Bug 1191961 (CVE-2021-34981) - VUL-0: CVE-2021-34981: kernel-source,kernel-source-rt,kernel-source-azure: Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability
Summary: VUL-0: CVE-2021-34981: kernel-source,kernel-source-rt,kernel-source-azure: Li...
Status: RESOLVED FIXED
Alias: CVE-2021-34981
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Minor
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/313300/
Whiteboard: CVSSv3.1:SUSE:CVE-2021-34981:7.5:(AV:...
Keywords:
Depends on:
Blocks: 1192595
  Show dependency treegraph
 
Reported: 2021-10-22 14:25 UTC by Gianluca Gabrielli
Modified: 2024-05-23 15:53 UTC (History)
9 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Gianluca Gabrielli 2021-10-22 14:25:39 UTC
This vulnerability allows local attackers to escalate privileges on affected
installations of Linux Kernel. An attacker must first obtain the ability to
execute high-privileged code on the target system in order to exploit this
vulnerability.

The specific flaw exists within the CMTP module. The issue results from the lack
of validating the existence of an object prior to performing further free
operations on the object. An attacker can leverage this vulnerability to
escalate privileges and execute code in the context of the kernel.

Fixed in version 5.10.42

References:
https://www.zerodayinitiative.com/advisories/ZDI-21-1223/
Comment 1 Gianluca Gabrielli 2021-10-22 14:31:42 UTC
Hi team,

I have not much clue about this vulnerability. According to the poor ZDI bug description the patch should exist somewhere between 6e1c69d7d79c21330e6af07d309b4c3680d61259 (v5.10.41) and 2276a4a138780f4afe90d41ecb80d0715cf48f5a (v5.10.42).
Comment 2 Gianluca Gabrielli 2021-10-22 14:47:40 UTC
I think I found the right fixing commit [0].

Already fixed branch:
 - SLE15-SP4

Affected branches:
 - SLE12-SP5
 - SLE15-SP2
 - SLE15-SP3
 - cve/linux-4.12
 - cve/linux-4.4
 - stable

Not sure about the two following branches:
 - cve/linux-2.6.32
 - cve/linux-3.0


[0] Fixing commit: 3cfdf8fcaafa62a4123f92eb0f4a72650da3a479
Comment 3 Takashi Iwai 2021-10-27 15:01:33 UTC
Will be a CVE number assigned to this bug?  If so, we should wait for that?
Comment 4 Wade Mealing 2021-11-01 05:55:03 UTC
ZDI assigned this internally as CVE-2021-34981, not sure why they didnt use the standard CNA policy but not this time.

I think that this is fixed by:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cfdf8fcaafa62a4123f92eb0f4a72650da3a479
Comment 5 Al Cho 2021-11-10 16:36:37 UTC
(In reply to Gianluca Gabrielli from comment #2)
> I think I found the right fixing commit [0].
> 
> Already fixed branch:
>  - SLE15-SP4
> 
> Affected branches:
>  - SLE12-SP5
>  - SLE15-SP2
>  - SLE15-SP3
>  - cve/linux-4.12
>  - cve/linux-4.4
>  - stable
> 
> Not sure about the two following branches:
>  - cve/linux-2.6.32
>  - cve/linux-3.0
> 
> 
> [0] Fixing commit: 3cfdf8fcaafa62a4123f92eb0f4a72650da3a479

- cve/linux-4.12 : Submitted
    - SLE12-SP5 : will automerge
- cve/linux-4.4 : Submitted
- SLE15-SP3 : Submitted
    - SLE15-SP2 : will automerge
- stable
    - Already fixed
Comment 6 Takashi Iwai 2021-11-10 16:41:13 UTC
(In reply to Wade Mealing from comment #4)
> ZDI assigned this internally as CVE-2021-34981, not sure why they didnt use
> the standard CNA policy but not this time.

So this CVE numer is official?  Then we should update the bugzilla subject line, too.
Comment 7 Wade Mealing 2021-11-11 00:13:48 UTC
The CVE is from their pool.  It is the accepted number from mitre.  Please use it.
Comment 8 Wade Mealing 2021-11-11 00:14:55 UTC
Updated subject and bug alias to the same format used by other CVE bugs in this category.

Disclaimer: I am not part of suse security team.  You might want someone to check over it to make sure its done correctly.
Comment 9 Gianluca Gabrielli 2021-11-11 15:03:25 UTC
(In reply to Al Cho from comment #5)
> (In reply to Gianluca Gabrielli from comment #2)
> > I think I found the right fixing commit [0].
> > 
> > Already fixed branch:
> >  - SLE15-SP4
> > 
> > Affected branches:
> >  - SLE12-SP5
> >  - SLE15-SP2
> >  - SLE15-SP3
> >  - cve/linux-4.12
> >  - cve/linux-4.4
> >  - stable
> > 
> > Not sure about the two following branches:
> >  - cve/linux-2.6.32
> >  - cve/linux-3.0
> > 
> > 
> > [0] Fixing commit: 3cfdf8fcaafa62a4123f92eb0f4a72650da3a479
> 
> - cve/linux-4.12 : Submitted
>     - SLE12-SP5 : will automerge
> - cve/linux-4.4 : Submitted
> - SLE15-SP3 : Submitted
>     - SLE15-SP2 : will automerge
> - stable
>     - Already fixed

Hi Al, can you please share your feedback about cve/linux-2.6.32 and cve/linux-3.0?

(In reply to Wade Mealing from comment #8)
> Updated subject and bug alias to the same format used by other CVE bugs in
> this category.
> 
> Disclaimer: I am not part of suse security team.  You might want someone to
> check over it to make sure its done correctly.

Hi Wade, you did a great job here. Thank you very much!
Comment 12 OBSbugzilla Bot 2021-11-22 23:41:09 UTC
This is an autogenerated message for OBS integration:
This bug (1191961) was mentioned in
https://build.opensuse.org/request/show/933172 15.2 / kernel-source
Comment 20 Swamp Workflow Management 2021-11-24 20:28:08 UTC
openSUSE-SU-2021:1501-1: An update that solves 6 vulnerabilities, contains one feature and has 22 fixes is now available.

Category: security (important)
Bug References: 1094840,1133021,1152489,1169263,1170269,1188601,1190523,1190795,1191790,1191851,1191958,1191961,1191980,1192045,1192229,1192267,1192273,1192328,1192718,1192740,1192745,1192750,1192753,1192781,1192802,1192896,1192906,1192918
CVE References: CVE-2021-0941,CVE-2021-20322,CVE-2021-31916,CVE-2021-34981,CVE-2021-37159,CVE-2021-43389
JIRA References: SLE-22573
Sources used:
openSUSE Leap 15.2 (src):    kernel-debug-5.3.18-lp152.106.1, kernel-default-5.3.18-lp152.106.1, kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1, kernel-docs-5.3.18-lp152.106.1, kernel-kvmsmall-5.3.18-lp152.106.1, kernel-obs-build-5.3.18-lp152.106.1, kernel-obs-qa-5.3.18-lp152.106.1, kernel-preempt-5.3.18-lp152.106.1, kernel-source-5.3.18-lp152.106.1, kernel-syms-5.3.18-lp152.106.1
Comment 23 Swamp Workflow Management 2021-11-25 17:20:01 UTC
SUSE-SU-2021:3806-1: An update that solves 6 vulnerabilities, contains one feature and has 35 fixes is now available.

Category: security (important)
Bug References: 1094840,1133021,1152489,1154353,1157177,1167773,1169263,1170269,1176940,1180749,1184924,1188601,1190523,1190795,1191628,1191790,1191851,1191958,1191961,1191980,1192045,1192217,1192229,1192267,1192273,1192288,1192328,1192375,1192473,1192549,1192718,1192740,1192745,1192750,1192753,1192758,1192781,1192802,1192896,1192906,1192918
CVE References: CVE-2021-0941,CVE-2021-20322,CVE-2021-31916,CVE-2021-34981,CVE-2021-37159,CVE-2021-43389
JIRA References: SLE-22573
Sources used:
SUSE Linux Enterprise Module for Public Cloud 15-SP3 (src):    kernel-azure-5.3.18-38.31.1, kernel-source-azure-5.3.18-38.31.1, kernel-syms-azure-5.3.18-38.31.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 24 Swamp Workflow Management 2021-11-25 17:29:28 UTC
openSUSE-SU-2021:3806-1: An update that solves 6 vulnerabilities, contains one feature and has 35 fixes is now available.

Category: security (important)
Bug References: 1094840,1133021,1152489,1154353,1157177,1167773,1169263,1170269,1176940,1180749,1184924,1188601,1190523,1190795,1191628,1191790,1191851,1191958,1191961,1191980,1192045,1192217,1192229,1192267,1192273,1192288,1192328,1192375,1192473,1192549,1192718,1192740,1192745,1192750,1192753,1192758,1192781,1192802,1192896,1192906,1192918
CVE References: CVE-2021-0941,CVE-2021-20322,CVE-2021-31916,CVE-2021-34981,CVE-2021-37159,CVE-2021-43389
JIRA References: SLE-22573
Sources used:
openSUSE Leap 15.3 (src):    kernel-azure-5.3.18-38.31.1, kernel-source-azure-5.3.18-38.31.1, kernel-syms-azure-5.3.18-38.31.1
Comment 25 Swamp Workflow Management 2021-11-25 17:35:32 UTC
SUSE-SU-2021:3807-1: An update that solves 6 vulnerabilities and has 23 fixes is now available.

Category: security (important)
Bug References: 1094840,1152489,1169263,1170269,1188601,1190523,1190795,1191628,1191790,1191851,1191958,1191961,1191980,1192045,1192229,1192267,1192273,1192328,1192549,1192718,1192740,1192745,1192750,1192753,1192781,1192802,1192896,1192906,1192918
CVE References: CVE-2021-0941,CVE-2021-20322,CVE-2021-31916,CVE-2021-34981,CVE-2021-37159,CVE-2021-43389
JIRA References: 
Sources used:
SUSE Linux Enterprise Module for Public Cloud 15-SP2 (src):    kernel-azure-5.3.18-18.75.1, kernel-source-azure-5.3.18-18.75.1, kernel-syms-azure-5.3.18-18.75.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 33 Swamp Workflow Management 2021-12-01 20:45:51 UTC
SUSE-SU-2021:3848-1: An update that solves 6 vulnerabilities, contains one feature and has 16 fixes is now available.

Category: security (important)
Bug References: 1094840,1114648,1141655,1188601,1190351,1190397,1190523,1190795,1191713,1191790,1191888,1191961,1192045,1192267,1192273,1192379,1192718,1192750,1192753,1192781,1192802,1192906
CVE References: CVE-2021-0941,CVE-2021-20322,CVE-2021-31916,CVE-2021-34981,CVE-2021-37159,CVE-2021-3772
JIRA References: SLE-22573
Sources used:
SUSE Linux Enterprise Server 12-SP5 (src):    kernel-azure-4.12.14-16.80.1, kernel-source-azure-4.12.14-16.80.1, kernel-syms-azure-4.12.14-16.80.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 34 Swamp Workflow Management 2021-12-02 11:27:49 UTC
openSUSE-SU-2021:3876-1: An update that solves 43 vulnerabilities, contains one feature and has 26 fixes is now available.

Category: security (important)
Bug References: 1100416,1108488,1129735,1129898,1133374,1136513,1171420,1176724,1177666,1181158,1184673,1184804,1185377,1185726,1185758,1185973,1186078,1186109,1186390,1186482,1186672,1188062,1188063,1188172,1188563,1188601,1188616,1188838,1188876,1188983,1188985,1189057,1189262,1189291,1189399,1189400,1189706,1189846,1189884,1190023,1190025,1190067,1190115,1190117,1190159,1190276,1190349,1190351,1190479,1190534,1190601,1190717,1191193,1191315,1191317,1191349,1191457,1191628,1191790,1191800,1191888,1191961,1192045,1192267,1192379,1192400,1192775,1192781,1192802
CVE References: CVE-2018-13405,CVE-2018-9517,CVE-2019-3874,CVE-2019-3900,CVE-2020-0429,CVE-2020-12770,CVE-2020-3702,CVE-2020-4788,CVE-2021-0941,CVE-2021-20322,CVE-2021-22543,CVE-2021-31916,CVE-2021-33033,CVE-2021-33909,CVE-2021-34556,CVE-2021-34981,CVE-2021-3542,CVE-2021-35477,CVE-2021-3640,CVE-2021-3653,CVE-2021-3655,CVE-2021-3656,CVE-2021-3659,CVE-2021-3679,CVE-2021-3715,CVE-2021-37159,CVE-2021-3732,CVE-2021-3744,CVE-2021-3752,CVE-2021-3753,CVE-2021-37576,CVE-2021-3759,CVE-2021-3760,CVE-2021-3764,CVE-2021-3772,CVE-2021-38160,CVE-2021-38198,CVE-2021-38204,CVE-2021-40490,CVE-2021-41864,CVE-2021-42008,CVE-2021-42252,CVE-2021-42739
JIRA References: SLE-22573
Sources used:
openSUSE Leap 15.3 (src):    kernel-debug-4.12.14-197.102.2, kernel-default-4.12.14-197.102.2, kernel-kvmsmall-4.12.14-197.102.2, kernel-vanilla-4.12.14-197.102.2, kernel-zfcpdump-4.12.14-197.102.2
Comment 35 Swamp Workflow Management 2021-12-02 11:40:09 UTC
SUSE-SU-2021:3876-1: An update that solves 43 vulnerabilities, contains one feature and has 26 fixes is now available.

Category: security (important)
Bug References: 1100416,1108488,1129735,1129898,1133374,1136513,1171420,1176724,1177666,1181158,1184673,1184804,1185377,1185726,1185758,1185973,1186078,1186109,1186390,1186482,1186672,1188062,1188063,1188172,1188563,1188601,1188616,1188838,1188876,1188983,1188985,1189057,1189262,1189291,1189399,1189400,1189706,1189846,1189884,1190023,1190025,1190067,1190115,1190117,1190159,1190276,1190349,1190351,1190479,1190534,1190601,1190717,1191193,1191315,1191317,1191349,1191457,1191628,1191790,1191800,1191888,1191961,1192045,1192267,1192379,1192400,1192775,1192781,1192802
CVE References: CVE-2018-13405,CVE-2018-9517,CVE-2019-3874,CVE-2019-3900,CVE-2020-0429,CVE-2020-12770,CVE-2020-3702,CVE-2020-4788,CVE-2021-0941,CVE-2021-20322,CVE-2021-22543,CVE-2021-31916,CVE-2021-33033,CVE-2021-33909,CVE-2021-34556,CVE-2021-34981,CVE-2021-3542,CVE-2021-35477,CVE-2021-3640,CVE-2021-3653,CVE-2021-3655,CVE-2021-3656,CVE-2021-3659,CVE-2021-3679,CVE-2021-3715,CVE-2021-37159,CVE-2021-3732,CVE-2021-3744,CVE-2021-3752,CVE-2021-3753,CVE-2021-37576,CVE-2021-3759,CVE-2021-3760,CVE-2021-3764,CVE-2021-3772,CVE-2021-38160,CVE-2021-38198,CVE-2021-38204,CVE-2021-40490,CVE-2021-41864,CVE-2021-42008,CVE-2021-42252,CVE-2021-42739
JIRA References: SLE-22573
Sources used:
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    kernel-default-4.12.14-197.102.2, kernel-docs-4.12.14-197.102.2, kernel-obs-build-4.12.14-197.102.1, kernel-source-4.12.14-197.102.2, kernel-syms-4.12.14-197.102.2
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    kernel-default-4.12.14-197.102.2, kernel-docs-4.12.14-197.102.2, kernel-obs-build-4.12.14-197.102.1, kernel-source-4.12.14-197.102.2, kernel-syms-4.12.14-197.102.2, kernel-zfcpdump-4.12.14-197.102.2
SUSE Linux Enterprise Server 15-SP1-BCL (src):    kernel-default-4.12.14-197.102.2, kernel-docs-4.12.14-197.102.2, kernel-obs-build-4.12.14-197.102.1, kernel-source-4.12.14-197.102.2, kernel-syms-4.12.14-197.102.2
SUSE Linux Enterprise Module for Live Patching 15-SP1 (src):    kernel-default-4.12.14-197.102.2, kernel-livepatch-SLE15-SP1_Update_27-1-3.3.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    kernel-default-4.12.14-197.102.2, kernel-docs-4.12.14-197.102.2, kernel-obs-build-4.12.14-197.102.1, kernel-source-4.12.14-197.102.2, kernel-syms-4.12.14-197.102.2
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    kernel-default-4.12.14-197.102.2, kernel-docs-4.12.14-197.102.2, kernel-obs-build-4.12.14-197.102.1, kernel-source-4.12.14-197.102.2, kernel-syms-4.12.14-197.102.2
SUSE Linux Enterprise High Availability 15-SP1 (src):    kernel-default-4.12.14-197.102.2
SUSE Enterprise Storage 6 (src):    kernel-default-4.12.14-197.102.2, kernel-docs-4.12.14-197.102.2, kernel-obs-build-4.12.14-197.102.1, kernel-source-4.12.14-197.102.2, kernel-syms-4.12.14-197.102.2
SUSE CaaS Platform 4.0 (src):    kernel-default-4.12.14-197.102.2, kernel-docs-4.12.14-197.102.2, kernel-obs-build-4.12.14-197.102.1, kernel-source-4.12.14-197.102.2, kernel-syms-4.12.14-197.102.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 36 Swamp Workflow Management 2021-12-02 11:54:20 UTC
SUSE-SU-2021:3877-1: An update that solves four vulnerabilities, contains one feature and has 11 fixes is now available.

Category: security (important)
Bug References: 1114648,1141655,1190523,1191790,1191961,1192045,1192048,1192273,1192718,1192750,1192753,1192781,1192802,1192906,1192987
CVE References: CVE-2021-0941,CVE-2021-20322,CVE-2021-31916,CVE-2021-34981
JIRA References: SLE-22573
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP5 (src):    kernel-default-4.12.14-122.103.1
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    kernel-docs-4.12.14-122.103.1, kernel-obs-build-4.12.14-122.103.1
SUSE Linux Enterprise Server 12-SP5 (src):    kernel-default-4.12.14-122.103.1, kernel-source-4.12.14-122.103.1, kernel-syms-4.12.14-122.103.1
SUSE Linux Enterprise Live Patching 12-SP5 (src):    kernel-default-4.12.14-122.103.1, kgraft-patch-SLE12-SP5_Update_26-1-8.5.1
SUSE Linux Enterprise High Availability 12-SP5 (src):    kernel-default-4.12.14-122.103.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 37 Gianluca Gabrielli 2021-12-02 13:23:54 UTC
(In reply to Gianluca Gabrielli from comment #9)
> (In reply to Al Cho from comment #5)
> > (In reply to Gianluca Gabrielli from comment #2)
> > > I think I found the right fixing commit [0].
> > > 
> > > Already fixed branch:
> > >  - SLE15-SP4
> > > 
> > > Affected branches:
> > >  - SLE12-SP5
> > >  - SLE15-SP2
> > >  - SLE15-SP3
> > >  - cve/linux-4.12
> > >  - cve/linux-4.4
> > >  - stable
> > > 
> > > Not sure about the two following branches:
> > >  - cve/linux-2.6.32
> > >  - cve/linux-3.0
> > > 
> > > 
> > > [0] Fixing commit: 3cfdf8fcaafa62a4123f92eb0f4a72650da3a479
> > 
> > - cve/linux-4.12 : Submitted
> >     - SLE12-SP5 : will automerge
> > - cve/linux-4.4 : Submitted
> > - SLE15-SP3 : Submitted
> >     - SLE15-SP2 : will automerge
> > - stable
> >     - Already fixed
> 
> Hi Al, can you please share your feedback about cve/linux-2.6.32 and
> cve/linux-3.0?

Hi Al, any update here?
Comment 38 Swamp Workflow Management 2021-12-06 14:29:12 UTC
SUSE-SU-2021:3933-1: An update that solves 6 vulnerabilities, contains one feature and has 21 fixes is now available.

Category: security (important)
Bug References: 1094840,1133021,1152489,1169263,1170269,1188601,1190523,1190795,1191790,1191851,1191958,1191961,1191980,1192045,1192229,1192273,1192328,1192718,1192740,1192745,1192750,1192753,1192781,1192802,1192896,1192906,1192918
CVE References: CVE-2021-0941,CVE-2021-20322,CVE-2021-31916,CVE-2021-34981,CVE-2021-37159,CVE-2021-43389
JIRA References: SLE-22573
Sources used:
SUSE MicroOS 5.0 (src):    kernel-default-5.3.18-24.96.1, kernel-default-base-5.3.18-24.96.1.9.44.1
SUSE Linux Enterprise Workstation Extension 15-SP2 (src):    kernel-default-5.3.18-24.96.1, kernel-preempt-5.3.18-24.96.1
SUSE Linux Enterprise Module for Live Patching 15-SP2 (src):    kernel-default-5.3.18-24.96.1, kernel-livepatch-SLE15-SP2_Update_22-1-5.3.1
SUSE Linux Enterprise Module for Legacy Software 15-SP2 (src):    kernel-default-5.3.18-24.96.1
SUSE Linux Enterprise Module for Development Tools 15-SP2 (src):    kernel-docs-5.3.18-24.96.1, kernel-obs-build-5.3.18-24.96.1, kernel-preempt-5.3.18-24.96.1, kernel-source-5.3.18-24.96.1, kernel-syms-5.3.18-24.96.1
SUSE Linux Enterprise Module for Basesystem 15-SP2 (src):    kernel-default-5.3.18-24.96.1, kernel-default-base-5.3.18-24.96.1.9.44.1, kernel-preempt-5.3.18-24.96.1, kernel-source-5.3.18-24.96.1
SUSE Linux Enterprise High Availability 15-SP2 (src):    kernel-default-5.3.18-24.96.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 39 Swamp Workflow Management 2021-12-06 14:41:15 UTC
SUSE-SU-2021:3929-1: An update that solves 36 vulnerabilities and has 7 fixes is now available.

Category: security (important)
Bug References: 1068032,1087082,1098425,1100416,1119934,1129735,1171217,1171420,1173346,1176724,1183089,1184673,1186109,1186390,1188172,1188325,1188563,1188601,1188838,1188876,1188983,1188985,1189057,1189262,1189291,1189399,1189706,1190023,1190025,1190067,1190117,1190159,1190276,1190349,1190351,1190601,1191193,1191315,1191790,1191958,1191961,1192781,802154
CVE References: CVE-2017-5753,CVE-2018-13405,CVE-2018-16882,CVE-2020-0429,CVE-2020-12655,CVE-2020-14305,CVE-2020-3702,CVE-2021-20265,CVE-2021-20322,CVE-2021-31916,CVE-2021-33033,CVE-2021-34556,CVE-2021-34981,CVE-2021-3542,CVE-2021-35477,CVE-2021-3640,CVE-2021-3653,CVE-2021-3655,CVE-2021-3659,CVE-2021-3679,CVE-2021-3715,CVE-2021-37159,CVE-2021-3732,CVE-2021-3752,CVE-2021-3753,CVE-2021-37576,CVE-2021-3760,CVE-2021-3772,CVE-2021-38160,CVE-2021-38198,CVE-2021-38204,CVE-2021-3896,CVE-2021-40490,CVE-2021-42008,CVE-2021-42739,CVE-2021-43389
JIRA References: 
Sources used:
SUSE Linux Enterprise Server 12-SP2-BCL (src):    kernel-default-4.4.121-92.161.1, kernel-source-4.4.121-92.161.1, kernel-syms-4.4.121-92.161.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 40 Swamp Workflow Management 2021-12-06 17:46:03 UTC
openSUSE-SU-2021:3941-1: An update that solves four vulnerabilities, contains one feature and has 21 fixes is now available.

Category: security (important)
Bug References: 1152489,1169263,1170269,1184924,1190523,1190795,1191790,1191961,1192045,1192217,1192273,1192328,1192375,1192473,1192718,1192740,1192745,1192750,1192753,1192758,1192781,1192802,1192896,1192906,1192918
CVE References: CVE-2021-0941,CVE-2021-20322,CVE-2021-31916,CVE-2021-34981
JIRA References: SLE-22573
Sources used:
openSUSE Leap 15.3 (src):    dtb-aarch64-5.3.18-59.37.1, kernel-64kb-5.3.18-59.37.2, kernel-debug-5.3.18-59.37.2, kernel-default-5.3.18-59.37.2, kernel-default-base-5.3.18-59.37.2.18.23.3, kernel-docs-5.3.18-59.37.2, kernel-kvmsmall-5.3.18-59.37.2, kernel-obs-build-5.3.18-59.37.3, kernel-obs-qa-5.3.18-59.37.1, kernel-preempt-5.3.18-59.37.2, kernel-source-5.3.18-59.37.2, kernel-syms-5.3.18-59.37.1, kernel-zfcpdump-5.3.18-59.37.2
Comment 41 Swamp Workflow Management 2021-12-06 17:59:17 UTC
SUSE-SU-2021:3941-1: An update that solves four vulnerabilities, contains one feature and has 21 fixes is now available.

Category: security (important)
Bug References: 1152489,1169263,1170269,1184924,1190523,1190795,1191790,1191961,1192045,1192217,1192273,1192328,1192375,1192473,1192718,1192740,1192745,1192750,1192753,1192758,1192781,1192802,1192896,1192906,1192918
CVE References: CVE-2021-0941,CVE-2021-20322,CVE-2021-31916,CVE-2021-34981
JIRA References: SLE-22573
Sources used:
SUSE MicroOS 5.1 (src):    kernel-default-5.3.18-59.37.2, kernel-default-base-5.3.18-59.37.2.18.23.3
SUSE Linux Enterprise Workstation Extension 15-SP3 (src):    kernel-default-5.3.18-59.37.2, kernel-preempt-5.3.18-59.37.2
SUSE Linux Enterprise Module for Live Patching 15-SP3 (src):    kernel-default-5.3.18-59.37.2, kernel-livepatch-SLE15-SP3_Update_10-1-7.3.2
SUSE Linux Enterprise Module for Legacy Software 15-SP3 (src):    kernel-default-5.3.18-59.37.2
SUSE Linux Enterprise Module for Development Tools 15-SP3 (src):    kernel-docs-5.3.18-59.37.2, kernel-obs-build-5.3.18-59.37.3, kernel-preempt-5.3.18-59.37.2, kernel-source-5.3.18-59.37.2, kernel-syms-5.3.18-59.37.1
SUSE Linux Enterprise Module for Basesystem 15-SP3 (src):    kernel-64kb-5.3.18-59.37.2, kernel-default-5.3.18-59.37.2, kernel-default-base-5.3.18-59.37.2.18.23.3, kernel-preempt-5.3.18-59.37.2, kernel-source-5.3.18-59.37.2, kernel-zfcpdump-5.3.18-59.37.2
SUSE Linux Enterprise High Availability 15-SP3 (src):    kernel-default-5.3.18-59.37.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 42 Swamp Workflow Management 2021-12-06 18:18:51 UTC
SUSE-SU-2021:3935-1: An update that solves 38 vulnerabilities and has 18 fixes is now available.

Category: security (important)
Bug References: 1073928,1098425,1100416,1119934,1129735,1171217,1171420,1173346,1176724,1177666,1181158,1181854,1181855,1183089,1184673,1185726,1185727,1185758,1185973,1186109,1186390,1188172,1188563,1188601,1188838,1188876,1188983,1188985,1189057,1189262,1189278,1189291,1189399,1189420,1189706,1190022,1190023,1190025,1190067,1190117,1190159,1190194,1190349,1190351,1190601,1190717,1191193,1191315,1191790,1191801,1191958,1191961,1192267,1192400,1192775,1192781
CVE References: CVE-2017-17862,CVE-2017-17864,CVE-2018-13405,CVE-2018-16882,CVE-2020-0429,CVE-2020-12655,CVE-2020-14305,CVE-2020-3702,CVE-2020-4788,CVE-2021-20265,CVE-2021-20322,CVE-2021-31916,CVE-2021-33033,CVE-2021-34556,CVE-2021-34981,CVE-2021-3542,CVE-2021-35477,CVE-2021-3640,CVE-2021-3653,CVE-2021-3655,CVE-2021-3659,CVE-2021-3679,CVE-2021-3715,CVE-2021-37159,CVE-2021-3732,CVE-2021-3752,CVE-2021-3753,CVE-2021-37576,CVE-2021-3760,CVE-2021-3772,CVE-2021-38160,CVE-2021-38198,CVE-2021-38204,CVE-2021-3896,CVE-2021-40490,CVE-2021-42008,CVE-2021-42739,CVE-2021-43389
JIRA References: 
Sources used:
SUSE OpenStack Cloud Crowbar 8 (src):    kernel-default-4.4.180-94.150.1, kernel-source-4.4.180-94.150.1, kernel-syms-4.4.180-94.150.1, kgraft-patch-SLE12-SP3_Update_41-1-4.3.1
SUSE OpenStack Cloud 8 (src):    kernel-default-4.4.180-94.150.1, kernel-source-4.4.180-94.150.1, kernel-syms-4.4.180-94.150.1, kgraft-patch-SLE12-SP3_Update_41-1-4.3.1
SUSE Linux Enterprise Server for SAP 12-SP3 (src):    kernel-default-4.4.180-94.150.1, kernel-source-4.4.180-94.150.1, kernel-syms-4.4.180-94.150.1, kgraft-patch-SLE12-SP3_Update_41-1-4.3.1
SUSE Linux Enterprise Server 12-SP3-LTSS (src):    kernel-default-4.4.180-94.150.1, kernel-source-4.4.180-94.150.1, kernel-syms-4.4.180-94.150.1, kgraft-patch-SLE12-SP3_Update_41-1-4.3.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    kernel-default-4.4.180-94.150.1, kernel-source-4.4.180-94.150.1, kernel-syms-4.4.180-94.150.1
SUSE Linux Enterprise High Availability 12-SP3 (src):    kernel-default-4.4.180-94.150.1
HPE Helion Openstack 8 (src):    kernel-default-4.4.180-94.150.1, kernel-source-4.4.180-94.150.1, kernel-syms-4.4.180-94.150.1, kgraft-patch-SLE12-SP3_Update_41-1-4.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 43 Swamp Workflow Management 2021-12-07 20:27:15 UTC
SUSE-SU-2021:3969-1: An update that solves 37 vulnerabilities and has 21 fixes is now available.

Category: security (important)
Bug References: 1085235,1085308,1087078,1087082,1100394,1102640,1105412,1108488,1129898,1133374,1171420,1173489,1174161,1181854,1184804,1185377,1185726,1185758,1186109,1186482,1188172,1188563,1188601,1188838,1188876,1188983,1188985,1189057,1189262,1189291,1189399,1189400,1189706,1189846,1189884,1190023,1190025,1190067,1190117,1190159,1190351,1190479,1190534,1190601,1190717,1191193,1191315,1191317,1191790,1191800,1191961,1192045,1192267,1192379,1192400,1192775,1192781,1192802
CVE References: CVE-2018-3639,CVE-2018-9517,CVE-2019-3874,CVE-2019-3900,CVE-2020-12770,CVE-2020-3702,CVE-2021-0941,CVE-2021-20320,CVE-2021-20322,CVE-2021-22543,CVE-2021-31916,CVE-2021-33033,CVE-2021-34556,CVE-2021-34981,CVE-2021-35477,CVE-2021-3640,CVE-2021-3653,CVE-2021-3655,CVE-2021-3656,CVE-2021-3659,CVE-2021-3679,CVE-2021-37159,CVE-2021-3732,CVE-2021-3744,CVE-2021-3752,CVE-2021-3753,CVE-2021-37576,CVE-2021-3760,CVE-2021-3764,CVE-2021-3772,CVE-2021-38160,CVE-2021-38198,CVE-2021-38204,CVE-2021-40490,CVE-2021-41864,CVE-2021-42008,CVE-2021-42252
JIRA References: 
Sources used:
SUSE Linux Enterprise Server for SAP 15 (src):    kernel-default-4.12.14-150.78.1, kernel-docs-4.12.14-150.78.2, kernel-obs-build-4.12.14-150.78.2, kernel-source-4.12.14-150.78.1, kernel-syms-4.12.14-150.78.1, kernel-vanilla-4.12.14-150.78.1
SUSE Linux Enterprise Server 15-LTSS (src):    kernel-default-4.12.14-150.78.1, kernel-docs-4.12.14-150.78.2, kernel-obs-build-4.12.14-150.78.2, kernel-source-4.12.14-150.78.1, kernel-syms-4.12.14-150.78.1, kernel-vanilla-4.12.14-150.78.1, kernel-zfcpdump-4.12.14-150.78.1
SUSE Linux Enterprise Module for Live Patching 15 (src):    kernel-default-4.12.14-150.78.1, kernel-livepatch-SLE15_Update_26-1-1.3.1
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    kernel-default-4.12.14-150.78.1, kernel-docs-4.12.14-150.78.2, kernel-obs-build-4.12.14-150.78.2, kernel-source-4.12.14-150.78.1, kernel-syms-4.12.14-150.78.1, kernel-vanilla-4.12.14-150.78.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    kernel-default-4.12.14-150.78.1, kernel-docs-4.12.14-150.78.2, kernel-obs-build-4.12.14-150.78.2, kernel-source-4.12.14-150.78.1, kernel-syms-4.12.14-150.78.1, kernel-vanilla-4.12.14-150.78.1
SUSE Linux Enterprise High Availability 15 (src):    kernel-default-4.12.14-150.78.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 44 Swamp Workflow Management 2021-12-08 14:27:57 UTC
SUSE-SU-2021:3972-1: An update that solves 40 vulnerabilities and has 47 fixes is now available.

Category: security (important)
Bug References: 1087082,1100416,1108488,1129735,1129898,1133374,1153720,1171420,1176724,1176931,1180624,1181854,1181855,1183050,1183861,1184673,1184804,1185377,1185677,1185726,1185727,1185758,1185973,1186063,1186482,1186483,1186672,1188026,1188172,1188563,1188601,1188613,1188838,1188842,1188876,1188983,1188985,1189057,1189262,1189278,1189291,1189399,1189400,1189418,1189420,1189706,1189846,1189884,1190023,1190025,1190067,1190115,1190117,1190118,1190159,1190276,1190349,1190350,1190351,1190432,1190479,1190534,1190601,1190717,1191193,1191315,1191317,1191318,1191529,1191530,1191628,1191660,1191790,1191801,1191813,1191961,1192036,1192045,1192048,1192267,1192379,1192400,1192444,1192549,1192775,1192781,1192802
CVE References: CVE-2018-13405,CVE-2018-9517,CVE-2019-3874,CVE-2019-3900,CVE-2020-0429,CVE-2020-12770,CVE-2020-3702,CVE-2021-0941,CVE-2021-20322,CVE-2021-22543,CVE-2021-31916,CVE-2021-34556,CVE-2021-34981,CVE-2021-3542,CVE-2021-35477,CVE-2021-3640,CVE-2021-3653,CVE-2021-3655,CVE-2021-3656,CVE-2021-3659,CVE-2021-3679,CVE-2021-3715,CVE-2021-37159,CVE-2021-3732,CVE-2021-3744,CVE-2021-3752,CVE-2021-3753,CVE-2021-37576,CVE-2021-3759,CVE-2021-3760,CVE-2021-3764,CVE-2021-3772,CVE-2021-38160,CVE-2021-38198,CVE-2021-38204,CVE-2021-40490,CVE-2021-41864,CVE-2021-42008,CVE-2021-42252,CVE-2021-42739
JIRA References: 
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    kernel-default-4.12.14-95.83.2, kernel-source-4.12.14-95.83.2, kernel-syms-4.12.14-95.83.2
SUSE OpenStack Cloud 9 (src):    kernel-default-4.12.14-95.83.2, kernel-source-4.12.14-95.83.2, kernel-syms-4.12.14-95.83.2
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    kernel-default-4.12.14-95.83.2, kernel-source-4.12.14-95.83.2, kernel-syms-4.12.14-95.83.2
SUSE Linux Enterprise Server 12-SP4-LTSS (src):    kernel-default-4.12.14-95.83.2, kernel-source-4.12.14-95.83.2, kernel-syms-4.12.14-95.83.2
SUSE Linux Enterprise Live Patching 12-SP4 (src):    kernel-default-4.12.14-95.83.2, kgraft-patch-SLE12-SP4_Update_23-1-6.3.1
SUSE Linux Enterprise High Availability 12-SP4 (src):    kernel-default-4.12.14-95.83.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 45 Swamp Workflow Management 2021-12-09 14:18:28 UTC
SUSE-SU-2021:3978-1: An update that solves 7 vulnerabilities, contains one feature and has 27 fixes is now available.

Category: security (important)
Bug References: 1094840,1133021,1152489,1153275,1169263,1169514,1170269,1176940,1179599,1188601,1190523,1190795,1191790,1191851,1191958,1191961,1191980,1192045,1192229,1192273,1192328,1192718,1192740,1192745,1192750,1192753,1192781,1192802,1192896,1192906,1192918,1192987,1192998,1193002
CVE References: CVE-2020-27820,CVE-2021-0941,CVE-2021-20322,CVE-2021-31916,CVE-2021-34981,CVE-2021-37159,CVE-2021-43389
JIRA References: SLE-22573
Sources used:
SUSE MicroOS 5.0 (src):    kernel-rt-5.3.18-62.2
SUSE Linux Enterprise Module for Realtime 15-SP2 (src):    kernel-rt-5.3.18-62.2, kernel-rt_debug-5.3.18-62.3, kernel-source-rt-5.3.18-62.3, kernel-syms-rt-5.3.18-62.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 46 Swamp Workflow Management 2021-12-09 20:28:07 UTC
SUSE-SU-2021:3979-1: An update that solves four vulnerabilities, contains one feature and has 23 fixes is now available.

Category: security (important)
Bug References: 1152489,1169263,1170269,1184924,1190523,1190795,1191790,1191961,1192045,1192217,1192273,1192328,1192375,1192473,1192691,1192718,1192740,1192745,1192750,1192753,1192758,1192781,1192802,1192874,1192896,1192906,1192918
CVE References: CVE-2021-0941,CVE-2021-20322,CVE-2021-31916,CVE-2021-34981
JIRA References: SLE-22573
Sources used:
SUSE MicroOS 5.1 (src):    kernel-rt-5.3.18-65.2
SUSE Linux Enterprise Module for Realtime 15-SP3 (src):    kernel-rt-5.3.18-65.2, kernel-rt_debug-5.3.18-65.2, kernel-source-rt-5.3.18-65.2, kernel-syms-rt-5.3.18-65.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 47 Swamp Workflow Management 2021-12-10 14:46:57 UTC
SUSE-SU-2021:3992-1: An update that solves four vulnerabilities, contains one feature and has 15 fixes is now available.

Category: security (important)
Bug References: 1114648,1141655,1169514,1190317,1190523,1191790,1191876,1191961,1192045,1192048,1192273,1192718,1192750,1192753,1192781,1192802,1192866,1192906,1192987
CVE References: CVE-2021-0941,CVE-2021-20322,CVE-2021-31916,CVE-2021-34981
JIRA References: SLE-22573
Sources used:
SUSE Linux Enterprise Real Time Extension 12-SP5 (src):    kernel-rt-4.12.14-10.70.2, kernel-rt_debug-4.12.14-10.70.2, kernel-source-rt-4.12.14-10.70.2, kernel-syms-rt-4.12.14-10.70.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 52 Takashi Iwai 2022-05-10 16:55:51 UTC
The fix backported to cve/linux-2.6.32 and cve/linux-3.0 now, too.

Reassigned back to security team.
Comment 55 Swamp Workflow Management 2023-02-15 14:23:06 UTC
SUSE-SU-2023:0416-1: An update that solves 62 vulnerabilities and has one errata is now available.

Category: security (important)
Bug References: 1055710,1084513,1131430,1133374,1154848,1166098,1173514,1177471,1191961,1196973,1197331,1197343,1197366,1197391,1198516,1198829,1199063,1199426,1199487,1199650,1199657,1200598,1200619,1200692,1200910,1201050,1201251,1201429,1201635,1201636,1201940,1201948,1202097,1202346,1202347,1202393,1202500,1202897,1202898,1202960,1203107,1203271,1203514,1203769,1203960,1203987,1204166,1204354,1204405,1204431,1204439,1204574,1204631,1204646,1204647,1204653,1204894,1204922,1205220,1205514,1205671,1205796,1206677
CVE References: CVE-2017-13695,CVE-2018-7755,CVE-2019-3837,CVE-2019-3900,CVE-2020-15393,CVE-2020-16119,CVE-2020-36557,CVE-2020-36558,CVE-2021-26341,CVE-2021-33655,CVE-2021-33656,CVE-2021-34981,CVE-2021-39713,CVE-2021-45868,CVE-2022-1011,CVE-2022-1048,CVE-2022-1353,CVE-2022-1462,CVE-2022-1652,CVE-2022-1679,CVE-2022-20132,CVE-2022-20166,CVE-2022-20368,CVE-2022-20369,CVE-2022-21123,CVE-2022-21125,CVE-2022-21127,CVE-2022-21166,CVE-2022-21180,CVE-2022-21385,CVE-2022-21499,CVE-2022-2318,CVE-2022-2663,CVE-2022-28356,CVE-2022-29900,CVE-2022-29901,CVE-2022-3028,CVE-2022-3303,CVE-2022-33981,CVE-2022-3424,CVE-2022-3524,CVE-2022-3565,CVE-2022-3566,CVE-2022-3586,CVE-2022-3621,CVE-2022-3635,CVE-2022-3646,CVE-2022-3649,CVE-2022-36879,CVE-2022-36946,CVE-2022-3903,CVE-2022-39188,CVE-2022-40768,CVE-2022-4095,CVE-2022-41218,CVE-2022-41848,CVE-2022-41850,CVE-2022-41858,CVE-2022-43750,CVE-2022-44032,CVE-2022-44033,CVE-2022-45934
JIRA References: 
Sources used:
SUSE Linux Enterprise Server 11-SP4-LTSS-EXTREME-CORE (src):    kernel-default-3.0.101-108.138.1, kernel-ec2-3.0.101-108.138.1, kernel-source-3.0.101-108.138.1, kernel-syms-3.0.101-108.138.1, kernel-trace-3.0.101-108.138.1, kernel-xen-3.0.101-108.138.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 56 Andrea Mattiazzo 2024-05-23 15:53:51 UTC
All done, closing.