SUSE: 2019:1823-2 important: the Linux Kernel
Summary
The SUSE Linux Enterprise 12 SP 2 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (bnc#1140575) - CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less proto...
Read the Full AdvisoryReferences
#1096254 #1108382 #1109137 #1127155 #1133190
#1133738 #1134395 #1134701 #1136922 #1136935
#1137194 #1138291 #1140575
Cross- CVE-2018-20836 CVE-2019-10126 CVE-2019-10638
CVE-2019-10639 CVE-2019-11487 CVE-2019-11599
CVE-2019-12380 CVE-2019-12456 CVE-2019-12614
CVE-2019-12818 CVE-2019-12819
Affected Products:
SUSE Linux Enterprise High Availability 12-SP2
https://www.suse.com/security/cve/CVE-2018-20836.html
https://www.suse.com/security/cve/CVE-2019-10126.html
https://www.suse.com/security/cve/CVE-2019-10638.html
https://www.suse.com/security/cve/CVE-2019-10639.html
https://www.suse.com/security/cve/CVE-2019-11487.html
https://www.suse.com/security/cve/CVE-2019-11599.html
https://www.suse.com/security/cve/CVE-2019-12380.html
https://www.suse.com/security/cve/CVE-2019-12456.html
https://www.suse.com/security/cve/CVE-2019-12614.html
https://ww...
Read the Full Advisory