The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

computer threat note CVE-2019-14284

Linux kernel: denial of service via setup_format_params

Synthesis of the vulnerability

An attacker can trigger a fatal error via setup_format_params() of the Linux kernel, in order to trigger a denial of service.
Severity of this weakness: 1/4.
Creation date: 29/07/2019.
Références of this bulletin: CERTFR-2019-AVI-376, CERTFR-2019-AVI-381, CERTFR-2019-AVI-392, CERTFR-2019-AVI-417, CERTFR-2019-AVI-418, CERTFR-2019-AVI-419, CERTFR-2019-AVI-441, CERTFR-2019-AVI-458, CVE-2019-14284, DLA-1884-1, DLA-1885-1, DSA-4495-1, DSA-4497-1, openSUSE-SU-2019:1923-1, openSUSE-SU-2019:1924-1, SSA:2019-226-01, SUSE-SU-2019:14157-1, SUSE-SU-2019:2068-1, SUSE-SU-2019:2069-1, SUSE-SU-2019:2070-1, SUSE-SU-2019:2071-1, SUSE-SU-2019:2072-1, SUSE-SU-2019:2073-1, SUSE-SU-2019:2262-1, SUSE-SU-2019:2263-1, SUSE-SU-2019:2299-1, SUSE-SU-2019:2430-1, SUSE-SU-2019:2450-1, USN-4114-1, USN-4115-1, USN-4115-2, USN-4116-1, USN-4117-1, USN-4118-1, VIGILANCE-VUL-29904.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can trigger a fatal error via setup_format_params() of the Linux kernel, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

This weakness alert impacts software or systems such as Debian, Tivoli Storage Manager, Linux, openSUSE Leap, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.

Our Vigil@nce team determined that the severity of this computer vulnerability note is low.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this security bulletin.

Solutions for this threat

Linux kernel: version 5.2.3.
The version 5.2.3 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v5.x/

Linux kernel: version 5.1.20.
The version 5.1.20 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v5.x/

Linux kernel: version 4.19.61.
The version 4.19.61 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 4.14.135.
The version 4.14.135 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 4.9.187.
The version 4.9.187 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 4.4.187.
The version 4.4.187 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 3.16.72.
The version 3.16.72 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v3.x/

Linux kernel: patch for setup_format_params.
A patch is indicated in information sources.

Debian 10: new linux packages.
New packages are available:
  Debian 10: linux 4.19.37-5+deb10u2

Debian 8: new linux-4.9 packages.
New packages are available:
  Debian 8: linux-4.9 4.9.168-1+deb9u5~deb8u1

Debian 8: new linux packages.
New packages are available:
  Debian 8: linux 3.16.72-1

Debian 9/10: new linux packages.
New packages are available:
  Debian 9: linux 4.9.168-1+deb9u5
  Debian 10: linux 4.19.37-5+deb10u2

IBM Spectrum Protect Plus: version 10.1.4.222.
The version 10.1.4.222 is fixed:
  http://www.ibm.com/support/docview.wss?uid=ibm10880861

openSUSE Leap: new kernel packages.
New packages are available:
  openSUSE Leap 15.0: kernel 4.12.14-lp150.12.70.1
  openSUSE Leap 15.1: kernel 4.12.14-lp151.28.13.1

Slackware 14.2: new kernel packages.
New packages are available:
  Slackware 14.2: kernel 4.4.189-*-1

SUSE LE 11 SP4: new kernel packages.
New packages are available:
  SUSE LE 11 SP4: kernel 3.0.101-108.101.1

SUSE LE 12 SP1: new kernel packages.
New packages are available:
  SUSE LE 12 SP1: kernel 3.12.74-60.64.121.1

SUSE LE 12 SP2: new kernel packages.
New packages are available:
  SUSE LE 12 SP2: kernel 4.4.121-92.120.1

SUSE LE 12 SP3: new kernel packages.
New packages are available:
  SUSE LE 12 SP3: kernel 4.4.180-94.103.1

SUSE LE 12 SP4: new kernel-azure packages.
New packages are available:
  SUSE LE 12 SP4: kernel-azure 4.12.14-6.23.1

SUSE LE 12 SP4: new kernel packages.
New packages are available:
  SUSE LE 12 SP4: kernel 4.12.14-95.29.1

SUSE LE 12 SP4: new kernel-rt packages.
New packages are available:
  SUSE LE 12 SP4: kernel-rt 4.12.14-8.3.1

SUSE LE 15 RTM: new kernel packages.
New packages are available:
  SUSE LE 15 RTM: kernel 4.12.14-150.32.1

SUSE LE 15 SP1: new kernel-azure packages.
New packages are available:
  SUSE LE 15 SP1: kernel-azure 4.12.14-5.38.1

SUSE LE 15 SP1: new kernel packages.
New packages are available:
  SUSE LE 15 SP1: kernel 4.12.14-197.15.1

SUSE LE 15 SP1: new kernel-source-rt packages.
New packages are available:
  SUSE LE 15 SP1: kernel-source-rt 4.12.14-14.8.1

Ubuntu 16.04: new linux-image-4.4.0 packages.
New packages are available:
  Ubuntu 16.04 LTS: linux-image-generic 4.4.0.161.169

Ubuntu 16/18: new linux-image-aws packages.
New packages are available:
  Ubuntu 16.04 LTS: linux-image-aws 4.15.0.1047.47
  Ubuntu 18.04 LTS: linux-image-aws 4.15.0.1047.46

Ubuntu 19.04: new linux-image-aws packages.
New packages are available:
  Ubuntu 19.04: linux-image-aws 5.0.0.1014.15

Ubuntu: new linux-image-4.15.0 packages.
New packages are available:
  Ubuntu 16.04 LTS: linux-image-generic-hwe-16.04 4.15.0.62.82
  Ubuntu 18.04 LTS: linux-image-generic 4.15.0.62.64

Ubuntu: new linux-image-5.0.0 packages.
New packages are available:
  Ubuntu 18.04 LTS: linux-image-generic-hwe-18.04 5.0.0.27.84
  Ubuntu 19.04: linux-image-generic 5.0.0.27.28
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a computer vulnerability bulletin. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The technology watch team tracks security threats targeting the computer system. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.