Описание
Security update for the Linux Kernel (Live Patch 35 for SLE 12)
This update for the Linux Kernel 3.12.61-52_133 fixes several issues.
The following security issues were fixed:
- CVE-2018-9568: Prevent possible memory corruption due to type confusion in sk_clone_lock. This could lead to local privilege escalation (bsc#1118319).
- CVE-2018-5848: Fixed an unsigned integer overflow in wmi_set_ie. This could lead to a buffer overflow (bsc#1097356).
Список пакетов
SUSE Linux Enterprise Server 12-LTSS
Ссылки
- Link for SUSE-SU-2018:4195-1
- E-Mail link for SUSE-SU-2018:4195-1
- SUSE Security Ratings
- SUSE Bug 1115339
- SUSE Bug 1118320
- SUSE CVE CVE-2018-5848 page
- SUSE CVE CVE-2018-9568 page
Описание
In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the 'ie_len' argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.
Затронутые продукты
Ссылки
- CVE-2018-5848
- SUSE Bug 1087082
- SUSE Bug 1097356
- SUSE Bug 1105412
- SUSE Bug 1115339
Описание
In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.
Затронутые продукты
Ссылки
- CVE-2018-9568
- SUSE Bug 1118319
- SUSE Bug 1118320