[SUSE-SU-2019:1948-1] Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3)
Severity
Important
Affected Packages
33
CVEs
3
Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3)
This update for the Linux Kernel 4.4.178-94_91 fixes several issues.
The following security issues were fixed:
- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).
This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
- ID
- SUSE-SU-2019:1948-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2019/suse-su-20191948-1/
- Published
-
2019-07-23T08:08:48
(5 years ago) - Modified
-
2019-07-23T08:08:48
(5 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2019-1222
- ALAS2-2019-1222
- ASA-201906-12
- ASA-201906-13
- ASA-201906-14
- ASA-201906-15
- DSA-4465-1
- ELSA-2019-1479
- ELSA-2019-1481
- ELSA-2019-1488
- ELSA-2019-2703
- ELSA-2019-3055
- ELSA-2019-4684
- ELSA-2019-4685
- ELSA-2019-4686
- ELSA-2019-4689
- ELSA-2019-4850
- ELSA-2020-5755
- ELSA-2020-5866
- FEDORA-2019-021c968423
- FEDORA-2019-057d691fd4
- FEDORA-2019-124a241044
- FEDORA-2019-15e141c6a7
- FEDORA-2019-1689d3fe07
- FEDORA-2019-41e28660ae
- FEDORA-2019-4c91a2f76e
- FEDORA-2019-6817686c4d
- FEDORA-2019-69c132b061
- FEDORA-2019-6bda4c81f4
- FEDORA-2019-6c3d89b3d0
- FEDORA-2019-7a3fc17778
- FEDORA-2019-7aecfe1c4b
- FEDORA-2019-7ec378191e
- FEDORA-2019-83858fc57b
- FEDORA-2019-8846a1a5a2
- FEDORA-2019-914542e05c
- FEDORA-2019-97380355ae
- FEDORA-2019-9d3fe6fd5b
- FEDORA-2019-a570a92d5a
- FEDORA-2019-a95015e60f
- FEDORA-2019-c03eda3cc6
- FEDORA-2019-e3010166bd
- FEDORA-2019-e37c348348
- FEDORA-2019-f40bd7826f
- FEDORA-2020-2a5cdd665c
- FEDORA-2020-c2d89d14d0
- FEDORA-2020-fe00e12580
- openSUSE-SU-2019:1571-1
- openSUSE-SU-2019:1579-1
- RHSA-2019:1479
- RHSA-2019:1480
- RHSA-2019:1481
- RHSA-2019:1486
- RHSA-2019:1488
- RHSA-2019:2703
- RHSA-2019:2741
- RHSA-2019:3055
- RHSA-2019:3076
- RHSA-2019:3089
- SSA:2019-169-01
- SSA:2019-202-01
- SUSE-SU-2019:1527-1
- SUSE-SU-2019:1529-1
- SUSE-SU-2019:1530-1
- SUSE-SU-2019:1532-1
- SUSE-SU-2019:1533-1
- SUSE-SU-2019:1534-1
- SUSE-SU-2019:1535-1
- SUSE-SU-2019:1536-1
- SUSE-SU-2019:1550-1
- SUSE-SU-2019:1581-1
- SUSE-SU-2019:1588-1
- SUSE-SU-2019:1668-1
- SUSE-SU-2019:1671-1
- SUSE-SU-2019:1674-1
- SUSE-SU-2019:1692-1
- SUSE-SU-2019:1765-1
- SUSE-SU-2019:1851-1
- SUSE-SU-2019:1855-1
- SUSE-SU-2019:1882-1
- SUSE-SU-2019:1888-1
- SUSE-SU-2019:1889-1
- SUSE-SU-2019:1924-1
- SUSE-SU-2019:1935-1
- SUSE-SU-2019:2069-1
- SUSE-SU-2019:2430-1
- SUSE-SU-2019:2450-1
- SUSE-SU-2019:2658-1
- SUSE-SU-2019:2821-1
- SUSE-SU-2019:2950-1
- USN-4017-1
- USN-4017-2
- USN-4093-1
- USN-4094-1
- USN-4095-1
- USN-4095-2
- USN-4117-1
- USN-4118-1
- VMSA-2019-0010.3
- VU:905115
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1948-1.json | |
Suse | URL for SUSE-SU-2019:1948-1 | https://www.suse.com/support/update/announcement/2019/suse-su-20191948-1/ | |
Suse | E-Mail link for SUSE-SU-2019:1948-1 | https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html | |
Bugzilla | SUSE Bug 1136446 | https://bugzilla.suse.com/1136446 | |
Bugzilla | SUSE Bug 1137597 | https://bugzilla.suse.com/1137597 | |
Bugzilla | SUSE Bug 1140747 | https://bugzilla.suse.com/1140747 | |
CVE | SUSE CVE CVE-2019-11477 page | https://www.suse.com/security/cve/CVE-2019-11477/ | |
CVE | SUSE CVE CVE-2019-11478 page | https://www.suse.com/security/cve/CVE-2019-11478/ | |
CVE | SUSE CVE CVE-2019-3846 page | https://www.suse.com/security/cve/CVE-2019-3846/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kgraft-patch-4_4_178-94_91-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_178-94_91-default | < 3-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_178-94_91-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_178-94_91-default | < 3-2.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_176-94_88-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_176-94_88-default | < 3-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_176-94_88-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_176-94_88-default | < 3-2.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_175-94_79-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_175-94_79-default | < 4-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_175-94_79-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_175-94_79-default | < 4-2.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_162-94_72-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_162-94_72-default | < 5-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_162-94_72-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_162-94_72-default | < 5-2.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_162-94_69-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_162-94_69-default | < 5-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_162-94_69-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_162-94_69-default | < 5-2.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_156-94_64-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_156-94_64-default | < 6-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_156-94_64-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_156-94_64-default | < 6-2.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_156-94_61-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_156-94_61-default | < 7-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_156-94_61-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_156-94_61-default | < 7-2.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_156-94_57-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_156-94_57-default | < 7-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_156-94_57-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_156-94_57-default | < 7-2.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_155-94_50-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_155-94_50-default | < 7-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_155-94_50-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_155-94_50-default | < 7-2.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_143-94_47-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_143-94_47-default | < 7-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_143-94_47-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_143-94_47-default | < 7-2.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_140-94_42-default?arch=x86_64&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_140-94_42-default | < 10-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_140-94_42-default?arch=ppc64le&distro=sles-12&sp=3 | suse | kgraft-patch-4_4_140-94_42-default | < 10-2.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_98-default?arch=x86_64&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_98-default | < 6-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_98-default?arch=ppc64le&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_98-default | < 6-2.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_95-default?arch=x86_64&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_95-default | < 7-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_95-default?arch=ppc64le&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_95-default | < 7-2.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_92-default?arch=x86_64&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_92-default | < 8-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_109-default?arch=x86_64&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_109-default | < 4-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_109-default?arch=ppc64le&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_109-default | < 4-2.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_104-default?arch=x86_64&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_104-default | < 4-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_104-default?arch=ppc64le&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_104-default | < 4-2.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_101-default?arch=x86_64&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_101-default | < 4-2.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_101-default?arch=ppc64le&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_101-default | < 4-2.1 | sles-12 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |