[SUSE-SU-2019:1668-1] Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP1)

Severity Important
Affected Packages 18
CVEs 4

Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP1)

This update for the Linux Kernel 3.12.74-60_64_107 fixes several issues.

The following security issues were fixed:

  • CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).
  • CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).
  • CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)
  • CVE-2019-11487: The Linux kernel allowed page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).
Package Affected Version
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_99-xen?arch=x86_64&distro=sles-12&sp=1 < 9-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_99-default?arch=x86_64&distro=sles-12&sp=1 < 9-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_96-xen?arch=x86_64&distro=sles-12&sp=1 < 11-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_96-default?arch=x86_64&distro=sles-12&sp=1 < 11-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_110-xen?arch=x86_64&distro=sles-12&sp=1 < 3-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_110-default?arch=x86_64&distro=sles-12&sp=1 < 3-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_107-xen?arch=x86_64&distro=sles-12&sp=1 < 7-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_107-default?arch=x86_64&distro=sles-12&sp=1 < 7-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_104-xen?arch=x86_64&distro=sles-12&sp=1 < 7-2.1
pkg:rpm/suse/kgraft-patch-3_12_74-60_64_104-default?arch=x86_64&distro=sles-12&sp=1 < 7-2.1
pkg:rpm/suse/kgraft-patch-3_12_61-52_149-xen?arch=x86_64&distro=sles-12 < 3-2.1
pkg:rpm/suse/kgraft-patch-3_12_61-52_149-default?arch=x86_64&distro=sles-12 < 3-2.1
pkg:rpm/suse/kgraft-patch-3_12_61-52_146-xen?arch=x86_64&distro=sles-12 < 7-2.1
pkg:rpm/suse/kgraft-patch-3_12_61-52_146-default?arch=x86_64&distro=sles-12 < 7-2.1
pkg:rpm/suse/kgraft-patch-3_12_61-52_141-xen?arch=x86_64&distro=sles-12 < 9-2.1
pkg:rpm/suse/kgraft-patch-3_12_61-52_141-default?arch=x86_64&distro=sles-12 < 9-2.1
pkg:rpm/suse/kgraft-patch-3_12_61-52_136-xen?arch=x86_64&distro=sles-12 < 11-2.1
pkg:rpm/suse/kgraft-patch-3_12_61-52_136-default?arch=x86_64&distro=sles-12 < 11-2.1
ID
SUSE-SU-2019:1668-1
Severity
important
URL
https://www.suse.com/support/update/announcement/2019/suse-su-20191668-1/
Published
2019-06-21T16:10:20
(5 years ago)
Modified
2019-06-21T16:10:20
(5 years ago)
Rights
Copyright 2024 SUSE LLC. All rights reserved.
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_99-xen?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_99-xen < 9-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_99-default?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_99-default < 9-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_96-xen?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_96-xen < 11-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_96-default?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_96-default < 11-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_110-xen?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_110-xen < 3-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_110-default?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_110-default < 3-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_107-xen?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_107-xen < 7-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_107-default?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_107-default < 7-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_104-xen?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_104-xen < 7-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_74-60_64_104-default?arch=x86_64&distro=sles-12&sp=1 suse kgraft-patch-3_12_74-60_64_104-default < 7-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_61-52_149-xen?arch=x86_64&distro=sles-12 suse kgraft-patch-3_12_61-52_149-xen < 3-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_61-52_149-default?arch=x86_64&distro=sles-12 suse kgraft-patch-3_12_61-52_149-default < 3-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_61-52_146-xen?arch=x86_64&distro=sles-12 suse kgraft-patch-3_12_61-52_146-xen < 7-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_61-52_146-default?arch=x86_64&distro=sles-12 suse kgraft-patch-3_12_61-52_146-default < 7-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_61-52_141-xen?arch=x86_64&distro=sles-12 suse kgraft-patch-3_12_61-52_141-xen < 9-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_61-52_141-default?arch=x86_64&distro=sles-12 suse kgraft-patch-3_12_61-52_141-default < 9-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_61-52_136-xen?arch=x86_64&distro=sles-12 suse kgraft-patch-3_12_61-52_136-xen < 11-2.1 sles-12 x86_64
Affected pkg:rpm/suse/kgraft-patch-3_12_61-52_136-default?arch=x86_64&distro=sles-12 suse kgraft-patch-3_12_61-52_136-default < 11-2.1 sles-12 x86_64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...