Описание
Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3)
This update for the Linux Kernel 4.4.180-94_103 fixes several issues.
The following security issues were fixed:
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2019-15239: Fixed a vulnerability where a local attacker could have triggered multiple use-after-free conditions resulted in privilege escalation (bsc#1156317).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).
The following bugs were fixed:
- Fixed boot up hang revealed by int3 self test (bsc#1157770).
Список пакетов
SUSE Linux Enterprise Live Patching 12 SP4
SUSE Linux Enterprise Live Patching 15 SP1
SUSE Linux Enterprise Server 12 SP3-LTSS
SUSE Linux Enterprise Server for SAP Applications 12 SP3
Ссылки
- Link for SUSE-SU-2019:3230-1
- E-Mail link for SUSE-SU-2019:3230-1
- SUSE Security Ratings
- SUSE Bug 1153108
- SUSE Bug 1156317
- SUSE Bug 1156321
- SUSE Bug 1157770
- SUSE CVE CVE-2019-10220 page
- SUSE CVE CVE-2019-13272 page
- SUSE CVE CVE-2019-15239 page
Описание
Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.
Затронутые продукты
Ссылки
- CVE-2019-10220
- SUSE Bug 1144903
- SUSE Bug 1153108
Описание
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.
Затронутые продукты
Ссылки
- CVE-2019-13272
- SUSE Bug 1140671
- SUSE Bug 1156321
- SUSE Bug 1198122
Описание
In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.
Затронутые продукты
Ссылки
- CVE-2019-15239
- SUSE Bug 1146589
- SUSE Bug 1156317