| Revision Date: | 2020-12-01 | Version: | 1 |
| Title: | Security update for the Linux Kernel (Important) |
| Description: |
The SUSE Linux Enterprise 12 SP 3 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux kernel in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could have allowed the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158). - CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038). - CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in the Linux kernel. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free (bnc#1155897). - CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333). - CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures (bnc#1157191). - CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324). - CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157143). - CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function (bnc#1157070). - CVE-2019-16231: drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150466). - CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel There was a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact (bnc#1156187). - CVE-2019-18680: An issue was discovered in the Linux kernel. There was a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will cause denial of service (bnc#1155898). - CVE-2019-15213: An use-after-free was fixed caused by malicious USB device in drivers/media/usb/dvb-usb/dvb-usb-init.c (bsc#1146544). - CVE-2019-19536: An uninitialized Kernel memory can leak to USB devices in drivers/net/can/usb/peak_usb/pcan_usb_pro.c (bsc#1158394). - CVE-2019-19534: An uninitialized Kernel memory can leak to USB devices in drivers/net/can/usb/peak_usb/pcan_usb_core.c (bsc#1158398). - CVE-2019-19530: An use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bsc#1158410). - CVE-2019-19524: An use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bsc#1158413). - CVE-2019-19525: An use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bsc#1158417). - CVE-2019-19531: An use-after-free in yurex_delete may lead to denial of service (bsc#1158445). - CVE-2019-19523: An use-after-free on disconnect in USB adutux (bsc#1158823). - CVE-2019-19532: An out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers (bsc#1158824). - CVE-2019-19332: An out-of-bounds memory write via kvm_dev_ioctl_get_cpuid (bsc#1158827). - CVE-2019-19533: An info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver (bsc#1158834). - CVE-2019-19527: An use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (bsc#1158900). - CVE-2019-19535: An info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver (bsc#1158903). - CVE-2019-19537: Two races in the USB character device registration and deregistration routines (bsc#1158904). - CVE-2019-19338: An incomplete fix for Transaction Asynchronous Abort (TAA) (bsc#1158954).
The following non-security bugs were fixed:
- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905). - ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047). - ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047). - ibmvnic: Serialize device queries (bsc#1155689 ltc#182047). - ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047). - netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612). - powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041). - powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107). - sched/fair: WARN() and refuse to set buddy when !se->on_rq (bsc#1158132). - x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811). - x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811). - xen/pv: Fix a boot up hang revealed by int3 self test (bsc#1153811). - arp: Fix cache issue during Life Partition Migration (bsc#1152631). - futexes: Fix speed on 4.12 kernel (bsc#1157464).
|
| Family: | unix | Class: | patch |
| Status: | | Reference(s): | 1020950 1024749 1027282 1041090 1042670 1045460 1050469 1056334 1056386 1067700 1068059 1073269 1073748 1078326 1078485 1081750 1084604 1084650 1086001 1087303 1091041 1091396 1103411 1105010 1113231 1114957 1116574 1116717 1117275 1119461 1119465 1119493 1121600 1123156 1123886 1126140 1126141 1126192 1126195 1126196 1126197 1126198 1126201 1127400 1131107 1133818 1138190 1143797 1144504 1146544 1146612 1146874 1149458 1149792 1149813 1150466 1150483 1151839 1152631 1153811 1153830 1154905 1155094 1155199 1155689 1155897 1155898 1156146 1156187 1157038 1157042 1157070 1157143 1157158 1157191 1157324 1157333 1157464 1158132 1158394 1158398 1158410 1158413 1158417 1158445 1158823 1158824 1158827 1158834 1158900 1158903 1158904 1158954 1159035 1160594 1160764 1161779 1162224 1162367 1162825 1163922 1163985 1165894 1170411 1170771 1171477 1171561 1171930 1172405 1174543 1174955 1177155 945401 964336 CVE-2016-7586 CVE-2016-7589 CVE-2016-7592 CVE-2016-7599 CVE-2016-7623 CVE-2016-7632 CVE-2016-7635 CVE-2016-7639 CVE-2016-7641 CVE-2016-7645 CVE-2016-7652 CVE-2016-7654 CVE-2016-7656 CVE-2017-13672 CVE-2017-13673 CVE-2017-2350 CVE-2017-2354 CVE-2017-2355 CVE-2017-2356 CVE-2017-2362 CVE-2017-2363 CVE-2017-2364 CVE-2017-2365 CVE-2017-2366 CVE-2017-2369 CVE-2017-2371 CVE-2017-2373 CVE-2017-2496 CVE-2017-2510 CVE-2017-2538 CVE-2017-2539 CVE-2017-7018 CVE-2017-7030 CVE-2017-7034 CVE-2017-7037 CVE-2017-7039 CVE-2017-7046 CVE-2017-7048 CVE-2017-7055 CVE-2017-7056 CVE-2017-7061 CVE-2017-7064 CVE-2018-10858 CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2018-13785 CVE-2018-15473 CVE-2018-16872 CVE-2018-18954 CVE-2018-19364 CVE-2018-19489 CVE-2018-3136 CVE-2018-3139 CVE-2018-3149 CVE-2018-3169 CVE-2018-3180 CVE-2018-3183 CVE-2018-3214 CVE-2018-7858 CVE-2019-11091 CVE-2019-12068 CVE-2019-12625 CVE-2019-12900 CVE-2019-14378 CVE-2019-14818 CVE-2019-14866 CVE-2019-14895 CVE-2019-15213 CVE-2019-15890 CVE-2019-16231 CVE-2019-17340 CVE-2019-17341 CVE-2019-17342 CVE-2019-17343 CVE-2019-17344 CVE-2019-17345 CVE-2019-17346 CVE-2019-17347 CVE-2019-17348 CVE-2019-18348 CVE-2019-18660 CVE-2019-18680 CVE-2019-18683 CVE-2019-18805 CVE-2019-19052 CVE-2019-19062 CVE-2019-19065 CVE-2019-19073 CVE-2019-19074 CVE-2019-19332 CVE-2019-19338 CVE-2019-19523 CVE-2019-19524 CVE-2019-19525 CVE-2019-19527 CVE-2019-19530 CVE-2019-19531 CVE-2019-19532 CVE-2019-19533 CVE-2019-19534 CVE-2019-19535 CVE-2019-19536 CVE-2019-19537 CVE-2019-6778 CVE-2019-9674 CVE-2020-10722 CVE-2020-12243 CVE-2020-15708 CVE-2020-1720 CVE-2020-25637 CVE-2020-8013 CVE-2020-8022 CVE-2020-8492 SUSE-SU-2017:2933-1 SUSE-SU-2018:2319-1 SUSE-SU-2018:4064-1 SUSE-SU-2019:0582-1 SUSE-SU-2019:3379-1 SUSE-SU-2020:0545-1 SUSE-SU-2020:0586-1 SUSE-SU-2020:1524-1 SUSE-SU-2020:1791-1 SUSE-SU-2020:2194-1 SUSE-SU-2020:3095-1
|
| Platform(s): | openSUSE Leap 15.1 SUSE Linux Enterprise Server 12 SP3 SUSE Linux Enterprise Server 12 SP3-BCL SUSE Linux Enterprise Server 12 SP3-ESPOS SUSE Linux Enterprise Server 12 SP3-LTSS SUSE Linux Enterprise Server 12 SP3-TERADATA SUSE Linux Enterprise Server 12 SP4 SUSE Linux Enterprise Server 12 SP4-ESPOS SUSE OpenStack Cloud Crowbar 8 SUSE OpenStack Cloud Crowbar 9
| Product(s): | |
| Definition Synopsis |
| openSUSE Leap 15.1 is installed AND Package Information
bzip2-1.0.6-lp151.5.6 is installed
OR bzip2-doc-1.0.6-lp151.5.6 is installed
OR libbz2-1-1.0.6-lp151.5.6 is installed
OR libbz2-1-32bit-1.0.6-lp151.5.6 is installed
OR libbz2-devel-1.0.6-lp151.5.6 is installed
OR libbz2-devel-32bit-1.0.6-lp151.5.6 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP3 is installed
AND Package Information
libjavascriptcoregtk-4_0-18-2.18.0-2.9 is installed
OR libwebkit2gtk-4_0-37-2.18.0-2.9 is installed
OR typelib-1_0-JavaScriptCore-4_0-2.18.0-2.9 is installed
OR typelib-1_0-WebKit2-4_0-2.18.0-2.9 is installed
OR webkit2gtk-4_0-injected-bundles-2.18.0-2.9 is installed
OR webkit2gtk3-2.18.0-2.9 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP3-BCL is installed
AND Package Information
tomcat-8.0.53-29.32 is installed
OR tomcat-admin-webapps-8.0.53-29.32 is installed
OR tomcat-docs-webapp-8.0.53-29.32 is installed
OR tomcat-el-3_0-api-8.0.53-29.32 is installed
OR tomcat-javadoc-8.0.53-29.32 is installed
OR tomcat-jsp-2_3-api-8.0.53-29.32 is installed
OR tomcat-lib-8.0.53-29.32 is installed
OR tomcat-servlet-3_1-api-8.0.53-29.32 is installed
OR tomcat-webapps-8.0.53-29.32 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP3-ESPOS is installed
AND Package Information
libldap-2_4-2-2.4.41-18.68 is installed
OR libldap-2_4-2-32bit-2.4.41-18.68 is installed
OR openldap2-2.4.41-18.68 is installed
OR openldap2-back-meta-2.4.41-18.68 is installed
OR openldap2-client-2.4.41-18.68 is installed
OR openldap2-doc-2.4.41-18.68 is installed
OR openldap2-ppolicy-check-password-1.2-18.68 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP3-LTSS is installed
AND permissions-2015.09.28.1626-17.27 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP3-TERADATA is installed
AND Package Information
openssh-7.2p2-74.30 is installed
OR openssh-askpass-gnome-7.2p2-74.30 is installed
OR openssh-fips-7.2p2-74.30 is installed
OR openssh-helpers-7.2p2-74.30 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP4 is installed
AND Package Information
elfutils-0.158-6 is installed
OR libasm1-0.158-6 is installed
OR libasm1-32bit-0.158-6 is installed
OR libdw1-0.158-6 is installed
OR libdw1-32bit-0.158-6 is installed
OR libebl1-0.158-6 is installed
OR libebl1-32bit-0.158-6 is installed
OR libelf-devel-0.158-6 is installed
OR libelf1-0.158-6 is installed
OR libelf1-32bit-0.158-6 is installed
|
| Definition Synopsis |
| SUSE Linux Enterprise Server 12 SP4-ESPOS is installed
AND Package Information
tomcat-9.0.36-3.45 is installed
OR tomcat-admin-webapps-9.0.36-3.45 is installed
OR tomcat-docs-webapp-9.0.36-3.45 is installed
OR tomcat-el-3_0-api-9.0.36-3.45 is installed
OR tomcat-javadoc-9.0.36-3.45 is installed
OR tomcat-jsp-2_3-api-9.0.36-3.45 is installed
OR tomcat-lib-9.0.36-3.45 is installed
OR tomcat-servlet-4_0-api-9.0.36-3.45 is installed
OR tomcat-webapps-9.0.36-3.45 is installed
|
| Definition Synopsis |
| SUSE OpenStack Cloud Crowbar 8 is installed
AND Package Information
kernel-default-4.4.180-94.113 is installed
OR kernel-default-base-4.4.180-94.113 is installed
OR kernel-default-devel-4.4.180-94.113 is installed
OR kernel-default-kgraft-4.4.180-94.113 is installed
OR kernel-devel-4.4.180-94.113 is installed
OR kernel-macros-4.4.180-94.113 is installed
OR kernel-source-4.4.180-94.113 is installed
OR kernel-syms-4.4.180-94.113 is installed
OR kgraft-patch-4_4_180-94_113-default-1-4.5 is installed
OR kgraft-patch-SLE12-SP3_Update_30-1-4.5 is installed
|
| Definition Synopsis |
| SUSE OpenStack Cloud Crowbar 9 is installed
AND Package Information
xorg-x11-server-1.19.6-4.8 is installed
OR xorg-x11-server-extra-1.19.6-4.8 is installed
|