Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.0558 SUSE Security Update: Security update for the Linux Kernel 25 February 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: linux kernel Publisher: SUSE Operating System: SUSE Impact/Access: Denial of Service -- Existing Account Access Confidential Data -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2019-3460 CVE-2019-3459 CVE-2017-18249 Reference: ESB-2019.0335.5 ASB-2018.0190 Original Bulletin: https://www.suse.com/support/update/announcement/2019/suse-su-20190470-1.html - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2019:0470-1 Rating: important References: #1012382 #1023175 #1087036 #1094823 #1102875 #1102877 #1102879 #1102882 #1102896 #1106105 #1106929 #1107866 #1109695 #1114893 #1116653 #1119680 #1120722 #1120758 #1120902 #1121726 #1122650 #1122651 #1122779 #1122885 #1123321 #1123323 #1123357 Cross-References: CVE-2017-18249 CVE-2019-3459 CVE-2019-3460 Affected Products: SUSE Linux Enterprise Real Time Extension 12-SP3 ______________________________________________________________________________ An update that solves three vulnerabilities and has 24 fixes is now available. Description: The SUSE Linux Enterprise 12 realtime kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2017-18249: Fixed tracking on allocated nid in the add_free_nid function fs/f2fs/node.c, which previously allowed local users to cause a denial of service (bnc#1087036). - CVE-2019-3459: Fixed remote heap address information leak in use of l2cap_get_conf_opt (bnc#1120758). - CVE-2019-3460: Fixed remote data leak in multiple location in the function l2cap_parse_conf_rsp (bnc#1120758). The following non-security bugs were fixed: - Disable MSI also when pcie-octeon.pcie_disable on (bnc#1012382). - Fix problem with sharetransport= and NFSv4 (bsc#1114893). - Revert "bs-upload-kernel: do not set %opensuse_bs" This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821. - Yama: Check for pid death before checking ancestry (bnc#1012382). - acpi / processor: Fix the return value of acpi_processor_ids_walk() (git fixes (acpi)). - acpi/nfit: Block function zero DSMs (bsc#1123321). - acpi/nfit: Fix command-supported detection (bsc#1123323). - acpi: power: Skip duplicate power resource references in _PRx (bnc#1012382). - alsa: bebob: fix model-id of unit for Apogee Ensemble (bnc#1012382). - alsa: hda/realtek - Disable headset Mic VREF for headset mode of ALC225 (bnc#1012382). - arm64/kvm: consistently handle host HCR_EL2 flags (bnc#1012382). - arm64: Do not trap host pointer auth use to EL2 (bnc#1012382). - arm64: perf: set suppress_bind_attrs flag to true (bnc#1012382). - ata: Fix racy link clearance (bsc#1107866). - block/loop: Use global lock for ioctl() operation (bnc#1012382). - block/swim3: Fix -EBUSY error when re-opening device after unmount (Git-fixes). - Btrfs: tree-check: reduce stack consumption in check_dir_item (bnc#1012382). - Btrfs: tree-checker: Check level for leaves and nodes (bnc#1012382). - Btrfs: tree-checker: Do not check max block group size as current max chunk size limit is unreliable (fixes for bnc#1012382 bsc#1102875 bsc#1102877 bsc#1102879 bsc#1102882 bsc#1102896). - Btrfs: tree-checker: Fix misleading group system information (bnc#1012382). - Btrfs: validate type when reading a chunk (bnc#1012382). - Btrfs: wait on ordered extents on abort cleanup (bnc#1012382). - can: gw: ensure DLC boundaries after CAN frame modification (bnc#1012382). - cifs: Do not hide EINTR after sending network packets (bnc#1012382). - cifs: Fix potential OOB access of lock element array (bnc#1012382). - clk: imx6q: reset exclusive gates on init (bnc#1012382). - crypto: authenc - fix parsing key with misaligned rta_len (bnc#1012382). - crypto: authencesn - Avoid twice completion call in decrypt path (bnc#1012382). - crypto: cts - fix crash on short inputs (bnc#1012382). - crypto: user - support incremental algorithm dumps (bsc#1120902). - dm crypt: add cryptographic data integrity protection (authenticated encryption) (Git-fixes). - dm crypt: factor IV constructor out to separate function (Git-fixes). - dm crypt: fix crash by adding missing check for auth key size (git-fixes). - dm crypt: fix error return code in crypt_ctr() (git-fixes). - dm crypt: fix memory leak in crypt_ctr_cipher_old() (git-fixes). - dm crypt: introduce new format of cipher with "capi:" prefix (Git-fixes). - dm crypt: wipe kernel key copy after IV initialization (Git-fixes). - dm kcopyd: Fix bug causing workqueue stalls (bnc#1012382). - dm snapshot: Fix excessive memory usage and workqueue stalls (bnc#1012382). - dm: do not allow readahead to limit IO size (git fixes (readahead)). - e1000e: allow non-monotonic SYSTIM readings (bnc#1012382). - edac: Raise the maximum number of memory controllers (bsc#1120722). - efi/libstub/arm64: Use hidden attribute for struct screen_info reference (bsc#1122650). - ext4: Fix crash during online resizing (bsc#1122779). - ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bnc#1012382). - f2fs: Add sanity_check_inode() function (bnc#1012382). - f2fs: avoid unneeded loop in build_sit_entries (bnc#1012382). - f2fs: check blkaddr more accuratly before issue a bio (bnc#1012382). - f2fs: clean up argument of recover_data (bnc#1012382). - f2fs: clean up with is_valid_blkaddr() (bnc#1012382). - f2fs: detect wrong layout (bnc#1012382). - f2fs: enhance sanity_check_raw_super() to avoid potential overflow (bnc#1012382). - f2fs: factor out fsync inode entry operations (bnc#1012382). - f2fs: fix inode cache leak (bnc#1012382). - f2fs: fix invalid memory access (bnc#1012382). - f2fs: fix missing up_read (bnc#1012382). - f2fs: fix to avoid reading out encrypted data in page cache (bnc#1012382). - f2fs: fix to convert inline directory correctly (bnc#1012382). - f2fs: fix to determine start_cp_addr by sbi->cur_cp_pack (bnc#1012382). - f2fs: fix to do sanity check with block address in main area (bnc#1012382). - f2fs: fix to do sanity check with block address in main area v2 (bnc#1012382). - f2fs: fix to do sanity check with cp_pack_start_sum (bnc#1012382). - f2fs: fix to do sanity check with node footer and iblocks (bnc#1012382). - f2fs: fix to do sanity check with reserved blkaddr of inline inode (bnc#1012382). - f2fs: fix to do sanity check with secs_per_zone (bnc#1012382). - f2fs: fix to do sanity check with user_block_count (bnc#1012382). - f2fs: fix validation of the block count in sanity_check_raw_super (bnc#1012382). - f2fs: free meta pages if sanity check for ckpt is failed (bnc#1012382). - f2fs: give -EINVAL for norecovery and rw mount (bnc#1012382). - f2fs: introduce and spread verify_blkaddr (bnc#1012382). - f2fs: introduce get_checkpoint_version for cleanup (bnc#1012382). - f2fs: move sanity checking of cp into get_valid_checkpoint (bnc#1012382). - f2fs: not allow to write illegal blkaddr (bnc#1012382). - f2fs: put directory inodes before checkpoint in roll-forward recovery (bnc#1012382). - f2fs: remove an obsolete variable (bnc#1012382). - f2fs: return error during fill_super (bnc#1012382). - f2fs: sanity check on sit entry (bnc#1012382). - f2fs: use crc and cp version to determine roll-forward recovery (bnc#1012382). - gpiolib: Fix return value of gpio_to_desc() stub if !GPIOLIB (Git-fixes). - i2c: dev: prevent adapter retries and timeout being set as minus value (bnc#1012382). - ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357). - ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726). - ibmvnic: Increase maximum queue size limit (bsc#1121726). - ibmvnic: Introduce driver limits for ring sizes (bsc#1121726). - iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105). - iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105). - iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105). - iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105). - ip: on queued skb use skb_header_pointer instead of pskb_may_pull (bnc#1012382). - ipmi:ssif: Fix handling of multi-part return messages (bnc#1012382). - ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (bnc#1012382). - ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (bnc#1012382). - ipv6: fix kernel-infoleak in ipv6_local_error() (bnc#1012382). - jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bnc#1012382). - kabi: reorder new slabinfo fields in struct kmem_cache_node (bnc#1116653). - kconfig: fix file name and line number of warn_ignored_character() (bnc#1012382). - kconfig: fix memory leak when EOF is encountered in quotation (bnc#1012382). - loop: Fix double mutex_unlock(&loop_ctl_mutex) in loop_control_ioctl() (bnc#1012382). - loop: Fold __loop_release into loop_release (bnc#1012382). - loop: Get rid of loop_index_mutex (bnc#1012382). - lsm: Check for NULL cred-security on free (bnc#1012382). - md: batch flush requests (bsc#1119680). - media: em28xx: Fix misplaced reset of dev->v4l::field_count (bnc#1012382). - media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bnc#1012382). - media: vb2: be sure to unlock mutex on errors (bnc#1012382). - media: vb2: vb2_mmap: move lock up (bnc#1012382). - media: vivid: fix error handling of kthread_run (bnc#1012382). - media: vivid: set min width/height to a value > 0 (bnc#1012382). - mfd: tps6586x: Handle interrupts on suspend (bnc#1012382). - mips: SiByte: Enable swiotlb for SWARM, LittleSur and BigSur (bnc#1012382). - mips: fix n32 compat_ipc_parse_version (bnc#1012382). - mm, proc: be more verbose about unstable VMA flags in /proc/<pid>/smaps (bnc#1012382). - mm, slab: faster active and free stats (bsc#1116653, VM Performance). - mm, slab: maintain total slab count instead of active count (bsc#1116653, VM Performance). - mm/page-writeback.c: do not break integrity writeback on ->writepage() error (bnc#1012382). - mm/slab: improve performance of gathering slabinfo stats (bsc#1116653, VM Performance). - mm: only report isolation failures when offlining memory (generic hotplug debugability). - mmc: atmel-mci: do not assume idle after atmci_request_end (bnc#1012382). - net: bridge: fix a bug on using a neighbour cache entry without checking its state (bnc#1012382). - net: call sk_dst_reset when set SO_DONTROUTE (bnc#1012382). - net: speed up skb_rbtree_purge() (bnc#1012382). - ocfs2: fix panic due to unrecovered local alloc (bnc#1012382). - omap2fb: Fix stack memory disclosure (bsc#1106929) - packet: Do not leak dev refcounts on error exit (bnc#1012382). - pci: altera: Check link status before retrain link (bnc#1012382). - pci: altera: Fix altera_pcie_link_is_up() (bnc#1012382). - pci: altera: Move retrain from fixup to altera_pcie_host_init() (bnc#1012382). - pci: altera: Poll for link training status after retraining the link (bnc#1012382). - pci: altera: Poll for link up status after retraining the link (bnc#1012382). - pci: altera: Reorder read/write functions (bnc#1012382). - pci: altera: Rework config accessors for use without a struct pci_bus (bnc#1012382). - perf intel-pt: Fix error with config term "pt=0" (bnc#1012382). - perf parse-events: Fix unchecked usage of strncpy() (bnc#1012382). - perf svghelper: Fix unchecked usage of strncpy() (bnc#1012382). - platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bnc#1012382). - powerpc, hotplug: Avoid to touch non-existent cpumasks (bsc#1109695). - powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695). - powerpc/pseries/cpuidle: Fix preempt warning (bnc#1012382). - powerpc/setup: Add cpu_to_phys_id array (bsc#1109695). - powerpc/smp: Add Power9 scheduler topology (bsc#1109695). - powerpc/smp: Add cpu_l2_cache_map (bsc#1109695). - powerpc/smp: Rework CPU topology construction (bsc#1109695). - powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695). - powerpc/xmon: Fix invocation inside lock region (bsc#1122885). - powerpc: Detect the presence of big-cores via "ibm, thread-groups" (bsc#1109695). - powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695). - powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695). - proc: Remove empty line in /proc/self/status (bnc#1012382 bsc#1094823). - pstore/ram: Do not treat empty buffers as valid (bnc#1012382). - r8169: Add support for new Realtek Ethernet (bnc#1012382). - scsi: megaraid: fix out-of-bound array accesses (bnc#1012382). - scsi: sd: Fix cache_type_store() (bnc#1012382). - scsi: target: use consistent left-aligned ASCII INQUIRY data (bnc#1012382). - sctp: allocate sctp_sockaddr_entry with kzalloc (bnc#1012382). - selinux: fix GPF on invalid policy (bnc#1012382). - slab: alien caches must not be initialized if the allocation of the alien cache failed (bnc#1012382). - sunrpc: handle ENOMEM in rpcb_getport_async (bnc#1012382). - sysfs: Disable lockdep for driver bind/unbind files (bnc#1012382). - tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bnc#1012382). - tipc: fix uninit-value in tipc_nl_compat_doit (bnc#1012382). - tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bnc#1012382). - tipc: fix uninit-value in tipc_nl_compat_link_set (bnc#1012382). - tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bnc#1012382). - tty/ldsem: Wake up readers after timed out down_write() (bnc#1012382). - usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bnc#1012382). - usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bnc#1012382). - usb: storage: add quirk for SMI SM3350 (bnc#1012382). - usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bnc#1012382). - writeback: do not decrement wb->refcnt if !wb->bdi (git fixes (writeback)). - x86/pkeys: Properly copy pkey state at fork() (bsc#1106105). Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Real Time Extension 12-SP3: zypper in -t patch SUSE-SLE-RT-12-SP3-2019-470=1 Package List: - SUSE Linux Enterprise Real Time Extension 12-SP3 (noarch): kernel-devel-rt-4.4.172-3.35.1 kernel-source-rt-4.4.172-3.35.1 - SUSE Linux Enterprise Real Time Extension 12-SP3 (x86_64): cluster-md-kmp-rt-4.4.172-3.35.1 cluster-md-kmp-rt-debuginfo-4.4.172-3.35.1 dlm-kmp-rt-4.4.172-3.35.1 dlm-kmp-rt-debuginfo-4.4.172-3.35.1 gfs2-kmp-rt-4.4.172-3.35.1 gfs2-kmp-rt-debuginfo-4.4.172-3.35.1 kernel-rt-4.4.172-3.35.1 kernel-rt-base-4.4.172-3.35.1 kernel-rt-base-debuginfo-4.4.172-3.35.1 kernel-rt-debuginfo-4.4.172-3.35.1 kernel-rt-debugsource-4.4.172-3.35.1 kernel-rt-devel-4.4.172-3.35.1 kernel-rt_debug-debuginfo-4.4.172-3.35.1 kernel-rt_debug-debugsource-4.4.172-3.35.1 kernel-rt_debug-devel-4.4.172-3.35.1 kernel-rt_debug-devel-debuginfo-4.4.172-3.35.1 kernel-syms-rt-4.4.172-3.35.1 ocfs2-kmp-rt-4.4.172-3.35.1 ocfs2-kmp-rt-debuginfo-4.4.172-3.35.1 References: https://www.suse.com/security/cve/CVE-2017-18249.html https://www.suse.com/security/cve/CVE-2019-3459.html https://www.suse.com/security/cve/CVE-2019-3460.html https://bugzilla.suse.com/1012382 https://bugzilla.suse.com/1023175 https://bugzilla.suse.com/1087036 https://bugzilla.suse.com/1094823 https://bugzilla.suse.com/1102875 https://bugzilla.suse.com/1102877 https://bugzilla.suse.com/1102879 https://bugzilla.suse.com/1102882 https://bugzilla.suse.com/1102896 https://bugzilla.suse.com/1106105 https://bugzilla.suse.com/1106929 https://bugzilla.suse.com/1107866 https://bugzilla.suse.com/1109695 https://bugzilla.suse.com/1114893 https://bugzilla.suse.com/1116653 https://bugzilla.suse.com/1119680 https://bugzilla.suse.com/1120722 https://bugzilla.suse.com/1120758 https://bugzilla.suse.com/1120902 https://bugzilla.suse.com/1121726 https://bugzilla.suse.com/1122650 https://bugzilla.suse.com/1122651 https://bugzilla.suse.com/1122779 https://bugzilla.suse.com/1122885 https://bugzilla.suse.com/1123321 https://bugzilla.suse.com/1123323 https://bugzilla.suse.com/1123357 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXHNKmWaOgq3Tt24GAQjruw/9G33ejBmCyUusealjv1d6vDII08uer2vW wTbZB2Eg9qtcGm1hXZk6YicrkKyLnCpjbMd2zrl85m7eDIqR2rw6A0Y9RCNu/k54 CjiOQqJPrgoo2DL5+oc4aLjAlbSRRfd9UDWbMI7lZKNnM/Y8BZh01NQx29jpmx2r wvxoZgXSD0y19T3FKpwUicvIHwxA1ZL8UVbY64dpypLinESmK8j7ZDQeN3oOE8P5 Y7TRaK1fsHhabdSVYIZcl0skgd73YWITuN4GwJfpl8S814uJcDUJDJRsuG+cTir8 sTtP/E+zaqcXCAYzLSvhQWgOBMQpmWaa3tVExAPeoNFaxcntTgQI9TGdAXeKeCFK IqJpCTgRJ2c9UMWHP6aXTEhv+1KKFCZGQoP3Xcv9juTk9hCiaibGrdvd/zOWM6g3 wGFsrKMrPxmPOF4W9jAz4MxEz07VQR0sjhDV4+WkPYoKDD+q4NxUfm7krQsaovve IAjHIqEM4RasFtezn75qNJ2ZpOHdGe7q1pKgoqbyBBYx1FDhQGmIgXoC6NrxAxq2 qFBCJPN+1C7XrRwbkTZ3PtLcqRntZ6CK1WHAuLT9Ja70P0qbt6Bks1sQOEeM57bY PxsKG60fkILMi8XO+J+UTF7OqigDL2t7t+mJ1eOlZEuviowVxxquvUFWmTMn5aDL Ti0VIOsZ/lo= =QKsI -----END PGP SIGNATURE-----