SUSE Security Update: Security update for kgraft-patch-SLE12_Update_1, kgraft-patch-SLE12_Update_2
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0832-1
Rating: important
References: #920633 #922004
Cross-References: CVE-2015-1421
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update supplies kgraft patches to fix one security vulnerability.
CVE-2015-1421: A use-after-free vulnerability in the sctp_assoc_update
function in net/sctp/associola.c in the Linux kernel allowed remote
attackers to cause a denial of service (slab corruption and panic) or
possibly have unspecified other impact by triggering an INIT collision
that leads to improper handling of shared-key data.
This patch supplies kgraft patches for the first kernel update and the
second kernel update published for SUSE Linux Enterprise Server 12. The
third kernel update contains the patch already.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2015-183=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-3_12_32-33-default-2-3.1
kgraft-patch-3_12_32-33-xen-2-3.1
kgraft-patch-3_12_36-38-default-2-3.1
kgraft-patch-3_12_36-38-xen-2-3.1
References:
https://www.suse.com/security/cve/CVE-2015-1421.html
https://bugzilla.suse.com/920633
https://bugzilla.suse.com/922004
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org