Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2020:2623-1

Опубликовано: 14 сент. 2020
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).
  • CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
  • CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).
  • CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
  • CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
  • CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).
  • CVE-2020-10135: Legacy pairing and secure-connections pairing authentication Bluetooth might have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access (bsc#1171988).
  • CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).

The following non-security bugs were fixed:

  • btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).
  • cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).
  • cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).
  • cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).
  • cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).
  • cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).
  • cifs: merge __{cifs,smb2}_reconnect_tcon into cifs_tree_connect() (bsc#1144333 bsc#1172428).
  • cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).
  • cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).
  • cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).
  • Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127).
  • ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
  • ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).
  • ip_tunnel: allow not to count pkts on tstats by setting skb's dev to NULL (bsc#1175515).
  • ipvs: fix the connection sync failed in some cases (bsc#1174699).
  • kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).
  • kabi: mask changes to struct ipv6_stub (bsc#1165629).
  • mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366).
  • mm, vmstat: reduce zone->lock holding time by /proc/pagetypeinfo (bsc#1175691).
  • ocfs2: add trimfs dlm lock resource (bsc#1175228).
  • ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).
  • ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
  • ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
  • ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
  • ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
  • ocfs2: fix remounting needed after setfacl command (bsc#1173954).
  • ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).
  • ocfs2: load global_inode_alloc (bsc#1172963).
  • ocfs2: load global_inode_alloc (bsc#1172963).
  • powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).
  • powerpc/pseries: PCIE PHB reset (bsc#1174689).
  • Revert 'ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).' This reverts commit 2638f62c6bc33d4c10ce0dddbf240aa80d366d7b.
  • Revert 'ocfs2: load global_inode_alloc (bsc#1172963).' This reverts commit f04f670651f505cb354f26601ec5f5e4428f2f47.
  • scsi: scsi_dh_alua: skip RTPG for devices only supporting active/optimized (bsc#1174978).
  • selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).
  • selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).
  • selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).
  • selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).
  • Update patch reference for a tipc fix patch (bsc#1175515)
  • x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).
  • xen: do not reschedule in preemption off sections (bsc#1175749).

Список пакетов

Image SLES12-SP4-Azure-BYOS
kernel-default-4.12.14-95.60.1
Image SLES12-SP4-EC2-HVM-BYOS
kernel-default-4.12.14-95.60.1
Image SLES12-SP4-GCE-BYOS
kernel-default-4.12.14-95.60.1
Image SLES12-SP4-OCI-BYOS
kernel-default-4.12.14-95.60.1
Image SLES12-SP4-SAP-Azure
cluster-md-kmp-default-4.12.14-95.60.1
dlm-kmp-default-4.12.14-95.60.1
gfs2-kmp-default-4.12.14-95.60.1
kernel-default-4.12.14-95.60.1
ocfs2-kmp-default-4.12.14-95.60.1
Image SLES12-SP4-SAP-Azure-BYOS
cluster-md-kmp-default-4.12.14-95.60.1
dlm-kmp-default-4.12.14-95.60.1
gfs2-kmp-default-4.12.14-95.60.1
kernel-default-4.12.14-95.60.1
ocfs2-kmp-default-4.12.14-95.60.1
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production
cluster-md-kmp-default-4.12.14-95.60.1
dlm-kmp-default-4.12.14-95.60.1
gfs2-kmp-default-4.12.14-95.60.1
kernel-default-4.12.14-95.60.1
ocfs2-kmp-default-4.12.14-95.60.1
Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production
cluster-md-kmp-default-4.12.14-95.60.1
dlm-kmp-default-4.12.14-95.60.1
gfs2-kmp-default-4.12.14-95.60.1
kernel-default-4.12.14-95.60.1
ocfs2-kmp-default-4.12.14-95.60.1
Image SLES12-SP4-SAP-EC2-HVM
cluster-md-kmp-default-4.12.14-95.60.1
dlm-kmp-default-4.12.14-95.60.1
gfs2-kmp-default-4.12.14-95.60.1
kernel-default-4.12.14-95.60.1
ocfs2-kmp-default-4.12.14-95.60.1
Image SLES12-SP4-SAP-EC2-HVM-BYOS
cluster-md-kmp-default-4.12.14-95.60.1
dlm-kmp-default-4.12.14-95.60.1
gfs2-kmp-default-4.12.14-95.60.1
kernel-default-4.12.14-95.60.1
ocfs2-kmp-default-4.12.14-95.60.1
Image SLES12-SP4-SAP-GCE
cluster-md-kmp-default-4.12.14-95.60.1
dlm-kmp-default-4.12.14-95.60.1
gfs2-kmp-default-4.12.14-95.60.1
kernel-default-4.12.14-95.60.1
ocfs2-kmp-default-4.12.14-95.60.1
Image SLES12-SP4-SAP-GCE-BYOS
cluster-md-kmp-default-4.12.14-95.60.1
dlm-kmp-default-4.12.14-95.60.1
gfs2-kmp-default-4.12.14-95.60.1
kernel-default-4.12.14-95.60.1
ocfs2-kmp-default-4.12.14-95.60.1
Image SLES12-SP4-SAP-OCI-BYOS
cluster-md-kmp-default-4.12.14-95.60.1
dlm-kmp-default-4.12.14-95.60.1
gfs2-kmp-default-4.12.14-95.60.1
kernel-default-4.12.14-95.60.1
ocfs2-kmp-default-4.12.14-95.60.1
SUSE Linux Enterprise High Availability Extension 12 SP4
cluster-md-kmp-default-4.12.14-95.60.1
dlm-kmp-default-4.12.14-95.60.1
gfs2-kmp-default-4.12.14-95.60.1
ocfs2-kmp-default-4.12.14-95.60.1
SUSE Linux Enterprise Live Patching 12 SP4
kernel-default-kgraft-4.12.14-95.60.1
kernel-default-kgraft-devel-4.12.14-95.60.1
kgraft-patch-4_12_14-95_60-default-1-6.3.1
SUSE Linux Enterprise Server 12 SP4-LTSS
kernel-default-4.12.14-95.60.1
kernel-default-base-4.12.14-95.60.1
kernel-default-devel-4.12.14-95.60.1
kernel-default-man-4.12.14-95.60.1
kernel-devel-4.12.14-95.60.1
kernel-macros-4.12.14-95.60.1
kernel-source-4.12.14-95.60.1
kernel-syms-4.12.14-95.60.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4
kernel-default-4.12.14-95.60.1
kernel-default-base-4.12.14-95.60.1
kernel-default-devel-4.12.14-95.60.1
kernel-devel-4.12.14-95.60.1
kernel-macros-4.12.14-95.60.1
kernel-source-4.12.14-95.60.1
kernel-syms-4.12.14-95.60.1
SUSE OpenStack Cloud 9
kernel-default-4.12.14-95.60.1
kernel-default-base-4.12.14-95.60.1
kernel-default-devel-4.12.14-95.60.1
kernel-devel-4.12.14-95.60.1
kernel-macros-4.12.14-95.60.1
kernel-source-4.12.14-95.60.1
kernel-syms-4.12.14-95.60.1
SUSE OpenStack Cloud Crowbar 9
kernel-default-4.12.14-95.60.1
kernel-default-base-4.12.14-95.60.1
kernel-default-devel-4.12.14-95.60.1
kernel-devel-4.12.14-95.60.1
kernel-macros-4.12.14-95.60.1
kernel-source-4.12.14-95.60.1
kernel-syms-4.12.14-95.60.1

Описание

Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.


Затронутые продукты
Image SLES12-SP4-Azure-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-EC2-HVM-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-GCE-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-OCI-BYOS:kernel-default-4.12.14-95.60.1

Ссылки

Описание

A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.


Затронутые продукты
Image SLES12-SP4-Azure-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-EC2-HVM-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-GCE-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-OCI-BYOS:kernel-default-4.12.14-95.60.1

Ссылки

Описание

A flaw was found in the Linux kernel's implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.


Затронутые продукты
Image SLES12-SP4-Azure-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-EC2-HVM-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-GCE-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-OCI-BYOS:kernel-default-4.12.14-95.60.1

Ссылки

Описание

A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.


Затронутые продукты
Image SLES12-SP4-Azure-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-EC2-HVM-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-GCE-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-OCI-BYOS:kernel-default-4.12.14-95.60.1

Ссылки

Описание

A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.


Затронутые продукты
Image SLES12-SP4-Azure-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-EC2-HVM-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-GCE-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-OCI-BYOS:kernel-default-4.12.14-95.60.1

Ссылки

Описание

The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.


Затронутые продукты
Image SLES12-SP4-Azure-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-EC2-HVM-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-GCE-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-OCI-BYOS:kernel-default-4.12.14-95.60.1

Ссылки

Описание

A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.


Затронутые продукты
Image SLES12-SP4-Azure-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-EC2-HVM-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-GCE-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-OCI-BYOS:kernel-default-4.12.14-95.60.1

Ссылки

Описание

In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.


Затронутые продукты
Image SLES12-SP4-Azure-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-EC2-HVM-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-GCE-BYOS:kernel-default-4.12.14-95.60.1
Image SLES12-SP4-OCI-BYOS:kernel-default-4.12.14-95.60.1

Ссылки
Уязвимость SUSE-SU-2020:2623-1