Hírolvasó

ECHO Network · 2021. április 16.

Privacy may be dead, but it can also be the catalyst for real change

Data has become the most valuable commodity and today, most organizations know more about an individual than ever before. Unfortunately, our information it not being handled appropriately given the number of data breaches we see in the news. In fact, in 2020, it was reported that there were 37....
ECHO Network · 2021. április 16.

Trickbot Actors Target Slack and BaseCamp Users

via infosecurity-magazine.com Trickbot Actors Target Slack and BaseCamp UsersThe threat actors behind the infamous Trickbot botnet have been at work again, firing highly customized phishing emails targeting Slack and BaseCamp users with loader malware, according to Sophos.
ECHO Network · 2021. április 16.

Facebook Expands Oversight Board Scope | Avast

16 April 2021. Plus, WhatsApp and Clubhouse face privacy issues and the FBI protects unsuspecting users by...hacking them? Facebook made an announcement this week that it has expanded the scope of its Oversight Board to include appeals against content that has been left up on either Instagram or Facebook after someone had reported it.
ECHO Network · 2021. április 16.

[webapps] GetSimple CMS My SMTP Contact Plugin 1.1.1 - CSRF to RCE

# Exploit Title: GetSimple CMS My SMTP Contact Plugin 1.1.1 - CSRF to RCE # Exploit Author: Bobby Cooke (boku) # Date: 15/04/2021 # Vendor Homepage: http://get-simple.info # Software Link: http://get-simple.info/extend/download.php?file=files/18274/1221/my-smtp-contact_1.1.1.zip&id=1221 # Vendor: NetExplorer # Version: <= v1.
ECHO Network · 2021. április 16.

Critical Microsoft Exchange Server Vulnerabilities Could Allow Hackers to Control of Enterprise Networks

In a daily routine check-up, the cybersecurity experts of the U.S. National Security Agency have detected two critical Microsoft Exchange Server vulnerabilities. After detecting the vulnerabilities, the analysts asserted that these two vulnerabilities could enable the threat actors to persistently access and control business networks.
ECHO Network · 2021. április 16.

NA - CVE-2021-31414 - The unofficial vscode-rpm-spec extension before...

This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary The unofficial vscode-rpm-spec extension before 0.3.2 for Visual Studio Code allows remote code execution via a crafted workspace configuration.
SANS · 2021. április 16.

HTTPS Support for All Internal Services, (Fri, Apr 16th)

SSL/TLS has been on stage for a while with deprecated protocols[1], free certificates for everybody[2]. The landscape is changing to force more and more people to switch to encrypted communications and this is good! Like Johannes explained yesterday[3], Chrome 90 will now append "https://" by default in the navigation bar. Yesterday diary covered the deployment of your own internal CA to generate certificates and switch everything to secure communications. This is a good point. Especially, by deploying your own root CA, you will add an extra  string to your securitybow: SSL interception and inspection.

But sometimes, you could face other issues:

  • If you have guests on your network, they won't have the root CA installed and will receive annoying messages
  • If you have very old devices or "closed" devices (like all kind of IoT gadgets), it could be difficult to switch them to HTTPS.

On my network, I'm still using Let's Encrypt but to generate certificates for internal hostname. To bypass the reconfiguration of "old devices", I'm concentrating all the traffic behind a Traefik[4] reverse-proxy. Here is my setup:

My IoT devices and facilities (printers, cameras, lights) are connected to a dedicated VLAN with restricted capabilities. As you can see, URLs to access them can be on top of HTTP, HTTPS, use standard ports or exotic ports. A Traefik reverse-proxy is installed on the IoT VLAN and accessible from clients only through TCP/443. Access to the "services" is provided through easy to remember URLs (https://service-a.internal.mydomain.be, etc).

From an HTTP point of view, Traefik is deployed in a standard way (in a Docker in my case). The following configuration is added to let it handle the certificates:

# Enable ACME certificatesResolvers: le: acme: email: xavier@<redacted>.be storage: /etc/traefik/acme.json dnsChallenge: provider: ovh delayBeforeCheck: 10 resolvers: - "8.8.8.8:53" - "8.8.4.4:53"

There is one major requirement for this setup: You need to use a valid domain name (read: a publicly registered domain) to generate internal URL (in my case, "mydomain.be") and the domain must be hosted at a provider that provides an API to manage the DNS zone (in my case, OVH). This is required by the DNS authentication mechanism that we will use. Every new certificate generation will requite a specific DNS record to be created through the API:

_acme-challenge.service-a.internal.mydomain.be

The subdomain is your preferred choice ("internal", "dmz", ...), be imaginative!

For all services running in Docker containers, Traefik is able to detect them and generate certificates on the fly. For other services like IoT devices, you just create a new config in Traefik, per service:

http: services: service_cam1: loadBalancer: servers: - url: "https://172.16.0.155:8443/" routers: router_cam1: rule: Host("cam1.internal.mydomain.be") entryPoints: [ "websecure" ] service: service_cam1 tls: certResolver: le

You can instruct Traefik to monitor new configuration files and automatically load them:

# Enable automatic reload of the config providers: file: directory: /etc/traefik/hosts/ watch: true

Now you are ready to deploy all your HTTPS internal URL and map them to your gadgets!

Of course, you have to maintain an internal DNS zone with records pointing to your Traefik instance.

Warning: Some services accessed through this kind of setup may require configuration tuning. By example, search for parameters like "base URL" and changed to reflex the URL that you're using with Traefik. More details about ACME support is available here[5] (with a list of all supported DNS providers).

[1] https://isc.sans.edu/forums/diary/Old+TLS+versions+gone+but+not+forgotten+well+not+really+gone+either/27260
[2] https://letsencrypt.org
[3] https://isc.sans.edu/forums/diary/Why+and+How+You+Should+be+Using+an+Internal+Certificate+Authority/27314/
[4] https://traefik.io
[5] https://doc.traefik.io/traefik/https/acme/

Xavier Mertens (@xme)
Senior ISC Handler - Freelance Cyber Security Consultant
PGP Key

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
ECHO Network · 2021. április 16.

NA - CVE-2021-21405 - Lotus is an Implementation of the Filecoin...

Lotus is an Implementation of the Filecoin protocol written in Go. BLS signature validation in lotus uses blst library method VerifyCompressed. This method accepts signatures in 2 forms: "serialized", and "compressed", meaning that BLS signatures can be provided as either of 2 unique byte arrays.
ECHO Network · 2021. április 16.

NA - CVE-2021-29430 - Sydent is a reference Matrix identity server....

Sydent is a reference Matrix identity server. Sydent does not limit the size of requests it receives from HTTP clients. A malicious user could send an HTTP request with a very large body, leading to memory exhaustion and denial of service. Sydent also does not limit response size for requests it makes to remote Matrix homeservers.
ECHO Network · 2021. április 16.

NA - CVE-2021-29450 - Wordpress is an open source CMS. One of the...

Wordpress is an open source CMS. One of the blocks in the WordPress editor can be exploited in a way that exposes password-protected posts and pages. This requires at least contributor privileges. This has been patched in WordPress 5.7.1, along with the older affected versions via minor releases.
NVD: all CVE · 2021. április 16.

CVE-2021-31414

The unofficial vscode-rpm-spec extension before 0.3.2 for Visual Studio Code allows remote code execution via a crafted workspace configuration.
NVD: all CVE · 2021. április 16.

CVE-2021-26073

Broken Authentication in Atlassian Connect Express (ACE) from version 3.0.2 before version 6.6.0: Atlassian Connect Express is a Node.js package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Express app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Express versions between 3.0.2 - 6.5.0 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app.
NVD: all CVE · 2021. április 16.

CVE-2021-26074

Broken Authentication in Atlassian Connect Spring Boot (ACSB) from version 1.1.0 before version 2.1.3: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions between 1.1.0 - 2.1.2 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app.
AusCERT - Security Bulletins · 2021. április 16.

ESB-2021.1302 - [Win][UNIX/Linux] WordPress: Access confidential data - Unknown/unspecified

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.1302 WordPress 5.7.1 Security and Maintenance Release 16 April 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: WordPress Publisher: WordPress Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Access Confidential Data -- Unknown/Unspecified Reduced Security -- Unknown/Unspecified Resolution: Patch/Upgrade Original Bulletin: https://wordpress.org/news/2021/04/wordpress-5-7-1-security-and-maintenance-release/ - --------------------------BEGIN INCLUDED TEXT-------------------- WordPress 5.7.1 Security and Maintenance Release Posted April 15, 2021 by Peter Wilson . Filed under Releases , Security . WordPress 5.7.1 is now available! This security and maintenance release features 26 bug fixes in addition to two security fixes. Because this is a security release , it is recommended that you update your sites immediately. All versions since WordPress 4.7 have also been updated. WordPress 5.7.1 is a short-cycle security and maintenance release. The next major release will be version 5.8. You can download WordPress 5.7.1 by downloading from WordPress.org, or visit your Dashboard -> Updates and click Update Now. If you have sites that support automatic background updates, they've already started the update process. Security Updates Two security issues affect WordPress versions between 4.7 and 5.7. If you haven't yet updated to 5.7, all WordPress versions since 4.7 have also been updated to fix the following security issues: o Thank you SonarSource for reporting an XXE vulnerability within the media library affecting PHP 8. o Thanks Mikael Korpela for reporting a data exposure vulnerability within the REST API. Thank you to all of the reporters for privately disclosing the vulnerabilities . This gave the security team time to fix the vulnerabilities before WordPress sites could be attacked. Props to Adam Zielinski , Pascal Birchler , Peter Wilson , Juliette Reinders Folmer , Alex Concha , Ehtisham Siddiqui , Timothy Jacobs and the WordPress security team for their work on these issues. For more information, browse the full list of changes on Trac, or check out the version 5.7.1 HelpHub documentation page . Thanks and props! The 5.7.1 release was led by @peterwilsoncc and @audrasjb . In addition to the security researchers and release squad members mentioned above, thank you to everyone who helped make WordPress 5.7.1 happen: 99w , Adam Silverstein , Andrew Ozz , annalamprou , anotherdave , Ari Stathopoulos , Ayesh Karunaratne , bobbingwide , Brecht , Daniel Richards , David Baumwald , dkoo , Dominik Schilling , dragongate , eatsleepcode , Ella van Durpe , Erik , Fabian Pimminger , Felix Arntz , Florian TIAR , gab81 , Gal Baras , Geoffrey , George Mamadashvili , Glen Davies , Greg Ziolkowski , grzim , Ipstenu (Mika Epstein) , Jake Spurlock , Jayman Pandya , Jb Audras , Joen A. , Johan Jonk Stenstrom , Johannes Kinast , John Blackbourn , John James Jacoby , Jonathan Desrosiers , Josee Wouters , Joy , k3nsai , Kelly Choyce-Dwan , Kerry Liu , Marius L. J. , Mel Choyce-Dwan , Mikhail Kobzarev , mmuyskens , Mukesh Panchal , nicegamer7 , Otshelnik-Fm , Paal Joachim Romdahl , palmiak , Pascal Birchler , Peter Wilson , pwallner , Rachel Baker , Riad Benguella , Rinat Khaziev , Robert Anderson , Roger Theriault , Sergey Biryukov , Sergey Yakimov , SirStuey , stefanjoebstl , Stephen Bernhardt , Sumit Singh , Sybre Waaijer , Synchro , Terri Ann , tigertech , Timothy Jacobs , tmatsuur , TobiasBg , Tonya Mork , Toru Miki , Ulrich , and Vlad T . - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYHkoG+NLKJtyKPYoAQgWug//XDcyKlxWoMQpW1VS7GBXb3qrC3h1ZpND wgq4/qJW6slY78xwvFfn3MU4kJJcWTGbNDV8DsWOXVIKY4gXW9Q5XH80le9Q0ox0 NoQa8DUlpG3TUVq9nVQ82aYMj7D40jSaIbSBiFwYqRO9wDpR0TvAyApAR6nu/DKC jr198TVkyqPDAlJ004yZEb9YejkwhfxmtgnslYMmm7tA+/OBc3NAp/vkwNgHfg1j 1A0dcnUqn3EUfiKWSEzvUl18PCtt1FQ4Dy1gEzULg1jQr0Fy4kqdOFv3xfooDWni m8Ss7LndaP3RTpmSKSNORCUkaPrdIyHOSHstBpA0rquWe1TwqQ0OGkHVqTD5YYfJ 21hDRKt3qz5Ldzn00lbMnAdAXDEnoWset9vfiSJOQih0LJuOmAofVkHDgmleVCUl TzWNRzR1URjFs0R7Xko6Zw4GMXZzNOgElDw/yraHW8HnZznh9mSBcNmJCx8g2nIq kRmAtDtOn+CSHPNYkZsySXnIhjv8t2vdX8AWWrDlsEZtZqmF1vmhjSw7WM936JZ9 pLOwgKnmlTsy3Yfcis0iYoASnj/dtZQbTZ7R5JFOH5TotxXpz5xRAZ9iIDfG1Uyk Eb+tUJ2lizwWLTaxKTmrE4lWg7whTyoW6ZOS4T1VIczJkHx6xMgkUYzoF7Tw3TvM Rk0I8iVR2hQ= =4li2 -----END PGP SIGNATURE-----
AusCERT - Security Bulletins · 2021. április 16.

ESB-2021.1301 - [Appliance] F5 Products: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.1301 Multiple NSS vulnerabilities CVE-2020-6829, CVE-2020-12400, CVE-2020-12401, and CVE-2020-12402 16 April 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: F5OS Traffix SDC Publisher: F5 Networks Operating System: Network Appliance Impact/Access: Access Confidential Data -- Remote with User Interaction Denial of Service -- Remote with User Interaction Resolution: None CVE Names: CVE-2020-12403 CVE-2020-12402 CVE-2020-12401 CVE-2020-12400 CVE-2020-6829 Reference: ESB-2021.0986 ESB-2020.3355 Original Bulletin: https://support.f5.com/csp/article/K61267093 https://support.f5.com/csp/article/K13290208 Comment: This bulletin contains two (2) F5 Networks security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- K61267093: Multiple NSS vulnerabilities CVE-2020-6829, CVE-2020-12400, CVE-2020-12401, and CVE-2020-12402 Original Publication Date: 16 Apr, 2021 Security Advisory Description o CVE-2020-6829 When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80. o CVE-2020-12400 When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80. o CVE-2020-12401 During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80. o CVE-2020-12402 During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78. Impact CVE-2020-6829, CVE-2020-12400, and CVE-2020-12401 Given a small number of ECDSA signatures, this information can be used to steal the private key. The highest threat from this vulnerability is to data confidentiality. CVE-2020-12402 An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. The highest threat to this flaw is to confidentiality. Security Advisory Status F5 Product Development has assigned ID 1004309 (F5OS) and ID SDC-1054 (Traffix) to this vulnerability. To determine if your product and version have been evaluated for this vulnerability, refer to the Applies to (see versions) box. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases, point releases, or hotfixes that address the vulnerability, refer to the following table. For more information about security advisory versioning, refer to K51812227: Understanding security advisory versioning. Note: After a fix is introduced for a given minor branch, that fix applies to all subsequent maintenance and point releases for that branch, and no additional fixes for that branch will be listed in the table. For example, when a fix is introduced in 14.1.2.3, the fix also applies to 14.1.2.4, and all later 14.1.x releases (14.1.3.x., 14.1.4.x). For more information, refer to K51812227: Understanding security advisory versioning. Additionally, software versions preceding those listed in the following table have reached the End of Technical Support (EoTS) phase of their lifecycle and are no longer evaluated for security issues. For more information, refer to the Security hotfixes section of K4602: Overview of the F5 security vulnerability response policy. +------------+------+--------------+----------+----------+------+-------------+ | | |Versions known|Fixes | |CVSSv3|Vulnerable | |Product |Branch|to be |introduced|Severity |score^|component or | | | |vulnerable^1 |in | |2 |feature | +------------+------+--------------+----------+----------+------+-------------+ | |16.x |None |Not | | | | | | | |applicable| | | | | +------+--------------+----------+ | | | | |15.x |None |Not | | | | | | | |applicable| | | | | +------+--------------+----------+ | | | | |14.x |None |Not | | | | |BIG-IP (all | | |applicable|Not | | | |modules) +------+--------------+----------+vulnerable|None |None | | |13.x |None |Not | | | | | | | |applicable| | | | | +------+--------------+----------+ | | | | |12.x |None |Not | | | | | | | |applicable| | | | | +------+--------------+----------+ | | | | |11.x |None |Not | | | | | | | |applicable| | | | +------------+------+--------------+----------+----------+------+-------------+ | |8.x |None |Not | | | | | | | |applicable| | | | |BIG-IQ +------+--------------+----------+ | | | |Centralized |7.x |None |Not |Not |None |None | |Management | | |applicable|vulnerable| | | | +------+--------------+----------+ | | | | |6.x |None |Not | | | | | | | |applicable| | | | +------------+------+--------------+----------+----------+------+-------------+ |F5OS |1.x |1.1.0 |None |Medium |4.4 |NSS | +------------+------+--------------+----------+----------+------+-------------+ |Traffix SDC |5.x |5.1.0 |None |Medium |4.4 |NSS | +------------+------+--------------+----------+----------+------+-------------+ ^1F5 evaluates only software versions that have not yet reached the End of Technical Support (EoTS) phase of their lifecycle. ^2The CVSSv3 score link takes you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge. Recommended Actions If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by installing a version listed in the Fixes introduced in column. If the Fixes introduced in column does not list a version for your branch, then no update candidate currently exists for that branch and F5 recommends upgrading to a version with the fix (refer to the table). If the Fixes introduced in column lists a version prior to the one you are running, in the same branch, then your version should have the fix. Mitigation None Supplemental Information o K41942608: Overview of security advisory articles o K4602: Overview of the F5 security vulnerability response policy o K4918: Overview of the F5 critical issue hotfix policy o K8986: F5 software lifecycle policy o K9502: BIG-IP hotfix and point release matrix o K13123: Managing BIG-IP product hotfixes (11.x - 16.x) o K167: Downloading software and firmware from F5 o K9970: Subscribing to email notifications regarding F5 products o K9957: Creating a custom RSS feed to view new and updated documents - -------------------------------------------------------------------------------- K13290208: NSS vulnerability CVE-2020-12403 Original Publication Date: 16 Apr, 2021 Security Advisory Description A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability. (CVE-2020-12403) Impact The highest threat from this vulnerability is to confidentiality and system availability. Security Advisory Status F5 Product Development has assigned ID 1004309 (F5OS) and ID SDC-1054 (Traffix) to this vulnerability. To determine if your product and version have been evaluated for this vulnerability, refer to the Applies to (see versions) box. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases, point releases, or hotfixes that address the vulnerability, refer to the following table. For more information about security advisory versioning, refer to K51812227: Understanding security advisory versioning. Note: After a fix is introduced for a given minor branch, that fix applies to all subsequent maintenance and point releases for that branch, and no additional fixes for that branch will be listed in the table. For example, when a fix is introduced in 14.1.2.3, the fix also applies to 14.1.2.4, and all later 14.1.x releases (14.1.3.x., 14.1.4.x). For more information, refer to K51812227: Understanding security advisory versioning. Additionally, software versions preceding those listed in the following table have reached the End of Technical Support (EoTS) phase of their lifecycle and are no longer evaluated for security issues. For more information, refer to the Security hotfixes section of K4602: Overview of the F5 security vulnerability response policy. +------------+------+--------------+----------+----------+------+-------------+ | | |Versions known|Fixes | |CVSSv3|Vulnerable | |Product |Branch|to be |introduced|Severity |score^|component or | | | |vulnerable^1 |in | |2 |feature | +------------+------+--------------+----------+----------+------+-------------+ | |16.x |None |Not | | | | | | | |applicable| | | | | +------+--------------+----------+ | | | | |15.x |None |Not | | | | | | | |applicable| | | | | +------+--------------+----------+ | | | | |14.x |None |Not | | | | |BIG-IP (all | | |applicable|Not | | | |modules) +------+--------------+----------+vulnerable|None |None | | |13.x |None |Not | | | | | | | |applicable| | | | | +------+--------------+----------+ | | | | |12.x |None |Not | | | | | | | |applicable| | | | | +------+--------------+----------+ | | | | |11.x |None |Not | | | | | | | |applicable| | | | +------------+------+--------------+----------+----------+------+-------------+ | |8.x |None |Not | | | | | | | |applicable| | | | |BIG-IQ +------+--------------+----------+ | | | |Centralized |7.x |None |Not |Not |None |None | |Management | | |applicable|vulnerable| | | | +------+--------------+----------+ | | | | |6.x |None |Not | | | | | | | |applicable| | | | +------------+------+--------------+----------+----------+------+-------------+ |F5OS |1.x |1.1.0 |None |High |6.8 |NSS | +------------+------+--------------+----------+----------+------+-------------+ |Traffix SDC |5.x |5.1.0 |None |High |6.8 |NSS | +------------+------+--------------+----------+----------+------+-------------+ ^1F5 evaluates only software versions that have not yet reached the End of Technical Support (EoTS) phase of their lifecycle. ^2The CVSSv3 score link takes you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge. Recommended Actions If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by installing a version listed in the Fixes introduced in column. If the Fixes introduced in column does not list a version for your branch, then no update candidate currently exists for that branch and F5 recommends upgrading to a version with the fix (refer to the table). If the Fixes introduced in column lists a version prior to the one you are running, in the same branch, then your version should have the fix. Mitigation None Supplemental Information o K41942608: Overview of security advisory articles o K4602: Overview of the F5 security vulnerability response policy o K4918: Overview of the F5 critical issue hotfix policy o K8986: F5 software lifecycle policy o K9502: BIG-IP hotfix and point release matrix o K13123: Managing BIG-IP product hotfixes (11.x - 16.x) o K167: Downloading software and firmware from F5 o K9970: Subscribing to email notifications regarding F5 products o K9957: Creating a custom RSS feed to view new and updated documents - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYHkoBONLKJtyKPYoAQifcA//UBmWpNexkV9/+BekJr4fqsRmO8alE8T8 B8B2BSYQUHEXSxIvkfRtcPYTBBJIu4aG8zPxdWPvAk8HOWYr5IRGZzLKorXZSqu4 8Y04DGfpt1wEyX6Yp0dd8SbR/q9/mcObv4qsBu/2/qDHpBbDgTKlVOZpH3mNgGzr bKNWSxnvv0TO3bHzLx2jEYhUye9Ptysyn2TWVi3Sn9vergYFUYH22Z69TttH+no5 6dWpuXDZP1YKGRsSiOOuOoNFQgLoI73OSpJUAxpW481Xp/o+pJeyym6ogA0HkKNy 3NuB5G3Aj3lm3v2YSTaB2PotvScv3w5Dh9hzZPTixpB6pLfuX+cmvEGzBbRz6CFB CcEMuIj+CtAyYDUBRLT6okA5Rb7sKrVZrPPZv3jMNy0P2ozvvdoW7/gNyAZxXERm wrxD3HaCLd9O2VUqOKtfMLY39/BfznjQfjdsgnO3mqIO7RG9wVKNLP1oteEaBzLK skxrGk2OkKvlo/VWfMfRnqUxpATo9eK1/ABeCse4O+yB7lEQd6zuPnLXY9tu0r4W uq63mz7oN09zEglPwcQ2agxuaZRhdl6mocamMQ4HjRwhyKtnP4c4hjbK7T+0i5h/ JSn+Y0K2xd6/0PR2uymrDoK/r7eg0ky7h+ojtEiiY83QEVHGsjgPUghkNr1XpDas YFXs1urN2+o= =NDm/ -----END PGP SIGNATURE-----
ECHO Network · 2021. április 16.

FoundCore: Evasive Malware Used by Chinese Hackers for Cyber Espionage

Security experts from Kaspersky Lab have uncovered a long-lasting cyber espionage operation launched by a Chinese nation-backed actor to target government and military institutions across Vietnam. The hacker group, known as Cycldek, APT27, GoblinPanda, and LuckyMouse, relied on a brand-new and....
AusCERT - Security Bulletins · 2021. április 16.

ESB-2021.1300 - [Ubuntu] Linux kernel and Linux kernel (OEM): Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.1300 USN-4915-1: Linux kernel (OEM) vulnerabilities 16 April 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux kernel Linux kernel (OEM) Publisher: Ubuntu Operating System: Ubuntu Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Increased Privileges -- Existing Account Denial of Service -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-29154 CVE-2021-3493 CVE-2021-3492 Reference: ESB-2021.1251 Original Bulletin: https://ubuntu.com/security/notices/USN-4915-1 https://ubuntu.com/security/notices/USN-4916-1 https://ubuntu.com/security/notices/USN-4917-1 Comment: This bulletin contains three (3) Ubuntu security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- USN-4915-1: Linux kernel (OEM) vulnerabilities 15 April 2021 Several security issues were fixed in the Linux kernel. Releases o Ubuntu 20.04 LTS Packages o linux-oem-5.6 - Linux kernel for OEM systems Details It was discovered that the overlayfs implementation in the Linux kernel did not properly validate the application of file system capabilities with respect to user namespaces. A local attacker could use this to gain elevated privileges. ( CVE-2021-3493 ) Vincent Dehors discovered that the shiftfs file system in the Ubuntu Linux kernel did not properly handle faults in copy_from_user() when passing through ioctls to an underlying file system. A local attacker could use this to cause a denial of service (memory exhaustion) or execute arbitrary code. ( CVE-2021-3492 ) Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 o linux-image-oem-20.04 - 5.6.0.1054.50 o linux-image-5.6.0-1054-oem - 5.6.0-1054.58 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References o CVE-2021-3493 o CVE-2021-3492 Related notices o USN-4916-1 : linux-image-gcp-lts-18.04, linux-image-powerpc64-smp, linux-image-azure, linux-image-4.4.0-209-lowlatency, linux-image-4.4.0-209-powerpc64-emb, linux-dell300x, linux-image-oem, linux-image-lowlatency, linux-image-4.15.0-1090-kvm, linux-image-4.15.0-142-generic-lpae, linux-image-gcp, linux-image-4.4.0-209-powerpc64-smp, linux-image-oracle, linux-image-aws-lts-18.04, linux-image-aws-hwe, linux-image-powerpc64-emb, linux-azure, linux-image-4.15.0-1113-azure, linux-image-4.4.0-1091-aws, linux-image-4.4.0-1127-aws, linux-image-generic-lpae-lts-xenial, linux-image-4.4.0-1155-snapdragon, linux-image-aws, linux-image-4.15.0-142-lowlatency, linux-image-oracle-lts-18.04, linux-image-generic, linux-image-4.4.0-209-generic-lpae, linux-image-4.15.0-142-generic, linux-image-generic-lpae-hwe-16.04, linux-image-4.4.0-209-powerpc-e500mc, linux-image-snapdragon, linux-image-4.4.0-1092-kvm, linux-lts-xenial, linux-image-virtual-hwe-16.04, linux-oracle, linux-raspi2, linux-image-4.15.0-1098-gcp, linux-image-4.4.0-209-generic, linux, linux-image-powerpc-e500mc-lts-xenial, linux-image-powerpc-smp, linux-azure-4.15, linux-snapdragon, linux-image-lowlatency-lts-xenial, linux-image-powerpc-smp-lts-xenial, linux-image-powerpc64-smp-lts-xenial, linux-image-powerpc-e500mc, linux-image-generic-lts-xenial, linux-image-dell300x, linux-image-4.4.0-209-powerpc-smp, linux-image-generic-lpae, linux-image-4.15.0-1084-raspi2, linux-hwe, linux-aws-hwe, linux-image-gke, linux-gcp, linux-image-4.15.0-1017-dell300x, linux-gcp-4.15, linux-image-4.15.0-1101-snapdragon, linux-image-generic-hwe-16.04, linux-kvm, linux-image-kvm, linux-image-virtual-lts-xenial, linux-image-4.15.0-1099-aws, linux-image-4.15.0-1070-oracle, linux-image-4.4.0-1151-raspi2, linux-image-raspi2, linux-aws, linux-image-powerpc64-emb-lts-xenial, linux-image-azure-lts-18.04, linux-image-lowlatency-hwe-16.04, linux-image-virtual o USN-4917-1 : linux-image-azure, linux-image-5.8.0-1029-azure, linux-image-oem, linux-image-5.10.0-1022-oem, linux-image-generic-lpae-hwe-18.04, linux-azure, linux-image-5.8.0-1021-raspi, linux-image-oem-20.04, linux-image-5.4.0-1042-gke, linux-image-generic, linux-image-5.4.0-72-generic, linux-image-5.8.0-1028-gcp, linux-image-generic-64k-hwe-20.04, linux, linux-image-lowlatency-hwe-20.04, linux-image-5.3.0-1042-gke, linux-image-gkeop-5.4, linux-image-generic-lpae, linux-image-generic-lpae-hwe-20.04, linux-aws, linux-raspi2-5.3, linux-image-5.8.0-1024-kvm, linux-gkeop-5.4, linux-image-virtual, linux-image-generic-hwe-18.04, linux-image-lowlatency, linux-image-gcp, linux-image-gke-5.3, linux-image-5.4.0-72-generic-lpae, linux-image-gke-5.4, linux-azure-5.4, linux-image-5.8.0-1026-oracle, linux-gke-5.3, linux-image-generic-hwe-20.04, linux-hwe, linux-gcp, linux-image-kvm, linux-image-5.4.0-1045-aws, linux-image-5.4.0-1038-kvm, linux-raspi-5.4, linux-image-5.8.0-50-lowlatency, linux-image-lowlatency-hwe-18.04, linux-image-oracle, linux-aws-5.4, linux-image-generic-64k, linux-image-virtual-hwe-18.04, linux-image-5.4.0-1014-gkeop, linux-oracle-5.4, linux-image-snapdragon-hwe-18.04, linux-image-5.4.0-1034-raspi, linux-image-5.4.0-1046-azure, linux-image-raspi2-hwe-18.04, linux-oracle, linux-image-5.8.0-1021-raspi-nolpae, linux-hwe-5.4, linux-gkeop, linux-oem-5.10, linux-image-gkeop, linux-image-5.8.0-1030-aws, linux-image-raspi-hwe-18.04, linux-kvm, linux-hwe-5.8, linux-image-5.3.0-73-generic, linux-image-oem-osp1, linux-image-virtual-hwe-20.04, linux-image-gkeop-5.3, linux-gcp-5.4, linux-image-5.3.0-73-lowlatency, linux-image-oem-20.04b, linux-raspi, linux-image-5.8.0-50-generic-lpae, linux-image-aws, linux-image-5.4.0-72-lowlatency, linux-image-raspi-nolpae, linux-image-5.4.0-1042-gcp, linux-image-5.8.0-50-generic, linux-image-5.4.0-1043-oracle, linux-image-raspi, linux-gke-5.4, linux-image-gke, linux-image-raspi2, linux-image-5.8.0-50-generic-64k, linux-image-5.3.0-1039-raspi2 - -------------------------------------------------------------------------------- USN-4916-1: Linux kernel vulnerabilities 15 April 2021 Several security issues were fixed in the Linux kernel. Releases o Ubuntu 18.04 LTS o Ubuntu 16.04 LTS o Ubuntu 14.04 ESM Packages o linux - Linux kernel o linux-aws - Linux kernel for Amazon Web Services (AWS) systems o linux-aws-hwe - Linux kernel for Amazon Web Services (AWS-HWE) systems o linux-azure - Linux kernel for Microsoft Azure Cloud systems o linux-azure-4.15 - Linux kernel for Microsoft Azure Cloud systems o linux-dell300x - Linux kernel for Dell 300x platforms o linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems o linux-gcp-4.15 - Linux kernel for Google Cloud Platform (GCP) systems o linux-hwe - Linux hardware enablement (HWE) kernel o linux-kvm - Linux kernel for cloud environments o linux-lts-xenial - Linux hardware enablement kernel from Xenial for Trusty o linux-oracle - Linux kernel for Oracle Cloud systems o linux-raspi2 - Linux kernel for Raspberry Pi (V8) systems o linux-snapdragon - Linux kernel for Qualcomm Snapdragon processors Details It was discovered that the overlayfs implementation in the Linux kernel did not properly validate the application of file system capabilities with respect to user namespaces. A local attacker could use this to gain elevated privileges. ( CVE-2021-3493 ) Piotr Krysiuk discovered that the BPF JIT compiler for x86 in the Linux kernel did not properly validate computation of branch displacements in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. ( CVE-2021-29154 ) Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 o linux-image-virtual - 4.15.0.142.129 o linux-image-powerpc-e500mc - 4.15.0.142.129 o linux-image-4.15.0-1113-azure - 4.15.0-1113.126 o linux-image-4.15.0-1098-gcp - 4.15.0-1098.111 o linux-image-gcp-lts-18.04 - 4.15.0.1098.116 o linux-image-4.15.0-1017-dell300x - 4.15.0-1017.21 o linux-image-4.15.0-142-generic - 4.15.0-142.146 o linux-image-4.15.0-1070-oracle - 4.15.0-1070.78 o linux-image-oracle-lts-18.04 - 4.15.0.1070.80 o linux-image-4.15.0-1084-raspi2 - 4.15.0-1084.89 o linux-image-4.15.0-142-generic-lpae - 4.15.0-142.146 o linux-image-raspi2 - 4.15.0.1084.81 o linux-image-4.15.0-142-lowlatency - 4.15.0-142.146 o linux-image-snapdragon - 4.15.0.1101.104 o linux-image-powerpc64-emb - 4.15.0.142.129 o linux-image-dell300x - 4.15.0.1017.19 o linux-image-aws-lts-18.04 - 4.15.0.1099.102 o linux-image-generic - 4.15.0.142.129 o linux-image-4.15.0-1099-aws - 4.15.0-1099.106 o linux-image-4.15.0-1101-snapdragon - 4.15.0-1101.110 o linux-image-kvm - 4.15.0.1090.86 o linux-image-4.15.0-1090-kvm - 4.15.0-1090.92 o linux-image-azure-lts-18.04 - 4.15.0.1113.86 o linux-image-powerpc-smp - 4.15.0.142.129 o linux-image-generic-lpae - 4.15.0.142.129 o linux-image-powerpc64-smp - 4.15.0.142.129 o linux-image-lowlatency - 4.15.0.142.129 Ubuntu 16.04 o linux-image-virtual - 4.4.0.209.215 o linux-image-lowlatency-hwe-16.04 - 4.15.0.142.137 o linux-image-4.4.0-1155-snapdragon - 4.4.0-1155.165 o linux-image-4.15.0-1113-azure - 4.15.0-1113.126~16.04.1 o linux-image-4.4.0-209-powerpc-e500mc - 4.4.0-209.241 o linux-image-4.15.0-1098-gcp - 4.15.0-1098.111~16.04.1 o linux-image-4.4.0-209-generic-lpae - 4.4.0-209.241 o linux-image-4.4.0-209-lowlatency - 4.4.0-209.241 o linux-image-oracle - 4.15.0.1070.58 o linux-image-azure - 4.15.0.1113.104 o linux-image-generic-lpae-hwe-16.04 - 4.15.0.142.137 o linux-image-4.15.0-142-generic - 4.15.0-142.146~16.04.1 o linux-image-4.4.0-209-powerpc-smp - 4.4.0-209.241 o linux-image-4.15.0-1070-oracle - 4.15.0-1070.78~16.04.1 o linux-image-powerpc-e500mc - 4.4.0.209.215 o linux-image-4.4.0-1127-aws - 4.4.0-1127.141 o linux-image-4.15.0-142-generic-lpae - 4.15.0-142.146~16.04.1 o linux-image-4.15.0-142-lowlatency - 4.15.0-142.146~16.04.1 o linux-image-snapdragon - 4.4.0.1155.147 o linux-image-4.4.0-209-generic - 4.4.0-209.241 o linux-image-powerpc64-emb - 4.4.0.209.215 o linux-image-powerpc64-smp - 4.4.0.209.215 o linux-image-gke - 4.15.0.1098.99 o linux-image-virtual-hwe-16.04 - 4.15.0.142.137 o linux-image-generic - 4.4.0.209.215 o linux-image-oem - 4.15.0.142.137 o linux-image-4.15.0-1099-aws - 4.15.0-1099.106~16.04.1 o linux-image-4.4.0-1092-kvm - 4.4.0-1092.101 o linux-image-aws - 4.4.0.1127.132 o linux-image-kvm - 4.4.0.1092.90 o linux-image-4.4.0-209-powerpc64-emb - 4.4.0-209.241 o linux-image-raspi2 - 4.4.0.1151.151 o linux-image-powerpc-smp - 4.4.0.209.215 o linux-image-4.4.0-209-powerpc64-smp - 4.4.0-209.241 o linux-image-generic-lpae - 4.4.0.209.215 o linux-image-gcp - 4.15.0.1098.99 o linux-image-generic-hwe-16.04 - 4.15.0.142.137 o linux-image-4.4.0-1151-raspi2 - 4.4.0-1151.162 o linux-image-lowlatency - 4.4.0.209.215 o linux-image-aws-hwe - 4.15.0.1099.92 Ubuntu 14.04 o linux-image-4.4.0-209-powerpc-smp - 4.4.0-209.241~14.04.1 o linux-image-lowlatency-lts-xenial - 4.4.0.209.182 o linux-image-4.4.0-209-powerpc64-smp - 4.4.0-209.241~14.04.1 o linux-image-4.4.0-1091-aws - 4.4.0-1091.95 o linux-image-4.4.0-209-powerpc64-emb - 4.4.0-209.241~14.04.1 o linux-image-4.15.0-1113-azure - 4.15.0-1113.126~14.04.1 o linux-image-4.4.0-209-powerpc-e500mc - 4.4.0-209.241~14.04.1 o linux-image-powerpc-e500mc-lts-xenial - 4.4.0.209.182 o linux-image-generic-lpae-lts-xenial - 4.4.0.209.182 o linux-image-powerpc64-smp-lts-xenial - 4.4.0.209.182 o linux-image-4.4.0-209-generic-lpae - 4.4.0-209.241~14.04.1 o linux-image-powerpc-smp-lts-xenial - 4.4.0.209.182 o linux-image-powerpc64-emb-lts-xenial - 4.4.0.209.182 o linux-image-4.4.0-209-lowlatency - 4.4.0-209.241~14.04.1 o linux-image-generic-lts-xenial - 4.4.0.209.182 o linux-image-aws - 4.4.0.1091.88 o linux-image-4.4.0-209-generic - 4.4.0-209.241~14.04.1 o linux-image-azure - 4.15.0.1113.86 o linux-image-virtual-lts-xenial - 4.4.0.209.182 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References o CVE-2021-3493 o CVE-2021-29154 Related notices o USN-4912-1 : linux-oem-5.6, linux-image-oem-20.04, linux-image-5.6.0-1053-oem o USN-4917-1 : linux-oracle, linux-image-aws, linux-image-5.3.0-73-lowlatency, linux-image-5.8.0-1030-aws, linux-image-5.4.0-72-generic-lpae, linux-image-generic-lpae, linux-image-generic, linux-hwe-5.8, linux-gkeop, linux-oracle-5.4, linux-hwe, linux-image-snapdragon-hwe-18.04, linux-image-raspi2, linux-image-oem-osp1, linux-image-generic-64k, linux-image-oracle, linux-image-raspi-hwe-18.04, linux-image-gkeop-5.4, linux-image-gkeop-5.3, linux-image-5.4.0-1046-azure, linux-oem-5.10, linux-image-gke-5.3, linux-image-lowlatency, linux-image-gke, linux-image-5.4.0-1043-oracle, linux-image-5.8.0-1028-gcp, linux-image-generic-lpae-hwe-20.04, linux-azure-5.4, linux-image-generic-lpae-hwe-18.04, linux-image-oem, linux-image-oem-20.04b, linux-image-generic-hwe-20.04, linux-kvm, linux-image-5.8.0-1026-oracle, linux-hwe-5.4, linux-image-5.4.0-72-lowlatency, linux-image-5.4.0-72-generic, linux-image-5.8.0-1021-raspi-nolpae, linux-gkeop-5.4, linux-image-5.8.0-50-lowlatency, linux-image-virtual-hwe-20.04, linux-image-5.8.0-1029-azure, linux-image-virtual, linux-gke-5.4, linux-image-5.4.0-1038-kvm, linux-image-lowlatency-hwe-18.04, linux-raspi2-5.3, linux-raspi-5.4, linux-image-raspi-nolpae, linux-image-5.8.0-50-generic, linux-image-kvm, linux-gke-5.3, linux-image-5.3.0-73-generic, linux-aws, linux, linux-image-lowlatency-hwe-20.04, linux-image-5.8.0-50-generic-lpae, linux-image-5.8.0-1024-kvm, linux-image-generic-64k-hwe-20.04, linux-image-5.8.0-1021-raspi, linux-image-azure, linux-image-raspi, linux-gcp-5.4, linux-image-generic-hwe-18.04, linux-aws-5.4, linux-azure, linux-image-5.10.0-1022-oem, linux-image-5.4.0-1042-gke, linux-image-gkeop, linux-image-raspi2-hwe-18.04, linux-image-gke-5.4, linux-image-oem-20.04, linux-image-5.8.0-50-generic-64k, linux-raspi, linux-gcp, linux-image-virtual-hwe-18.04, linux-image-gcp, linux-image-5.3.0-1039-raspi2, linux-image-5.4.0-1042-gcp, linux-image-5.4.0-1014-gkeop, linux-image-5.3.0-1042-gke, linux-image-5.4.0-1045-aws, linux-image-5.4.0-1034-raspi o USN-4915-1 : linux-oem-5.6, linux-image-5.6.0-1054-oem, linux-image-oem-20.04 - -------------------------------------------------------------------------------- USN-4917-1: Linux kernel vulnerabilities 15 April 2021 Several security issues were fixed in the Linux kernel. Releases o Ubuntu 20.10 o Ubuntu 20.04 LTS o Ubuntu 18.04 LTS Packages o linux - Linux kernel o linux-aws - Linux kernel for Amazon Web Services (AWS) systems o linux-aws-5.4 - Linux kernel for Amazon Web Services (AWS) systems o linux-azure - Linux kernel for Microsoft Azure Cloud systems o linux-azure-5.4 - Linux kernel for Microsoft Azure cloud systems o linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems o linux-gcp-5.4 - Linux kernel for Google Cloud Platform (GCP) systems o linux-gke-5.3 - Linux kernel for Google Container Engine (GKE) systems o linux-gke-5.4 - Linux kernel for Google Container Engine (GKE) systems o linux-gkeop - Linux kernel for Google Container Engine (GKE) systems o linux-gkeop-5.4 - Linux kernel for Google Container Engine (GKE) systems o linux-hwe - Linux hardware enablement (HWE) kernel o linux-hwe-5.4 - Linux hardware enablement (HWE) kernel o linux-hwe-5.8 - Linux hardware enablement (HWE) kernel o linux-kvm - Linux kernel for cloud environments o linux-oem-5.10 - Linux kernel for OEM systems o linux-oracle - Linux kernel for Oracle Cloud systems o linux-oracle-5.4 - Linux kernel for Oracle Cloud systems o linux-raspi - Linux kernel for Raspberry Pi (V8) systems o linux-raspi-5.4 - Linux kernel for Raspberry Pi (V8) systems o linux-raspi2-5.3 - Linux kernel for Raspberry Pi (V8) systems Details It was discovered that the overlayfs implementation in the Linux kernel did not properly validate the application of file system capabilities with respect to user namespaces. A local attacker could use this to gain elevated privileges. ( CVE-2021-3493 ) Vincent Dehors discovered that the shiftfs file system in the Ubuntu Linux kernel did not properly handle faults in copy_from_user() when passing through ioctls to an underlying file system. A local attacker could use this to cause a denial of service (memory exhaustion) or execute arbitrary code. ( CVE-2021-3492 ) Piotr Krysiuk discovered that the BPF JIT compiler for x86 in the Linux kernel did not properly validate computation of branch displacements in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. ( CVE-2021-29154 ) Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 20.10 o linux-image-5.8.0-1024-kvm - 5.8.0-1024.26 o linux-image-gke - 5.8.0.1028.28 o linux-image-oracle - 5.8.0.1026.25 o linux-image-5.8.0-1021-raspi-nolpae - 5.8.0-1021.24 o linux-image-raspi-nolpae - 5.8.0.1021.24 o linux-image-5.8.0-1021-raspi - 5.8.0-1021.24 o linux-image-oem-20.04 - 5.8.0.50.55 o linux-image-azure - 5.8.0.1029.29 o linux-image-virtual - 5.8.0.50.55 o linux-image-raspi - 5.8.0.1021.24 o linux-image-5.8.0-1030-aws - 5.8.0-1030.32 o linux-image-5.8.0-1029-azure - 5.8.0-1029.31 o linux-image-generic-64k - 5.8.0.50.55 o linux-image-5.8.0-50-generic-64k - 5.8.0-50.56 o linux-image-generic - 5.8.0.50.55 o linux-image-5.8.0-50-generic - 5.8.0-50.56 o linux-image-5.8.0-50-generic-lpae - 5.8.0-50.56 o linux-image-aws - 5.8.0.1030.32 o linux-image-kvm - 5.8.0.1024.26 o linux-image-5.8.0-50-lowlatency - 5.8.0-50.56 o linux-image-5.8.0-1028-gcp - 5.8.0-1028.29 o linux-image-generic-lpae - 5.8.0.50.55 o linux-image-gcp - 5.8.0.1028.28 o linux-image-5.8.0-1026-oracle - 5.8.0-1026.27 o linux-image-lowlatency - 5.8.0.50.55 Ubuntu 20.04 o linux-image-gkeop-5.4 - 5.4.0.1014.17 o linux-image-virtual-hwe-20.04 - 5.8.0.50.56~20.04.34 o linux-image-oem-20.04b - 5.10.0.1022.23 o linux-image-5.4.0-72-generic - 5.4.0-72.80 o linux-image-gkeop - 5.4.0.1014.17 o linux-image-oem-osp1 - 5.4.0.72.75 o linux-image-generic-hwe-20.04 - 5.8.0.50.56~20.04.34 o linux-image-5.4.0-72-generic-lpae - 5.4.0-72.80 o linux-image-oracle - 5.4.0.1043.40 o linux-image-5.4.0-72-lowlatency - 5.4.0-72.80 o linux-image-azure - 5.4.0.1046.44 o linux-image-generic-lpae-hwe-20.04 - 5.8.0.50.56~20.04.34 o linux-image-5.4.0-1046-azure - 5.4.0-1046.48 o linux-image-virtual - 5.4.0.72.75 o linux-image-5.4.0-1034-raspi - 5.4.0-1034.37 o linux-image-raspi - 5.4.0.1034.69 o linux-image-5.4.0-1043-oracle - 5.4.0-1043.46 o linux-image-5.8.0-50-generic-64k - 5.8.0-50.56~20.04.1 o linux-image-generic - 5.4.0.72.75 o linux-image-generic-64k-hwe-20.04 - 5.8.0.50.56~20.04.34 o linux-image-5.8.0-50-generic - 5.8.0-50.56~20.04.1 o linux-image-oem - 5.4.0.72.75 o linux-image-5.4.0-1014-gkeop - 5.4.0-1014.15 o linux-image-5.4.0-1045-aws - 5.4.0-1045.47 o linux-image-5.8.0-50-generic-lpae - 5.8.0-50.56~20.04.1 o linux-image-aws - 5.4.0.1045.46 o linux-image-kvm - 5.4.0.1038.36 o linux-image-5.8.0-50-lowlatency - 5.8.0-50.56~20.04.1 o linux-image-raspi2 - 5.4.0.1034.69 o linux-image-5.4.0-1042-gcp - 5.4.0-1042.45 o linux-image-generic-lpae - 5.4.0.72.75 o linux-image-gcp - 5.4.0.1042.51 o linux-image-5.4.0-1038-kvm - 5.4.0-1038.39 o linux-image-lowlatency-hwe-20.04 - 5.8.0.50.56~20.04.34 o linux-image-5.10.0-1022-oem - 5.10.0-1022.23 o linux-image-lowlatency - 5.4.0.72.75 Ubuntu 18.04 o linux-image-gkeop-5.4 - 5.4.0.1014.15~18.04.15 o linux-image-gkeop-5.3 - 5.3.0.73.130 o linux-image-5.4.0-72-generic - 5.4.0-72.80~18.04.1 o linux-image-oem-osp1 - 5.4.0.72.80~18.04.65 o linux-image-5.4.0-72-generic-lpae - 5.4.0-72.80~18.04.1 o linux-image-oracle - 5.4.0.1043.46~18.04.25 o linux-image-generic-hwe-18.04 - 5.4.0.72.80~18.04.65 o linux-image-azure - 5.4.0.1046.25 o linux-image-snapdragon-hwe-18.04 - 5.4.0.72.80~18.04.65 o linux-image-5.3.0-1039-raspi2 - 5.3.0-1039.41 o linux-image-5.4.0-72-lowlatency - 5.4.0-72.80~18.04.1 o linux-image-generic-lpae-hwe-18.04 - 5.4.0.72.80~18.04.65 o linux-image-5.4.0-1046-azure - 5.4.0-1046.48~18.04.1 o linux-image-5.4.0-1042-gke - 5.4.0-1042.44~18.04.1 o linux-image-5.3.0-73-generic - 5.3.0-73.69 o linux-image-5.4.0-1034-raspi - 5.4.0-1034.37~18.04.1 o linux-image-virtual-hwe-18.04 - 5.4.0.72.80~18.04.65 o linux-image-5.4.0-1043-oracle - 5.4.0-1043.46~18.04.1 o linux-image-5.3.0-73-lowlatency - 5.3.0-73.69 o linux-image-lowlatency-hwe-18.04 - 5.4.0.72.80~18.04.65 o linux-image-gke-5.3 - 5.3.0.1042.25 o linux-image-gke-5.4 - 5.4.0.1042.44~18.04.8 o linux-image-oem - 5.4.0.72.80~18.04.65 o linux-image-5.4.0-1014-gkeop - 5.4.0-1014.15~18.04.1 o linux-image-5.4.0-1045-aws - 5.4.0-1045.47~18.04.1 o linux-image-aws - 5.4.0.1045.27 o linux-image-5.3.0-1042-gke - 5.3.0-1042.45 o linux-image-5.4.0-1042-gcp - 5.4.0-1042.45~18.04.1 o linux-image-raspi-hwe-18.04 - 5.4.0.1034.36 o linux-image-gcp - 5.4.0.1042.29 o linux-image-raspi2-hwe-18.04 - 5.3.0.1039.28 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References o CVE-2021-3492 o CVE-2021-3493 o CVE-2021-29154 Related notices o USN-4912-1 : linux-oem-5.6, linux-image-oem-20.04, linux-image-5.6.0-1053-oem o USN-4916-1 : linux-snapdragon, linux-gcp-4.15, linux-dell300x, linux-aws-hwe, linux-image-4.15.0-142-generic, linux-image-lowlatency-lts-xenial, linux-image-4.4.0-209-generic-lpae, linux-image-virtual-hwe-16.04, linux-image-4.15.0-1101-snapdragon, linux-image-virtual-lts-xenial, linux-image-lowlatency, linux-image-generic, linux-image-aws-lts-18.04, linux-image-4.15.0-1098-gcp, linux-hwe, linux-aws, linux-image-oem, linux-image-azure, linux-raspi2, linux-image-4.15.0-142-generic-lpae, linux-azure, linux-azure-4.15, linux-image-generic-lpae-lts-xenial, linux-gcp, linux-image-4.15.0-1017-dell300x, linux-image-powerpc64-smp-lts-xenial, linux-image-4.15.0-1084-raspi2, linux-image-generic-lts-xenial, linux-image-azure-lts-18.04, linux-image-gke, linux-image-powerpc64-smp, linux-image-generic-lpae-hwe-16.04, linux-image-powerpc64-emb, linux-image-4.4.0-1155-snapdragon, linux-image-oracle, linux-image-virtual, linux-image-4.15.0-1090-kvm, linux-image-gcp-lts-18.04, linux-image-4.4.0-1127-aws, linux-image-powerpc-e500mc, linux-image-powerpc-e500mc-lts-xenial, linux-image-aws-hwe, linux-image-dell300x, linux-image-4.15.0-1099-aws, linux-image-4.15.0-1113-azure, linux, linux-image-generic-lpae, linux-image-4.4.0-1151-raspi2, linux-image-powerpc64-emb-lts-xenial, linux-kvm, linux-image-gcp, linux-image-kvm, linux-image-4.4.0-209-powerpc-e500mc, linux-image-4.4.0-209-powerpc-smp, linux-lts-xenial, linux-image-4.4.0-209-generic, linux-image-4.15.0-142-lowlatency, linux-image-aws, linux-image-4.4.0-209-lowlatency, linux-image-powerpc-smp, linux-image-raspi2, linux-image-4.4.0-209-powerpc64-smp, linux-image-generic-hwe-16.04, linux-image-4.4.0-1091-aws, linux-oracle, linux-image-4.4.0-1092-kvm, linux-image-4.4.0-209-powerpc64-emb, linux-image-lowlatency-hwe-16.04, linux-image-oracle-lts-18.04, linux-image-4.15.0-1070-oracle, linux-image-snapdragon, linux-image-powerpc-smp-lts-xenial o USN-4915-1 : linux-oem-5.6, linux-image-5.6.0-1054-oem, linux-image-oem-20.04 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYHkCy+NLKJtyKPYoAQi16RAAr2ozRn8ORPTVbeh3Uz4lGeFpcbOertCQ OF6ktzKPrHGeJznfdJg1Tdi2MJoXdL5xsCYi89SXs9W73J6DyIBEeGRk4xztdytu O+pZ4i9VbXZm9eeQF0gDTl2iLTPIjThL/pUuRQb22w3/Ds6NnWsMSyf6zsrNA7im A79SXapwfW3BW8aeDOiknejAtqhf7kdF5YGD2IAoZ7Ohz2Cs7V3rn2EFXCmHr7jq IOA9cAzI6DJLMnDEKWnAN7rS+ww41HdzqMhV0eeen0t77zTFbSuLNNkOHgJclodp h9MZR1BVB9+cZvsLGTSSMojyKBg61NUTCXGeciEtsOOSKqpIcMV90/dsmoZiVY5f 30JoYtR1CBaoDMHJtmkNl5yqMiWVWphaOLZ9r8YSlGBRHLw4yepqKO8ZDYvK8vs9 BM0w2RuZFFn0hrGZHp0ykmEwMgQZcpDp09oupMk73yDeFIz8uZ44iIW8IkxxrFtl r8ioOQR1GFBtWz3KNVcsDoso0jX+QOWslx3BpgQFJNaiFsE7u3bn5EdDzCimAdkx xK0No1qIylbstxOFX01AR5lGArjeVsBQYXMPtwdFrYPQHkV7qYVNju9p3APdlCa/ kMFS/5BJo7ObNwDeIziS9j97S3IbOUWmyrt3s9BKpqDDI6h3q3LR4SbAlV49kk81 SfSsvG6mMtU= =TpLM -----END PGP SIGNATURE-----
AusCERT - Security Bulletins · 2021. április 16.

ESB-2021.1299 - [SUSE] Linux kernel: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.1299 Security update for the Linux Kernel 16 April 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux kernel Publisher: SUSE Operating System: SUSE Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Increased Privileges -- Existing Account Overwrite Arbitrary Files -- Existing Account Create Arbitrary Files -- Existing Account Denial of Service -- Remote/Unauthenticated Access Confidential Data -- Existing Account Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-30002 CVE-2021-29647 CVE-2021-29265 CVE-2021-29264 CVE-2021-29154 CVE-2021-28972 CVE-2021-28971 CVE-2021-28964 CVE-2021-28950 CVE-2021-28688 CVE-2021-28660 CVE-2021-28375 CVE-2021-28038 CVE-2021-27365 CVE-2021-27364 CVE-2021-27363 CVE-2021-26932 CVE-2021-26931 CVE-2021-26930 CVE-2021-20219 CVE-2021-3483 CVE-2021-3444 CVE-2021-3428 CVE-2020-36312 CVE-2020-36311 CVE-2020-36310 CVE-2020-35519 CVE-2020-29374 CVE-2020-29368 CVE-2020-27815 CVE-2020-27171 CVE-2020-27170 CVE-2020-25673 CVE-2020-25672 CVE-2020-25671 CVE-2020-25670 CVE-2020-0433 CVE-2019-19769 CVE-2019-18814 Reference: ESB-2021.1251 ESB-2021.1231 ESB-2021.1228 ESB-2021.1212 ESB-2021.1184 Original Bulletin: https://www.suse.com/support/update/announcement/2021/suse-su-20211211-1 https://www.suse.com/support/update/announcement/2021/suse-su-20211210-1 Comment: This bulletin contains two (2) SUSE security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:1211-1 Rating: important References: #1047233 #1065729 #1113295 #1152472 #1152489 #1153274 #1154353 #1155518 #1156256 #1156395 #1159280 #1160634 #1167773 #1168777 #1169514 #1169709 #1171295 #1173485 #1177326 #1178163 #1178181 #1178330 #1179454 #1180197 #1180980 #1181383 #1181507 #1181674 #1181862 #1182011 #1182077 #1182485 #1182552 #1182574 #1182591 #1182595 #1182712 #1182713 #1182715 #1182716 #1182717 #1182770 #1182989 #1183015 #1183018 #1183022 #1183023 #1183048 #1183252 #1183277 #1183278 #1183279 #1183280 #1183281 #1183282 #1183283 #1183284 #1183285 #1183286 #1183287 #1183288 #1183366 #1183369 #1183386 #1183405 #1183412 #1183416 #1183427 #1183428 #1183445 #1183447 #1183501 #1183509 #1183530 #1183534 #1183540 #1183593 #1183596 #1183598 #1183637 #1183646 #1183662 #1183686 #1183692 #1183696 #1183750 #1183757 #1183775 #1183843 #1183859 #1183871 #1184074 #1184120 #1184167 #1184168 #1184170 #1184176 #1184192 #1184193 #1184194 #1184196 #1184198 #1184211 #1184217 #1184218 #1184219 #1184220 #1184224 #1184388 #1184391 #1184393 #1184509 #1184511 #1184512 #1184514 #1184583 #1184647 Cross-References: CVE-2019-18814 CVE-2019-19769 CVE-2020-25670 CVE-2020-25671 CVE-2020-25672 CVE-2020-25673 CVE-2020-27170 CVE-2020-27171 CVE-2020-27815 CVE-2020-35519 CVE-2020-36310 CVE-2020-36311 CVE-2020-36312 CVE-2021-27363 CVE-2021-27364 CVE-2021-27365 CVE-2021-28038 CVE-2021-28375 CVE-2021-28660 CVE-2021-28688 CVE-2021-28950 CVE-2021-28964 CVE-2021-28971 CVE-2021-28972 CVE-2021-29154 CVE-2021-29264 CVE-2021-29265 CVE-2021-29647 CVE-2021-30002 CVE-2021-3428 CVE-2021-3444 CVE-2021-3483 Affected Products: SUSE Linux Enterprise Module for Realtime 15-SP2 ______________________________________________________________________________ An update that solves 32 vulnerabilities and has 85 fixes is now available. Description: The SUSE Linux Enterprise 15 SP2 kernel RT was updated to receive various security and bugfixes. The following security bugs were fixed: o CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read (bsc#1184170). o CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc# 1173485). o CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ). o CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167). o CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168). o CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198). o CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ). o CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193). o CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646). o CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc# 1183593 ). o CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not prevent user applications from sending kernel RPC messages (bsc#1183596). o CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc# 1183022). o CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715). o CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717). o CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716). o CVE-2020-35519: Fixed an out-of-bounds memory access was found in x25_bind (bsc#1183696). o CVE-2020-27815: Fixed an issue in JFS filesystem where could have allowed an attacker to execute code (bsc#1179454). o CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775). o CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc# 1183686). o CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire function (bsc#1159280 ). o CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in aa_audit_rule_init() (bsc#1156256). o CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181). o CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511). o CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391). o CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120). o CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393). o CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc# 1184512). o CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ). o CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194). The following non-security bugs were fixed: o 0007-block-add-docs-for-gendisk-request_queue-refcount-he.patch: (bsc# 1171295, git fixes (block drivers)). o 0008-block-revert-back-to-synchronous-request_queue-remov.patch: (bsc# 1171295, git fixes (block drivers)). o 0009-blktrace-fix-debugfs-use-after-free.patch: (bsc#1171295, git fixes (block drivers)). o ACPI: bus: Constify is_acpi_node() and friends (part 2) (git-fixes). o ACPICA: Always create namespace nodes using acpi_ns_create_node() (git-fixes). o ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383). o ACPICA: Fix race in generic_serial_bus (I2C) and GPIO op_region parameter handling (git-fixes). o ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes). o ACPI: video: Add DMI quirk for GIGABYTE GB-BXBT-2807 (git-fixes). o ACPI: video: Add missing callback back for Sony VPCEH3U1E (git-fixes). o ALSA: aloop: Fix initialization of controls (git-fixes). o ALSA: ctxfi: cthw20k2: fix mask on conf to allow 4 bits (git-fixes). o ALSA: hda: Avoid spurious unsol event handling during S3/S4 (git-fixes). o ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes). o ALSA: hda: generic: Fix the micmute led init state (git-fixes). o ALSA: hda/hdmi: Cancel pending works before suspend (git-fixes). o ALSA: hda/realtek: Add quirk for Clevo NH55RZQ (git-fixes). o ALSA: hda/realtek: Add quirk for Intel NUC 10 (git-fixes). o ALSA: hda/realtek: Apply dual codec quirks for MSI Godlike X570 board (git-fixes). o ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air (git-fixes). o ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro (git-fixes). o ALSA: hda/realtek: Enable headset mic of Acer SWIFT with ALC256 (git-fixes). o ALSA: hda/realtek: fix a determine_headset_type issue for a Dell AIO (git-fixes). o ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes). o ALSA: usb: Add Plantronics C320-M USB ctrl msg delay quirk (bsc#1182552). o ALSA: usb-audio: Allow modifying parameters with succeeding hw_params calls (bsc#1182552). o ALSA: usb-audio: Apply sample rate quirk to Logitech Connect (git-fixes). o ALSA: usb-audio: Apply the control quirk to Plantronics headsets (bsc# 1182552). o ALSA: usb-audio: Disable USB autosuspend properly in setup_disable_autosuspend() (bsc#1182552). o ALSA: usb-audio: Do not abort even if the clock rate differs (bsc#1182552). o ALSA: usb-audio: Drop bogus dB range in too low level (bsc#1182552). o ALSA: usb-audio: Fix "cannot get freq eq" errors on Dell AE515 sound bar (bsc#1182552). o ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe (bsc#1182552). o ALSA: usb-audio: Fix "RANGE setting not yet supported" errors (git-fixes). o ALSA: usb-audio: fix use after free in usb_audio_disconnect (bsc#1182552). o ALSA: usb-audio: Skip the clock selector inquiry for single connections (git-fixes). o ALSA: usb: Use DIV_ROUND_UP() instead of open-coding it (git-fixes). o amd/amdgpu: Disable VCN DPG mode for Picasso (git-fixes). o apparmor: check/put label on apparmor_sk_clone_security() (git-fixes). o appletalk: Fix skb allocation size in loopback case (git-fixes). o arm64: make STACKPROTECTOR_PER_TASK configurable (bsc#1181862). o ASoC: ak4458: Add MODULE_DEVICE_TABLE (git-fixes). o ASoC: ak5558: Add MODULE_DEVICE_TABLE (git-fixes). o ASoC: cs42l42: Always wait at least 3ms after reset (git-fixes). o ASoC: cs42l42: Do not enable/disable regulator at Bias Level (git-fixes). o ASoC: cs42l42: Fix Bitclock polarity inversion (git-fixes). o ASoC: cs42l42: Fix channel width support (git-fixes). o ASoC: cs42l42: Fix mixer volume control (git-fixes). o ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes). o ASoC: es8316: Simplify adc_pga_gain_tlv table (git-fixes). o ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes). o ASoC: fsl_ssi: Fix TDM slot setup for I2S mode (git-fixes). o ASoC: Intel: Add DMI quirk table to soc_intel_is_byt_cr() (git-fixes). o ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes). o ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes). o ASoC: Intel: bytcr_rt5640: Add quirk for ARCHOS Cesium 140 (git-fixes). o ASoC: Intel: bytcr_rt5640: Add quirk for the Acer One S1002 tablet (git-fixes). o ASoC: Intel: bytcr_rt5640: Add quirk for the Estar Beauty HD MID 7316R tablet (git-fixes). o ASoC: Intel: bytcr_rt5640: Add quirk for the Voyo Winpad A15 tablet (git-fixes). o ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold (git-fixes). o ASoC: Intel: bytcr_rt5651: Add quirk for the Jumper EZpad 7 tablet (git-fixes). o ASoC: max98373: Added 30ms turn on/off time delay (git-fixes). o ASoC: rt5640: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes). o ASoC: rt5651: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes). o ASoC: rt5670: Add emulated 'DAC1 Playback Switch' control (git-fixes). o ASoC: rt5670: Remove ADC vol-ctrl mute bits poking from Sto1 ADC mixer settings (git-fixes). o ASoC: rt5670: Remove 'HP Playback Switch' control (git-fixes). o ASoC: rt5670: Remove 'OUT Channel Switch' control (git-fixes). o ASoC: sgtl5000: set DAP_AVC_CTRL register to correct default value on probe (git-fixes). o ASoC: simple-card-utils: Do not handle device clock (git-fixes). o ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes). o ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes). o ath10k: fix wmi mgmt tx queue full due to race condition (git-fixes). o ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes). o ath9k: fix transmitting to stations in dynamic SMPS mode (git-fixes). o atl1c: fix error return code in atl1c_probe() (git-fixes). o atl1e: fix error return code in atl1e_probe() (git-fixes). o batman-adv: initialize "struct batadv_tvlv_tt_vlan_data"->reserved field (git-fixes). o binfmt_misc: fix possible deadlock in bm_register_write (git-fixes). o binfmt_misc: fix possible deadlock in bm_register_write (git-fixes). o blktrace-annotate-required-lock-on-do_blk_trace_setu.patch: (bsc#1171295). o blktrace-Avoid-sparse-warnings-when-assigning-q-blk_.patch: (bsc#1171295). o blktrace-break-out-of-blktrace-setup-on-concurrent-c.patch: (bsc#1171295). o block-clarify-context-for-refcount-increment-helpers.patch: (bsc#1171295). o block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes). o Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes). o Bluetooth: hci_h5: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for btrtl (git-fixes). o bnxt_en: reliably allocate IRQ table on reset to avoid crash (jsc#SLE-8371 bsc#1153274). o bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775). o bpf: Avoid warning when re-casting __bpf_call_base into __bpf_call_base_args (bsc#1155518). o bpf: Declare __bpf_free_used_maps() unconditionally (bsc#1155518). o bpf: Do not do bpf_cgroup_storage_set() for kuprobe/tp programs (bsc# 1155518). o bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170). o bpf_lru_list: Read double-checked variable once without lock (bsc#1155518). o bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518). o bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc# 1183775). o bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163). o brcmfmac: Add DMI nvram filename quirk for Predia Basic tablet (git-fixes). o brcmfmac: Add DMI nvram filename quirk for Voyo winpad A15 tablet (git-fixes). o brcmfmac: clear EAP/association status bits on linkdown events (git-fixes). o btrfs: abort the transaction if we fail to inc ref in btrfs_copy_root (bsc# 1184217). o btrfs: always pin deleted leaves when there are active tree mod log users (bsc#1184224). o btrfs: fix exhaustion of the system chunk array due to concurrent allocations (bsc#1183386). o btrfs: fix extent buffer leak on failure to copy root (bsc#1184218). o btrfs: fix race when cloning extent buffer during rewind of an old root (bsc#1184193). o btrfs: fix stale data exposure after cloning a hole with NO_HOLES enabled (bsc#1184220). o btrfs: fix subvolume/snapshot deletion not triggered on mount (bsc# 1184219). o bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes). o bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes). o can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes). o can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes). o can: flexcan: assert FRZ bit in flexcan_chip_freeze() (git-fixes). o can: flexcan: enable RX FIFO after FRZ/HALT valid (git-fixes). o can: flexcan: flexcan_chip_freeze(): fix chip freeze for missing bitrate (git-fixes). o can: flexcan: invoke flexcan_chip_freeze() to enter freeze mode (git-fixes). o can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes). o can: peak_usb: add forgotten supported devices (git-fixes). o can: peak_usb: Revert "can: peak_usb: add forgotten supported devices" (git-fixes). o can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes). o cdc-acm: fix BREAK rx code path adding necessary calls (git-fixes). o certs: Fix blacklist flag type confusion (git-fixes). o cifs: change noisy error message to FYI (bsc#1181507). o cifs: check pointer before freeing (bsc#1183534). o cifs_debug: use %pd instead of messing with ->d_name (bsc#1181507). o cifs: do not send close in compound create+close requests (bsc#1181507). o cifs: New optype for session operations (bsc#1181507). o cifs: print MIDs in decimal notation (bsc#1181507). o cifs: return proper error code in statfs(2) (bsc#1181507). o cifs: Tracepoints and logs for tracing credit changes (bsc#1181507). o clk: fix invalid usage of list cursor in register (git-fixes). o clk: fix invalid usage of list cursor in unregister (git-fixes). o clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes). o completion: Drop init_completion define (git-fixes). o configfs: fix a use-after-free in __configfs_open_file (git-fixes). o config: net: freescale: change xgmac-mdio to built-in References: bsc# 1183015,bsc#1182595 o crypto: aesni - prevent misaligned buffers on the stack (git-fixes). o crypto: arm64/sha - add missing module aliases (git-fixes). o crypto: bcm - Rename struct device_private to bcm_device_private (git-fixes). o crypto: Kconfig - CRYPTO_MANAGER_EXTRA_TESTS requires the manager (git-fixes). o crypto: tcrypt - avoid signed overflow in byte count (git-fixes). o Delete patches.suse/sched-Reenable-interrupts-in-do_sched_yield.patch (bsc# 1183530) o drivers/misc/vmw_vmci: restrict too big queue size in qp_host_alloc_queue (git-fixes). o drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes). o drm/amd/display: Guard against NULL pointer deref when get_i2c_info fails (git-fixes). o drm/amdgpu: Add check to prevent IH overflow (git-fixes). o drm/amdgpu: check alignment on CPU page for bo map (git-fixes). o drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes). o drm/amdgpu: fix parameter error of RREG32_PCIE() in amdgpu_regs_pcie (git-fixes). o drm/amdkfd: Put ACPI table after using it (bsc#1152489) Backporting notes: * context changes o drm/amd/powerplay: fix spelling mistake "smu_state_memroy_block" -> (bsc# 1152489) Backporting notes: * rename amd/pm to amd/powerplay * context changes o drm/compat: Clear bounce structures (git-fixes). o drm/hisilicon: Fix use-after-free (git-fixes). o drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074). o drm/i915: Reject 446-480MHz HDMI clock on GLK (git-fixes). o drm/mediatek: Fix aal size config (bsc#1152489) o drm: meson_drv add shutdown function (git-fixes). o drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes). o drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes). o drm/msm/dsi: Correct io_start for MSM8994 (20nm PHY) (git-fixes). o drm/msm: Fix races managing the OOB state for timestamp vs (bsc#1152489) o drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes). o drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1152489) o drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1152489) o drm/msm/gem: Add obj->lock wrappers (bsc#1152489) o drm/msm: Ratelimit invalid-fence message (git-fixes). o drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes). o drm/nouveau: bail out of nouveau_channel_new if channel init fails (bsc# 1152489) o drm/nouveau/kms: handle mDP connectors (git-fixes). o drm/panfrost: Do not corrupt the queue mutex on open/close (bsc#1152472) o drm/panfrost: Fix job timeout handling (bsc#1152472) o drm/panfrost: Remove unused variables in panfrost_job_close() (bsc#1152472) o drm/radeon: fix AGP dependency (git-fixes). o drm: rcar-du: Fix crash when using LVDS1 clock for CRTC (bsc#1152489) o drm/sched: Cancel and flush all outstanding jobs before finish (git-fixes). o drm/sun4i: tcon: fix inverted DCLK polarity (bsc#1152489) o drm/tegra: sor: Grab runtime PM reference across reset (git-fixes). o drm/vc4: hdmi: Restore cec physical address on reconnect (bsc#1152472) o efi: use 32-bit alignment for efi_guid_t literals (git-fixes). o enetc: Fix reporting of h/w packet counters (git-fixes). o epoll: check for events when removing a timed out thread from the wait queue (git-fixes). o ethernet: alx: fix order of calls on resume (git-fixes). o exec: Move would_dump into flush_old_exec (git-fixes). o exfat: add missing MODULE_ALIAS_FS() (bsc#1182989). o exfat: add the dummy mount options to be backward compatible with staging/ exfat (bsc#1182989). o extcon: Add stubs for extcon_register_notifier_all() functions (git-fixes). o extcon: Fix error handling in extcon_dev_register (git-fixes). o fbdev: aty: SPARC64 requires FB_ATY_CT (git-fixes). o firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes). o flow_dissector: fix byteorder of dissected ICMP ID (bsc#1154353). o fsl/fman: check dereferencing null pointer (git-fixes). o fsl/fman: fix dereference null return value (git-fixes). o fsl/fman: fix eth hash table allocation (git-fixes). o fsl/fman: fix unreachable code (git-fixes). o fsl/fman: use 32-bit unsigned integer (git-fixes). o fuse: fix bad inode (bsc#1184211). o fuse: fix live lock in fuse_iget() (bsc#1184211). o fuse: verify write return (git-fixes). o gcc-plugins: drop support for GCC <= 4.7 (bcs#1181862). o gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again (bcs# 1181862). o gcc-plugins: simplify GCC plugin-dev capability test (bsc#1181862). o gianfar: Account for Tx PTP timestamp in the skb headroom (git-fixes). o gianfar: Fix TX timestamping with a stacked DSA driver (git-fixes). o gianfar: Handle error code at MAC address change (git-fixes). o gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP (git-fixes). o Goodix Fingerprint device is not a modem (git-fixes). o gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes). o gpio: pca953x: Set IRQ type when handle Intel Galileo Gen 2 (git-fixes). o gpio: zynq: fix reference leak in zynq_gpio functions (git-fixes). o HID: i2c-hid: Add I2C_HID_QUIRK_NO_IRQ_AFTER_RESET for ITE8568 EC on Voyo Winpad A15 (git-fixes). o HID: mf: add support for 0079:1846 Mayflash/Dragonrise USB Gamecube Adapter (git-fixes). o HSI: Fix PM usage counter unbalance in ssi_hw_init (git-fixes). o hwmon: (ina3221) Fix PM usage counter unbalance in ina3221_write_enable (git-fixes). o i2c: rcar: faster irq code to minimize HW race condition (git-fixes). o i2c: rcar: optimize cacheline to minimize HW race condition (git-fixes). o i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025). o i40e: Fix sparse error: 'vsi->netdev' could be null (jsc#SLE-8025). o iavf: Fix incorrect adapter get in iavf_resume (git-fixes). o iavf: use generic power management (git-fixes). o ibmvnic: add comments for spinlock_t definitions (bsc#1183871 ltc#192139). o ibmvnic: always store valid MAC address (bsc#1182011 ltc#191844). o ibmvnic: avoid multiple line dereference (bsc#1183871 ltc#192139). o ibmvnic: fix block comments (bsc#1183871 ltc#192139). o ibmvnic: fix braces (bsc#1183871 ltc#192139). o ibmvnic: fix miscellaneous checks (bsc#1183871 ltc#192139). o ibmvnic: Fix possibly uninitialized old_num_tx_queues variable warning (jsc #SLE-17268). o ibmvnic: merge do_change_param_reset into do_reset (bsc#1183871 ltc# 192139). o ibmvnic: prefer strscpy over strlcpy (bsc#1183871 ltc#192139). o ibmvnic: prefer 'unsigned long' over 'unsigned long int' (bsc#1183871 ltc# 192139). o ibmvnic: remove excessive irqsave (bsc#1182485 ltc#191591). o ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1183871 ltc# 192139). o ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1183871 ltc# 192139). o ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc# 1183871 ltc#192139). o ibmvnic: simplify reset_long_term_buff function (bsc#1183023 ltc#191791). o ibmvnic: substitute mb() with dma_wmb() for send_*crq* functions (bsc# 1183023 ltc#191791). o ice: fix memory leak if register_netdev_fails (git-fixes). o ice: fix memory leak in ice_vsi_setup (git-fixes). o ice: Fix state bits on LLDP mode switch (jsc#SLE-7926). o ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926). o ice: renegotiate link after FW DCB on (jsc#SLE-8464). o ice: report correct max number of TCs (jsc#SLE-7926). o ice: update the number of available RSS queues (jsc#SLE-7926). o igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634). o iio: adc: ad7949: fix wrong ADC result due to incorrect bit mask (git-fixes). o iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes). o iio: adis16400: Fix an error code in adis16400_initial_setup() (git-fixes). o iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes). o iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes). o iio: hid-sensor-prox: Fix scale not correct issue (git-fixes). o iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes). o include/linux/sched/mm.h: use rcu_dereference in in_vfork() (git-fixes). o Input: applespi - do not wait for responses to commands indefinitely (git-fixes). o Input: elantech - fix protocol errors for some trackpoints in SMBus mode (git-fixes). o Input: i8042 - add ASUS Zenbook Flip to noselftest list (git-fixes). o Input: raydium_ts_i2c - do not send zero length (git-fixes). o Input: xpad - add support for PowerA Enhanced Wired Controller for Xbox Series X|S (git-fixes). o iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc# 1183277). o iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183278). o iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc# 1183637). o iommu/vt-d: Add get_domain_info() helper (bsc#1183279). o iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183280). o iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183281). o iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183282). o iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc# 1183283). o iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc# 1183284). o iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc# 1183285). o iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183286). o ionic: linearize tso skb with too many frags (bsc#1167773). o kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes). o kbuild: add dummy toolchains to enable all cc-option etc. in Kconfig (bcs# 1181862). o kbuild: change *FLAGS_.o to take the path relative to $(obj) (bcs#1181862). o kbuild: dummy-tools, fix inverted tests for gcc (bcs#1181862). o kbuild: dummy-tools, support MPROFILE_KERNEL checks for ppc (bsc#1181862). o kbuild: Fail if gold linker is detected (bcs#1181862). o kbuild: improve cc-option to clean up all temporary files (bsc#1178330). o kbuild: include scripts/Makefile.* only when relevant CONFIG is enabled (bcs#1181862). o kbuild: simplify GCC_PLUGINS enablement in dummy-tools/gcc (bcs#1181862). o kbuild: stop filtering out $(GCC_PLUGINS_CFLAGS) from cc-option base (bcs# 1181862). o kbuild: use -S instead of -E for precise cc-option test in Kconfig (bsc# 1178330). o kconfig: introduce m32-flag and m64-flag (bcs#1181862). o KVM: nVMX: Properly handle userspace interrupt window request (bsc# 1183427). o KVM: SVM: Clear the CR4 register on reset (bsc#1183252). o KVM: x86: Add helpers to perform CPUID-based guest vendor check (bsc# 1183445). o KVM: x86: Add RIP to the kvm_entry, i.e. VM-Enter, tracepoint Needed as a dependency of 0b40723a827 ("kvm: tracing: Fix unmatched kvm_entry and kvm_exit events", bsc#1182770). o KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc# 1183287). o KVM: x86: do not reset microcode version on INIT or RESET (bsc#1183412). o KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc# 1183447). o KVM: x86: list MSR_IA32_UCODE_REV as an emulated MSR (bsc#1183369). o KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits max entries (bsc# 1183428). o KVM: x86: Set so called 'reserved CR3 bits in LM mask' at vCPU reset (bsc# 1183288). o libbpf: Clear map_info before each bpf_obj_get_info_by_fd (bsc#1155518). o libbpf: Fix BTF dump of pointer-to-array-of-struct (bsc#1155518). o libbpf: Fix INSTALL flag order (bsc#1155518). o libbpf: Use SOCK_CLOEXEC when opening the netlink socket (bsc#1155518). o lib/syscall: fix syscall registers retrieval on 32-bit platforms (git-fixes). o locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes). o loop-be-paranoid-on-exit-and-prevent-new-additions-r.patch: (bsc#1171295). o mac80211: choose first enabled channel for monitor (git-fixes). o mac80211: fix double free in ibss_leave (git-fixes). o mac80211: fix rate mask reset (git-fixes). o mac80211: fix TXQ AC confusion (git-fixes). o mdio: fix mdio-thunder.c dependency & build error (git-fixes). o media: cros-ec-cec: do not bail on device_init_wakeup failure (git-fixes). o media: cx23885: add more quirks for reset DMA on some AMD IOMMU (git-fixes). o media: mceusb: Fix potential out-of-bounds shift (git-fixes). o media: mceusb: sanity check for prescaler value (git-fixes). o media: rc: compile rc-cec.c into rc-core (git-fixes). o media: usbtv: Fix deadlock on suspend (git-fixes). o media: uvcvideo: Allow entities with no pads (git-fixes). o media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate (git-fixes). o media: v4l: vsp1: Fix bru null pointer access (git-fixes). o media: v4l: vsp1: Fix uif null pointer access (git-fixes). o media: vicodec: add missing v4l2_ctrl_request_hdl_put() (git-fixes). o misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes). o misc: fastrpc: restrict user apps from sending kernel RPC messages (git-fixes). o misc/pvpanic: Export module FDT device table (git-fixes). o misc: rtsx: init of rts522a add OCP power off when no card is present (git-fixes). o mISDN: fix crash in fritzpci (git-fixes). o mmc: core: Fix partition switch time for eMMC (git-fixes). o mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes). o mmc: mxs-mmc: Fix a resource leak in an error handling path in 'mxs_mmc_probe()' (git-fixes). o mmc: sdhci-esdhc-imx: fix kernel panic when remove module (git-fixes). o mmc: sdhci-of-dwcmshc: set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes). o mm: hugetlbfs: fix cannot migrate the fallocated HugeTLB page (git-fixes). o mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1168777). o mount: fix mounting of detached mounts onto targets that reside on shared mounts (git-fixes). o mt76: dma: do not report truncated frames to mac80211 (git-fixes). o mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes). o net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes). o net: atheros: switch from 'pci_' to 'dma_' API (git-fixes). o net: b44: fix error return code in b44_init_one() (git-fixes). o net: bonding: fix error return code of bond_neigh_init() (bsc#1154353). o net: cdc-phonet: fix data-interface release on probe failure (git-fixes). o net: core: introduce __netdev_notify_peers (bsc#1183871 ltc#192139). o netdevsim: init u64 stats for 32bit hardware (git-fixes). o net: dsa: rtl8366: Fix VLAN semantics (git-fixes). o net: dsa: rtl8366: Fix VLAN set-up (git-fixes). o net: dsa: rtl8366rb: Support all 4096 VLANs (git-fixes). o net: enic: Cure the enic api locking trainwreck (git-fixes). o net: ethernet: aquantia: Fix wrong return value (git-fixes). o net: ethernet: cavium: octeon_mgmt: use phy_start and phy_stop (git-fixes). o net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1183871 ltc#192139). o net: ethernet: ti: cpsw: fix clean up of vlan mc entries for host port (git-fixes). o net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes). o net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes). o net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes). o net: fec: Fix reference count leak in fec series ops (git-fixes). o net: gemini: Fix another missing clk_disable_unprepare() in probe (git-fixes). o net: gemini: Fix missing free_netdev() in error path of gemini_ethernet_port_probe() (git-fixes). o net: gianfar: Add of_node_put() before goto statement (git-fixes). o net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes). o net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes). o net: hns3: Remove the left over redundant check & assignment (bsc#1154353). o net: korina: cast KSEG0 address to pointer in kfree (git-fixes). o net: korina: fix kfree of rx/tx descriptor array (git-fixes). o net: lantiq: Wait for the GPHY firmware to be ready (git-fixes). o net/mlx5: Disable devlink reload for lag devices (jsc#SLE-8464). o net/mlx5: Disable devlink reload for multi port slave device (jsc# SLE-8464). o net/mlx5: Disallow RoCE on lag device (jsc#SLE-8464). o net/mlx5: Disallow RoCE on multi port slave device (jsc#SLE-8464). o net/mlx5e: E-switch, Fix rate calculation division (jsc#SLE-8464). o net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464). o net/mlx5: Fix PPLM register mapping (jsc#SLE-8464). o net: mvneta: fix double free of txq->buf (git-fixes). o net: mvneta: make tx buffer array agnostic (git-fixes). o net: pasemi: fix error return code in pasemi_mac_open() (git-fixes). o net: phy: broadcom: Only advertise EEE for supported modes (git-fixes). o net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes). o net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes). o net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405) o netsec: restore phy power state after controller reset (bsc#1183757). o net: spider_net: Fix the size used in a 'dma_free_coherent()' call (git-fixes). o net: stmmac: Fix incorrect location to set real_num_rx|tx_queues (git-fixes). o net: stmmac: removed enabling eee in EEE set callback (git-fixes). o net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes). o net: stmmac: Use rtnl_lock/unlock on netif_set_real_num_rx_queues() call (git-fixes). o net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes). o net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes). o net: usb: qmi_wwan: support ZTE P685M modem (git-fixes). o net: wan/lmc: unregister device when no matching device is found (git-fixes). o nfp: flower: fix pre_tun mask id allocation (bsc#1154353). o nvme: allocate the keep alive request using BLK_MQ_REQ_NOWAIT (bsc# 1182077). o nvme-fabrics: fix kato initialization (bsc#1182591). o nvme-fabrics: only reserve a single tag (bsc#1182077). o nvme-fc: fix racing controller reset and create association (bsc#1183048). o nvme-hwmon: Return error code when registration fails (bsc#1177326). o nvme: merge nvme_keep_alive into nvme_keep_alive_work (bsc#1182077). o nvme: return an error if nvme_set_queue_count() fails (bsc#1180197). o nvmet-rdma: Fix list_del corruption on queue establishment failure (bsc# 1183501). o objtool: Fix ".cold" section suffix check for newer versions of GCC (bsc# 1169514). o objtool: Fix error handling for STD/CLD warnings (bsc#1169514). o objtool: Fix retpoline detection in asm code (bsc#1169514). o ovl: fix dentry leak in ovl_get_redirect (bsc#1184176). o ovl: fix out of date comment and unreachable code (bsc#1184176). o ovl: fix regression with re-formatted lower squashfs (bsc#1184176). o ovl: fix unneeded call to ovl_change_flags() (bsc#1184176). o ovl: fix value of i_ino for lower hardlink corner case (bsc#1184176). o ovl: initialize error in ovl_copy_xattr (bsc#1184176). o ovl: relax WARN_ON() when decoding lower directory file handle (bsc# 1184176). o PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse (git-fixes). o PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes). o PCI: Align checking of syscall user config accessors (git-fixes). o PCI: Decline to resize resources if boot config must be preserved (git-fixes). o PCI: Fix pci_register_io_range() memory leak (git-fixes). o PCI: mediatek: Add missing of_node_put() to fix reference leak (git-fixes). o PCI: qcom: Use PHY_REFCLK_USE_PAD only for ipq8064 (git-fixes). o PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes). o pinctrl: rockchip: fix restore error in resume (git-fixes). o Platform: OLPC: Fix probe error handling (git-fixes). o platform/x86: acer-wmi: Add ACER_CAP_KBD_DOCK quirk for the Aspire Switch 10E SW3-016 (git-fixes). o platform/x86: acer-wmi: Add ACER_CAP_SET_FUNCTION_MODE capability flag (git-fixes). o platform/x86: acer-wmi: Add new force_caps module parameter (git-fixes). o platform/x86: acer-wmi: Add support for SW_TABLET_MODE on Switch devices (git-fixes). o platform/x86: acer-wmi: Cleanup accelerometer device handling (git-fixes). o platform/x86: acer-wmi: Cleanup ACER_CAP_FOO defines (git-fixes). o platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes). o platform/x86: intel-vbtn: Stop reporting SW_DOCK events (git-fixes). o platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes). o PM: EM: postpone creating the debugfs dir till fs_initcall (git-fixes). o PM: runtime: Add pm_runtime_resume_and_get to deal with usage counter (bsc# 1183366). o PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes). o PM: runtime: Fix race getting/putting suppliers at probe (git-fixes). o post.sh: Return an error when module update fails (bsc#1047233 bsc# 1184388). o powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc# 1065729). o powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963). o powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes). o powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922). o powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc# 189159 git-fixes bsc#1183662 ltc#191922). o powerpc/pseries/ras: Remove unused variable 'status' (bsc#1065729). o powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395). o powerpc/sstep: Fix darn emulation (bsc#1156395). o powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395). o powerpc/sstep: Fix load-store and update emulation (bsc#1156395). o printk: fix deadlock when kernel panic (bsc#1183018). o proc: fix lookup in /proc/net subdirectories after setns(2) (git-fixes). o pwm: rockchip: rockchip_pwm_probe(): Remove superfluous clk_unprepare() (git-fixes). o qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes). o qxl: Fix uninitialised struct field head.surface_id (git-fixes). o random: fix the RNDRESEEDCRNG ioctl (git-fixes). o RAS/CEC: Correct ce_add_elem()'s returned values (bsc#1152489). o RDMA/hns: Disable RQ inline by default (jsc#SLE-8449). o RDMA/hns: Fix type of sq_signal_bits (jsc#SLE-8449). o RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc# 1169709) o regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes). o Revert "net: bonding: fix error return code of bond_neigh_init()" (bsc# 1154353). o rpadlpar: fix potential drc_name corruption in store functions (bsc#1183416 ltc#191079). o rpm/check-for-config-changes: add -mrecord-mcount ignore Added by 3b15cdc15956 (tracing: move function tracer options to Kconfig) upstream. o rpm/check-for-config-changes: Also ignore AS_VERSION added in 5.12. o rpm/check-for-config-changes: comment on the list To explain what it actually is. o rpm/check-for-config-changes: declare sed args as an array So that we can reuse it in both seds. This also introduces IGNORED_CONFIGS_RE array which can be easily extended. o rpm/check-for-config-changes: define ignores more strictly * search for whole words, so make wildcards explicit * use ' for quoting * prepend CONFIG_ dynamically, so it need not be in the list o rpm/check-for-config-changes: sort the ignores They are growing so to make them searchable by humans. o rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc# 1184514) The devel package requires the kernel binary package itself for building modules externally. o rsi: Fix TX EAPOL packet handling against iwlwifi AP (git-fixes). o rsi: Move card interrupt handling to RX thread (git-fixes). o rsxx: Return -EFAULT if copy_to_user() fails (git-fixes). o s390/cio: return -EFAULT if copy_to_user() fails (git-fixes). o s390/cio: return -EFAULT if copy_to_user() fails (git-fixes). o s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes). o s390/dasd: fix hanging IO request during DASD driver unbind (git-fixes). o s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes). o s390/qeth: fix notification for pending buffers during teardown (git-fixes). o s390/qeth: improve completion of pending TX buffers (git-fixes). o s390/qeth: schedule TX NAPI on QAOB completion (git-fixes). o s390/vtime: fix increased steal time accounting (bsc#1183859). o samples, bpf: Add missing munmap in xdpsock (bsc#1155518). o scsi: ibmvfc: Fix invalid state machine BUG_ON() (bsc#1184647 ltc#191231). o scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574). o scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574). o scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574). o scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574). o scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc# 1182574). o scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574). o scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574). o scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc# 1182574). o scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574). o scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc# 1182574). o scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574). o scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574). o scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574). o scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574). o scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574). o scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc# 1182574). o scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc# 1182574). o scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574). o scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574). o scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574). o scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc# 1182574). o scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574). o scsi: target: pscsi: Avoid OOM in pscsi_map_sg() (bsc#1183843). o scsi: target: pscsi: Clean up after failure in pscsi_map_sg() (bsc# 1183843). o selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier (bsc#1155518). o selftests/bpf: No need to drop the packet when there is no geneve opt (bsc# 1155518). o selftests/bpf: Set gopt opt_class to 0 if get tunnel opt failed (bsc# 1155518). o selinux: fix error initialization in inode_doinit_with_dentry() (git-fixes). o selinux: Fix error return code in sel_ib_pkey_sid_slow() (git-fixes). o selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling (git-fixes). o smb3: add dynamic trace point to trace when credits obtained (bsc#1181507). o smb3: fix crediting for compounding when only one request in flight (bsc# 1181507). o smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540). o soc/fsl: qbman: fix conflicting alignment attributes (git-fixes). o software node: Fix node registration (git-fixes). o spi: stm32: make spurious and overrun interrupts visible (git-fixes). o squashfs: fix inode lookup sanity checks (bsc#1183750). o squashfs: fix xattr id and id lookup sanity checks (bsc#1183750). o stop_machine: mark helpers __always_inline (git-fixes). o thermal/core: Add NULL pointer check before using cooling device stats (git-fixes). o udlfb: Fix memory leak in dlfb_usb_probe (git-fixes). o Update bug reference for USB-audio fixes (bsc#1182552 bsc#1183598) o USB: cdc-acm: downgrade message to debug (git-fixes). o USB: cdc-acm: fix double free on probe failure (git-fixes). o USB: cdc-acm: fix use-after-free after probe failure (git-fixes). o USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes). o USB: dwc2: Fix HPRT0.PrtSusp bit setting for HiKey 960 board (git-fixes). o USB: dwc2: Prevent core suspend when port connection flag is 0 (git-fixes). o USB: dwc3: gadget: Fix dep->interval for fullspeed interrupt (git-fixes). o USB: dwc3: gadget: Fix setting of DEPCFG.bInterval_m1 (git-fixes). o USB: dwc3: qcom: Add missing DWC3 OF node refcount decrement (git-fixes). o USB: dwc3: qcom: Honor wakeup enabled/disabled state (git-fixes). o USB: gadget: configfs: Fix KASAN use-after-free (git-fixes). o USB: gadget: f_uac1: stop playback on function disable (git-fixes). o USB: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes). o USB: gadget: udc: amd5536udc_pci fix null-ptr-dereference (git-fixes). o USB: gadget: u_ether: Fix a configfs return code (git-fixes). o USBip: Fix incorrect double assignment to udc->ud.tcp_rx (git-fixes). o USBip: fix stub_dev to check for stream socket (git-fixes). o USBip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes). o USBip: fix vhci_hcd attach_store() races leading to gpf (git-fixes). o USBip: fix vhci_hcd to check for stream socket (git-fixes). o USBip: fix vudc to check for stream socket (git-fixes). o USBip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes). o USBip: tools: fix build error for multiple definition (git-fixes). o USBip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes). o USB: musb: Fix suspend with devices connected for a64 (git-fixes). o USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes). o USB: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM (git-fixes). o USB: replace hardcode maximum usb string length by definition (git-fixes). o USB: serial: ch341: add new Product ID (git-fixes). o USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter (git-fixes). o USB: serial: cp210x: add some more GE USB IDs (git-fixes). o USB: serial: ftdi_sio: fix FTX sub-integer prescaler (git-fixes). o USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes). o USB-storage: Add quirk to defeat Kindle's automatic unload (git-fixes). o USB: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes). o USB: usblp: fix a hang in poll() if disconnected (git-fixes). o USB: xhci: do not perform Soft Retry for some xHCI hosts (git-fixes). o USB: xhci: Fix ASMedia ASM1042A and ASM3242 DMA addressing (git-fixes). o USB: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes). o use __netdev_notify_peers in ibmvnic (bsc#1183871 ltc#192139). o video: fbdev: acornfb: remove free_unused_pages() (bsc#1152489) o video: hyperv_fb: Fix a double free in hvfb_probe (git-fixes). o VMCI: Use set_page_dirty_lock() when unregistering guest memory (git-fixes). o vt/consolemap: do font sum unsigned (git-fixes). o watchdog: mei_wdt: request stop on unregister (git-fixes). o wireguard: device: do not generate ICMP for non-IP packets (git-fixes). o wireguard: kconfig: use arm chacha even with no neon (git-fixes). o wireguard: selftests: test multiple parallel streams (git-fixes). o wlcore: Fix command execute failure 19 for wl12xx (git-fixes). o x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1152489). o x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc# 1152489). o x86/ioapic: Ignore IRQ2 again (bsc#1152489). o x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc () (bsc#1152489). o xen/events: avoid handling the same event on two cpus at the same time (git-fixes). o xen/events: do not unmask an event channel when an eoi is pending (git-fixes). o xen/events: fix setting irq affinity (bsc#1184583). o xen/events: reset affinity of 2-level event when tearing it down (git-fixes). o xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367). o xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367). o xfs: group quota should return EDQUOT when prj quota enabled (bsc#1180980). o xhci: Fix repeated xhci wake after suspend due to uncleared internal wake state (git-fixes). o xhci: Improve detection of device initiated wake signal (git-fixes). Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Module for Realtime 15-SP2: zypper in -t patch SUSE-SLE-Module-RT-15-SP2-2021-1211=1 Package List: o SUSE Linux Enterprise Module for Realtime 15-SP2 (x86_64): cluster-md-kmp-rt-5.3.18-33.1 cluster-md-kmp-rt-debuginfo-5.3.18-33.1 dlm-kmp-rt-5.3.18-33.1 dlm-kmp-rt-debuginfo-5.3.18-33.1 gfs2-kmp-rt-5.3.18-33.1 gfs2-kmp-rt-debuginfo-5.3.18-33.1 kernel-rt-5.3.18-33.1 kernel-rt-debuginfo-5.3.18-33.1 kernel-rt-debugsource-5.3.18-33.1 kernel-rt-devel-5.3.18-33.1 kernel-rt-devel-debuginfo-5.3.18-33.1 kernel-rt_debug-debuginfo-5.3.18-33.1 kernel-rt_debug-debugsource-5.3.18-33.1 kernel-rt_debug-devel-5.3.18-33.1 kernel-rt_debug-devel-debuginfo-5.3.18-33.1 kernel-syms-rt-5.3.18-33.1 ocfs2-kmp-rt-5.3.18-33.1 ocfs2-kmp-rt-debuginfo-5.3.18-33.1 o SUSE Linux Enterprise Module for Realtime 15-SP2 (noarch): kernel-devel-rt-5.3.18-33.1 kernel-source-rt-5.3.18-33.1 References: o https://www.suse.com/security/cve/CVE-2019-18814.html o https://www.suse.com/security/cve/CVE-2019-19769.html o https://www.suse.com/security/cve/CVE-2020-25670.html o https://www.suse.com/security/cve/CVE-2020-25671.html o https://www.suse.com/security/cve/CVE-2020-25672.html o https://www.suse.com/security/cve/CVE-2020-25673.html o https://www.suse.com/security/cve/CVE-2020-27170.html o https://www.suse.com/security/cve/CVE-2020-27171.html o https://www.suse.com/security/cve/CVE-2020-27815.html o https://www.suse.com/security/cve/CVE-2020-35519.html o https://www.suse.com/security/cve/CVE-2020-36310.html o https://www.suse.com/security/cve/CVE-2020-36311.html o https://www.suse.com/security/cve/CVE-2020-36312.html o https://www.suse.com/security/cve/CVE-2021-27363.html o https://www.suse.com/security/cve/CVE-2021-27364.html o https://www.suse.com/security/cve/CVE-2021-27365.html o https://www.suse.com/security/cve/CVE-2021-28038.html o https://www.suse.com/security/cve/CVE-2021-28375.html o https://www.suse.com/security/cve/CVE-2021-28660.html o https://www.suse.com/security/cve/CVE-2021-28688.html o https://www.suse.com/security/cve/CVE-2021-28950.html o https://www.suse.com/security/cve/CVE-2021-28964.html o https://www.suse.com/security/cve/CVE-2021-28971.html o https://www.suse.com/security/cve/CVE-2021-28972.html o https://www.suse.com/security/cve/CVE-2021-29154.html o https://www.suse.com/security/cve/CVE-2021-29264.html o https://www.suse.com/security/cve/CVE-2021-29265.html o https://www.suse.com/security/cve/CVE-2021-29647.html o https://www.suse.com/security/cve/CVE-2021-30002.html o https://www.suse.com/security/cve/CVE-2021-3428.html o https://www.suse.com/security/cve/CVE-2021-3444.html o https://www.suse.com/security/cve/CVE-2021-3483.html o https://bugzilla.suse.com/1047233 o https://bugzilla.suse.com/1065729 o https://bugzilla.suse.com/1113295 o https://bugzilla.suse.com/1152472 o https://bugzilla.suse.com/1152489 o https://bugzilla.suse.com/1153274 o https://bugzilla.suse.com/1154353 o https://bugzilla.suse.com/1155518 o https://bugzilla.suse.com/1156256 o https://bugzilla.suse.com/1156395 o https://bugzilla.suse.com/1159280 o https://bugzilla.suse.com/1160634 o https://bugzilla.suse.com/1167773 o https://bugzilla.suse.com/1168777 o https://bugzilla.suse.com/1169514 o https://bugzilla.suse.com/1169709 o https://bugzilla.suse.com/1171295 o https://bugzilla.suse.com/1173485 o https://bugzilla.suse.com/1177326 o https://bugzilla.suse.com/1178163 o https://bugzilla.suse.com/1178181 o https://bugzilla.suse.com/1178330 o https://bugzilla.suse.com/1179454 o https://bugzilla.suse.com/1180197 o https://bugzilla.suse.com/1180980 o https://bugzilla.suse.com/1181383 o https://bugzilla.suse.com/1181507 o https://bugzilla.suse.com/1181674 o https://bugzilla.suse.com/1181862 o https://bugzilla.suse.com/1182011 o https://bugzilla.suse.com/1182077 o https://bugzilla.suse.com/1182485 o https://bugzilla.suse.com/1182552 o https://bugzilla.suse.com/1182574 o https://bugzilla.suse.com/1182591 o https://bugzilla.suse.com/1182595 o https://bugzilla.suse.com/1182712 o https://bugzilla.suse.com/1182713 o https://bugzilla.suse.com/1182715 o https://bugzilla.suse.com/1182716 o https://bugzilla.suse.com/1182717 o https://bugzilla.suse.com/1182770 o https://bugzilla.suse.com/1182989 o https://bugzilla.suse.com/1183015 o https://bugzilla.suse.com/1183018 o https://bugzilla.suse.com/1183022 o https://bugzilla.suse.com/1183023 o https://bugzilla.suse.com/1183048 o https://bugzilla.suse.com/1183252 o https://bugzilla.suse.com/1183277 o https://bugzilla.suse.com/1183278 o https://bugzilla.suse.com/1183279 o https://bugzilla.suse.com/1183280 o https://bugzilla.suse.com/1183281 o https://bugzilla.suse.com/1183282 o https://bugzilla.suse.com/1183283 o https://bugzilla.suse.com/1183284 o https://bugzilla.suse.com/1183285 o https://bugzilla.suse.com/1183286 o https://bugzilla.suse.com/1183287 o https://bugzilla.suse.com/1183288 o https://bugzilla.suse.com/1183366 o https://bugzilla.suse.com/1183369 o https://bugzilla.suse.com/1183386 o https://bugzilla.suse.com/1183405 o https://bugzilla.suse.com/1183412 o https://bugzilla.suse.com/1183416 o https://bugzilla.suse.com/1183427 o https://bugzilla.suse.com/1183428 o https://bugzilla.suse.com/1183445 o https://bugzilla.suse.com/1183447 o https://bugzilla.suse.com/1183501 o https://bugzilla.suse.com/1183509 o https://bugzilla.suse.com/1183530 o https://bugzilla.suse.com/1183534 o https://bugzilla.suse.com/1183540 o https://bugzilla.suse.com/1183593 o https://bugzilla.suse.com/1183596 o https://bugzilla.suse.com/1183598 o https://bugzilla.suse.com/1183637 o https://bugzilla.suse.com/1183646 o https://bugzilla.suse.com/1183662 o https://bugzilla.suse.com/1183686 o https://bugzilla.suse.com/1183692 o https://bugzilla.suse.com/1183696 o https://bugzilla.suse.com/1183750 o https://bugzilla.suse.com/1183757 o https://bugzilla.suse.com/1183775 o https://bugzilla.suse.com/1183843 o https://bugzilla.suse.com/1183859 o https://bugzilla.suse.com/1183871 o https://bugzilla.suse.com/1184074 o https://bugzilla.suse.com/1184120 o https://bugzilla.suse.com/1184167 o https://bugzilla.suse.com/1184168 o https://bugzilla.suse.com/1184170 o https://bugzilla.suse.com/1184176 o https://bugzilla.suse.com/1184192 o https://bugzilla.suse.com/1184193 o https://bugzilla.suse.com/1184194 o https://bugzilla.suse.com/1184196 o https://bugzilla.suse.com/1184198 o https://bugzilla.suse.com/1184211 o https://bugzilla.suse.com/1184217 o https://bugzilla.suse.com/1184218 o https://bugzilla.suse.com/1184219 o https://bugzilla.suse.com/1184220 o https://bugzilla.suse.com/1184224 o https://bugzilla.suse.com/1184388 o https://bugzilla.suse.com/1184391 o https://bugzilla.suse.com/1184393 o https://bugzilla.suse.com/1184509 o https://bugzilla.suse.com/1184511 o https://bugzilla.suse.com/1184512 o https://bugzilla.suse.com/1184514 o https://bugzilla.suse.com/1184583 o https://bugzilla.suse.com/1184647 - -------------------------------------------------------------------------------- SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:1210-1 Rating: important References: #1065600 #1065729 #1103990 #1103991 #1103992 #1104270 #1104353 #1109837 #1111981 #1112374 #1113295 #1113994 #1118657 #1118661 #1119113 #1126390 #1129770 #1132477 #1142635 #1152446 #1154048 #1169709 #1172455 #1173485 #1175165 #1176720 #1176855 #1178163 #1178181 #1179243 #1179428 #1179454 #1179660 #1179755 #1180846 #1181507 #1181515 #1181544 #1181655 #1181674 #1181747 #1181753 #1181843 #1182011 #1182175 #1182485 #1182574 #1182715 #1182716 #1182717 #1183018 #1183022 #1183023 #1183378 #1183379 #1183380 #1183381 #1183382 #1183405 #1183416 #1183509 #1183593 #1183646 #1183662 #1183686 #1183692 #1183696 #1183755 #1183775 #1183861 #1183871 #1184114 #1184120 #1184167 #1184168 #1184170 #1184192 #1184193 #1184196 #1184198 #1184391 #1184393 #1184397 #1184494 #1184511 #1184583 Cross-References: CVE-2020-0433 CVE-2020-25670 CVE-2020-25671 CVE-2020-25672 CVE-2020-25673 CVE-2020-27170 CVE-2020-27171 CVE-2020-27815 CVE-2020-29368 CVE-2020-29374 CVE-2020-35519 CVE-2020-36311 CVE-2021-20219 CVE-2021-26930 CVE-2021-26931 CVE-2021-26932 CVE-2021-27363 CVE-2021-27364 CVE-2021-27365 CVE-2021-28038 CVE-2021-28660 CVE-2021-28688 CVE-2021-28964 CVE-2021-28971 CVE-2021-28972 CVE-2021-29154 CVE-2021-29264 CVE-2021-29265 CVE-2021-29647 CVE-2021-30002 CVE-2021-3428 CVE-2021-3444 CVE-2021-3483 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP5 SUSE Linux Enterprise Software Development Kit 12-SP5 SUSE Linux Enterprise Server 12-SP5 SUSE Linux Enterprise Live Patching 12-SP5 SUSE Linux Enterprise High Availability 12-SP5 ______________________________________________________________________________ An update that solves 33 vulnerabilities and has 53 fixes is now available. Description: The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: o CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read (bsc#1184170). o CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc# 1173485). o CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ). o CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167). o CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168). o CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198). o CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ). o CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193). o CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646). o CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc# 1183593 ). o CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc# 1183022). o CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715). o CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717). o CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716). o CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747). o CVE-2021-26931: Fixed an issue where Linux kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753). o CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843). o CVE-2020-35519: Fixed an out-of-bounds memory access was found in x25_bind (bsc#1183696). o CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access (bsc# 1179660, bsc#1179428). o CVE-2020-27815: Fixed an issue in JFS filesystem where could have allowed an attacker to execute code (bsc#1179454). o CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775). o CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc# 1183686). o CVE-2020-0433: Fixed a use after free due to improper locking which could have led to local escalation of privilege (bsc#1176720). o CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393). o CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120). o CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391). o CVE-2021-20219: Fixed a denial of service in n_tty_receive_char_special (bsc#1184397). o CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511). o CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181). The following non-security bugs were fixed: o ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes). o ALSA: ctxfi: cthw20k2: fix mask on conf to allow 4 bits (git-fixes). o ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes). o ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes). o amba: Fix resource leak for drivers without .remove (git-fixes). o bfq: Fix kABI for update internal depth state when queue depth changes (bsc #1172455). o bfq: update internal depth state when queue depth changes (bsc#1172455). o block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes). o Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes). o Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes). o Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes). o bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775). o bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170). o bpf: fix subprog verifier bypass by div/mod by 0 exception (bsc#1184170). o bpf: fix x64 JIT code generation for jmp to 1st insn (bsc#1178163). o bpf_lru_list: Read double-checked variable once without lock (git-fixes). o bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc# 1183775). o bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163). o bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes). o can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes). o can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes). o can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes). o can: peak_usb: add forgotten supported devices (git-fixes). o can: peak_usb: Revert "can: peak_usb: add forgotten supported devices" (git-fixes). o can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes). o cifs: change noisy error message to FYI (bsc#1181507). o cifs: check all path components in resolved dfs target (bsc#1179755). o cifs_debug: use %pd instead of messing with ->d_name (bsc#1181507). o cifs: do not send close in compound create+close requests (bsc#1181507). o cifs: fix nodfs mount option (bsc#1179755). o cifs: introduce helper for finding referral server (bsc#1179755). o cifs: New optype for session operations (bsc#1181507). o cifs: print MIDs in decimal notation (bsc#1181507). o cifs: return proper error code in statfs(2) (bsc#1181507). o cifs: Tracepoints and logs for tracing credit changes (bsc#1181507). o cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (bsc#1104270). o dmaengine: hsu: disable spurious interrupt (git-fixes). o drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if (bsc# 1129770) o drm/atomic: Create __drm_atomic_helper_crtc_reset() for subclassing (bsc# 1142635) o drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc# 1129770) o drm/compat: Clear bounce structures (bsc#1129770) o drm/etnaviv: replace MMU flush marker with flush sequence (bsc#1154048) o drm/gma500: Fix error return code in psb_driver_load() (bsc#1129770) o drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc# 1152446) o drm/mediatek: Fix aal size config (bsc#1129770) o drm: meson_drv add shutdown function (git-fixes). o drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes). o drm/msm/dsi: Correct io_start for MSM8994 (20nm PHY) (bsc#1129770) o drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes). o drm: mxsfb: check framebuffer pitch (bsc#1129770) o drm/omap: fix max fclk divider for omap36xx (bsc#1152446) o drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1129770) o drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1129770) o drm/radeon: fix AGP dependency (git-fixes). o drm: rcar-du: Put reference to VSP device (bsc#1129770) o drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1129770) o drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1129770) o ethernet: alx: fix order of calls on resume (git-fixes). o fbdev: aty: SPARC64 requires FB_ATY_CT (bsc#1129770) o firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes). o fix setting irq affinity (bsc#1184583) o futex: Prevent robust futex exit race (git-fixes). o gma500: clean up error handling in init (bsc#1129770) o gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes). o HID: make arrays usage and value to be the same (git-fixes). o i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes). o i40e: Add zero-initialization of AQ command structures (bsc#1109837 bsc# 1111981). o i40e: Fix add TC filter for IPv6 (bsc#1109837 bsc#1111981 ). o i40e: Fix endianness conversions (bsc#1109837 bsc#1111981 ). o IB/mlx5: Return appropriate error code instead of ENOMEM (bsc#1103991). o ibmvnic: add comments for spinlock_t definitions (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139). o ibmvnic: add memory barrier to protect long term buffer (bsc#1184114 ltc# 192237 bsc#1182485 ltc#191591). o ibmvnic: always store valid MAC address (bsc#1182011 ltc#191844). o ibmvnic: avoid multiple line dereference (bsc#1184114 ltc#192237 bsc# 1183871 ltc#192139). o ibmvnic: compare adapter->init_done_rc with more readable ibmvnic_rc_codes (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290). o ibmvnic: Correctly re-enable interrupts in NAPI polling routine (bsc# 1184114 ltc#192237 bsc#1179243 ltc#189290). o ibmvnic: create send_control_ip_offload (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290). o ibmvnic: create send_query_ip_offload (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290). o ibmvnic: Do not replenish RX buffers after every polling loop (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290). o ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1184114 ltc# 192237 bsc#1182485 ltc#191591). o ibmvnic: Ensure that device queue memory is cache-line aligned (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290). o ibmvnic: Ensure that SCRQ entry reads are correctly ordered (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290). o ibmvnic: fix block comments (bsc#1184114 ltc#192237 bsc#1183871 ltc# 192139). o ibmvnic: fix braces (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139). o ibmvnic: fix miscellaneous checks (bsc#1184114 ltc#192237 bsc#1183871 ltc# 192139). o ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (bsc#1184114 ltc# 192237 bsc#1179243 ltc#189290). o ibmvnic: Fix possibly uninitialized old_num_tx_queues variable warning (bsc #1184114 ltc#192237). o ibmvnic: Fix TX completion error handling (bsc#1184114 ltc#192237 bsc# 1179243 ltc#189290). o ibmvnic: Fix use-after-free of VNIC login response buffer (bsc#1184114 ltc# 192237 bsc#1179243 ltc#189290). o ibmvnic: handle inconsistent login with reset (bsc#1184114 ltc#192237 bsc# 1179243 ltc#189290). o ibmvnic: Harden device Command Response Queue handshake (bsc#1184114 ltc# 192237 bsc#1179243 ltc#189290). o ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (bsc#1184114 ltc# 192237 bsc#1179243 ltc#189290). o ibmvnic: merge do_change_param_reset into do_reset (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139). o ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290). o ibmvnic: no reset timeout for 5 seconds after reset (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290). o ibmvnic: prefer strscpy over strlcpy (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139). o ibmvnic: prefer 'unsigned long' over 'unsigned long int' (bsc#1184114 ltc# 192237 bsc#1183871 ltc#192139). o ibmvnic: reduce wait for completion time (bsc#1184114 ltc#192237 bsc# 1179243 ltc#189290). o ibmvnic: remove excessive irqsave (bsc#1065729). o ibmvnic: remove never executed if statement (bsc#1184114 ltc#192237 bsc# 1179243 ltc#189290). o ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1184114 ltc# 192237 bsc#1183871 ltc#192139). o ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1184114 ltc# 192237 bsc#1183871 ltc#192139). o ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (bsc#1184114 ltc# 192237 bsc#1179243 ltc#189290). o ibmvnic: rename send_cap_queries to send_query_cap (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290). o ibmvnic: rename send_map_query to send_query_map (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290). o ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc# 1184114 ltc#192237 bsc#1183871 ltc#192139). o ibmvnic: send_login should check for crq errors (bsc#1184114 ltc#192237 bsc #1179243 ltc#189290). o ibmvnic: simplify reset_long_term_buff function (bsc#1184114 ltc#192237 bsc #1183023 ltc#191791). o ibmvnic: skip send_request_unmap for timeout reset (bsc#1184114 ltc#192237 bsc#1182485 ltc#191591). o ibmvnic: skip tx timeout reset while in resetting (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290). o ibmvnic: stop free_all_rwi on failed reset (bsc#1184114 ltc#192237 bsc# 1179243 ltc#189290). o ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (bsc #1184114 ltc#192237 bsc#1179243 ltc#189290). o ibmvnic: substitute mb() with dma_wmb() for send_*crq* functions (bsc# 1184114 ltc#192237 bsc#1183023 ltc#191791). o ibmvnic: track pending login (bsc#1184114 ltc#192237 bsc#1179243 ltc# 189290). o ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (bsc#1184114 ltc#192237 bsc#1179243 ltc#189290). o ibmvnic: Use 'skb_frag_address()' instead of hand coding it (bsc#1184114 ltc#192237). o ice: Account for port VLAN in VF max packet size calculation (bsc#1118661). o igc: check return value of ret_val in igc_config_fc_after_link_up (bsc# 1118657). o igc: Report speed and duplex as unknown when device is runtime suspended (jsc#SLE-4799). o igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (bsc#1118657). o iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes). o iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes). o iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes). o iio: hid-sensor-prox: Fix scale not correct issue (git-fixes). o iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes). o Input: i8042 - add ASUS Zenbook Flip to noselftest list (git-fixes). o Input: i8042 - unbreak Pegatron C15B (git-fixes). o Input: raydium_ts_i2c - do not send zero length (git-fixes). o Input: xpad - add support for PowerA Enhanced Wired Controller for Xbox Series X|S (git-fixes). o Input: xpad - sync supported devices with fork on GitHub (git-fixes). o iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc# 1183378). o iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183379). o iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183380). o iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183381). o ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (bsc#1113994). o kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846). o kabi/severities: Add rtas_online_cpus_mask, rtas_offline_cpus_mask o kernel/smp: add boot parameter for controlling CSD lock debugging (bsc# 1180846). o kernel/smp: add more data to CSD lock debugging (bsc#1180846). o kernel/smp: prepare more CSD lock debugging (bsc#1180846). o kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846). o KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc# 1183382). o lib/crc32test: remove extra local_irq_disable/enable (git-fixes). o locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes). o mac80211: fix double free in ibss_leave (git-fixes). o mac80211: fix rate mask reset (git-fixes). o media: usbtv: Fix deadlock on suspend (git-fixes). o media: uvcvideo: Allow entities with no pads (git-fixes). o misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes). o mmc: core: Fix partition switch time for eMMC (git-fixes). o mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE. o mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes). o mmc: sdhci-esdhc-imx: fix kernel panic when remove module (git-fixes). o mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes). o mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes). o net: bridge: use switchdev for port flags set through sysfs too (bsc# 1112374). o net: cdc-phonet: fix data-interface release on probe failure (git-fixes). o net: core: introduce __netdev_notify_peers (bsc#1184114 ltc#192237 bsc# 1183871 ltc#192139). o net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139). o net: hns3: add a check for index in hclge_get_rss_key() (bsc#1126390). o net: hns3: add a check for queue_id in hclge_reset_vf_queue() (bsc# 1104353). o net: hns3: fix bug when calculating the TCAM table info (bsc#1104353). o net: hns3: fix query vlan mask value error for flow director (bsc#1104353). o net/mlx5e: Update max_opened_tc also when channels are closed (bsc# 1103990). o net: phy: micrel: set soft_reset callback to genphy_soft_reset for KSZ8081 (bsc#1119113). o net: re-solve some conflicts after net -> net-next merge (bsc#1184114 ltc# 192237 bsc#1176855 ltc#187293). o net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405) o net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes). o net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes). o PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes). o PCI: Align checking of syscall user config accessors (git-fixes). o phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes). o platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes). o powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc# 1065729). o powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963). o powerpc: Convert to using %pOFn instead of device_node.name (bsc#1181674 ltc#189159). o powerpc: Fix some spelling mistakes (bsc#1181674 ltc#189159). o powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc# 189159). o powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159). o powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159). o powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc# 1181544 ltc#191080 git-fixes). o powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530). o powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc# 189159). o powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc# 189159). o powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159). o powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159). o powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159). o powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159). o powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159). o powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc# 189159). o powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc# 189159). o powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc# 189159). o powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc# 1181674 ltc#189159). o powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159). o powerpc/numa: Suppress "VPHN is not supported" messages (bsc#1181674 ltc# 189159). o powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes). o powerpc/pseries: Add empty update_numa_cpu_lookup_table() for NUMA=n (bsc# 1181674 ltc#189159). o powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc# 190855). o powerpc/pseries: Generalize hcall_vphn() (bsc#1181674 ltc#189159). o powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159). o powerpc/pseries/hibernation: pass stream id via function arguments (bsc# 1181674 ltc#189159). o powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159). o powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159). o powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc# 189159). o powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159). o powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159). o powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc# 1181674 ltc#189159). o powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc #1181674 ltc#189159). o powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc# 189159). o powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159). o powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922). o powerpc/pseries/mobility: refactor node lookup during DT update (bsc# 1181674 ltc#189159). o powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159). o powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159). o powerpc/pseries/mobility: signal suspend cancellation to platform (bsc# 1181674 ltc#189159). o powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc# 1181674 ltc#189159). o powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159). o powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc# 189159 git-fixes bsc#1183662 ltc#191922). o powerpc/pseries/ras: Remove unused variable 'status' (bsc#1065729). o powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159). o powerpc/pseries: remove memory "re-add" implementation (bsc#1181674 ltc# 189159). o powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc# 1181674 ltc#189159). o powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159). o powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159). o powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159). o powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc# 189159). o powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159). o powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc# 1181674 ltc#189159). o powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc# 189159). o powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159). o powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159). o powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc# 189159). o powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159). o powerpc/rtas: rtas_ibm_suspend_me -> rtas_ibm_suspend_me_unsafe (bsc# 1181674 ltc#189159). o powerpc/rtas: Unexport rtas_online_cpus_mask, rtas_offline_cpus_mask (bsc# 1181674 ltc#189159). o powerpc/vio: Use device_type to detect family (bsc#1181674 ltc#189159). o printk: fix deadlock when kernel panic (bsc#1183018). o pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc# 175530). o pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc #175530). o pwm: rockchip: rockchip_pwm_probe(): Remove superfluous clk_unprepare() (git-fixes). o qxl: Fix uninitialised struct field head.surface_id (git-fixes). o random: fix the RNDRESEEDCRNG ioctl (git-fixes). o rcu: Allow only one expedited GP to run concurrently with (git-fixes) o rcu: Fix missed wakeup of exp_wq waiters (git-fixes) o RDMA/mlx5: Use the correct obj_id upon DEVX TIR creation (bsc#1103991). o RDMA/rxe: Remove useless code in rxe_recv.c (bsc#1103992 ). o RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc# 1169709) o RDMA/uverbs: Fix kernel-doc warning of _uverbs_alloc (bsc#1103992). o Revert "ibmvnic: remove never executed if statement" (bsc#1184114 ltc# 192237 bsc#1179243 ltc#189290). o rpadlpar: fix potential drc_name corruption in store functions (bsc#1183416 ltc#191079). o rsxx: Return -EFAULT if copy_to_user() fails (git-fixes). o s390/cio: return -EFAULT if copy_to_user() fails (git-fixes). o s390/cio: return -EFAULT if copy_to_user() fails (git-fixes). o s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes). o s390/dasd: fix hanging offline processing due to canceled worker (bsc# 1175165). o s390/dasd: fix hanging offline processing due to canceled worker (bsc# 1175165). o s390/pci: Fix s390_mmio_read/write with MIO (LTC#192079 bsc#1183755). o s390/vtime: fix increased steal time accounting (bsc#1183861). o sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes) o sched/vtime: Fix guest/system mis-accounting on task switch (git-fixes) o scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574). o scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574). o scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574). o scsi: lpfc: Fix ancient double free (bsc#1182574). o scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574). o scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc# 1182574). o scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1182574). o scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574). o scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574). o scsi: lpfc: Fix kerneldoc inconsistency in lpfc_sli4_dump_page_a0() (bsc# 1182574). o scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc# 1182574). o scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574). o scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc# 1182574). o scsi: lpfc: Fix 'physical' typos (bsc#1182574). o scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574). o scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574). o scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574). o scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574). o scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574). o scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc# 1182574). o scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc# 1182574). o scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574). o scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574). o scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574). o scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc# 1182574). o scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574). o selinux: never allow relabeling on context mounts (git-fixes). o smb3: add dynamic trace point to trace when credits obtained (bsc#1181507). o smb3: fix crediting for compounding when only one request in flight (bsc# 1181507). o smp: Add source and destination CPUs to __call_single_data (bsc#1180846). o Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc# 1180846). o Update config files: disable CONFIG_CSD_LOCK_WAIT_DEBUG (bsc#1180846). o usb: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes). o usbip: fix stub_dev to check for stream socket (git-fixes). o usbip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes). o usbip: Fix unsafe unaligned pointer usage (git-fixes). o usbip: fix vhci_hcd attach_store() races leading to gpf (git-fixes). o usbip: fix vhci_hcd to check for stream socket (git-fixes). o usbip: tools: fix build error for multiple definition (git-fixes). o usb: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes). o usb: replace hardcode maximum usb string length by definition (git-fixes). o usb: serial: io_edgeport: fix memory leak in edge_startup (git-fixes). o usb: serial: option: add Quectel EM160R-GL (git-fixes). o usb-storage: Add quirk to defeat Kindle's automatic unload (git-fixes). o use __netdev_notify_peers in ibmvnic (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139). o video: fbdev: acornfb: remove free_unused_pages() (bsc#1129770) o video: fbdev: atmel_lcdfb: fix return error code in (bsc#1129770) Backporting notes: * context changes * fallout from trailing whitespaces o vsprintf: Do not have bprintf dereference pointers (bsc#1184494). o vsprintf: Do not preprocess non-dereferenced pointers for bprintf (%px and %pK) (bsc#1184494). o vsprintf: Fix off-by-one bug in bstr_printf() processing dereferenced pointers (bsc#1184494). o wlcore: Fix command execute failure 19 for wl12xx (git-fixes). o x86/ioapic: Ignore IRQ2 again (12sp5). o x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc () (12sp5). o xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367). o xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600). o xen/netback: fix spurious event detection for common event case (bsc# 1182175). o xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367). o xfs: Fix assert failure in xfs_setattr_size() (git-fixes). o xsk: Remove dangling function declaration from header file (bsc#1109837). Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Workstation Extension 12-SP5: zypper in -t patch SUSE-SLE-WE-12-SP5-2021-1210=1 o SUSE Linux Enterprise Software Development Kit 12-SP5: zypper in -t patch SUSE-SLE-SDK-12-SP5-2021-1210=1 o SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-1210=1 o SUSE Linux Enterprise Live Patching 12-SP5: zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2021-1210=1 o SUSE Linux Enterprise High Availability 12-SP5: zypper in -t patch SUSE-SLE-HA-12-SP5-2021-1210=1 Package List: o SUSE Linux Enterprise Workstation Extension 12-SP5 (x86_64): kernel-default-debuginfo-4.12.14-122.66.2 kernel-default-debugsource-4.12.14-122.66.2 kernel-default-extra-4.12.14-122.66.2 kernel-default-extra-debuginfo-4.12.14-122.66.2 o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64): kernel-obs-build-4.12.14-122.66.2 kernel-obs-build-debugsource-4.12.14-122.66.2 o SUSE Linux Enterprise Software Development Kit 12-SP5 (noarch): kernel-docs-4.12.14-122.66.2 o SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): kernel-default-4.12.14-122.66.2 kernel-default-base-4.12.14-122.66.2 kernel-default-base-debuginfo-4.12.14-122.66.2 kernel-default-debuginfo-4.12.14-122.66.2 kernel-default-debugsource-4.12.14-122.66.2 kernel-default-devel-4.12.14-122.66.2 kernel-syms-4.12.14-122.66.2 o SUSE Linux Enterprise Server 12-SP5 (noarch): kernel-devel-4.12.14-122.66.2 kernel-macros-4.12.14-122.66.2 kernel-source-4.12.14-122.66.2 o SUSE Linux Enterprise Server 12-SP5 (x86_64): kernel-default-devel-debuginfo-4.12.14-122.66.2 o SUSE Linux Enterprise Server 12-SP5 (s390x): kernel-default-man-4.12.14-122.66.2 o SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64): kernel-default-debuginfo-4.12.14-122.66.2 kernel-default-debugsource-4.12.14-122.66.2 kernel-default-kgraft-4.12.14-122.66.2 kernel-default-kgraft-devel-4.12.14-122.66.2 kgraft-patch-4_12_14-122_66-default-1-8.3.2 o SUSE Linux Enterprise High Availability 12-SP5 (ppc64le s390x x86_64): cluster-md-kmp-default-4.12.14-122.66.2 cluster-md-kmp-default-debuginfo-4.12.14-122.66.2 dlm-kmp-default-4.12.14-122.66.2 dlm-kmp-default-debuginfo-4.12.14-122.66.2 gfs2-kmp-default-4.12.14-122.66.2 gfs2-kmp-default-debuginfo-4.12.14-122.66.2 kernel-default-debuginfo-4.12.14-122.66.2 kernel-default-debugsource-4.12.14-122.66.2 ocfs2-kmp-default-4.12.14-122.66.2 ocfs2-kmp-default-debuginfo-4.12.14-122.66.2 References: o https://www.suse.com/security/cve/CVE-2020-0433.html o https://www.suse.com/security/cve/CVE-2020-25670.html o https://www.suse.com/security/cve/CVE-2020-25671.html o https://www.suse.com/security/cve/CVE-2020-25672.html o https://www.suse.com/security/cve/CVE-2020-25673.html o https://www.suse.com/security/cve/CVE-2020-27170.html o https://www.suse.com/security/cve/CVE-2020-27171.html o https://www.suse.com/security/cve/CVE-2020-27815.html o https://www.suse.com/security/cve/CVE-2020-29368.html o https://www.suse.com/security/cve/CVE-2020-29374.html o https://www.suse.com/security/cve/CVE-2020-35519.html o https://www.suse.com/security/cve/CVE-2020-36311.html o https://www.suse.com/security/cve/CVE-2021-20219.html o https://www.suse.com/security/cve/CVE-2021-26930.html o https://www.suse.com/security/cve/CVE-2021-26931.html o https://www.suse.com/security/cve/CVE-2021-26932.html o https://www.suse.com/security/cve/CVE-2021-27363.html o https://www.suse.com/security/cve/CVE-2021-27364.html o https://www.suse.com/security/cve/CVE-2021-27365.html o https://www.suse.com/security/cve/CVE-2021-28038.html o https://www.suse.com/security/cve/CVE-2021-28660.html o https://www.suse.com/security/cve/CVE-2021-28688.html o https://www.suse.com/security/cve/CVE-2021-28964.html o https://www.suse.com/security/cve/CVE-2021-28971.html o https://www.suse.com/security/cve/CVE-2021-28972.html o https://www.suse.com/security/cve/CVE-2021-29154.html o https://www.suse.com/security/cve/CVE-2021-29264.html o https://www.suse.com/security/cve/CVE-2021-29265.html o https://www.suse.com/security/cve/CVE-2021-29647.html o https://www.suse.com/security/cve/CVE-2021-30002.html o https://www.suse.com/security/cve/CVE-2021-3428.html o https://www.suse.com/security/cve/CVE-2021-3444.html o https://www.suse.com/security/cve/CVE-2021-3483.html o https://bugzilla.suse.com/1065600 o https://bugzilla.suse.com/1065729 o https://bugzilla.suse.com/1103990 o https://bugzilla.suse.com/1103991 o https://bugzilla.suse.com/1103992 o https://bugzilla.suse.com/1104270 o https://bugzilla.suse.com/1104353 o https://bugzilla.suse.com/1109837 o https://bugzilla.suse.com/1111981 o https://bugzilla.suse.com/1112374 o https://bugzilla.suse.com/1113295 o https://bugzilla.suse.com/1113994 o https://bugzilla.suse.com/1118657 o https://bugzilla.suse.com/1118661 o https://bugzilla.suse.com/1119113 o https://bugzilla.suse.com/1126390 o https://bugzilla.suse.com/1129770 o https://bugzilla.suse.com/1132477 o https://bugzilla.suse.com/1142635 o https://bugzilla.suse.com/1152446 o https://bugzilla.suse.com/1154048 o https://bugzilla.suse.com/1169709 o https://bugzilla.suse.com/1172455 o https://bugzilla.suse.com/1173485 o https://bugzilla.suse.com/1175165 o https://bugzilla.suse.com/1176720 o https://bugzilla.suse.com/1176855 o https://bugzilla.suse.com/1178163 o https://bugzilla.suse.com/1178181 o https://bugzilla.suse.com/1179243 o https://bugzilla.suse.com/1179428 o https://bugzilla.suse.com/1179454 o https://bugzilla.suse.com/1179660 o https://bugzilla.suse.com/1179755 o https://bugzilla.suse.com/1180846 o https://bugzilla.suse.com/1181507 o https://bugzilla.suse.com/1181515 o https://bugzilla.suse.com/1181544 o https://bugzilla.suse.com/1181655 o https://bugzilla.suse.com/1181674 o https://bugzilla.suse.com/1181747 o https://bugzilla.suse.com/1181753 o https://bugzilla.suse.com/1181843 o https://bugzilla.suse.com/1182011 o https://bugzilla.suse.com/1182175 o https://bugzilla.suse.com/1182485 o https://bugzilla.suse.com/1182574 o https://bugzilla.suse.com/1182715 o https://bugzilla.suse.com/1182716 o https://bugzilla.suse.com/1182717 o https://bugzilla.suse.com/1183018 o https://bugzilla.suse.com/1183022 o https://bugzilla.suse.com/1183023 o https://bugzilla.suse.com/1183378 o https://bugzilla.suse.com/1183379 o https://bugzilla.suse.com/1183380 o https://bugzilla.suse.com/1183381 o https://bugzilla.suse.com/1183382 o https://bugzilla.suse.com/1183405 o https://bugzilla.suse.com/1183416 o https://bugzilla.suse.com/1183509 o https://bugzilla.suse.com/1183593 o https://bugzilla.suse.com/1183646 o https://bugzilla.suse.com/1183662 o https://bugzilla.suse.com/1183686 o https://bugzilla.suse.com/1183692 o https://bugzilla.suse.com/1183696 o https://bugzilla.suse.com/1183755 o https://bugzilla.suse.com/1183775 o https://bugzilla.suse.com/1183861 o https://bugzilla.suse.com/1183871 o https://bugzilla.suse.com/1184114 o https://bugzilla.suse.com/1184120 o https://bugzilla.suse.com/1184167 o https://bugzilla.suse.com/1184168 o https://bugzilla.suse.com/1184170 o https://bugzilla.suse.com/1184192 o https://bugzilla.suse.com/1184193 o https://bugzilla.suse.com/1184196 o https://bugzilla.suse.com/1184198 o https://bugzilla.suse.com/1184391 o https://bugzilla.suse.com/1184393 o https://bugzilla.suse.com/1184397 o https://bugzilla.suse.com/1184494 o https://bugzilla.suse.com/1184511 o https://bugzilla.suse.com/1184583 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYHkCYuNLKJtyKPYoAQjAmxAAlo1s8TKrSK+05UOY4k1c/IxEfBAIMXv0 qa+iy4HmCKOcMw5cNFldtWHyjl/iVenae6trPBUmxMc1Ew0D2spIHEt025Ouv8i1 SKjaNukZRzua0g8/OTYazVuvAL1VWtf/xF8DVWXzQGPaZHQGaFBQtgUzP2Uu8stP HAOveWygM/K6qb1ezpZOYUCK8M6QQO7ajKamwGNeTMM5Tjqov1DLeg98IW67ieEl fVYiwJ0NvUnBFDkmm4ks+e70Xy368ri3U8aUKcKGPwgXOjbvRW0LlcpkyiIHPKJX MrKXnaYxFX/JKEzVE+BRXjBKhkhSAWaLX+RksJ8zgTEerg7UUohpi2CXTVaQDn2x zNONVzbvIjZvYUrCATLcb6JTiJKd3+vtH8fFPu0QT0fIr1gpMg4sClTMjh5ev5SU 7cKtpy0d2F1fYFKUEhyUKlVCqdlEy50hgOxtYSueatzzs15eSi25/wSvePFYPsgt 03lyidBjUFQpmooRsFHI8ZZQTINHNwWYU8XQWwFmaqEStNGy4YB3uuH128mQwFX6 eCRqnoUCOyoYWWaXk4/59ENf7U7gaRzrMRczXa/EB8SrW4PztrqLMaRRNbWMDx6t va/hePzk8DUrun61P/b2/g0MCa3z/ems7/vwtpayH9pfwwztYh0t73FUh+UeIyYg TcEgUISYiI8= =Lr2+ -----END PGP SIGNATURE-----
AusCERT - Security Bulletins · 2021. április 16.

ESB-2021.1298 - [SUSE] grafana and system-user-grafana: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.1298 Security update for grafana and system-user-grafana 16 April 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: grafana system-user-grafana Publisher: SUSE Operating System: SUSE Impact/Access: Denial of Service -- Remote/Unauthenticated Cross-site Scripting -- Remote with User Interaction Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2020-24303 CVE-2020-13379 CVE-2020-12245 CVE-2020-12052 CVE-2019-19499 CVE-2019-15043 CVE-2018-18623 CVE-2018-12099 Reference: ESB-2020.4542 ESB-2020.3903 ESB-2020.3700 ESB-2020.1727.2 Original Bulletin: https://www.suse.com/support/update/announcement/2021/suse-su-20211233-1 - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for grafana and system-user-grafana ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:1233-1 Rating: moderate References: #1148383 #1170557 #1170657 #1172409 #1172450 #1175951 #1178243 Cross-References: CVE-2018-18623 CVE-2019-15043 CVE-2019-19499 CVE-2020-12052 CVE-2020-12245 CVE-2020-13379 CVE-2020-24303 Affected Products: SUSE Manager Tools 15 SUSE Enterprise Storage 6 ______________________________________________________________________________ An update that fixes 7 vulnerabilities is now available. Description: This update for grafana and system-user-grafana fixes the following issues: o Updated grafana to upstream version 7.3.1 * CVE-2019-15043: In Grafana 2.x through 6.x before 6.3.4, parts of the HTTP API allow unauthenticated use. This makes it possible to run a denial of service attack against the server running Grafana * CVE-2020-12245: Grafana before 6.7.3 allows table-panel XSS via column.title or cellLinkTooltip (bsc#1170557) * CVE-2020-13379: The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS'ing Grafana via SegFault (bsc#1172409) * CVE-2019-15043: In Grafana 2.x through 6.x before 6.3.4, parts of the HTTP API allow unauthenticated use. This makes it possible to run a denial of service attack against the server running Grafana (bsc#1148383) * CVE-2020-12052: Grafana version below 6.7.3 is vulnerable for annotation popup XSS (bsc# 1170657) * CVE-2020-24303: Grafana before 7.1.0-beta 1 allows XSS via a query alias for the ElasticSearch datasource. (bsc#1178243) * CVE-2018-18623: Grafana 5.3.1 has XSS via the "Dashboard > Text Panel" screen (bsc#1172450) * CVE-2019-19499: Grafana versions below or equal to 6.4.3 has an Arbitrary File Read vulnerability, which could be exploited by an authenticated attacker that has privileges to modify the data source configurations (bsc#1175951) * Please refer to this package's changelog to get a full list of all changes (including bug fixes etc.) o Initial shipment of system-user-grafana to SES 6 Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Manager Tools 15: zypper in -t patch SUSE-SLE-Manager-Tools-15-2021-1233=1 o SUSE Enterprise Storage 6: zypper in -t patch SUSE-Storage-6-2021-1233=1 Package List: o SUSE Manager Tools 15 (noarch): system-user-grafana-1.0.0-3.9.1 o SUSE Enterprise Storage 6 (aarch64 x86_64): grafana-7.3.1-3.6.1 o SUSE Enterprise Storage 6 (noarch): system-user-grafana-1.0.0-3.9.1 References: o https://www.suse.com/security/cve/CVE-2018-18623.html o https://www.suse.com/security/cve/CVE-2019-15043.html o https://www.suse.com/security/cve/CVE-2019-19499.html o https://www.suse.com/security/cve/CVE-2020-12052.html o https://www.suse.com/security/cve/CVE-2020-12245.html o https://www.suse.com/security/cve/CVE-2020-13379.html o https://www.suse.com/security/cve/CVE-2020-24303.html o https://bugzilla.suse.com/1148383 o https://bugzilla.suse.com/1170557 o https://bugzilla.suse.com/1170657 o https://bugzilla.suse.com/1172409 o https://bugzilla.suse.com/1172450 o https://bugzilla.suse.com/1175951 o https://bugzilla.suse.com/1178243 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYHjh7ONLKJtyKPYoAQiXWw//XCpuFOAN/IFEDKaALlVuz3azIdk8NsnW 1sV/mZC1Fus+JGKCQLkb1zcytm+RGvd0MDz/yRTKqWLRnkeQZiIwfVUJlO50nNOX bpBBAskujUEm6gB6Ea8Zw8IZS5VJeeHuXNK2gimnXrTO2nUu5aQPuz5U9rifYjUL DtDBw5AUxyLzBaxobAyGvGp7njo++kzYV8aXmoERmGQFksC3MCngI3fj2KVNbqMU 7UJLj1KoRE03f4yD8lkdY7rpH4uI4n1A406sbeW2+O8bhm14/fkPSmEHZrxTyXuA nWDU/edK0f1txH40a6ONx9P5wUnzXiWW7vZWzZlOtOYHNp57vH69sLwDgfC57oOk /iP6qe7lJycuybdTXROi3kxsyECYXZAUAV1ZpS56GtlDPKQgWscScP2y29hgIgtV K0Qqb43V5Jy/Z37bQpajg9jU4ED8SOKcjSQ2eQXkvLmbXHWzK8Fz6J6caJWidEJg 1n4aVLLxTQXYbsevfcAFfwAbFQ7k18+jfb9vNuct1ZIPRyja6gjQcVfmHqFiuUzH XBMoJY3s5ZZKTkDNC76o69UW41mbuptLBIhbL3sljPZB8HbYWtOKVxalYzfgPAPx 7vanIfOIJ92IhfkJwrenNRLTAQPXuFADnK7Rc61N0/0PlYNo1DGVBvNnfQR3SG8P ViNEUGylUSk= =6jAp -----END PGP SIGNATURE-----
AusCERT - Security Bulletins · 2021. április 16.

ESB-2021.1297 - [Appliance] Schneider Electric C-Bus Toolkit: Execute arbitrary code/commands - Existing account

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.1297 Advisory (icsa-21-105-01) Schneider Electric C-Bus Toolkit 16 April 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Schneider Electric C-Bus Toolkit Publisher: ICS-CERT Operating System: Network Appliance Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-22720 CVE-2021-22719 CVE-2021-22718 CVE-2021-22717 CVE-2021-22716 Original Bulletin: https://us-cert.cisa.gov/ics/advisories/icsa-21-105-01 - --------------------------BEGIN INCLUDED TEXT-------------------- ICS Advisory (ICSA-21-105-01) Schneider Electric C-Bus Toolkit Original release date: April 15, 2021 Legal Notice All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/ . 1. EXECUTIVE SUMMARY o CVSS v3 8.8 o ATTENTION: Exploitable remotely/low attack complexity o Vendor: Schneider Electric o Equipment: C-Bus Toolkit o Vulnerabilities: Improper Privilege Management, Path Traversal 2. RISK EVALUATION Successful exploitation of these vulnerabilities may allow remote code execution. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of C-Bus Toolkit are affected: o C-Bus Toolkit v1.15.7 and prior 3.2 VULNERABILITY OVERVIEW 3.2.1 IMPROPER PRIVILEGE MANAGEMENT CWE-269 The affected product is vulnerable to Improper Privilege Management, which could allow remote code execution when an unprivileged user modifies a file. CVE-2021-22716 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is ( AV:L/AC:L/PR:L/UI:N/S:U/C:H/ I:H/A:H ). 3.2.2 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 The affected product is vulnerable to Path Traversal, which could allow remote code execution when processing config files. CVE-2021-22717 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is ( AV:N/AC:L/PR:L/UI:N/S:U/C:H/ I:H/A:H ). 3.2.3 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 The affected product is vulnerable to Path Traversal, which could allow remote code execution when restoring project files. CVE-2021-22718 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is ( AV:L/AC:L/PR:N/UI:R/S:U/C:H/ I:H/A:H ). 3.2.4 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 The affected product is vulnerable to Path Traversal, which could allow remote code execution when a file is uploaded. CVE-2021-22719 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is ( AV:N/AC:L/PR:L/UI:N/S:U/C:H/ I:H/A:H ). 3.2.5 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 The affected product is vulnerable to Path Traversal, which could allow remote code execution when restoring a project. CVE-2021-22720 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is ( AV:N/AC:L/PR:L/UI:N/S:U/C:H/ I:N/A:N ). 3.3 BACKGROUND o CRITICAL INFRASTRUCTURE SECTORS: Commercial Facilities o COUNTRIES/AREAS DEPLOYED: Worldwide o COMPANY HEADQUARTERS LOCATION: France 3.4 RESEARCHER rgod, working with Trend Micro Zero Day Initiative, and Simon Zuckerbraun of Trend Micro's Zero Day Initiative reported these vulnerabilities to CISA. 4. MITIGATIONS Schneider Electric recommends users update to the latest version available . A reboot will be needed after the update. If users choose not to apply the remediation provided above, they should immediately apply the following mitigations to reduce the risk of exploit: o Use an allow list for this application. o Turn on the workstation's firewall. o Use an antivirus program. o Secure the workstation from unauthorized personnel. Please see Schneider Electric's publication SEVD-2021-103-01 for more information. CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should: o Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet . o Locate control system networks and remote devices behind firewalls, and isolate them from the business network. o When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on us-cert.cisa.gov . Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies . Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies . Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents. No known public exploits specifically target these vulnerabilities. For any questions related to this report, please contact the CISA at: Email: CISAservicedesk@cisa.dhs.gov Toll Free: 1-888-282-0870 CISA continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYHjh2+NLKJtyKPYoAQiOsg//agU/bwDgT2vrZulZMoeuoTZWj4Uha1Bv bB1DYRdz5QQsjh2pttE1KhCFmXnzJWdt0ilYTBVCC5MGOeKQfVz7VFLRdCj/Lmax 5eXqFqI0Qga1eiDGE6C92oHXvbKCGJXgklhTboFribB3HzHaLDt0zcPOsr9ASaL6 nWts5NRknoAEhxB3p+Xi7rQp41kTPchvaszUH3GWyMPdQmdpLsWhAJiqb1L4wxW5 zEfE++T/M6xZLS4QBRjIuWQczdAF0WjOi6VZM1n2SWQ9Zay68POquPiJSfnWscJk St4K1oTMuyFnGPbFpQtmrX2p/A3dpXLh8SXBZkQYeA54KZEZjw6BfzRO0zbiBJE7 kba/SzbfY+DDJ9TVdkzQ48wHN/D+l0OJ6TCPbf87Ckt6xqAxCM+UHAWC3b8OAkGg axizqctNwa2QRDe4qB9kr+8Gc+WhA6D0XkKa6BNgoQDlQSHjMmJdRRqn9dzKpi7S sHbchND+imPxkbwFK53VzVfeNXhbXx0l6y6yzGcbB8lm51aKATSh4JrUCwJrr7rK WLNsV1HwfmYqMBM98nbBKO0/AyIt+LOZ2aYvduNgLwRtDd3djDl6wqZGcaGIfGPV L+elf6U7mUuD/UCYaEEoyKYBhPNw6xf35atHAGr0MX7jvtrwRk6xOEU4zYgCUoWi GZJ3PzJHnzc= =Ccw5 -----END PGP SIGNATURE-----