Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2019:1948-1

Опубликовано: 23 июл. 2019
Источник: suse-cvrf

Описание

Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3)

This update for the Linux Kernel 4.4.178-94_91 fixes several issues.

The following security issues were fixed:

  • CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
  • CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
  • CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).

This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).

Список пакетов

SUSE Linux Enterprise Live Patching 12 SP4
kgraft-patch-4_12_14-94_41-default-6-2.16.1
kgraft-patch-4_12_14-95_3-default-5-2.1
kgraft-patch-4_12_14-95_6-default-4-2.1
kgraft-patch-4_12_14-95_13-default-3-2.1
kgraft-patch-4_12_14-95_16-default-3-2.1
SUSE Linux Enterprise Server 12 SP2-LTSS
kgraft-patch-4_4_121-92_92-default-8-2.1
kgraft-patch-4_4_121-92_95-default-7-2.1
kgraft-patch-4_4_121-92_98-default-6-2.1
kgraft-patch-4_4_121-92_101-default-4-2.1
kgraft-patch-4_4_121-92_104-default-4-2.1
kgraft-patch-4_4_121-92_109-default-4-2.1
SUSE Linux Enterprise Server 12 SP3-LTSS
kgraft-patch-4_4_140-94_42-default-10-2.1
kgraft-patch-4_4_143-94_47-default-7-2.1
kgraft-patch-4_4_155-94_50-default-7-2.1
kgraft-patch-4_4_156-94_57-default-7-2.1
kgraft-patch-4_4_156-94_61-default-7-2.1
kgraft-patch-4_4_156-94_64-default-6-2.1
kgraft-patch-4_4_162-94_69-default-5-2.1
kgraft-patch-4_4_162-94_72-default-5-2.1
kgraft-patch-4_4_175-94_79-default-4-2.1
kgraft-patch-4_4_176-94_88-default-3-2.1
kgraft-patch-4_4_178-94_91-default-3-2.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
kgraft-patch-4_4_121-92_92-default-8-2.1
kgraft-patch-4_4_121-92_95-default-7-2.1
kgraft-patch-4_4_121-92_98-default-6-2.1
kgraft-patch-4_4_121-92_101-default-4-2.1
kgraft-patch-4_4_121-92_104-default-4-2.1
kgraft-patch-4_4_121-92_109-default-4-2.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
kgraft-patch-4_4_140-94_42-default-10-2.1
kgraft-patch-4_4_143-94_47-default-7-2.1
kgraft-patch-4_4_155-94_50-default-7-2.1
kgraft-patch-4_4_156-94_57-default-7-2.1
kgraft-patch-4_4_156-94_61-default-7-2.1
kgraft-patch-4_4_156-94_64-default-6-2.1
kgraft-patch-4_4_162-94_69-default-5-2.1
kgraft-patch-4_4_162-94_72-default-5-2.1
kgraft-patch-4_4_175-94_79-default-4-2.1
kgraft-patch-4_4_176-94_88-default-3-2.1
kgraft-patch-4_4_178-94_91-default-3-2.1

Описание

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1

Ссылки

Описание

Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1

Ссылки

Описание

A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1

Ссылки
Уязвимость SUSE-SU-2019:1948-1