SUSE: 2019:0828-1 important: the Linux Kernel
Summary
The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179). - CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166). - CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. (bnc#1107829). - CVE-2019-7221: The KVM implementation in the Linux kernel had a Use-after-Free (bnc#1124732). - CVE-2019-7222: The KVM implementation in the Linux kernel had an Information Leak (bnc#1124735). - CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, which led to a use-after-free (bnc#1124728). The following non-security bugs were fixed: - copy_mount_string: Limit string length to PATH_MAX (bsc#1082943). - enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959). - ibmvscsi: Fix empty event pool access during host removal (bsc#1119019). - ipv4: ipv6: Adjust the frag mem limit after truesize has been changed (bsc#1110286). - kmps: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137). - netfilter: ipv6: Adjust the frag mem limit after truesize has been changed (bsc#1110286). - perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805). - perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805). - perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805). - perf/x86/intel: Fix memory corruption (bsc#1121805). - perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805). - perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805). - perf/x86/intel: Make cpuc allocations consistent (bsc#1121805). - pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080). - restore cond_resched() in shrink_dcache_parent() (bsc#1098599, bsc#1105402, bsc#1127758). - rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1108145). - scsi: megaraid_sas: Send SYNCHRONIZE_CACHE for VD to firmware (bsc#1121698). - scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315). - x86: Add TSX Force Abort CPUID/MSR (bsc#1121805). - x86: respect memory size limiting via mem= parameter (bsc#1117645). - x86/spectre_v2: Do not check microcode versions when running under hypervisors (bsc#1122821). - x86/xen: dont add memory above max allowed allocation (bsc#1117645). - xen-netfront: Fix hang on device removal (bnc#1012382). - xfrm: use complete IPv6 addresses for hash (bsc#1109330). - xfs: remove filestream item xfs_inode reference (bsc#1127961).
References
#1012382 #1075697 #1082943 #1098599 #1102959
#1105402 #1107829 #1108145 #1109137 #1109330
#1110286 #1117645 #1119019 #1120691 #1121698
#1121805 #1122821 #1124728 #1124732 #1124735
#1125315 #1127155 #1127758 #1127961 #1128166
#1129080 #1129179
Cross- CVE-2018-14633 CVE-2019-2024 CVE-2019-6974
CVE-2019-7221 CVE-2019-7222 CVE-2019-9213
Affected Products:
SUSE OpenStack Cloud 7
SUSE Linux Enterprise Server for SAP 12-SP2
SUSE Linux Enterprise Server 12-SP2-LTSS
SUSE Linux Enterprise Server 12-SP2-BCL
SUSE Linux Enterprise High Availability 12-SP2
SUSE Enterprise Storage 4
OpenStack Cloud Magnum Orchestration 7
https://www.suse.com/security/cve/CVE-2018-14633.html
https://www.suse.com/security/cve/CVE-2019-2024.html
https://www.suse.com/security/cve/CVE-2019-6974.html
https://www.suse.com/security/cve/CVE-2019-7221.html
https://www.suse.com/security/cve/CVE-2019-7222.html
https://www.suse.com/security/cve/CVE-2019-9213.html
https://bugzilla.suse.com/1012382
https://bugzilla.suse.com/1075697
https://bugzilla.suse.com/1082943
https://bugzilla.suse.com/1098599
https://bugzilla.suse.com/1102959
https://bugzilla.suse.com/1105402
https://bugzilla.suse.com/1107829
https://bugzilla.suse.com/1108145
https://bugzilla.suse.com/1109137
https://bugzilla.suse.com/1109330
https://bugzilla.suse.com/1110286
https://bugzilla.suse.com/1117645
https://bugzilla.suse.com/1119019
https://bugzilla.suse.com/1120691
https://bugzilla.suse.com/1121698
https://bugzilla.suse.com/1121805
https://bugzilla.suse.com/1122821
https://bugzilla.suse.com/1124728
https://bugzilla.suse.com/1124732
https://bugzilla.suse.com/1124735
https://bugzilla.suse.com/1125315
https://bugzilla.suse.com/1127155
https://bugzilla.suse.com/1127758
https://bugzilla.suse.com/1127961
https://bugzilla.suse.com/1128166
https://bugzilla.suse.com/1129080
https://bugzilla.suse.com/1129179