempting store operation did not
necessarily occur before a store operation that has an
attacker-controlled value (bnc#1188985).
CVE-2021-42252: An issue was discovered in aspeed_lpc_ctrl_mmap in
drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel Local attackers
able to access the Aspeed LPC control interface could overwrite memory
in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1.
This occurs because a certain comparison uses values that are not memory
sizes (bnc#1190479).
CVE-2021-41864: prealloc_elems_and_freelist in kernel/bpf/stackmap.c in
the Linux kernel allowed unprivileged users to trigger an eBPF
multiplication integer overflow with a resultant out-of-bounds write
(bnc#1191317).
CVE-2021-42008: The decode_data function in drivers/net/hamradio/6pack.c
in the Linux kernel has a slab out-of-bounds write. Input from a process
that has the CAP_NET_ADMIN capability can lead to root access
(bnc#1191315).
CVE-2021-3759: Unaccounted ipc objects could have lead to breaking memcg
limits and DoS attacks (bsc#1190115).
CVE-2020-3702: Specifically timed and handcrafted traffic can cause
internal errors in a WLAN device that lead to improper layer 2 Wi-Fi
encryption with a consequent possibility of information disclosure over
the air for a discrete set of traffic (bnc#1191193).
CVE-2021-3752: Fixed a use after free vulnerability in the bluetooth
module. (bsc#1190023)
CVE-2021-40490: A race condition was discovered in
ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in
the Linux kernel (bnc#1190159 bnc#1192775)
CVE-2021-3744: Fixed a bug which could allows attackers to cause a
denial of service. (bsc#1189884)
CVE-2021-3764: Fixed a bug which could allows attackers to cause a
denial of service. (bsc#1190534)
CVE-2020-12770: An issue was discovered in the Linux kernel sg_write
lacks an sg_remove_request call in a certain failure case, aka
CID-83c6f2390040 (bnc#1171420).
CVE-2021-3640: Fixed a Use-After-Free vulnerability in function
sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
CVE-2019-3900: An infinite loop issue was found in the vhost_net kernel
module, while handling incoming packets in handle_rx(). It could occur
if one end sends packets faster than the other end can process them. A
guest user, maybe remote one, could use this flaw to stall the vhost_net
kernel thread, resulting in a DoS scenario (bnc#1133374).
CVE-2019-3874: The SCTP socket buffer used by a userspace application is
not accounted by the cgroups subsystem. An attacker can use this flaw to
cause a denial of service attack. (bnc#1129898).
CVE-2018-9517: In pppol2tp_connect, there is possible memory corruption
due to a use after free. This could lead to local escalation of
privilege with System execution privileges needed. User interaction is
not needed for exploitation. (bnc#1108488).
CVE-2021-38160: Data corruption or loss could be triggered by an
untrusted device that supplies a buf->len value exceeding the buffer
size in drivers/char/virtio_console.c (bsc#1190117)
CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling
(bsc#1190025).
CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace
can reveal files (bsc#1189706).
CVE-2021-3653: A flaw was found in the KVM’s AMD code for supporting SVM
nested virtualization. The flaw occurs when processing the VMCB (virtual
machine control block) provided by the L1 guest to spawn/handle a nested
guest (L2). Due to improper validation of the “int_ctl” field, this
issue could allow a malicious L1 to enable AVIC support (Advanced
Virtual Interrupt Controller) for the L2 guest. As a result, the L2
guest would be allowed to read/write physical pages of the host,
resulting in a crash of the entire system, leak of sensitive data or
potential guest-to-host escape. This flaw affects Linux kernel versions
prior to 5.14-rc7 (bnc#1189399).
CVE-2021-3656: Missing validation of the the virt_ext
VMCB field and
allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and
VLS for the L2 guest (bsc#1189400).
CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically
proximate attackers to cause a denial of service (use-after-free and
panic) by removing a MAX-3421 USB device in certain situations
(bnc#1189291).
CVE-2021-3679: A lack of CPU resource in the tracing module
functionality was found in the way user uses trace ring buffer in a
specific way. Only privileged local users (with CAP_SYS_ADMIN
capability) could use this flaw to starve the resources causing denial
of service (bnc#1189057).
CVE-2020-4788: IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could
allow a local user to obtain sensitive information from the data in the
L1 cache under extenuating circumstances. IBM X-Force ID: 189296 (bnc#0
bnc#1177666 bnc#1181158).
CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in
net/mac802154/llsec.c (bsc#1188876).
CVE-2020-0429: In l2tp_session_delete and related functions of
l2tp_core.c, there is possible memory corruption due to a use after
free. This could lead to local escalation of privilege with System
execution privileges needed. User interaction is not needed for
exploitation (bnc#1176724).
CVE-2021-37576: arch/powerpc/kvm/book3s_rtas.c on the powerpc platform
allowed KVM guest OS users to cause host OS memory corruption via
rtas_args.nargs, aka CID-f62f3c20647e (bnc#1188838 bnc#1190276).
CVE-2021-22543: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in
KVM can bypass RO checks and can lead to pages being freed while still
accessible by the VMM and guest. This allowed users with the ability to
start and control a VM to read/write random pages of memory and can
result in local privilege escalation (bnc#1186482 bnc#1190276).
CVE-2021-33909: fs/seq_file.c did not properly restrict seq buffer
allocations, leading to an integer overflow, an Out-of-bounds Write, and
escalation to root by an unprivileged user, aka CID-8cae8cd89f05
(bnc#1188062 bnc#1188063).
The following non-security bugs were fixed:
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2021-3876=1
8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
7.9 High
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:M/Au:N/C:C/I:C/A:C