Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2020:0204-1

Опубликовано: 22 янв. 2020
Источник: suse-cvrf

Описание

Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP3)

This update for the Linux Kernel 4.4.180-94_100 fixes several issues.

The following security issues were fixed:

  • CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).
  • CVE-2019-14897: A stack-based buffer overflow was found in the Marvell WiFi chip driver. An attacker was able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bsc#1157155).

Список пакетов

SUSE Linux Enterprise Live Patching 12 SP4
kgraft-patch-4_12_14-95_45-default-2-2.1
SUSE Linux Enterprise Live Patching 12 SP5
kgraft-patch-4_12_14-122_12-default-2-2.1
kgraft-patch-4_12_14-122_7-default-2-2.1
SUSE Linux Enterprise Live Patching 15
kernel-livepatch-4_12_14-150_47-default-2-2.1
SUSE Linux Enterprise Live Patching 15 SP1
kernel-livepatch-4_12_14-197_29-default-2-2.1
SUSE Linux Enterprise Server 12 SP1-LTSS
kgraft-patch-3_12_74-60_64_124-default-3-2.1
kgraft-patch-3_12_74-60_64_124-xen-3-2.1
kgraft-patch-3_12_74-60_64_121-default-5-2.1
kgraft-patch-3_12_74-60_64_121-xen-5-2.1
kgraft-patch-3_12_74-60_64_118-default-5-2.1
kgraft-patch-3_12_74-60_64_118-xen-5-2.1
kgraft-patch-3_12_74-60_64_115-default-7-2.1
kgraft-patch-3_12_74-60_64_115-xen-7-2.1
kgraft-patch-3_12_74-60_64_110-default-8-2.1
kgraft-patch-3_12_74-60_64_110-xen-8-2.1
SUSE Linux Enterprise Server 12 SP2-LTSS
kgraft-patch-4_4_121-92_125-default-3-2.1
kgraft-patch-4_4_121-92_120-default-5-2.1
kgraft-patch-4_4_121-92_117-default-6-2.1
kgraft-patch-4_4_121-92_114-default-7-2.1
kgraft-patch-4_4_121-92_109-default-8-2.1
kgraft-patch-4_4_121-92_104-default-8-2.1
kgraft-patch-4_4_121-92_101-default-8-2.1
SUSE Linux Enterprise Server 12 SP3-LTSS
kgraft-patch-4_4_180-94_97-default-7-2.1
kgraft-patch-4_4_178-94_91-default-7-2.1
kgraft-patch-4_4_176-94_88-default-7-2.1
kgraft-patch-4_4_175-94_79-default-8-2.1
kgraft-patch-4_4_180-94_113-default-2-2.1
kgraft-patch-4_4_180-94_107-default-3-2.1
kgraft-patch-4_4_180-94_103-default-5-2.1
kgraft-patch-4_4_180-94_100-default-5-2.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1
kgraft-patch-3_12_74-60_64_124-default-3-2.1
kgraft-patch-3_12_74-60_64_124-xen-3-2.1
kgraft-patch-3_12_74-60_64_121-default-5-2.1
kgraft-patch-3_12_74-60_64_121-xen-5-2.1
kgraft-patch-3_12_74-60_64_118-default-5-2.1
kgraft-patch-3_12_74-60_64_118-xen-5-2.1
kgraft-patch-3_12_74-60_64_115-default-7-2.1
kgraft-patch-3_12_74-60_64_115-xen-7-2.1
kgraft-patch-3_12_74-60_64_110-default-8-2.1
kgraft-patch-3_12_74-60_64_110-xen-8-2.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
kgraft-patch-4_4_121-92_125-default-3-2.1
kgraft-patch-4_4_121-92_120-default-5-2.1
kgraft-patch-4_4_121-92_117-default-6-2.1
kgraft-patch-4_4_121-92_114-default-7-2.1
kgraft-patch-4_4_121-92_109-default-8-2.1
kgraft-patch-4_4_121-92_104-default-8-2.1
kgraft-patch-4_4_121-92_101-default-8-2.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
kgraft-patch-4_4_180-94_97-default-7-2.1
kgraft-patch-4_4_178-94_91-default-7-2.1
kgraft-patch-4_4_176-94_88-default-7-2.1
kgraft-patch-4_4_175-94_79-default-8-2.1
kgraft-patch-4_4_180-94_113-default-2-2.1
kgraft-patch-4_4_180-94_107-default-3-2.1
kgraft-patch-4_4_180-94_103-default-5-2.1
kgraft-patch-4_4_180-94_100-default-5-2.1

Описание

A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-2-2.1
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-2-2.1
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-2-2.1
SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-2-2.1

Ссылки

Описание

A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-2-2.1
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-2-2.1
SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-2-2.1
SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-2-2.1

Ссылки
Уязвимость SUSE-SU-2020:0204-1