| Revision Date: | 2020-12-01 | Version: | 1 |
| Title: | Security update for the Linux Kernel (Important) |
| Description: |
The SUSE Linux Enterprise 12 SP2 kernel version 4.4.121 was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).
- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection.
- CVE-2019-11479: It was possible to send a crafted sequence of SACKs which would fragment the RACK send map. A remote attacker may be able to further exploit the fragmented send map to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. This would have resulted in excess resource consumption due to low mss values.
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network. (bnc#1136424)
- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel There is an unchecked kstrdup of fwstr, which may have allowed an attacker to cause a denial of service (NULL pointer dereference and system crash). (bnc#1136586)
- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux kernel allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may have been possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server. (bnc#1120843)
- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the unused memory region in the extent tree block, which might have allowed local users to obtain sensitive information by reading uninitialized data in the filesystem. (bnc#1135281)
- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343. (bnc#1135603)
- CVE-2019-11190: The Linux kernel allowed local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check had a race condition when reading /proc/pid/stat. (bnc#1131543)
- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel There was a race condition leading to a use-after-free, related to net namespace cleanup. (bnc#1134537)
- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel allowed a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not have ended with a '\0' character. (bnc#1134848)
- CVE-2018-17972: An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel It did not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. (bnc#1110785)
The following non-security bugs were fixed:
- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565). - ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658). - kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586). - kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586). - mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935). - tcp: add tcp_min_snd_mss sysctl (bsc#1137586). - tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586). - tcp: limit payload size of sacked skbs (bsc#1137586). - tcp: tcp_fragment() should apply sane memory limits (bsc#1137586). - x86_64: Add gap to int3 to allow for call emulation (bsc#1099658). - x86_64: Allow breakpoints to emulate call instructions (bsc#1099658). - xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1134596). - xen-swiotlb: use actually allocated size on check physical continuous (bnc#1134596).
|
| Family: | unix | Class: | patch |
| Status: | | Reference(s): | 1056088 1056090 1056093 1056095 1056097 1056101 1056105 1083630 1087200 1099658 1106284 1109465 1110785 1111789 1113769 1117473 1117740 1119947 1120843 1120885 1123022 1123482 1124525 1130116 1131543 1131565 1132374 1132472 1132728 1132729 1132732 1132734 1133810 1134537 1134596 1134718 1134848 1135281 1135603 1136424 1136446 1136586 1136935 1137586 1137597 1140747 1140868 1144903 1145665 1149323 1149792 1153108 1153158 1153161 1154609 1159913 1165631 1168930 1169605 1169786 1169936 1170302 1170741 1170939 CVE-2011-1526 CVE-2011-4862 CVE-2017-12627 CVE-2017-13738 CVE-2017-13739 CVE-2017-13740 CVE-2017-13741 CVE-2017-13743 CVE-2017-13744 CVE-2018-16884 CVE-2018-17972 CVE-2018-19622 CVE-2018-19623 CVE-2018-19624 CVE-2018-19625 CVE-2018-19626 CVE-2018-19627 CVE-2018-7191 CVE-2019-10220 CVE-2019-10245 CVE-2019-11190 CVE-2019-11477 CVE-2019-11477 CVE-2019-11478 CVE-2019-11478 CVE-2019-11479 CVE-2019-11709 CVE-2019-11710 CVE-2019-11711 CVE-2019-11712 CVE-2019-11713 CVE-2019-11714 CVE-2019-11715 CVE-2019-11716 CVE-2019-11717 CVE-2019-11718 CVE-2019-11719 CVE-2019-11720 CVE-2019-11721 CVE-2019-11723 CVE-2019-11724 CVE-2019-11725 CVE-2019-11727 CVE-2019-11728 CVE-2019-11729 CVE-2019-11730 CVE-2019-11733 CVE-2019-11735 CVE-2019-11736 CVE-2019-11738 CVE-2019-11740 CVE-2019-11742 CVE-2019-11743 CVE-2019-11744 CVE-2019-11746 CVE-2019-11747 CVE-2019-11748 CVE-2019-11749 CVE-2019-11750 CVE-2019-11751 CVE-2019-11752 CVE-2019-11753 CVE-2019-11815 CVE-2019-11833 CVE-2019-11884 CVE-2019-12382 CVE-2019-17133 CVE-2019-18197 CVE-2019-2602 CVE-2019-2684 CVE-2019-2697 CVE-2019-2698 CVE-2019-3814 CVE-2019-3846 CVE-2019-3846 CVE-2019-5108 CVE-2019-5489 CVE-2019-7524 CVE-2019-9811 CVE-2019-9812 CVE-2020-11008 CVE-2020-1749 CVE-2020-5260 SUSE-SU-2017:2570-1 SUSE-SU-2018:4298-1 SUSE-SU-2019:1644-1 SUSE-SU-2019:2620-1 SUSE-SU-2020:0920-2 SUSE-SU-2020:1295-1
|
| Platform(s): | openSUSE Leap 15.0 openSUSE Leap 15.1 SUSE Linux Enterprise Server 12 SP2-ESPOS SUSE Linux Enterprise Server 12 SP3 SUSE Linux Enterprise Server 12 SP3-BCL SUSE Linux Enterprise Server 12 SP3-ESPOS SUSE Linux Enterprise Server 12 SP3-LTSS SUSE Linux Enterprise Server 12 SP3-TERADATA SUSE Linux Enterprise Server 12 SP4 SUSE OpenStack Cloud 8 SUSE OpenStack Cloud 9 SUSE OpenStack Cloud Crowbar 8
| Product(s): | |
| Definition Synopsis |
| openSUSE Leap 15.0 is installed AND libcacard0-2.5.3-lp150.1 is installed
|
| Definition Synopsis |
| openSUSE Leap 15.1 is installed
AND Package Information
dbus-1-1.12.2-lp151.4.3 is installed
OR dbus-1-devel-1.12.2-lp151.4.3 is installed
OR dbus-1-devel-32bit-1.12.2-lp151.4.3 is installed
OR dbus-1-devel-doc-1.12.2-lp151.4.3 is installed
OR dbus-1-x11-1.12.2-lp151.4.3 is installed
OR libdbus-1-3-1.12.2-lp151.4.3 is installed
OR libdbus-1-3-32bit-1.12.2-lp151.4.3 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP2-ESPOS is installed
AND Package Information
kernel-default-4.4.121-92.114 is installed
OR kernel-default-base-4.4.121-92.114 is installed
OR kernel-default-devel-4.4.121-92.114 is installed
OR kernel-devel-4.4.121-92.114 is installed
OR kernel-macros-4.4.121-92.114 is installed
OR kernel-source-4.4.121-92.114 is installed
OR kernel-syms-4.4.121-92.114 is installed
OR kgraft-patch-4_4_121-92_114-default-1-3.5 is installed
OR kgraft-patch-SLE12-SP2_Update_30-1-3.5 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP3 is installed
AND Package Information
krb5-appl-clients-1.0.3-1 is installed
OR krb5-appl-servers-1.0.3-1 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP3-BCL is installed
AND Package Information
ghostscript-9.27-23.28 is installed
OR ghostscript-x11-9.27-23.28 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP3-ESPOS is installed
AND Package Information
kgraft-patch-4_4_176-94_88-default-4-2 is installed
OR kgraft-patch-SLE12-SP3_Update_24-4-2 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP3-LTSS is installed
AND Package Information
kgraft-patch-4_4_175-94_79-default-4-2 is installed
OR kgraft-patch-SLE12-SP3_Update_23-4-2 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP3-TERADATA is installed
AND Package Information
openssh-7.2p2-74.23 is installed
OR openssh-askpass-gnome-7.2p2-74.23 is installed
OR openssh-fips-7.2p2-74.23 is installed
OR openssh-helpers-7.2p2-74.23 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP4 is installed
AND Package Information
dovecot22-2.2.31-19.11 is installed
OR dovecot22-backend-mysql-2.2.31-19.11 is installed
OR dovecot22-backend-pgsql-2.2.31-19.11 is installed
OR dovecot22-backend-sqlite-2.2.31-19.11 is installed
|
| Definition Synopsis |
| SUSE OpenStack Cloud 8 is installed
AND Package Information
MozillaFirefox-68.1.0-109.89 is installed
OR MozillaFirefox-branding-SLE-68-32.8 is installed
OR MozillaFirefox-translations-common-68.1.0-109.89 is installed
|
| Definition Synopsis |
| SUSE OpenStack Cloud 9 is installed
AND python-SQLAlchemy-1.2.10-3.3 is installed
|
| Definition Synopsis |
| SUSE OpenStack Cloud Crowbar 8 is installed
AND Package Information
git-2.26.2-27.36 is installed
OR git-core-2.26.2-27.36 is installed
|