Описание
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 GA LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX registers) between processes. These registers might contain encryption keys when doing SSE accelerated AES enc/decryption (bsc#1087086)
- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did not handle unsigned integer overflow properly. As a result, a large value of the 'ie_len' argument could have caused a buffer overflow (bnc#1097356)
- CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO ioctl (bsc#1096728)
- CVE-2017-13305: Prevent information disclosure vulnerability in encrypted-keys (bsc#1094353)
- CVE-2018-1094: The ext4_fill_super function did not always initialize the crc32c checksum driver, which allowed attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image (bsc#1087007)
- CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers (bsc#1087095)
- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory with a zero i_links_count, which allowed attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image (bsc#1087012)
- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that allowed a local user to cause a denial of service by a number of certain crafted system calls (bsc#1092904)
- CVE-2018-5803: Prevent error in the '_sctp_make_chunk()' function when handling SCTP packets length that could have been exploited to cause a kernel crash (bnc#1083900)
- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c __rds_rdma_map() function that allowed local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bsc#1082962)
The following non-security bugs were fixed:
- Fix excessive newline in /proc/*/status (bsc#1094823).
- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- ipv6: add mtu lock check in __ip6_rt_update_pmtu (bsc#1092552).
- kABI: work around BPF SSBD removal (bsc#1087082).
- kgraft/bnx2fc: Do not block kGraft in bnx2fc_l2_rcv kthread (bsc#1094033).
- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152).
- usbip: usbip_host: fix NULL-ptr deref and use-after-free errors (bsc#1096480).
- usbip: usbip_host: fix bad unlock balance during stub_probe() (bsc#1096480).
- x86/boot: Fix early command-line parsing when matching at end (bsc#1096281).
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096281).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1092813)
- xen-netfront: fix req_prod check to avoid RX hang when index wraps (bsc#1046610).
Список пакетов
SUSE Linux Enterprise Module for Public Cloud 12
SUSE Linux Enterprise Server 12-LTSS
Ссылки
- Link for SUSE-SU-2018:1762-1
- E-Mail link for SUSE-SU-2018:1762-1
- SUSE Security Ratings
- SUSE Bug 1046610
- SUSE Bug 1079152
- SUSE Bug 1082962
- SUSE Bug 1083900
- SUSE Bug 1087007
- SUSE Bug 1087012
- SUSE Bug 1087082
- SUSE Bug 1087086
- SUSE Bug 1087095
- SUSE Bug 1092552
- SUSE Bug 1092813
- SUSE Bug 1092904
- SUSE Bug 1094033
- SUSE Bug 1094353
- SUSE Bug 1094823
- SUSE Bug 1096140
- SUSE Bug 1096242
Описание
A information disclosure vulnerability in the Upstream kernel encrypted-keys. Product: Android. Versions: Android kernel. Android ID: A-70526974.
Затронутые продукты
Ссылки
- CVE-2017-13305
- SUSE Bug 1094353
- SUSE Bug 1105412
Описание
** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit."
Затронутые продукты
Ссылки
- CVE-2018-1000204
- SUSE Bug 1096728
- SUSE Bug 1105412
Описание
The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image.
Затронутые продукты
Ссылки
- CVE-2018-1092
- SUSE Bug 1087012
- SUSE Bug 1087082
Описание
The ext4_valid_block_bitmap function in fs/ext4/balloc.c in the Linux kernel through 4.15.15 allows attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers.
Затронутые продукты
Ссылки
- CVE-2018-1093
- SUSE Bug 1087082
- SUSE Bug 1087095
Описание
The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.
Затронутые продукты
Ссылки
- CVE-2018-1094
- SUSE Bug 1087007
- SUSE Bug 1087082
Описание
Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.
Затронутые продукты
Ссылки
- CVE-2018-1130
- SUSE Bug 1092904
Описание
System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
Затронутые продукты
Ссылки
- CVE-2018-3665
- SUSE Bug 1087078
- SUSE Bug 1087082
- SUSE Bug 1087086
- SUSE Bug 1090338
- SUSE Bug 1095241
- SUSE Bug 1095242
- SUSE Bug 1096740
- SUSE Bug 1100091
- SUSE Bug 1100555
- SUSE Bug 1178658
Описание
In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the "_sctp_make_chunk()" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.
Затронутые продукты
Ссылки
- CVE-2018-5803
- SUSE Bug 1083900
- SUSE Bug 1087082
- SUSE Bug 1115893
Описание
In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the 'ie_len' argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.
Затронутые продукты
Ссылки
- CVE-2018-5848
- SUSE Bug 1087082
- SUSE Bug 1097356
- SUSE Bug 1105412
- SUSE Bug 1115339
Описание
A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.
Затронутые продукты
Ссылки
- CVE-2018-7492
- SUSE Bug 1082962