Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2019:3215-1

Опубликовано: 10 дек. 2019
Источник: suse-cvrf

Описание

Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP1)

This update for the Linux Kernel 4.12.14-197_15 fixes several issues.

The following security issues were fixed:

  • CVE-2019-15239: Fixed a vulnerability where a local attacker could have triggered multiple use-after-free conditions resulted in privilege escalation (bsc#1156317).
  • CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).

The following bugs were fixed:

  • Fixed boot up hang revealed by int3 self test (bsc#1157770).

Список пакетов

SUSE Linux Enterprise Live Patching 12 SP4
kgraft-patch-4_12_14-95_29-default-4-2.1
SUSE Linux Enterprise Live Patching 15
kernel-livepatch-4_12_14-150_27-default-4-2.1
kernel-livepatch-4_12_14-150_32-default-4-2.1
SUSE Linux Enterprise Live Patching 15 SP1
kernel-livepatch-4_12_14-197_10-default-4-2.1
kernel-livepatch-4_12_14-197_15-default-4-2.1

Описание

Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-4-2.1
SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_10-default-4-2.1
SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-4-2.1
SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-4-2.1

Ссылки

Описание

In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_29-default-4-2.1
SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_10-default-4-2.1
SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_15-default-4-2.1
SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_27-default-4-2.1

Ссылки