Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2019:14157-1

Опубликовано: 29 авг. 2019
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
  • CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
  • CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
  • CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
  • CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).
  • CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
  • CVE-2015-9289: A buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allowed larger values such as 23 (bsc#1143179).

The following non-security bugs were fixed:

  • fix detection of race between fcntl-setlk and close (bsc#1140965).
  • ocfs2: add first lock wait time in locking_state (bsc#1134390).
  • ocfs2: add last unlock times in locking_state (bsc#1134390).
  • ocfs2: add locking filter debugfs file (bsc#1134390).
  • powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945,bsc#1141401,bsc#1141402,bsc#1141452,bsc#1141453,bsc#1141454).
  • xen-netfront: use napi_complete() correctly to prevent Rx stalling (bsc#1138744).

Список пакетов

SUSE Linux Enterprise Server 11 SP4-LTSS
kernel-bigmem-3.0.101-108.101.1
kernel-bigmem-base-3.0.101-108.101.1
kernel-bigmem-devel-3.0.101-108.101.1
kernel-default-3.0.101-108.101.1
kernel-default-base-3.0.101-108.101.1
kernel-default-devel-3.0.101-108.101.1
kernel-default-man-3.0.101-108.101.1
kernel-ec2-3.0.101-108.101.1
kernel-ec2-base-3.0.101-108.101.1
kernel-ec2-devel-3.0.101-108.101.1
kernel-pae-3.0.101-108.101.1
kernel-pae-base-3.0.101-108.101.1
kernel-pae-devel-3.0.101-108.101.1
kernel-ppc64-3.0.101-108.101.1
kernel-ppc64-base-3.0.101-108.101.1
kernel-ppc64-devel-3.0.101-108.101.1
kernel-source-3.0.101-108.101.1
kernel-syms-3.0.101-108.101.1
kernel-trace-3.0.101-108.101.1
kernel-trace-base-3.0.101-108.101.1
kernel-trace-devel-3.0.101-108.101.1
kernel-xen-3.0.101-108.101.1
kernel-xen-base-3.0.101-108.101.1
kernel-xen-devel-3.0.101-108.101.1

Описание

In the Linux kernel before 4.1.4, a buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allows larger values such as 23.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1

Ссылки

Описание

An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1

Ссылки

Описание

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a security update on July 9, 2019 that addresses the vulnerability through a software change that mitigates how the CPU speculatively accesses memory. Note that this vulnerability does not require a microcode update from your device OEM.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1

Ссылки

Описание

An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1

Ссылки

Описание

In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1

Ссылки

Описание

In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1

Ссылки

Описание

In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.101.1
SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.101.1

Ссылки
Уязвимость SUSE-SU-2019:14157-1