Description: | Summary: The remote host is missing an update for the 'Linux Kernel (Live Patch 25 for SLE 12 SP3)' package(s) announced via the SUSE-SU-2019:1948-1 advisory.
Vulnerability Insight: This update for the Linux Kernel 4.4.178-94_91 fixes several issues.
The following security issues were fixed:
- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586) - CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586) - CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).
This update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).
Affected Software/OS: 'Linux Kernel (Live Patch 25 for SLE 12 SP3)' package(s) on SUSE Linux Enterprise Server 12-SP2, SUSE Linux Enterprise Server 12-SP3, SUSE Linux Enterprise Server for SAP Applications 12-SP2, SUSE Linux Enterprise Server for SAP Applications 12-SP3.
Solution: Please install the updated package(s).
CVSS Score: 8.3
CVSS Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C
|