Описание
Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2)
This update for the Linux Kernel 4.4.121-92_114 fixes several issues.
The following security issues were fixed:
- CVE-2019-11487: The Linux kernel allowed page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).
- CVE-2018-5390: Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).
Список пакетов
SUSE Linux Enterprise Server 12 SP1-LTSS
kgraft-patch-3_12_74-60_64_115-default-2-2.1
kgraft-patch-3_12_74-60_64_115-xen-2-2.1
SUSE Linux Enterprise Server 12 SP2-LTSS
kgraft-patch-4_4_121-92_114-default-2-2.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1
kgraft-patch-3_12_74-60_64_115-default-2-2.1
kgraft-patch-3_12_74-60_64_115-xen-2-2.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
kgraft-patch-4_4_121-92_114-default-2-2.1
Ссылки
- Link for SUSE-SU-2019:1767-1
- E-Mail link for SUSE-SU-2019:1767-1
- SUSE Security Ratings
- SUSE Bug 1102682
- SUSE Bug 1133191
- SUSE CVE CVE-2018-5390 page
- SUSE CVE CVE-2019-11487 page
Описание
Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
Затронутые продукты
SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-2-2.1
SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-2-2.1
SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-2-2.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-2-2.1
Ссылки
- CVE-2018-5390
- SUSE Bug 1087082
- SUSE Bug 1102340
- SUSE Bug 1102682
- SUSE Bug 1103097
- SUSE Bug 1103098
- SUSE Bug 1156434
Описание
The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.
Затронутые продукты
SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-2-2.1
SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-2-2.1
SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-2-2.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-2-2.1
Ссылки
- CVE-2019-11487
- SUSE Bug 1133190
- SUSE Bug 1133191