Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2019:1671-1

Опубликовано: 21 июн. 2019
Источник: suse-cvrf

Описание

Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2)

This update for the Linux Kernel 4.4.121-92_101 fixes several issues.

The following security issues were fixed:

  • CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).
  • CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).
  • CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)
  • CVE-2019-11487: The Linux kernel allowed page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).

Список пакетов

SUSE Linux Enterprise Live Patching 12 SP3
kgraft-patch-4_4_176-94_88-default-2-2.1
kgraft-patch-4_4_162-94_72-default-4-2.1
kgraft-patch-4_4_178-94_91-default-2-2.1
kgraft-patch-4_4_156-94_64-default-5-2.1
kgraft-patch-4_4_175-94_79-default-3-2.1
kgraft-patch-4_4_156-94_61-default-6-2.1
kgraft-patch-4_4_162-94_69-default-4-2.1
kgraft-patch-4_4_143-94_47-default-6-2.1
kgraft-patch-4_4_156-94_57-default-6-2.1
kgraft-patch-4_4_140-94_42-default-9-2.1
kgraft-patch-4_4_155-94_50-default-6-2.1
kgraft-patch-4_4_138-94_39-default-9-2.1
SUSE Linux Enterprise Live Patching 12 SP4
kgraft-patch-4_12_14-95_16-default-2-2.1
kgraft-patch-4_12_14-95_13-default-2-2.1
SUSE Linux Enterprise Server 12 SP2-LTSS
kgraft-patch-4_4_121-92_92-default-7-2.1
kgraft-patch-4_4_121-92_85-default-9-2.1
kgraft-patch-4_4_121-92_95-default-6-2.1
kgraft-patch-4_4_121-92_98-default-5-2.1
kgraft-patch-4_4_121-92_109-default-3-2.1
kgraft-patch-4_4_121-92_104-default-3-2.1
kgraft-patch-4_4_121-92_101-default-3-2.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
kgraft-patch-4_4_121-92_92-default-7-2.1
kgraft-patch-4_4_121-92_85-default-9-2.1
kgraft-patch-4_4_121-92_95-default-6-2.1
kgraft-patch-4_4_121-92_98-default-5-2.1
kgraft-patch-4_4_121-92_109-default-3-2.1
kgraft-patch-4_4_121-92_104-default-3-2.1
kgraft-patch-4_4_121-92_101-default-3-2.1

Описание

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1
SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1
SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1
SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1

Ссылки

Описание

Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1
SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1
SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1
SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1

Ссылки

Описание

The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1
SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1
SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1
SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1

Ссылки

Описание

A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1
SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1
SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1
SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1

Ссылки