SB2019071909 - OpenSUSE Linux update for the Linux Kernel



SB2019071909 - OpenSUSE Linux update for the Linux Kernel

Published: July 19, 2019

Security Bulletin ID SB2019071909
Severity
High
Patch available
YES
Number of vulnerabilities 7
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 14% Medium 29% Low 57%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) NULL pointer dereference (CVE-ID: CVE-2018-16871)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in the Network File System (NFS) implementation. A remote authenticated attacker can mount an exported NFS filesystem, cause a NULL pointer dereference condition due to an invalid NFS sequence and perform a denial of service (DoS) attack.


2) Race condition (CVE-ID: CVE-2018-20836)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.


3) Heap-based buffer overflow (CVE-ID: CVE-2019-10126)

The vulnerability allows a local user to perform a denial of service (DoS) condition or execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the Marvell Wireless LAN device driver in "mwifiex_uap_parse_tail_ies" function in "drivers/net/wireless/marvell/mwifiex/ie.c". A local authenticated user can trigger heap-based buffer overflow and cause a denial of service (system crash) or possibly execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Information disclosure (CVE-ID: CVE-2019-10638)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the software uses the IP ID values that the kernel produces for connectionless protocols. A remote attacker with a crafted web page can forge the targeted system to send UDP traffic to an attacker-controlled IP address to gain unauthorized access to sensitive information on the system.


5) Information disclosure (CVE-ID: CVE-2019-10639)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the possibility to extract the Kernel Address Space Layout Randomization (KASLR) kernel image offset of the affected software using the IP ID values that the kernel produces for connectionless protocols. A remote attacker can force the targeted system to send UDP or ICMP traffic to an attacker-controlled IP address and gain unauthorized access to sensitive information on the system.


6) Race condition (CVE-ID: CVE-2019-11599)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition with mmget_not_zero or get_task_mm calls and is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c due to kernel does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.


7) NULL pointer dereference (CVE-ID: CVE-2019-12614)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dreference error in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c due to  kstrdup of prop->name. A local user can perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.