Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2019:0828-1

Опубликовано: 01 апр. 2019
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).
  • CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
  • CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. (bnc#1107829).
  • CVE-2019-7221: The KVM implementation in the Linux kernel had a Use-after-Free (bnc#1124732).
  • CVE-2019-7222: The KVM implementation in the Linux kernel had an Information Leak (bnc#1124735).
  • CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, which led to a use-after-free (bnc#1124728).

The following non-security bugs were fixed:

  • copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
  • enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959).
  • ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
  • ipv4: ipv6: Adjust the frag mem limit after truesize has been changed (bsc#1110286).
  • kmps: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).
  • netfilter: ipv6: Adjust the frag mem limit after truesize has been changed (bsc#1110286).
  • perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
  • perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
  • perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
  • perf/x86/intel: Fix memory corruption (bsc#1121805).
  • perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
  • perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
  • perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
  • pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
  • restore cond_resched() in shrink_dcache_parent() (bsc#1098599, bsc#1105402, bsc#1127758).
  • rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1108145).
  • scsi: megaraid_sas: Send SYNCHRONIZE_CACHE for VD to firmware (bsc#1121698).
  • scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
  • x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
  • x86: respect memory size limiting via mem= parameter (bsc#1117645).
  • x86/spectre_v2: Do not check microcode versions when running under hypervisors (bsc#1122821).
  • x86/xen: dont add memory above max allowed allocation (bsc#1117645).
  • xen-netfront: Fix hang on device removal (bnc#1012382).
  • xfrm: use complete IPv6 addresses for hash (bsc#1109330).
  • xfs: remove filestream item xfs_inode reference (bsc#1127961).

Список пакетов

SUSE Enterprise Storage 4
kernel-default-4.4.121-92.104.1
kernel-default-base-4.4.121-92.104.1
kernel-default-devel-4.4.121-92.104.1
kernel-devel-4.4.121-92.104.1
kernel-macros-4.4.121-92.104.1
kernel-source-4.4.121-92.104.1
kernel-syms-4.4.121-92.104.1
kgraft-patch-4_4_121-92_104-default-1-3.3.1
SUSE Linux Enterprise High Availability Extension 12 SP2
cluster-md-kmp-default-4.4.121-92.104.1
cluster-network-kmp-default-4.4.121-92.104.1
dlm-kmp-default-4.4.121-92.104.1
gfs2-kmp-default-4.4.121-92.104.1
ocfs2-kmp-default-4.4.121-92.104.1
SUSE Linux Enterprise Server 12 SP2-BCL
kernel-default-4.4.121-92.104.1
kernel-default-base-4.4.121-92.104.1
kernel-default-devel-4.4.121-92.104.1
kernel-devel-4.4.121-92.104.1
kernel-macros-4.4.121-92.104.1
kernel-source-4.4.121-92.104.1
kernel-syms-4.4.121-92.104.1
SUSE Linux Enterprise Server 12 SP2-LTSS
kernel-default-4.4.121-92.104.1
kernel-default-base-4.4.121-92.104.1
kernel-default-devel-4.4.121-92.104.1
kernel-default-man-4.4.121-92.104.1
kernel-devel-4.4.121-92.104.1
kernel-macros-4.4.121-92.104.1
kernel-source-4.4.121-92.104.1
kernel-syms-4.4.121-92.104.1
kgraft-patch-4_4_121-92_104-default-1-3.3.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
kernel-default-4.4.121-92.104.1
kernel-default-base-4.4.121-92.104.1
kernel-default-devel-4.4.121-92.104.1
kernel-devel-4.4.121-92.104.1
kernel-macros-4.4.121-92.104.1
kernel-source-4.4.121-92.104.1
kernel-syms-4.4.121-92.104.1
kgraft-patch-4_4_121-92_104-default-1-3.3.1
SUSE OpenStack Cloud 7
kernel-default-4.4.121-92.104.1
kernel-default-base-4.4.121-92.104.1
kernel-default-devel-4.4.121-92.104.1
kernel-default-man-4.4.121-92.104.1
kernel-devel-4.4.121-92.104.1
kernel-macros-4.4.121-92.104.1
kernel-source-4.4.121-92.104.1
kernel-syms-4.4.121-92.104.1
kgraft-patch-4_4_121-92_104-default-1-3.3.1

Описание

A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.


Затронутые продукты
SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1
SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1
SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1
SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1

Ссылки

Описание

In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel


Затронутые продукты
SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1
SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1
SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1
SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1

Ссылки

Описание

In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.


Затронутые продукты
SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1
SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1
SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1
SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1

Ссылки

Описание

The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.


Затронутые продукты
SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1
SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1
SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1
SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1

Ссылки

Описание

The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.


Затронутые продукты
SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1
SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1
SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1
SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1

Ссылки

Описание

In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.


Затронутые продукты
SUSE Enterprise Storage 4:kernel-default-4.4.121-92.104.1
SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.104.1
SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.104.1
SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.104.1

Ссылки
Уязвимость SUSE-SU-2019:0828-1