Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2019:2299-1

Опубликовано: 05 сент. 2019
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2019-3819: A flaw was fixed in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may have enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') could have caused a system lock up and a denial of service (bnc#1123161).
  • CVE-2019-15118: Fixed kernel stack exhaustion in check_input_term in sound/usb/mixer.c via mishandled recursion (bnc#1145922).
  • CVE-2019-15117: Fixed out-of-bounds memory access in parse_audio_mixer_unit in sound/usb/mixer.c via mishandled short descriptor (bnc#1145920).
  • CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
  • CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
  • CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
  • CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
  • CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).
  • CVE-2019-10207: Check for missing tty operations in bluetooth/hci_uart (bsc#1142857).
  • CVE-2018-20856: Fixed a use-after-free issue in block/blk-core.c, where certain error case are mishandled (bnc#1143048).
  • CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
  • CVE-2017-18551: An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel There was an out of bounds write in the function i2c_smbus_xfer_emulated (bnc#1146163).

The following non-security bugs were fixed:

  • bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288).
  • bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288).
  • bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257).
  • bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273).
  • bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288).
  • bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288).
  • btrfs: improve delayed refs iterations (bsc#1076033, bsc#1107256).
  • i40e: add functions to control default VSI (bsc#1141628).
  • i40e: set default VSI without a reset (bsc#1141628).
  • mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1142098).
  • nfs: Fix the inode request accounting when pages have subrequests (bsc#1140012).
  • powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945,bsc#1141401,bsc#1141402,bsc#1141452,bsc#1141453,bsc#1141454).
  • qib/hfi1: Fix MR reference count leak on write with immediate (bsc#1045640).
  • sched/fair: Do not free p->numa_faults with concurrent readers (bsc#1144920).
  • sched/fair: Use RCU accessors consistently for ->numa_group (bsc#1144920).
  • x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
  • xen: let alloc_xenballooned_pages() fail if not enough memory free (XSA-300).

Список пакетов

SUSE Enterprise Storage 4
kernel-default-4.4.121-92.120.1
kernel-default-base-4.4.121-92.120.1
kernel-default-devel-4.4.121-92.120.1
kernel-devel-4.4.121-92.120.1
kernel-macros-4.4.121-92.120.1
kernel-source-4.4.121-92.120.1
kernel-syms-4.4.121-92.120.1
kgraft-patch-4_4_121-92_120-default-1-3.3.1
SUSE Linux Enterprise High Availability Extension 12 SP2
cluster-md-kmp-default-4.4.121-92.120.1
cluster-network-kmp-default-4.4.121-92.120.1
dlm-kmp-default-4.4.121-92.120.1
gfs2-kmp-default-4.4.121-92.120.1
ocfs2-kmp-default-4.4.121-92.120.1
SUSE Linux Enterprise Server 12 SP2-BCL
kernel-default-4.4.121-92.120.1
kernel-default-base-4.4.121-92.120.1
kernel-default-devel-4.4.121-92.120.1
kernel-devel-4.4.121-92.120.1
kernel-macros-4.4.121-92.120.1
kernel-source-4.4.121-92.120.1
kernel-syms-4.4.121-92.120.1
SUSE Linux Enterprise Server 12 SP2-LTSS
kernel-default-4.4.121-92.120.1
kernel-default-base-4.4.121-92.120.1
kernel-default-devel-4.4.121-92.120.1
kernel-default-man-4.4.121-92.120.1
kernel-devel-4.4.121-92.120.1
kernel-macros-4.4.121-92.120.1
kernel-source-4.4.121-92.120.1
kernel-syms-4.4.121-92.120.1
kgraft-patch-4_4_121-92_120-default-1-3.3.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
kernel-default-4.4.121-92.120.1
kernel-default-base-4.4.121-92.120.1
kernel-default-devel-4.4.121-92.120.1
kernel-devel-4.4.121-92.120.1
kernel-macros-4.4.121-92.120.1
kernel-source-4.4.121-92.120.1
kernel-syms-4.4.121-92.120.1
kgraft-patch-4_4_121-92_120-default-1-3.3.1
SUSE OpenStack Cloud 7
kernel-default-4.4.121-92.120.1
kernel-default-base-4.4.121-92.120.1
kernel-default-devel-4.4.121-92.120.1
kernel-default-man-4.4.121-92.120.1
kernel-devel-4.4.121-92.120.1
kernel-macros-4.4.121-92.120.1
kernel-source-4.4.121-92.120.1
kernel-syms-4.4.121-92.120.1
kgraft-patch-4_4_121-92_120-default-1-3.3.1

Описание

An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.


Затронутые продукты
SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1

Ссылки

Описание

An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.


Затронутые продукты
SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1

Ссылки

Описание

An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.


Затронутые продукты
SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1

Ссылки

Описание

A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.


Затронутые продукты
SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1

Ссылки

Описание

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a security update on July 9, 2019 that addresses the vulnerability through a software change that mitigates how the CPU speculatively accesses memory. Note that this vulnerability does not require a microcode update from your device OEM.


Затронутые продукты
SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1

Ссылки

Описание

An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.


Затронутые продукты
SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1

Ссылки

Описание

In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.


Затронутые продукты
SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1

Ссылки

Описание

In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.


Затронутые продукты
SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1

Ссылки

Описание

In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.


Затронутые продукты
SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1

Ссылки

Описание

parse_audio_mixer_unit in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles a short descriptor, leading to out-of-bounds memory access.


Затронутые продукты
SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1

Ссылки

Описание

check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.


Затронутые продукты
SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1

Ссылки

Описание

A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user ("root") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.


Затронутые продукты
SUSE Enterprise Storage 4:kernel-default-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.120.1
SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.120.1

Ссылки
Уязвимость SUSE-SU-2019:2299-1