[SUSE-SU-2019:2299-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
18
CVEs
12
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-3819: A flaw was fixed in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may have enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') could have caused a system lock up and a denial of service (bnc#1123161).
- CVE-2019-15118: Fixed kernel stack exhaustion in check_input_term in sound/usb/mixer.c via mishandled recursion (bnc#1145922).
- CVE-2019-15117: Fixed out-of-bounds memory access in parse_audio_mixer_unit in sound/usb/mixer.c via mishandled short descriptor (bnc#1145920).
- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).
- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).
- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).
- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).
- CVE-2019-1125: Enable Spectre v1 swapgs mitigations (bsc#1139358).
- CVE-2019-10207: Check for missing tty operations in bluetooth/hci_uart (bsc#1142857).
- CVE-2018-20856: Fixed a use-after-free issue in block/blk-core.c, where certain error case are mishandled (bnc#1143048).
- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).
- CVE-2017-18551: An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel There was an out of bounds write in the function i2c_smbus_xfer_emulated (bnc#1146163).
The following non-security bugs were fixed:
- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652, bsc#1144288).
- bcache: fix race in btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1130972, bsc#1144257).
- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1130972, bsc#1144273).
- bcache: performance improvement for btree_flush_write() (bsc#1140652, bsc#1144288).
- bcache: remove retry_flush_write from struct cache_set (bsc#1140652, bsc#1144288).
- btrfs: improve delayed refs iterations (bsc#1076033, bsc#1107256).
- i40e: add functions to control default VSI (bsc#1141628).
- i40e: set default VSI without a reset (bsc#1141628).
- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1142098).
- nfs: Fix the inode request accounting when pages have subrequests (bsc#1140012).
- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945,bsc#1141401,bsc#1141402,bsc#1141452,bsc#1141453,bsc#1141454).
- qib/hfi1: Fix MR reference count leak on write with immediate (bsc#1045640).
- sched/fair: Do not free p->numa_faults with concurrent readers (bsc#1144920).
- sched/fair: Use RCU accessors consistently for ->numa_group (bsc#1144920).
- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).
- xen: let alloc_xenballooned_pages() fail if not enough memory free (XSA-300).
- ID
- SUSE-SU-2019:2299-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2019/suse-su-20192299-1/
- Published
-
2019-09-05T06:56:18
(5 years ago) - Modified
-
2019-09-05T06:56:18
(5 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2018-1086
- ALAS-2019-1253
- ALAS2-2019-1253
- ALSA-2024:3138
- DSA-4495-1
- DSA-4497-1
- DSA-4531-1
- ELSA-2019-1959
- ELSA-2019-2029
- ELSA-2019-2411
- ELSA-2019-2473
- ELSA-2019-2600
- ELSA-2019-2736
- ELSA-2019-3055
- ELSA-2019-3517
- ELSA-2019-4670
- ELSA-2019-4685
- ELSA-2019-4733
- ELSA-2019-4735
- ELSA-2019-4739
- ELSA-2019-4741
- ELSA-2019-4746
- ELSA-2019-4775
- ELSA-2019-4777
- ELSA-2019-4808
- ELSA-2019-4810
- ELSA-2019-4812
- ELSA-2019-4820
- ELSA-2019-4836
- ELSA-2019-4850
- ELSA-2019-4854
- ELSA-2019-4855
- ELSA-2020-1016
- ELSA-2020-4060
- ELSA-2020-5866
- ELSA-2021-9534
- ELSA-2024-3138
- FEDORA-2019-021c968423
- FEDORA-2019-057d691fd4
- FEDORA-2019-124a241044
- FEDORA-2019-15e141c6a7
- FEDORA-2019-1689d3fe07
- FEDORA-2019-3dbfaeac73
- FEDORA-2019-41e28660ae
- FEDORA-2019-4c91a2f76e
- FEDORA-2019-6bda4c81f4
- FEDORA-2019-7a3fc17778
- FEDORA-2019-7aecfe1c4b
- FEDORA-2019-8846a1a5a2
- FEDORA-2019-97380355ae
- FEDORA-2019-9d3fe6fd5b
- FEDORA-2019-a570a92d5a
- FEDORA-2019-e3010166bd
- FEDORA-2019-e37c348348
- FEDORA-2020-2a5cdd665c
- FEDORA-2020-c2d89d14d0
- FEDORA-2020-fe00e12580
- MS:CVE-2019-1125
- openSUSE-SU-2019:1193-1
- openSUSE-SU-2019:1923-1
- openSUSE-SU-2019:1924-1
- openSUSE-SU-2019:2173-1
- openSUSE-SU-2019:2181-1
- RHSA-2019:1959
- RHSA-2019:1971
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:2405
- RHSA-2019:2411
- RHSA-2019:2473
- RHSA-2019:2600
- RHSA-2019:2609
- RHSA-2019:2736
- RHSA-2019:3055
- RHSA-2019:3076
- RHSA-2019:3089
- RHSA-2019:3309
- RHSA-2019:3517
- RHSA-2020:1016
- RHSA-2020:1070
- RHSA-2020:4060
- RHSA-2020:4062
- RHSA-2024:2950
- RHSA-2024:3138
- RLSA-2024:3138
- SSA:2019-169-01
- SSA:2019-226-01
- SSA:2019-311-01
- SUSE-SU-2019:0765-1
- SUSE-SU-2019:0767-1
- SUSE-SU-2019:0784-1
- SUSE-SU-2019:0785-1
- SUSE-SU-2019:2068-1
- SUSE-SU-2019:2069-1
- SUSE-SU-2019:2070-1
- SUSE-SU-2019:2071-1
- SUSE-SU-2019:2072-1
- SUSE-SU-2019:2073-1
- SUSE-SU-2019:2262-1
- SUSE-SU-2019:2263-1
- SUSE-SU-2019:2412-1
- SUSE-SU-2019:2414-1
- SUSE-SU-2019:2424-1
- SUSE-SU-2019:2430-1
- SUSE-SU-2019:2450-1
- SUSE-SU-2019:2648-1
- SUSE-SU-2019:2651-1
- SUSE-SU-2019:2658-1
- SUSE-SU-2019:2738-1
- SUSE-SU-2019:2756-1
- SUSE-SU-2019:2949-1
- SUSE-SU-2019:2950-1
- SUSE-SU-2019:3228-1
- SUSE-SU-2019:3232-1
- SUSE-SU-2019:3252-1
- SUSE-SU-2019:3258-1
- SUSE-SU-2019:3260-1
- SUSE-SU-2019:3261-1
- SUSE-SU-2020:2526-1
- USN-3932-1
- USN-3932-2
- USN-4005-1
- USN-4008-1
- USN-4008-3
- USN-4093-1
- USN-4094-1
- USN-4095-1
- USN-4095-2
- USN-4096-1
- USN-4114-1
- USN-4115-1
- USN-4116-1
- USN-4117-1
- USN-4118-1
- USN-4145-1
- USN-4147-1
- USN-4162-1
- USN-4162-2
- USN-4163-1
- USN-4163-2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_120-default?arch=x86_64&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_120-default | < 1-3.3.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kgraft-patch-4_4_121-92_120-default?arch=ppc64le&distro=sles-12&sp=2 | suse | kgraft-patch-4_4_121-92_120-default | < 1-3.3.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12&sp=2 | suse | kernel-syms | < 4.4.121-92.120.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-12&sp=2 | suse | kernel-syms | < 4.4.121-92.120.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-12&sp=2 | suse | kernel-syms | < 4.4.121-92.120.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12&sp=2 | suse | kernel-source | < 4.4.121-92.120.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12&sp=2 | suse | kernel-macros | < 4.4.121-92.120.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12&sp=2 | suse | kernel-devel | < 4.4.121-92.120.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12&sp=2 | suse | kernel-default | < 4.4.121-92.120.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-12&sp=2 | suse | kernel-default | < 4.4.121-92.120.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-12&sp=2 | suse | kernel-default | < 4.4.121-92.120.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-man?arch=s390x&distro=sles-12&sp=2 | suse | kernel-default-man | < 4.4.121-92.120.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12&sp=2 | suse | kernel-default-devel | < 4.4.121-92.120.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-12&sp=2 | suse | kernel-default-devel | < 4.4.121-92.120.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-12&sp=2 | suse | kernel-default-devel | < 4.4.121-92.120.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12&sp=2 | suse | kernel-default-base | < 4.4.121-92.120.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-12&sp=2 | suse | kernel-default-base | < 4.4.121-92.120.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-12&sp=2 | suse | kernel-default-base | < 4.4.121-92.120.1 | sles-12 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |