SUSE Security Update: Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3292-1
Rating: important
References: #1053153 #1055567 #1062847 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________
An update that solves two vulnerabilities and has two fixes
is now available.
Description:
This update for the Linux Kernel 4.4.21-84 fixes several issues.
The following security issues were fixed:
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).
This non-security issue was fixed:
– bsc#1062847: Enable proper shut down if NIC teaming is enabled
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2049=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-4_4_21-84-default-11-2.1
References:
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3306-1
Rating: important
References: #1053153 #1055567 #1062847 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________
An update that solves two vulnerabilities and has two fixes
is now available.
Description:
This update for the Linux Kernel 4.4.21-90 fixes several issues.
The following security issues were fixed:
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).
This non-security issue was fixed:
– bsc#1062847: Enable proper shut down if NIC teaming is enabled
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2048=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-4_4_21-90-default-11-2.1
References:
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3288-1
Rating: important
References: #1053153 #1055567 #1062847 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________
An update that solves two vulnerabilities and has two fixes
is now available.
Description:
This update for the Linux Kernel 4.4.38-93 fixes several issues.
The following security issues were fixed:
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).
This non-security issue was fixed:
– bsc#1062847: Enable proper shut down if NIC teaming is enabled
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2050=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-4_4_38-93-default-11-2.1
References:
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3290-1
Rating: important
References: #1053153 #1055567 #1062847 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________
An update that solves two vulnerabilities and has two fixes
is now available.
Description:
This update for the Linux Kernel 4.4.49-92_11 fixes several issues.
The following security issues were fixed:
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).
This non-security issue was fixed:
– bsc#1062847: Enable proper shut down if NIC teaming is enabled
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2057=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-4_4_49-92_11-default-9-2.1
References:
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3291-1
Rating: important
References: #1053153 #1055567 #1062847 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________
An update that solves two vulnerabilities and has two fixes
is now available.
Description:
This update for the Linux Kernel 4.4.49-92_14 fixes several issues.
The following security issues were fixed:
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).
This non-security issue was fixed:
– bsc#1062847: Enable proper shut down if NIC teaming is enabled
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2052=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-4_4_49-92_14-default-8-2.1
References:
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3310-1
Rating: important
References: #1053153 #1055567 #1062847 #1069708 #1070307
Cross-References: CVE-2017-1000405 CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________
An update that solves three vulnerabilities and has two
fixes is now available.
Description:
This update for the Linux Kernel 4.4.59-92_17 fixes several issues.
The following security issues were fixed:
– CVE-2017-1000405: Problematic use of pmd_mkdirty() in the touch_pmd()
function allowed users to overwrite read-only huge pages (e.g. the zero
huge page and sealed shmem files) (bsc#1070307).
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).
This non-security issue was fixed:
– bsc#1062847: Enable proper shut down if NIC teaming is enabled
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2051=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-4_4_59-92_17-default-7-2.1
References:
https://www.suse.com/security/cve/CVE-2017-1000405.html
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708
https://bugzilla.suse.com/1070307
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3286-1
Rating: important
References: #1053153 #1055567 #1062847 #1069708 #1070307
Cross-References: CVE-2017-1000405 CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________
An update that solves three vulnerabilities and has two
fixes is now available.
Description:
This update for the Linux Kernel 4.4.59-92_20 fixes several issues.
The following security issues were fixed:
– CVE-2017-1000405: Problematic use of pmd_mkdirty() in the touch_pmd()
function allowed users to overwrite read-only huge pages (e.g. the zero
huge page and sealed shmem files) (bsc#1070307).
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).
This non-security issue was fixed:
– bsc#1062847: Enable proper shut down if NIC teaming is enabled
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2047=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-4_4_59-92_20-default-7-2.1
References:
https://www.suse.com/security/cve/CVE-2017-1000405.html
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708
https://bugzilla.suse.com/1070307
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3296-1
Rating: important
References: #1053153 #1055567 #1062847 #1069708 #1070307
Cross-References: CVE-2017-1000405 CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________
An update that solves three vulnerabilities and has two
fixes is now available.
Description:
This update for the Linux Kernel 4.4.59-92_24 fixes several issues.
The following security issues were fixed:
– CVE-2017-1000405: Problematic use of pmd_mkdirty() in the touch_pmd()
function allowed users to overwrite read-only huge pages (e.g. the zero
huge page and sealed shmem files) (bsc#1070307).
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).
This non-security issue was fixed:
– bsc#1062847: Enable proper shut down if NIC teaming is enabled
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2046=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-4_4_59-92_24-default-6-2.1
References:
https://www.suse.com/security/cve/CVE-2017-1000405.html
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708
https://bugzilla.suse.com/1070307
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3300-1
Rating: important
References: #1055567 #1062847 #1069708 #1070307
Cross-References: CVE-2017-1000405 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________
An update that solves two vulnerabilities and has two fixes
is now available.
Description:
This update for the Linux Kernel 4.4.74-92_29 fixes several issues.
The following security issues were fixed:
– CVE-2017-1000405: Problematic use of pmd_mkdirty() in the touch_pmd()
function allowed users to overwrite read-only huge pages (e.g. the zero
huge page and sealed shmem files) (bsc#1070307).
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
This non-security issue was fixed:
– bsc#1062847: Enable proper shut down if NIC teaming is enabled
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2069=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-4_4_74-92_29-default-6-2.1
References:
https://www.suse.com/security/cve/CVE-2017-1000405.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708
https://bugzilla.suse.com/1070307
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3284-1
Rating: important
References: #1055567 #1062847 #1069708 #1070307
Cross-References: CVE-2017-1000405 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________
An update that solves two vulnerabilities and has two fixes
is now available.
Description:
This update for the Linux Kernel 4.4.74-92_32 fixes several issues.
The following security issues were fixed:
– CVE-2017-1000405: Problematic use of pmd_mkdirty() in the touch_pmd()
function allowed users to overwrite read-only huge pages (e.g. the zero
huge page and sealed shmem files) (bsc#1070307).
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
This non-security issue was fixed:
– bsc#1062847: Enable proper shut down if NIC teaming is enabled
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2055=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-4_4_74-92_32-default-5-2.1
References:
https://www.suse.com/security/cve/CVE-2017-1000405.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708
https://bugzilla.suse.com/1070307
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3295-1
Rating: important
References: #1055567 #1062847 #1069708 #1070307
Cross-References: CVE-2017-1000405 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________
An update that solves two vulnerabilities and has two fixes
is now available.
Description:
This update for the Linux Kernel 4.4.74-92_35 fixes several issues.
The following security issues were fixed:
- CVE-2017-1000405: Problematic use of pmd_mkdirty() in the touch_pmd()
function allowed users to overwrite read-only huge pages (e.g. the zero
huge page and sealed shmem files) (bsc#1070307).
- CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
This non-security issue was fixed:
- bsc#1062847: Enable proper shut down if NIC teaming is enabled
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2053=1
To bring your system up-to-date, use “zypper patch”.
Package List:
- SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-4_4_74-92_35-default-5-2.1
References:
https://www.suse.com/security/cve/CVE-2017-1000405.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708
https://bugzilla.suse.com/1070307
–
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3297-1
Rating: important
References: #1055567 #1062847 #1069708 #1070307
Cross-References: CVE-2017-1000405 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________
An update that solves two vulnerabilities and has two fixes
is now available.
Description:
This update for the Linux Kernel 4.4.74-92_38 fixes several issues.
The following security issues were fixed:
– CVE-2017-1000405: Problematic use of pmd_mkdirty() in the touch_pmd()
function allowed users to overwrite read-only huge pages (e.g. the zero
huge page and sealed shmem files) (bsc#1070307).
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
This non-security issue was fixed:
– bsc#1062847: Enable proper shut down if NIC teaming is enabled
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2054=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-4_4_74-92_38-default-4-2.1
References:
https://www.suse.com/security/cve/CVE-2017-1000405.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708
https://bugzilla.suse.com/1070307
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3285-1
Rating: important
References: #1055567 #1062847 #1069708 #1070307
Cross-References: CVE-2017-1000405 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________
An update that solves two vulnerabilities and has two fixes
is now available.
Description:
This update for the Linux Kernel 4.4.90-92_45 fixes several issues.
The following security issues were fixed:
– CVE-2017-1000405: Problematic use of pmd_mkdirty() in the touch_pmd()
function allowed users to overwrite read-only huge pages (e.g. the zero
huge page and sealed shmem files) (bsc#1070307).
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
This non-security issue was fixed:
– bsc#1062847: Enable proper shut down if NIC teaming is enabled
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2056=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-4_4_90-92_45-default-2-2.1
References:
https://www.suse.com/security/cve/CVE-2017-1000405.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708
https://bugzilla.suse.com/1070307
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 17 for SLE 12)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3289-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.60-52_60 fixes several issues.
The following security issues were fixed:
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-2060=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Server 12-LTSS (x86_64):
kgraft-patch-3_12_60-52_60-default-11-2.1
kgraft-patch-3_12_60-52_60-xen-11-2.1
References:
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 18 for SLE 12)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3304-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.60-52_63 fixes several issues.
The following security issues were fixed:
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-2058=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Server 12-LTSS (x86_64):
kgraft-patch-3_12_60-52_63-default-11-2.1
kgraft-patch-3_12_60-52_63-xen-11-2.1
References:
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 19 for SLE 12)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3308-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.61-52_66 fixes several issues.
The following security issues were fixed:
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-2059=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Server 12-LTSS (x86_64):
kgraft-patch-3_12_61-52_66-default-10-2.1
kgraft-patch-3_12_61-52_66-xen-10-2.1
References:
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 20 for SLE 12)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3287-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.61-52_69 fixes several issues.
The following security issues were fixed:
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-2063=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Server 12-LTSS (x86_64):
kgraft-patch-3_12_61-52_69-default-8-2.1
kgraft-patch-3_12_61-52_69-xen-8-2.1
References:
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 21 for SLE 12)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3302-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.61-52_72 fixes several issues.
The following security issues were fixed:
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-2062=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Server 12-LTSS (x86_64):
kgraft-patch-3_12_61-52_72-default-7-2.1
kgraft-patch-3_12_61-52_72-xen-7-2.1
References:
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 22 for SLE 12)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3299-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.61-52_77 fixes several issues.
The following security issues were fixed:
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-2065=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Server 12-LTSS (x86_64):
kgraft-patch-3_12_61-52_77-default-7-2.1
kgraft-patch-3_12_61-52_77-xen-7-2.1
References:
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 23 for SLE 12)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3309-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.61-52_80 fixes several issues.
The following security issues were fixed:
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-2064=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Server 12-LTSS (x86_64):
kgraft-patch-3_12_61-52_80-default-6-2.1
kgraft-patch-3_12_61-52_80-xen-6-2.1
References:
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 24 for SLE 12)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3293-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.61-52_83 fixes several issues.
The following security issues were fixed:
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-2067=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Server 12-LTSS (x86_64):
kgraft-patch-3_12_61-52_83-default-5-2.1
kgraft-patch-3_12_61-52_83-xen-5-2.1
References:
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 25 for SLE 12)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3301-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.61-52_86 fixes several issues.
The following security issues were fixed:
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-2066=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Server 12-LTSS (x86_64):
kgraft-patch-3_12_61-52_86-default-5-2.1
kgraft-patch-3_12_61-52_86-xen-5-2.1
References:
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 26 for SLE 12)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3303-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.61-52_89 fixes several issues.
The following security issues were fixed:
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-2070=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Server 12-LTSS (x86_64):
kgraft-patch-3_12_61-52_89-default-5-2.1
kgraft-patch-3_12_61-52_89-xen-5-2.1
References:
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 27 for SLE 12)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3305-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.61-52_92 fixes several issues.
The following security issues were fixed:
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-2068=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Server 12-LTSS (x86_64):
kgraft-patch-3_12_61-52_92-default-4-2.1
kgraft-patch-3_12_61-52_92-xen-4-2.1
References:
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 28 for SLE 12)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3307-1
Rating: important
References: #1064388 #1064392 #1069708
Cross-References: CVE-2017-15649 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
This update for the Linux Kernel 3.12.61-52_101 fixes several issues.
The following security issues were fixed:
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-15649: net/packet/af_packet.c allowed local users to gain
privileges via crafted system calls that trigger mishandling of
packet_fanout data structures, because of a race condition (involving
fanout_add and packet_do_bind) that leads to a use-after-free
(bsc#1064392).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-2061=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Server 12-LTSS (x86_64):
kgraft-patch-3_12_61-52_101-default-2-2.1
kgraft-patch-3_12_61-52_101-xen-2-2.1
References:
https://www.suse.com/security/cve/CVE-2017-15649.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1064388
https://bugzilla.suse.com/1064392
https://bugzilla.suse.com/1069708
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org