SUSE-SU-2019:0828-1: important: Security update for the Linux Kernel

sle-updates at lists.suse.com sle-updates at lists.suse.com
Mon Apr 1 07:09:51 MDT 2019


   SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:0828-1
Rating:             important
References:         #1012382 #1075697 #1082943 #1098599 #1102959 
                    #1105402 #1107829 #1108145 #1109137 #1109330 
                    #1110286 #1117645 #1119019 #1120691 #1121698 
                    #1121805 #1122821 #1124728 #1124732 #1124735 
                    #1125315 #1127155 #1127758 #1127961 #1128166 
                    #1129080 #1129179 
Cross-References:   CVE-2018-14633 CVE-2019-2024 CVE-2019-6974
                    CVE-2019-7221 CVE-2019-7222 CVE-2019-9213
                   
Affected Products:
                    SUSE OpenStack Cloud 7
                    SUSE Linux Enterprise Server for SAP 12-SP2
                    SUSE Linux Enterprise Server 12-SP2-LTSS
                    SUSE Linux Enterprise Server 12-SP2-BCL
                    SUSE Linux Enterprise High Availability 12-SP2
                    SUSE Enterprise Storage 4
                    OpenStack Cloud Magnum Orchestration 7
______________________________________________________________________________

   An update that solves 6 vulnerabilities and has 21 fixes is
   now available.

Description:



   The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive
   various security and bugfixes.

   The following security bugs were fixed:

   - CVE-2019-2024: A use-after-free when disconnecting a source was fixed
     which could lead to crashes. bnc#1129179).
   - CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap
     minimum address, which made it easier for attackers to exploit kernel
     NULL pointer dereferences on non-SMAP platforms. This is related to a
     capability check for the wrong task (bnc#1128166).
   - CVE-2018-14633: A security flaw was found in the
     chap_server_compute_md5() function in the ISCSI target code in the Linux
     kernel in a way an authentication request from an ISCSI initiator is
     processed. (bnc#1107829).
   - CVE-2019-7221: The KVM implementation in the Linux kernel had a
     Use-after-Free (bnc#1124732).
   - CVE-2019-7222: The KVM implementation in the Linux kernel had an
     Information Leak (bnc#1124735).
   - CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled
     reference counting because of a race condition, which led to a
     use-after-free (bnc#1124728).

   The following non-security bugs were fixed:

   - copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
   - enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959).
   - ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
   - ipv4: ipv6: Adjust the frag mem limit after truesize has been changed
     (bsc#1110286).
   - kmps: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).
   - netfilter: ipv6: Adjust the frag mem limit after truesize has been
     changed (bsc#1110286).
   - perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
   - perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu()
     (bsc#1121805).
   - perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
   - perf/x86/intel: Fix memory corruption (bsc#1121805).
   - perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
   - perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
   - perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
   - pseries/energy: Use OF accessor function to read ibm,drc-indexes
     (bsc#1129080).
   - restore cond_resched() in shrink_dcache_parent() (bsc#1098599,
     bsc#1105402, bsc#1127758).
   - rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash
     possibly (bsc#1108145).
   - scsi: megaraid_sas: Send SYNCHRONIZE_CACHE for VD to firmware
     (bsc#1121698).
   - scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir()
     (bsc#1125315).
   - x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
   - x86: respect memory size limiting via mem= parameter (bsc#1117645).
   - x86/spectre_v2: Do not check microcode versions when running under
     hypervisors (bsc#1122821).
   - x86/xen: dont add memory above max allowed allocation (bsc#1117645).
   - xen-netfront: Fix hang on device removal (bnc#1012382).
   - xfrm: use complete IPv6 addresses for hash (bsc#1109330).
   - xfs: remove filestream item xfs_inode reference (bsc#1127961).


Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE OpenStack Cloud 7:

      zypper in -t patch SUSE-OpenStack-Cloud-7-2019-828=1

   - SUSE Linux Enterprise Server for SAP 12-SP2:

      zypper in -t patch SUSE-SLE-SAP-12-SP2-2019-828=1

   - SUSE Linux Enterprise Server 12-SP2-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2019-828=1

   - SUSE Linux Enterprise Server 12-SP2-BCL:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2019-828=1

   - SUSE Linux Enterprise High Availability 12-SP2:

      zypper in -t patch SUSE-SLE-HA-12-SP2-2019-828=1

   - SUSE Enterprise Storage 4:

      zypper in -t patch SUSE-Storage-4-2019-828=1

   - OpenStack Cloud Magnum Orchestration 7:

      zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-828=1



Package List:

   - SUSE OpenStack Cloud 7 (s390x x86_64):

      kernel-default-4.4.121-92.104.1
      kernel-default-base-4.4.121-92.104.1
      kernel-default-base-debuginfo-4.4.121-92.104.1
      kernel-default-debuginfo-4.4.121-92.104.1
      kernel-default-debugsource-4.4.121-92.104.1
      kernel-default-devel-4.4.121-92.104.1
      kernel-syms-4.4.121-92.104.1

   - SUSE OpenStack Cloud 7 (noarch):

      kernel-devel-4.4.121-92.104.1
      kernel-macros-4.4.121-92.104.1
      kernel-source-4.4.121-92.104.1

   - SUSE OpenStack Cloud 7 (x86_64):

      kgraft-patch-4_4_121-92_104-default-1-3.3.1

   - SUSE OpenStack Cloud 7 (s390x):

      kernel-default-man-4.4.121-92.104.1

   - SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64):

      kernel-default-4.4.121-92.104.1
      kernel-default-base-4.4.121-92.104.1
      kernel-default-base-debuginfo-4.4.121-92.104.1
      kernel-default-debuginfo-4.4.121-92.104.1
      kernel-default-debugsource-4.4.121-92.104.1
      kernel-default-devel-4.4.121-92.104.1
      kernel-syms-4.4.121-92.104.1
      kgraft-patch-4_4_121-92_104-default-1-3.3.1

   - SUSE Linux Enterprise Server for SAP 12-SP2 (noarch):

      kernel-devel-4.4.121-92.104.1
      kernel-macros-4.4.121-92.104.1
      kernel-source-4.4.121-92.104.1

   - SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le s390x x86_64):

      kernel-default-4.4.121-92.104.1
      kernel-default-base-4.4.121-92.104.1
      kernel-default-base-debuginfo-4.4.121-92.104.1
      kernel-default-debuginfo-4.4.121-92.104.1
      kernel-default-debugsource-4.4.121-92.104.1
      kernel-default-devel-4.4.121-92.104.1
      kernel-syms-4.4.121-92.104.1

   - SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le x86_64):

      kgraft-patch-4_4_121-92_104-default-1-3.3.1

   - SUSE Linux Enterprise Server 12-SP2-LTSS (noarch):

      kernel-devel-4.4.121-92.104.1
      kernel-macros-4.4.121-92.104.1
      kernel-source-4.4.121-92.104.1

   - SUSE Linux Enterprise Server 12-SP2-LTSS (s390x):

      kernel-default-man-4.4.121-92.104.1

   - SUSE Linux Enterprise Server 12-SP2-BCL (noarch):

      kernel-devel-4.4.121-92.104.1
      kernel-macros-4.4.121-92.104.1
      kernel-source-4.4.121-92.104.1

   - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):

      kernel-default-4.4.121-92.104.1
      kernel-default-base-4.4.121-92.104.1
      kernel-default-base-debuginfo-4.4.121-92.104.1
      kernel-default-debuginfo-4.4.121-92.104.1
      kernel-default-debugsource-4.4.121-92.104.1
      kernel-default-devel-4.4.121-92.104.1
      kernel-syms-4.4.121-92.104.1

   - SUSE Linux Enterprise High Availability 12-SP2 (ppc64le s390x x86_64):

      cluster-md-kmp-default-4.4.121-92.104.1
      cluster-md-kmp-default-debuginfo-4.4.121-92.104.1
      cluster-network-kmp-default-4.4.121-92.104.1
      cluster-network-kmp-default-debuginfo-4.4.121-92.104.1
      dlm-kmp-default-4.4.121-92.104.1
      dlm-kmp-default-debuginfo-4.4.121-92.104.1
      gfs2-kmp-default-4.4.121-92.104.1
      gfs2-kmp-default-debuginfo-4.4.121-92.104.1
      kernel-default-debuginfo-4.4.121-92.104.1
      kernel-default-debugsource-4.4.121-92.104.1
      ocfs2-kmp-default-4.4.121-92.104.1
      ocfs2-kmp-default-debuginfo-4.4.121-92.104.1

   - SUSE Enterprise Storage 4 (noarch):

      kernel-devel-4.4.121-92.104.1
      kernel-macros-4.4.121-92.104.1
      kernel-source-4.4.121-92.104.1

   - SUSE Enterprise Storage 4 (x86_64):

      kernel-default-4.4.121-92.104.1
      kernel-default-base-4.4.121-92.104.1
      kernel-default-base-debuginfo-4.4.121-92.104.1
      kernel-default-debuginfo-4.4.121-92.104.1
      kernel-default-debugsource-4.4.121-92.104.1
      kernel-default-devel-4.4.121-92.104.1
      kernel-syms-4.4.121-92.104.1
      kgraft-patch-4_4_121-92_104-default-1-3.3.1

   - OpenStack Cloud Magnum Orchestration 7 (x86_64):

      kernel-default-4.4.121-92.104.1
      kernel-default-debuginfo-4.4.121-92.104.1
      kernel-default-debugsource-4.4.121-92.104.1


References:

   https://www.suse.com/security/cve/CVE-2018-14633.html
   https://www.suse.com/security/cve/CVE-2019-2024.html
   https://www.suse.com/security/cve/CVE-2019-6974.html
   https://www.suse.com/security/cve/CVE-2019-7221.html
   https://www.suse.com/security/cve/CVE-2019-7222.html
   https://www.suse.com/security/cve/CVE-2019-9213.html
   https://bugzilla.suse.com/1012382
   https://bugzilla.suse.com/1075697
   https://bugzilla.suse.com/1082943
   https://bugzilla.suse.com/1098599
   https://bugzilla.suse.com/1102959
   https://bugzilla.suse.com/1105402
   https://bugzilla.suse.com/1107829
   https://bugzilla.suse.com/1108145
   https://bugzilla.suse.com/1109137
   https://bugzilla.suse.com/1109330
   https://bugzilla.suse.com/1110286
   https://bugzilla.suse.com/1117645
   https://bugzilla.suse.com/1119019
   https://bugzilla.suse.com/1120691
   https://bugzilla.suse.com/1121698
   https://bugzilla.suse.com/1121805
   https://bugzilla.suse.com/1122821
   https://bugzilla.suse.com/1124728
   https://bugzilla.suse.com/1124732
   https://bugzilla.suse.com/1124735
   https://bugzilla.suse.com/1125315
   https://bugzilla.suse.com/1127155
   https://bugzilla.suse.com/1127758
   https://bugzilla.suse.com/1127961
   https://bugzilla.suse.com/1128166
   https://bugzilla.suse.com/1129080
   https://bugzilla.suse.com/1129179



More information about the sle-updates mailing list