Описание
Security update for the Linux Kernel (Live Patch 0 for SLE 15)
This update for the Linux Kernel 4.12.14-23 fixes several issues.
The following security issues were fixed:
- CVE-2018-9568: Prevent possible memory corruption due to type confusion in sk_clone_lock. This could lead to local privilege escalation (bsc#1118319).
- CVE-2018-5848: Fixed an unsigned integer overflow in wmi_set_ie. This could lead to a buffer overflow (bsc#1097356).
Список пакетов
SUSE Linux Enterprise Live Patching 15
Ссылки
- Link for SUSE-SU-2018:4238-1
- E-Mail link for SUSE-SU-2018:4238-1
- SUSE Security Ratings
- SUSE Bug 1097356
- SUSE Bug 1118319
- SUSE CVE CVE-2018-5848 page
- SUSE CVE CVE-2018-9568 page
Описание
In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the 'ie_len' argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.
Затронутые продукты
Ссылки
- CVE-2018-5848
- SUSE Bug 1087082
- SUSE Bug 1097356
- SUSE Bug 1105412
- SUSE Bug 1115339
Описание
In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.
Затронутые продукты
Ссылки
- CVE-2018-9568
- SUSE Bug 1118319
- SUSE Bug 1118320