The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

threat bulletin CVE-2019-14283

Linux kernel: out-of-bounds memory reading via set_geometry

Synthesis of the vulnerability

An attacker can force a read at an invalid address via set_geometry() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information.
Severity of this alert: 1/4.
Creation date: 29/07/2019.
Références of this alert: CERTFR-2019-AVI-376, CERTFR-2019-AVI-381, CERTFR-2019-AVI-392, CERTFR-2019-AVI-417, CERTFR-2019-AVI-418, CERTFR-2019-AVI-419, CERTFR-2019-AVI-441, CERTFR-2019-AVI-458, CVE-2019-14283, DLA-1884-1, DLA-1885-1, DSA-4495-1, DSA-4497-1, openSUSE-SU-2019:1923-1, openSUSE-SU-2019:1924-1, SSA:2019-226-01, SUSE-SU-2019:14157-1, SUSE-SU-2019:2068-1, SUSE-SU-2019:2069-1, SUSE-SU-2019:2070-1, SUSE-SU-2019:2071-1, SUSE-SU-2019:2072-1, SUSE-SU-2019:2073-1, SUSE-SU-2019:2262-1, SUSE-SU-2019:2263-1, SUSE-SU-2019:2299-1, SUSE-SU-2019:2430-1, SUSE-SU-2019:2450-1, USN-4114-1, USN-4115-1, USN-4115-2, USN-4116-1, USN-4117-1, USN-4118-1, VIGILANCE-VUL-29903.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can force a read at an invalid address via set_geometry() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

This computer threat bulletin impacts software or systems such as Debian, Tivoli Storage Manager, Linux, openSUSE Leap, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.

Our Vigil@nce team determined that the severity of this security threat is low.

The trust level is of type confirmed by the editor, with an origin of user shell.

An attacker with a expert ability can exploit this computer vulnerability alert.

Solutions for this threat

Linux kernel: version 5.2.3.
The version 5.2.3 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v5.x/

Linux kernel: version 5.1.20.
The version 5.1.20 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v5.x/

Linux kernel: version 4.19.61.
The version 4.19.61 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 4.14.135.
The version 4.14.135 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 4.9.187.
The version 4.9.187 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 4.4.187.
The version 4.4.187 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 3.16.72.
The version 3.16.72 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v3.x/

Linux kernel: patch for set_geometry.
A patch is indicated in information sources.

Debian 10: new linux packages.
New packages are available:
  Debian 10: linux 4.19.37-5+deb10u2

Debian 8: new linux-4.9 packages.
New packages are available:
  Debian 8: linux-4.9 4.9.168-1+deb9u5~deb8u1

Debian 8: new linux packages.
New packages are available:
  Debian 8: linux 3.16.72-1

Debian 9/10: new linux packages.
New packages are available:
  Debian 9: linux 4.9.168-1+deb9u5
  Debian 10: linux 4.19.37-5+deb10u2

IBM Spectrum Protect Plus: version 10.1.4.222.
The version 10.1.4.222 is fixed:
  http://www.ibm.com/support/docview.wss?uid=ibm10880861

openSUSE Leap: new kernel packages.
New packages are available:
  openSUSE Leap 15.0: kernel 4.12.14-lp150.12.70.1
  openSUSE Leap 15.1: kernel 4.12.14-lp151.28.13.1

Slackware 14.2: new kernel packages.
New packages are available:
  Slackware 14.2: kernel 4.4.189-*-1

SUSE LE 11 SP4: new kernel packages.
New packages are available:
  SUSE LE 11 SP4: kernel 3.0.101-108.101.1

SUSE LE 12 SP1: new kernel packages.
New packages are available:
  SUSE LE 12 SP1: kernel 3.12.74-60.64.121.1

SUSE LE 12 SP2: new kernel packages.
New packages are available:
  SUSE LE 12 SP2: kernel 4.4.121-92.120.1

SUSE LE 12 SP3: new kernel packages.
New packages are available:
  SUSE LE 12 SP3: kernel 4.4.180-94.103.1

SUSE LE 12 SP4: new kernel-azure packages.
New packages are available:
  SUSE LE 12 SP4: kernel-azure 4.12.14-6.23.1

SUSE LE 12 SP4: new kernel packages.
New packages are available:
  SUSE LE 12 SP4: kernel 4.12.14-95.29.1

SUSE LE 12 SP4: new kernel-rt packages.
New packages are available:
  SUSE LE 12 SP4: kernel-rt 4.12.14-8.3.1

SUSE LE 15 RTM: new kernel packages.
New packages are available:
  SUSE LE 15 RTM: kernel 4.12.14-150.32.1

SUSE LE 15 SP1: new kernel-azure packages.
New packages are available:
  SUSE LE 15 SP1: kernel-azure 4.12.14-5.38.1

SUSE LE 15 SP1: new kernel packages.
New packages are available:
  SUSE LE 15 SP1: kernel 4.12.14-197.15.1

SUSE LE 15 SP1: new kernel-source-rt packages.
New packages are available:
  SUSE LE 15 SP1: kernel-source-rt 4.12.14-14.8.1

Ubuntu 16.04: new linux-image-4.4.0 packages.
New packages are available:
  Ubuntu 16.04 LTS: linux-image-generic 4.4.0.161.169

Ubuntu 16/18: new linux-image-aws packages.
New packages are available:
  Ubuntu 16.04 LTS: linux-image-aws 4.15.0.1047.47
  Ubuntu 18.04 LTS: linux-image-aws 4.15.0.1047.46

Ubuntu 19.04: new linux-image-aws packages.
New packages are available:
  Ubuntu 19.04: linux-image-aws 5.0.0.1014.15

Ubuntu: new linux-image-4.15.0 packages.
New packages are available:
  Ubuntu 16.04 LTS: linux-image-generic-hwe-16.04 4.15.0.62.82
  Ubuntu 18.04 LTS: linux-image-generic 4.15.0.62.64

Ubuntu: new linux-image-5.0.0 packages.
New packages are available:
  Ubuntu 18.04 LTS: linux-image-generic-hwe-18.04 5.0.0.27.84
  Ubuntu 19.04: linux-image-generic 5.0.0.27.28
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a computers vulnerabilities database. The technology watch team tracks security threats targeting the computer system. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.