openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:3118-1
Rating: important
References: #1013533 #1013604
Cross-References: CVE-2016-9576 CVE-2016-9794
Affected Products:
openSUSE 13.1
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
The openSUSE 13.1 kernel was updated to fix two security issues.
The following security bugs were fixed:
– CVE-2016-9576: A use-after-free vulnerability in the SCSI generic driver
allows users with write access to /dev/sg* or /dev/bsg* to elevate their
privileges (bsc#1013604).
– CVE-2016-9794: A use-after-free vulnerability in the ALSA pcm layer
allowed local users to cause a denial of service, memory corruption or
possibly even to elevate their privileges (bsc#1013533).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– openSUSE 13.1:
zypper in -t patch openSUSE-2016-1454=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– openSUSE 13.1 (i586 x86_64):
cloop-2.639-11.40.1
cloop-debuginfo-2.639-11.40.1
cloop-debugsource-2.639-11.40.1
cloop-kmp-default-2.639_k3.12.67_64-11.40.1
cloop-kmp-default-debuginfo-2.639_k3.12.67_64-11.40.1
cloop-kmp-desktop-2.639_k3.12.67_64-11.40.1
cloop-kmp-desktop-debuginfo-2.639_k3.12.67_64-11.40.1
cloop-kmp-xen-2.639_k3.12.67_64-11.40.1
cloop-kmp-xen-debuginfo-2.639_k3.12.67_64-11.40.1
crash-7.0.2-2.40.1
crash-debuginfo-7.0.2-2.40.1
crash-debugsource-7.0.2-2.40.1
crash-devel-7.0.2-2.40.1
crash-doc-7.0.2-2.40.1
crash-eppic-7.0.2-2.40.1
crash-eppic-debuginfo-7.0.2-2.40.1
crash-gcore-7.0.2-2.40.1
crash-gcore-debuginfo-7.0.2-2.40.1
crash-kmp-default-7.0.2_k3.12.67_64-2.40.1
crash-kmp-default-debuginfo-7.0.2_k3.12.67_64-2.40.1
crash-kmp-desktop-7.0.2_k3.12.67_64-2.40.1
crash-kmp-desktop-debuginfo-7.0.2_k3.12.67_64-2.40.1
crash-kmp-xen-7.0.2_k3.12.67_64-2.40.1
crash-kmp-xen-debuginfo-7.0.2_k3.12.67_64-2.40.1
hdjmod-debugsource-1.28-16.40.1
hdjmod-kmp-default-1.28_k3.12.67_64-16.40.1
hdjmod-kmp-default-debuginfo-1.28_k3.12.67_64-16.40.1
hdjmod-kmp-desktop-1.28_k3.12.67_64-16.40.1
hdjmod-kmp-desktop-debuginfo-1.28_k3.12.67_64-16.40.1
hdjmod-kmp-xen-1.28_k3.12.67_64-16.40.1
hdjmod-kmp-xen-debuginfo-1.28_k3.12.67_64-16.40.1
ipset-6.21.1-2.44.1
ipset-debuginfo-6.21.1-2.44.1
ipset-debugsource-6.21.1-2.44.1
ipset-devel-6.21.1-2.44.1
ipset-kmp-default-6.21.1_k3.12.67_64-2.44.1
ipset-kmp-default-debuginfo-6.21.1_k3.12.67_64-2.44.1
ipset-kmp-desktop-6.21.1_k3.12.67_64-2.44.1
ipset-kmp-desktop-debuginfo-6.21.1_k3.12.67_64-2.44.1
ipset-kmp-xen-6.21.1_k3.12.67_64-2.44.1
ipset-kmp-xen-debuginfo-6.21.1_k3.12.67_64-2.44.1
iscsitarget-1.4.20.3-13.40.1
iscsitarget-debuginfo-1.4.20.3-13.40.1
iscsitarget-debugsource-1.4.20.3-13.40.1
iscsitarget-kmp-default-1.4.20.3_k3.12.67_64-13.40.1
iscsitarget-kmp-default-debuginfo-1.4.20.3_k3.12.67_64-13.40.1
iscsitarget-kmp-desktop-1.4.20.3_k3.12.67_64-13.40.1
iscsitarget-kmp-desktop-debuginfo-1.4.20.3_k3.12.67_64-13.40.1
iscsitarget-kmp-xen-1.4.20.3_k3.12.67_64-13.40.1
iscsitarget-kmp-xen-debuginfo-1.4.20.3_k3.12.67_64-13.40.1
kernel-default-3.12.67-64.1
kernel-default-base-3.12.67-64.1
kernel-default-base-debuginfo-3.12.67-64.1
kernel-default-debuginfo-3.12.67-64.1
kernel-default-debugsource-3.12.67-64.1
kernel-default-devel-3.12.67-64.1
kernel-syms-3.12.67-64.1
libipset3-6.21.1-2.44.1
libipset3-debuginfo-6.21.1-2.44.1
ndiswrapper-1.58-41.1
ndiswrapper-debuginfo-1.58-41.1
ndiswrapper-debugsource-1.58-41.1
ndiswrapper-kmp-default-1.58_k3.12.67_64-41.1
ndiswrapper-kmp-default-debuginfo-1.58_k3.12.67_64-41.1
ndiswrapper-kmp-desktop-1.58_k3.12.67_64-41.1
ndiswrapper-kmp-desktop-debuginfo-1.58_k3.12.67_64-41.1
openvswitch-1.11.0-0.47.1
openvswitch-controller-1.11.0-0.47.1
openvswitch-controller-debuginfo-1.11.0-0.47.1
openvswitch-debuginfo-1.11.0-0.47.1
openvswitch-debugsource-1.11.0-0.47.1
openvswitch-kmp-default-1.11.0_k3.12.67_64-0.47.1
openvswitch-kmp-default-debuginfo-1.11.0_k3.12.67_64-0.47.1
openvswitch-kmp-desktop-1.11.0_k3.12.67_64-0.47.1
openvswitch-kmp-desktop-debuginfo-1.11.0_k3.12.67_64-0.47.1
openvswitch-kmp-xen-1.11.0_k3.12.67_64-0.47.1
openvswitch-kmp-xen-debuginfo-1.11.0_k3.12.67_64-0.47.1
openvswitch-pki-1.11.0-0.47.1
openvswitch-switch-1.11.0-0.47.1
openvswitch-switch-debuginfo-1.11.0-0.47.1
openvswitch-test-1.11.0-0.47.1
pcfclock-0.44-258.41.1
pcfclock-debuginfo-0.44-258.41.1
pcfclock-debugsource-0.44-258.41.1
pcfclock-kmp-default-0.44_k3.12.67_64-258.41.1
pcfclock-kmp-default-debuginfo-0.44_k3.12.67_64-258.41.1
pcfclock-kmp-desktop-0.44_k3.12.67_64-258.41.1
pcfclock-kmp-desktop-debuginfo-0.44_k3.12.67_64-258.41.1
python-openvswitch-1.11.0-0.47.1
python-openvswitch-test-1.11.0-0.47.1
python-virtualbox-4.2.36-2.72.1
python-virtualbox-debuginfo-4.2.36-2.72.1
vhba-kmp-debugsource-20130607-2.40.1
vhba-kmp-default-20130607_k3.12.67_64-2.40.1
vhba-kmp-default-debuginfo-20130607_k3.12.67_64-2.40.1
vhba-kmp-desktop-20130607_k3.12.67_64-2.40.1
vhba-kmp-desktop-debuginfo-20130607_k3.12.67_64-2.40.1
vhba-kmp-xen-20130607_k3.12.67_64-2.40.1
vhba-kmp-xen-debuginfo-20130607_k3.12.67_64-2.40.1
virtualbox-4.2.36-2.72.1
virtualbox-debuginfo-4.2.36-2.72.1
virtualbox-debugsource-4.2.36-2.72.1
virtualbox-devel-4.2.36-2.72.1
virtualbox-guest-kmp-default-4.2.36_k3.12.67_64-2.72.1
virtualbox-guest-kmp-default-debuginfo-4.2.36_k3.12.67_64-2.72.1
virtualbox-guest-kmp-desktop-4.2.36_k3.12.67_64-2.72.1
virtualbox-guest-kmp-desktop-debuginfo-4.2.36_k3.12.67_64-2.72.1
virtualbox-guest-tools-4.2.36-2.72.1
virtualbox-guest-tools-debuginfo-4.2.36-2.72.1
virtualbox-guest-x11-4.2.36-2.72.1
virtualbox-guest-x11-debuginfo-4.2.36-2.72.1
virtualbox-host-kmp-default-4.2.36_k3.12.67_64-2.72.1
virtualbox-host-kmp-default-debuginfo-4.2.36_k3.12.67_64-2.72.1
virtualbox-host-kmp-desktop-4.2.36_k3.12.67_64-2.72.1
virtualbox-host-kmp-desktop-debuginfo-4.2.36_k3.12.67_64-2.72.1
virtualbox-qt-4.2.36-2.72.1
virtualbox-qt-debuginfo-4.2.36-2.72.1
virtualbox-websrv-4.2.36-2.72.1
virtualbox-websrv-debuginfo-4.2.36-2.72.1
xen-debugsource-4.3.4_10-73.1
xen-devel-4.3.4_10-73.1
xen-kmp-default-4.3.4_10_k3.12.67_64-73.1
xen-kmp-default-debuginfo-4.3.4_10_k3.12.67_64-73.1
xen-kmp-desktop-4.3.4_10_k3.12.67_64-73.1
xen-kmp-desktop-debuginfo-4.3.4_10_k3.12.67_64-73.1
xen-libs-4.3.4_10-73.1
xen-libs-debuginfo-4.3.4_10-73.1
xen-tools-domU-4.3.4_10-73.1
xen-tools-domU-debuginfo-4.3.4_10-73.1
xtables-addons-2.3-2.39.1
xtables-addons-debuginfo-2.3-2.39.1
xtables-addons-debugsource-2.3-2.39.1
xtables-addons-kmp-default-2.3_k3.12.67_64-2.39.1
xtables-addons-kmp-default-debuginfo-2.3_k3.12.67_64-2.39.1
xtables-addons-kmp-desktop-2.3_k3.12.67_64-2.39.1
xtables-addons-kmp-desktop-debuginfo-2.3_k3.12.67_64-2.39.1
xtables-addons-kmp-xen-2.3_k3.12.67_64-2.39.1
xtables-addons-kmp-xen-debuginfo-2.3_k3.12.67_64-2.39.1
– openSUSE 13.1 (i686 x86_64):
kernel-debug-3.12.67-64.1
kernel-debug-base-3.12.67-64.1
kernel-debug-base-debuginfo-3.12.67-64.1
kernel-debug-debuginfo-3.12.67-64.1
kernel-debug-debugsource-3.12.67-64.1
kernel-debug-devel-3.12.67-64.1
kernel-debug-devel-debuginfo-3.12.67-64.1
kernel-desktop-3.12.67-64.1
kernel-desktop-base-3.12.67-64.1
kernel-desktop-base-debuginfo-3.12.67-64.1
kernel-desktop-debuginfo-3.12.67-64.1
kernel-desktop-debugsource-3.12.67-64.1
kernel-desktop-devel-3.12.67-64.1
kernel-ec2-3.12.67-64.1
kernel-ec2-base-3.12.67-64.1
kernel-ec2-base-debuginfo-3.12.67-64.1
kernel-ec2-debuginfo-3.12.67-64.1
kernel-ec2-debugsource-3.12.67-64.1
kernel-ec2-devel-3.12.67-64.1
kernel-trace-3.12.67-64.1
kernel-trace-base-3.12.67-64.1
kernel-trace-base-debuginfo-3.12.67-64.1
kernel-trace-debuginfo-3.12.67-64.1
kernel-trace-debugsource-3.12.67-64.1
kernel-trace-devel-3.12.67-64.1
kernel-vanilla-3.12.67-64.1
kernel-vanilla-debuginfo-3.12.67-64.1
kernel-vanilla-debugsource-3.12.67-64.1
kernel-vanilla-devel-3.12.67-64.1
kernel-xen-3.12.67-64.1
kernel-xen-base-3.12.67-64.1
kernel-xen-base-debuginfo-3.12.67-64.1
kernel-xen-debuginfo-3.12.67-64.1
kernel-xen-debugsource-3.12.67-64.1
kernel-xen-devel-3.12.67-64.1
– openSUSE 13.1 (x86_64):
xen-4.3.4_10-73.1
xen-doc-html-4.3.4_10-73.1
xen-libs-32bit-4.3.4_10-73.1
xen-libs-debuginfo-32bit-4.3.4_10-73.1
xen-tools-4.3.4_10-73.1
xen-tools-debuginfo-4.3.4_10-73.1
xen-xend-tools-4.3.4_10-73.1
xen-xend-tools-debuginfo-4.3.4_10-73.1
– openSUSE 13.1 (noarch):
kernel-devel-3.12.67-64.1
kernel-docs-3.12.67-64.2
kernel-macros-3.12.67-64.1
kernel-source-3.12.67-64.1
kernel-source-vanilla-3.12.67-64.1
virtualbox-host-source-4.2.36-2.72.1
– openSUSE 13.1 (i686):
kernel-pae-3.12.67-64.1
kernel-pae-base-3.12.67-64.1
kernel-pae-base-debuginfo-3.12.67-64.1
kernel-pae-debuginfo-3.12.67-64.1
kernel-pae-debugsource-3.12.67-64.1
kernel-pae-devel-3.12.67-64.1
– openSUSE 13.1 (i586):
cloop-kmp-pae-2.639_k3.12.67_64-11.40.1
cloop-kmp-pae-debuginfo-2.639_k3.12.67_64-11.40.1
crash-kmp-pae-7.0.2_k3.12.67_64-2.40.1
crash-kmp-pae-debuginfo-7.0.2_k3.12.67_64-2.40.1
hdjmod-kmp-pae-1.28_k3.12.67_64-16.40.1
hdjmod-kmp-pae-debuginfo-1.28_k3.12.67_64-16.40.1
ipset-kmp-pae-6.21.1_k3.12.67_64-2.44.1
ipset-kmp-pae-debuginfo-6.21.1_k3.12.67_64-2.44.1
iscsitarget-kmp-pae-1.4.20.3_k3.12.67_64-13.40.1
iscsitarget-kmp-pae-debuginfo-1.4.20.3_k3.12.67_64-13.40.1
ndiswrapper-kmp-pae-1.58_k3.12.67_64-41.1
ndiswrapper-kmp-pae-debuginfo-1.58_k3.12.67_64-41.1
openvswitch-kmp-pae-1.11.0_k3.12.67_64-0.47.1
openvswitch-kmp-pae-debuginfo-1.11.0_k3.12.67_64-0.47.1
pcfclock-kmp-pae-0.44_k3.12.67_64-258.41.1
pcfclock-kmp-pae-debuginfo-0.44_k3.12.67_64-258.41.1
vhba-kmp-pae-20130607_k3.12.67_64-2.40.1
vhba-kmp-pae-debuginfo-20130607_k3.12.67_64-2.40.1
virtualbox-guest-kmp-pae-4.2.36_k3.12.67_64-2.72.1
virtualbox-guest-kmp-pae-debuginfo-4.2.36_k3.12.67_64-2.72.1
virtualbox-host-kmp-pae-4.2.36_k3.12.67_64-2.72.1
virtualbox-host-kmp-pae-debuginfo-4.2.36_k3.12.67_64-2.72.1
xen-kmp-pae-4.3.4_10_k3.12.67_64-73.1
xen-kmp-pae-debuginfo-4.3.4_10_k3.12.67_64-73.1
xtables-addons-kmp-pae-2.3_k3.12.67_64-2.39.1
xtables-addons-kmp-pae-debuginfo-2.3_k3.12.67_64-2.39.1
References:
https://www.suse.com/security/cve/CVE-2016-9576.html
https://www.suse.com/security/cve/CVE-2016-9794.html
https://bugzilla.suse.com/1013533
https://bugzilla.suse.com/1013604
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:3146-1
Rating: important
References: #1013533 #1013604
Cross-References: CVE-2016-9576 CVE-2016-9794
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Live Patching 12
SUSE Linux Enterprise High Availability 12-SP2
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
The SUSE Linux Enterprise 12 SP 2 kernel was updated to fix two security
issues.
The following security bugs were fixed:
– CVE-2016-9576: A use-after-free vulnerability in the SCSI generic driver
allows users with write access to /dev/sg* or /dev/bsg* to elevate their
privileges (bsc#1013604).
– CVE-2016-9794: A use-after-free vulnerability in the ALSA pcm layer
allowed local users to cause a denial of service, memory corruption or
possibly even to elevate their privileges (bsc#1013533).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Workstation Extension 12-SP2:
zypper in -t patch SUSE-SLE-WE-12-SP2-2016-1815=1
– SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2016-1815=1
– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2016-1815=1
– SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1815=1
– SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1815=1
– SUSE Linux Enterprise High Availability 12-SP2:
zypper in -t patch SUSE-SLE-HA-12-SP2-2016-1815=1
– SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2016-1815=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64):
kernel-default-debuginfo-4.4.21-90.1
kernel-default-debugsource-4.4.21-90.1
kernel-default-extra-4.4.21-90.1
kernel-default-extra-debuginfo-4.4.21-90.1
– SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
kernel-obs-build-4.4.21-90.1
kernel-obs-build-debugsource-4.4.21-90.1
– SUSE Linux Enterprise Software Development Kit 12-SP2 (noarch):
kernel-docs-4.4.21-90.3
– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
kernel-default-4.4.21-90.1
kernel-default-base-4.4.21-90.1
kernel-default-base-debuginfo-4.4.21-90.1
kernel-default-debuginfo-4.4.21-90.1
kernel-default-debugsource-4.4.21-90.1
kernel-default-devel-4.4.21-90.1
kernel-syms-4.4.21-90.1
– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch):
kernel-devel-4.4.21-90.1
kernel-macros-4.4.21-90.1
kernel-source-4.4.21-90.1
– SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
kernel-default-4.4.21-90.1
kernel-default-base-4.4.21-90.1
kernel-default-base-debuginfo-4.4.21-90.1
kernel-default-debuginfo-4.4.21-90.1
kernel-default-debugsource-4.4.21-90.1
kernel-default-devel-4.4.21-90.1
kernel-syms-4.4.21-90.1
– SUSE Linux Enterprise Server 12-SP2 (noarch):
kernel-devel-4.4.21-90.1
kernel-macros-4.4.21-90.1
kernel-source-4.4.21-90.1
– SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-4_4_21-90-default-1-2.3
– SUSE Linux Enterprise High Availability 12-SP2 (ppc64le s390x x86_64):
cluster-md-kmp-default-4.4.21-90.1
cluster-md-kmp-default-debuginfo-4.4.21-90.1
cluster-network-kmp-default-4.4.21-90.1
cluster-network-kmp-default-debuginfo-4.4.21-90.1
dlm-kmp-default-4.4.21-90.1
dlm-kmp-default-debuginfo-4.4.21-90.1
gfs2-kmp-default-4.4.21-90.1
gfs2-kmp-default-debuginfo-4.4.21-90.1
kernel-default-debuginfo-4.4.21-90.1
kernel-default-debugsource-4.4.21-90.1
ocfs2-kmp-default-4.4.21-90.1
ocfs2-kmp-default-debuginfo-4.4.21-90.1
– SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
kernel-default-4.4.21-90.1
kernel-default-debuginfo-4.4.21-90.1
kernel-default-debugsource-4.4.21-90.1
kernel-default-devel-4.4.21-90.1
kernel-default-extra-4.4.21-90.1
kernel-default-extra-debuginfo-4.4.21-90.1
kernel-syms-4.4.21-90.1
– SUSE Linux Enterprise Desktop 12-SP2 (noarch):
kernel-devel-4.4.21-90.1
kernel-macros-4.4.21-90.1
kernel-source-4.4.21-90.1
References:
https://www.suse.com/security/cve/CVE-2016-9576.html
https://www.suse.com/security/cve/CVE-2016-9794.html
https://bugzilla.suse.com/1013533
https://bugzilla.suse.com/1013604
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org