Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2019:3379-1

Опубликовано: 21 дек. 2019
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 12 SP 3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux kernel in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could have allowed the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).
  • CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038).
  • CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in the Linux kernel. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free (bnc#1155897).
  • CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).
  • CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures (bnc#1157191).
  • CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).
  • CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).
  • CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function (bnc#1157070).
  • CVE-2019-16231: drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150466).
  • CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel There was a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact (bnc#1156187).
  • CVE-2019-18680: An issue was discovered in the Linux kernel. There was a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will cause denial of service (bnc#1155898).
  • CVE-2019-15213: An use-after-free was fixed caused by malicious USB device in drivers/media/usb/dvb-usb/dvb-usb-init.c (bsc#1146544).
  • CVE-2019-19536: An uninitialized Kernel memory can leak to USB devices in drivers/net/can/usb/peak_usb/pcan_usb_pro.c (bsc#1158394).
  • CVE-2019-19534: An uninitialized Kernel memory can leak to USB devices in drivers/net/can/usb/peak_usb/pcan_usb_core.c (bsc#1158398).
  • CVE-2019-19530: An use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bsc#1158410).
  • CVE-2019-19524: An use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bsc#1158413).
  • CVE-2019-19525: An use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bsc#1158417).
  • CVE-2019-19531: An use-after-free in yurex_delete may lead to denial of service (bsc#1158445).
  • CVE-2019-19523: An use-after-free on disconnect in USB adutux (bsc#1158823).
  • CVE-2019-19532: An out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers (bsc#1158824).
  • CVE-2019-19332: An out-of-bounds memory write via kvm_dev_ioctl_get_cpuid (bsc#1158827).
  • CVE-2019-19533: An info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver (bsc#1158834).
  • CVE-2019-19527: An use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (bsc#1158900).
  • CVE-2019-19535: An info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver (bsc#1158903).
  • CVE-2019-19537: Two races in the USB character device registration and deregistration routines (bsc#1158904).
  • CVE-2019-19338: An incomplete fix for Transaction Asynchronous Abort (TAA) (bsc#1158954).

The following non-security bugs were fixed:

  • hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).
  • ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).
  • ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).
  • ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).
  • ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).
  • netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
  • powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).
  • powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).
  • sched/fair: WARN() and refuse to set buddy when !se->on_rq (bsc#1158132).
  • x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).
  • x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).
  • xen/pv: Fix a boot up hang revealed by int3 self test (bsc#1153811).
  • arp: Fix cache issue during Life Partition Migration (bsc#1152631).
  • futexes: Fix speed on 4.12 kernel (bsc#1157464).

Список пакетов

HPE Helion OpenStack 8
kernel-default-4.4.180-94.113.1
kernel-default-base-4.4.180-94.113.1
kernel-default-devel-4.4.180-94.113.1
kernel-default-kgraft-4.4.180-94.113.1
kernel-devel-4.4.180-94.113.1
kernel-macros-4.4.180-94.113.1
kernel-source-4.4.180-94.113.1
kernel-syms-4.4.180-94.113.1
kgraft-patch-4_4_180-94_113-default-1-4.5.1
SUSE Enterprise Storage 5
kernel-default-4.4.180-94.113.1
kernel-default-base-4.4.180-94.113.1
kernel-default-devel-4.4.180-94.113.1
kernel-default-kgraft-4.4.180-94.113.1
kernel-devel-4.4.180-94.113.1
kernel-macros-4.4.180-94.113.1
kernel-source-4.4.180-94.113.1
kernel-syms-4.4.180-94.113.1
kgraft-patch-4_4_180-94_113-default-1-4.5.1
SUSE Linux Enterprise High Availability Extension 12 SP3
cluster-md-kmp-default-4.4.180-94.113.1
dlm-kmp-default-4.4.180-94.113.1
gfs2-kmp-default-4.4.180-94.113.1
ocfs2-kmp-default-4.4.180-94.113.1
SUSE Linux Enterprise Server 12 SP3-BCL
kernel-default-4.4.180-94.113.1
kernel-default-base-4.4.180-94.113.1
kernel-default-devel-4.4.180-94.113.1
kernel-devel-4.4.180-94.113.1
kernel-macros-4.4.180-94.113.1
kernel-source-4.4.180-94.113.1
kernel-syms-4.4.180-94.113.1
SUSE Linux Enterprise Server 12 SP3-LTSS
kernel-default-4.4.180-94.113.1
kernel-default-base-4.4.180-94.113.1
kernel-default-devel-4.4.180-94.113.1
kernel-default-kgraft-4.4.180-94.113.1
kernel-default-man-4.4.180-94.113.1
kernel-devel-4.4.180-94.113.1
kernel-macros-4.4.180-94.113.1
kernel-source-4.4.180-94.113.1
kernel-syms-4.4.180-94.113.1
kgraft-patch-4_4_180-94_113-default-1-4.5.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
kernel-default-4.4.180-94.113.1
kernel-default-base-4.4.180-94.113.1
kernel-default-devel-4.4.180-94.113.1
kernel-default-kgraft-4.4.180-94.113.1
kernel-devel-4.4.180-94.113.1
kernel-macros-4.4.180-94.113.1
kernel-source-4.4.180-94.113.1
kernel-syms-4.4.180-94.113.1
kgraft-patch-4_4_180-94_113-default-1-4.5.1
SUSE OpenStack Cloud 8
kernel-default-4.4.180-94.113.1
kernel-default-base-4.4.180-94.113.1
kernel-default-devel-4.4.180-94.113.1
kernel-default-kgraft-4.4.180-94.113.1
kernel-devel-4.4.180-94.113.1
kernel-macros-4.4.180-94.113.1
kernel-source-4.4.180-94.113.1
kernel-syms-4.4.180-94.113.1
kgraft-patch-4_4_180-94_113-default-1-4.5.1
SUSE OpenStack Cloud Crowbar 8
kernel-default-4.4.180-94.113.1
kernel-default-base-4.4.180-94.113.1
kernel-default-devel-4.4.180-94.113.1
kernel-default-kgraft-4.4.180-94.113.1
kernel-devel-4.4.180-94.113.1
kernel-macros-4.4.180-94.113.1
kernel-source-4.4.180-94.113.1
kernel-syms-4.4.180-94.113.1
kgraft-patch-4_4_180-94_113-default-1-4.5.1

Описание

A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

An issue was discovered in the Linux kernel 4.4.x before 4.4.195. There is a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will cause denial of service, aka CID-91573ae4aed0.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

** DISPUTED ** A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because "rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem)."


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки

Описание

In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.


Затронутые продукты
HPE Helion OpenStack 8:kernel-default-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.113.1
HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.113.1

Ссылки
Уязвимость SUSE-SU-2019:3379-1