Revision Date: | 2019-07-23 | Version: | 1 |
Title: | Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2) (Important) |
Description: |
This update for the Linux Kernel 4.4.121-92_109 fixes several issues.
The following security issues were fixed:
- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586) - CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586) - CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).
This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1136446 1137597 1140747 CVE-2019-11477 CVE-2019-11478 CVE-2019-3846
|
Platform(s): | SUSE Linux Enterprise Server 12 SP2-ESPOS
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP2-ESPOS is installed AND kgraft-patch-4_4_121-92_109-default-4-2.1 is installed
|