Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2019:2263-1

Опубликовано: 02 сент. 2019
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).
  • CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
  • CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
  • CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
  • CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
  • CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c (bnc#1142254).
  • CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
  • CVE-2019-15118: Fixed kernel stack exhaustion in check_input_term in sound/usb/mixer.c via mishandled recursion (bnc#1145922).
  • CVE-2019-15117: Fixed out-of-bounds memory access in parse_audio_mixer_unit in sound/usb/mixer.c via mishandled short descriptor (bnc#1145920).
  • CVE-2019-3819: A flaw was fixed in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may have enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') could have caused a system lock up and a denial of service (bnc#1123161).
  • CVE-2019-10207: Check for missing tty operations in bluetooth/hci_uart (bsc#1142857).
  • CVE-2018-20856: Fixed a use-after-free issue in block/blk-core.c, where certain error case are mishandled (bnc#1143048).

The following non-security bugs were fixed:

  • cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1125674).
  • dlm: Fix saving of NULL callbacks (bsc#1135365).
  • bcache: Revert 'bcache: fix high CPU occupancy during journal' (bsc#1140652, bsc#1144288).
  • bcache: Revert 'bcache: free heap cache_set->flush_btree in bch_journal_free' (bsc#1140652, bsc#1144288).
  • bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288).
  • bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288).
  • bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257).
  • bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273).
  • bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288).
  • bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288).
  • bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).
  • clocksource: Defer override invalidation unless clock is unstable (bsc#1139826).
  • kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).
  • kvmclock: fix TSC calibration for nested guests (bsc#1133860, jsc#PM-1211).
  • mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).
  • powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945, bsc#1141401, bsc#1141402, bsc#1141452, bsc#1141453, bsc#1141454).
  • qla2xxx: performance degradation when enabling blk-mq (bsc#1128977).
  • qlge: Deduplicate lbq_buf_size (bsc#1106061).
  • qlge: Deduplicate rx buffer queue management (bsc#1106061).
  • qlge: Factor out duplicated expression (bsc#1106061).
  • qlge: Fix dma_sync_single calls (bsc#1106061).
  • qlge: Fix irq masking in INTx mode (bsc#1106061).
  • qlge: Refill empty buffer queues from wq (bsc#1106061).
  • qlge: Refill rx buffers up to multiple of 16 (bsc#1106061).
  • qlge: Remove bq_desc.maplen (bsc#1106061).
  • qlge: Remove irq_cnt (bsc#1106061).
  • qlge: Remove page_chunk.last_flag (bsc#1106061).
  • qlge: Remove qlge_bq.len size (bsc#1106061).
  • qlge: Remove rx_ring.sbq_buf_size (bsc#1106061).
  • qlge: Remove rx_ring.type (bsc#1106061).
  • qlge: Remove useless dma synchronization calls (bsc#1106061).
  • qlge: Remove useless memset (bsc#1106061).
  • qlge: Replace memset with assignment (bsc#1106061).
  • qlge: Update buffer queue prod index despite oom (bsc#1106061).
  • rbd: flush rbd_dev->watch_dwork after watch is unregistered (bsc#1143333).
  • rbd: retry watch re-registration periodically (bsc#1143333).
  • sched/fair: Do not free p->numa_faults with concurrent readers (bsc#1144920).
  • sched/fair: Use RCU accessors consistently for ->numa_group (bsc#1144920).
  • scsi: virtio_scsi: let host do exception handling (bsc#1141181).
  • x86: mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
  • x86: tsc: Add X86_FEATURE_TSC_KNOWN_FREQ flag (bsc#1133860, jsc#PM-1211).
  • xen: let alloc_xenballooned_pages() fail if not enough memory free (XSA-300).

Список пакетов

HPE Helion OpenStack 8
kernel-default-4.4.180-94.103.1
kernel-default-base-4.4.180-94.103.1
kernel-default-devel-4.4.180-94.103.1
kernel-devel-4.4.180-94.103.1
kernel-macros-4.4.180-94.103.1
kernel-source-4.4.180-94.103.1
kernel-syms-4.4.180-94.103.1
kgraft-patch-4_4_180-94_103-default-1-4.3.1
SUSE Enterprise Storage 5
kernel-default-4.4.180-94.103.1
kernel-default-base-4.4.180-94.103.1
kernel-default-devel-4.4.180-94.103.1
kernel-devel-4.4.180-94.103.1
kernel-macros-4.4.180-94.103.1
kernel-source-4.4.180-94.103.1
kernel-syms-4.4.180-94.103.1
kgraft-patch-4_4_180-94_103-default-1-4.3.1
SUSE Linux Enterprise High Availability Extension 12 SP3
cluster-md-kmp-default-4.4.180-94.103.1
dlm-kmp-default-4.4.180-94.103.1
gfs2-kmp-default-4.4.180-94.103.1
ocfs2-kmp-default-4.4.180-94.103.1
SUSE Linux Enterprise Server 12 SP3-BCL
kernel-default-4.4.180-94.103.1
kernel-default-base-4.4.180-94.103.1
kernel-default-devel-4.4.180-94.103.1
kernel-devel-4.4.180-94.103.1
kernel-macros-4.4.180-94.103.1
kernel-source-4.4.180-94.103.1
kernel-syms-4.4.180-94.103.1
SUSE Linux Enterprise Server 12 SP3-LTSS
kernel-default-4.4.180-94.103.1
kernel-default-base-4.4.180-94.103.1
kernel-default-devel-4.4.180-94.103.1
kernel-default-man-4.4.180-94.103.1
kernel-devel-4.4.180-94.103.1
kernel-macros-4.4.180-94.103.1
kernel-source-4.4.180-94.103.1
kernel-syms-4.4.180-94.103.1
kgraft-patch-4_4_180-94_103-default-1-4.3.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
kernel-default-4.4.180-94.103.1
kernel-default-base-4.4.180-94.103.1
kernel-default-devel-4.4.180-94.103.1
kernel-devel-4.4.180-94.103.1
kernel-macros-4.4.180-94.103.1
kernel-source-4.4.180-94.103.1
kernel-syms-4.4.180-94.103.1
kgraft-patch-4_4_180-94_103-default-1-4.3.1
SUSE OpenStack Cloud 8
kernel-default-4.4.180-94.103.1
kernel-default-base-4.4.180-94.103.1
kernel-default-devel-4.4.180-94.103.1
kernel-devel-4.4.180-94.103.1
kernel-macros-4.4.180-94.103.1
kernel-source-4.4.180-94.103.1
kernel-syms-4.4.180-94.103.1
kgraft-patch-4_4_180-94_103-default-1-4.3.1
SUSE OpenStack Cloud Crowbar 8
kernel-default-4.4.180-94.103.1
kernel-default-base-4.4.180-94.103.1
kernel-default-devel-4.4.180-94.103.1
kernel-devel-4.4.180-94.103.1
kernel-macros-4.4.180-94.103.1
kernel-source-4.4.180-94.103.1
kernel-syms-4.4.180-94.103.1
kgraft-patch-4_4_180-94_103-default-1-4.3.1

Описание

An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1

Ссылки

Описание

An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1

Ссылки

Описание

A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1

Ссылки

Описание

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a security update on July 9, 2019 that addresses the vulnerability through a software change that mitigates how the CPU speculatively accesses memory. Note that this vulnerability does not require a microcode update from your device OEM.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1

Ссылки

Описание

An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1

Ссылки

Описание

In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1

Ссылки

Описание

In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1

Ссылки

Описание

In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1

Ссылки

Описание

In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1

Ссылки

Описание

parse_audio_mixer_unit in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles a short descriptor, leading to out-of-bounds memory access.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1

Ссылки

Описание

check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1

Ссылки

Описание

A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user ("root") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.103.1
HPE Helion OpenStack 8:kernel-devel-4.4.180-94.103.1

Ссылки
Уязвимость SUSE-SU-2019:2263-1