Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2020:2106-1

Опубликовано: 03 авг. 2020
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 GA LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
  • CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).
  • CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).
  • CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).
  • CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).
  • CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c which did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107 1173659).
  • CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
  • CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).
  • CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).
  • CVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
  • CVE-2020-10768: Indirect branch speculation could have been enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).
  • CVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (bnc#1172781).
  • CVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).
  • CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059 (bnc#1172775).

The following non-security bugs were fixed:

  • Merge ibmvnic reset fixes (bsc#1158755 ltc#182094).
  • block, bfq: add requeue-request hook (bsc#1104967 bsc#1171673).
  • block, bfq: postpone rq preparation to insert or merge (bsc#1104967 bsc#1171673).
  • ibmvnic: Do not process device remove during device reset (bsc#1065729).
  • ibmvnic: Flush existing work items before device removal (bsc#1065729).
  • ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
  • ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
  • ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
  • intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
  • livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
  • livepatch: Disallow vmlinux.ko (bsc#1071995).
  • livepatch: Make klp_apply_object_relocs static (bsc#1071995).
  • livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
  • livepatch: Remove .klp.arch (bsc#1071995).
  • vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1051510).
  • vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174000).
  • vfio/pci: Mask buggy SR-IOV VF INTx support (bsc#1051510).
  • vfio/pci: Mask buggy SR-IOV VF INTx support (bsc#1173999).
  • x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).

Список пакетов

Image SLES15-Azure-BYOS
kernel-default-4.12.14-150.55.1
Image SLES15-EC2-CHOST-HVM-BYOS
kernel-default-4.12.14-150.55.1
Image SLES15-EC2-HVM-BYOS
kernel-default-4.12.14-150.55.1
Image SLES15-GCE-BYOS
kernel-default-4.12.14-150.55.1
Image SLES15-OCI-BYOS
kernel-default-4.12.14-150.55.1
Image SLES15-SAP-Azure
cluster-md-kmp-default-4.12.14-150.55.1
dlm-kmp-default-4.12.14-150.55.1
gfs2-kmp-default-4.12.14-150.55.1
kernel-default-4.12.14-150.55.1
ocfs2-kmp-default-4.12.14-150.55.1
Image SLES15-SAP-Azure-BYOS
cluster-md-kmp-default-4.12.14-150.55.1
dlm-kmp-default-4.12.14-150.55.1
gfs2-kmp-default-4.12.14-150.55.1
kernel-default-4.12.14-150.55.1
ocfs2-kmp-default-4.12.14-150.55.1
Image SLES15-SAP-Azure-LI-BYOS-Production
cluster-md-kmp-default-4.12.14-150.55.1
dlm-kmp-default-4.12.14-150.55.1
gfs2-kmp-default-4.12.14-150.55.1
kernel-default-4.12.14-150.55.1
ocfs2-kmp-default-4.12.14-150.55.1
Image SLES15-SAP-Azure-VLI-BYOS-Production
cluster-md-kmp-default-4.12.14-150.55.1
dlm-kmp-default-4.12.14-150.55.1
gfs2-kmp-default-4.12.14-150.55.1
kernel-default-4.12.14-150.55.1
ocfs2-kmp-default-4.12.14-150.55.1
Image SLES15-SAP-EC2-HVM
cluster-md-kmp-default-4.12.14-150.55.1
dlm-kmp-default-4.12.14-150.55.1
gfs2-kmp-default-4.12.14-150.55.1
kernel-default-4.12.14-150.55.1
ocfs2-kmp-default-4.12.14-150.55.1
Image SLES15-SAP-EC2-HVM-BYOS
cluster-md-kmp-default-4.12.14-150.55.1
dlm-kmp-default-4.12.14-150.55.1
gfs2-kmp-default-4.12.14-150.55.1
kernel-default-4.12.14-150.55.1
ocfs2-kmp-default-4.12.14-150.55.1
Image SLES15-SAP-GCE
cluster-md-kmp-default-4.12.14-150.55.1
dlm-kmp-default-4.12.14-150.55.1
gfs2-kmp-default-4.12.14-150.55.1
kernel-default-4.12.14-150.55.1
ocfs2-kmp-default-4.12.14-150.55.1
Image SLES15-SAP-GCE-BYOS
cluster-md-kmp-default-4.12.14-150.55.1
dlm-kmp-default-4.12.14-150.55.1
gfs2-kmp-default-4.12.14-150.55.1
kernel-default-4.12.14-150.55.1
ocfs2-kmp-default-4.12.14-150.55.1
Image SLES15-SAP-OCI-BYOS
cluster-md-kmp-default-4.12.14-150.55.1
dlm-kmp-default-4.12.14-150.55.1
gfs2-kmp-default-4.12.14-150.55.1
kernel-default-4.12.14-150.55.1
ocfs2-kmp-default-4.12.14-150.55.1
SUSE Linux Enterprise High Availability Extension 15
cluster-md-kmp-default-4.12.14-150.55.1
dlm-kmp-default-4.12.14-150.55.1
gfs2-kmp-default-4.12.14-150.55.1
ocfs2-kmp-default-4.12.14-150.55.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS
kernel-default-4.12.14-150.55.1
kernel-default-base-4.12.14-150.55.1
kernel-default-devel-4.12.14-150.55.1
kernel-devel-4.12.14-150.55.1
kernel-docs-4.12.14-150.55.1
kernel-macros-4.12.14-150.55.1
kernel-obs-build-4.12.14-150.55.1
kernel-source-4.12.14-150.55.1
kernel-syms-4.12.14-150.55.1
kernel-vanilla-base-4.12.14-150.55.1
SUSE Linux Enterprise High Performance Computing 15-LTSS
kernel-default-4.12.14-150.55.1
kernel-default-base-4.12.14-150.55.1
kernel-default-devel-4.12.14-150.55.1
kernel-devel-4.12.14-150.55.1
kernel-docs-4.12.14-150.55.1
kernel-macros-4.12.14-150.55.1
kernel-obs-build-4.12.14-150.55.1
kernel-source-4.12.14-150.55.1
kernel-syms-4.12.14-150.55.1
kernel-vanilla-base-4.12.14-150.55.1
SUSE Linux Enterprise Live Patching 15
kernel-default-livepatch-4.12.14-150.55.1
kernel-livepatch-4_12_14-150_55-default-1-1.3.1
SUSE Linux Enterprise Server 15-LTSS
kernel-default-4.12.14-150.55.1
kernel-default-base-4.12.14-150.55.1
kernel-default-devel-4.12.14-150.55.1
kernel-default-man-4.12.14-150.55.1
kernel-devel-4.12.14-150.55.1
kernel-docs-4.12.14-150.55.1
kernel-macros-4.12.14-150.55.1
kernel-obs-build-4.12.14-150.55.1
kernel-source-4.12.14-150.55.1
kernel-syms-4.12.14-150.55.1
kernel-vanilla-base-4.12.14-150.55.1
reiserfs-kmp-default-4.12.14-150.55.1
SUSE Linux Enterprise Server for SAP Applications 15
kernel-default-4.12.14-150.55.1
kernel-default-base-4.12.14-150.55.1
kernel-default-devel-4.12.14-150.55.1
kernel-devel-4.12.14-150.55.1
kernel-docs-4.12.14-150.55.1
kernel-macros-4.12.14-150.55.1
kernel-obs-build-4.12.14-150.55.1
kernel-source-4.12.14-150.55.1
kernel-syms-4.12.14-150.55.1
kernel-vanilla-base-4.12.14-150.55.1
reiserfs-kmp-default-4.12.14-150.55.1

Описание

An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-CHOST-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-GCE-BYOS:kernel-default-4.12.14-150.55.1

Ссылки

Описание

An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-CHOST-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-GCE-BYOS:kernel-default-4.12.14-150.55.1

Ссылки

Описание

In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-CHOST-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-GCE-BYOS:kernel-default-4.12.14-150.55.1

Ссылки

Описание

A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-CHOST-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-GCE-BYOS:kernel-default-4.12.14-150.55.1

Ссылки

Описание

A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-CHOST-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-GCE-BYOS:kernel-default-4.12.14-150.55.1

Ссылки

Описание

A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-CHOST-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-GCE-BYOS:kernel-default-4.12.14-150.55.1

Ссылки

Описание

A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-CHOST-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-GCE-BYOS:kernel-default-4.12.14-150.55.1

Ссылки

Описание

A stack information leak flaw was found in s390/s390x in the Linux kernel's memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-CHOST-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-GCE-BYOS:kernel-default-4.12.14-150.55.1

Ссылки

Описание

An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-CHOST-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-GCE-BYOS:kernel-default-4.12.14-150.55.1

Ссылки

Описание

The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-CHOST-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-GCE-BYOS:kernel-default-4.12.14-150.55.1

Ссылки

Описание

An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-CHOST-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-GCE-BYOS:kernel-default-4.12.14-150.55.1

Ссылки

Описание

In the Linux kernel before 5.4.16, a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-CHOST-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-GCE-BYOS:kernel-default-4.12.14-150.55.1

Ссылки

Описание

In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-CHOST-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-GCE-BYOS:kernel-default-4.12.14-150.55.1

Ссылки

Описание

An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.


Затронутые продукты
Image SLES15-Azure-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-CHOST-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-EC2-HVM-BYOS:kernel-default-4.12.14-150.55.1
Image SLES15-GCE-BYOS:kernel-default-4.12.14-150.55.1

Ссылки
Уязвимость SUSE-SU-2020:2106-1