<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP4)</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2019:3223-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-12-10T09:12:02Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-12-10T09:12:02Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-12-10T09:12:02Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP4)</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for the Linux Kernel 4.12.14-95_6 fixes several issues.

The following security issues were fixed:

- CVE-2019-15917: Fixed a use-after-free when hci_uart_register_dev() fails in hci_uart_set_proto() (bsc#1156334).
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging
  certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2018-16871: Fixed an issue where an attacker, who could mount an exported NFS filesystem, was able to trigger a 
  null pointer dereference by using an invalid NFS sequence leading to kernel panic and deny of access to the NFS server
  (bsc#1156320). 
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2019-3223,SUSE-SLE-Live-Patching-12-SP4-2019-3223</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20193223-1/</URL>
      <Description>Link for SUSE-SU-2019:3223-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2019-December/006225.html</URL>
      <Description>E-Mail link for SUSE-SU-2019:3223-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1153108</URL>
      <Description>SUSE Bug 1153108</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1156320</URL>
      <Description>SUSE Bug 1156320</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1156321</URL>
      <Description>SUSE Bug 1156321</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1156334</URL>
      <Description>SUSE Bug 1156334</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16871/</URL>
      <Description>SUSE CVE CVE-2018-16871 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10220/</URL>
      <Description>SUSE CVE CVE-2019-10220 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-13272/</URL>
      <Description>SUSE CVE CVE-2019-13272 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15917/</URL>
      <Description>SUSE CVE CVE-2019-15917 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 12 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 12 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP4" CPE="cpe:/o:suse:sle-live-patching:12:sp4">SUSE Linux Enterprise Live Patching 12 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kgraft-patch-4_12_14-95_6-default-7-2.5">
      <FullProductName ProductID="kgraft-patch-4_12_14-95_6-default-7-2.5">kgraft-patch-4_12_14-95_6-default-7-2.5</FullProductName>
    </Branch>
    <Relationship ProductReference="kgraft-patch-4_12_14-95_6-default-7-2.5" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5">kgraft-patch-4_12_14-95_6-default-7-2.5 as a component of SUSE Linux Enterprise Live Patching 12 SP4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.</Note>
    </Notes>
    <CVE>CVE-2018-16871</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20193223-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16871.html</URL>
        <Description>CVE-2018-16871</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137103</URL>
        <Description>SUSE Bug 1137103</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156320</URL>
        <Description>SUSE Bug 1156320</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.</Note>
    </Notes>
    <CVE>CVE-2019-10220</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20193223-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10220.html</URL>
        <Description>CVE-2019-10220</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1144903</URL>
        <Description>SUSE Bug 1144903</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153108</URL>
        <Description>SUSE Bug 1153108</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.</Note>
    </Notes>
    <CVE>CVE-2019-13272</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20193223-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-13272.html</URL>
        <Description>CVE-2019-13272</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1140671</URL>
        <Description>SUSE Bug 1140671</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156321</URL>
        <Description>SUSE Bug 1156321</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1198122</URL>
        <Description>SUSE Bug 1198122</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c.</Note>
    </Notes>
    <CVE>CVE-2019-15917</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-7-2.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20193223-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15917.html</URL>
        <Description>CVE-2019-15917</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149539</URL>
        <Description>SUSE Bug 1149539</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156334</URL>
        <Description>SUSE Bug 1156334</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
