SUSE Security Update: Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP3)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1024-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for the Linux Kernel 4.4.82-6_3 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Live Patching 12-SP3:
zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-684=1
Package List:
– SUSE Linux Enterprise Live Patching 12-SP3 (x86_64):
kgraft-patch-4_4_82-6_3-default-7-2.1
kgraft-patch-4_4_82-6_3-default-debuginfo-7-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP3)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1020-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for the Linux Kernel 4.4.82-6_9 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Live Patching 12-SP3:
zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-683=1
Package List:
– SUSE Linux Enterprise Live Patching 12-SP3 (x86_64):
kgraft-patch-4_4_82-6_9-default-6-2.1
kgraft-patch-4_4_82-6_9-default-debuginfo-6-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP3)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1013-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for the Linux Kernel 4.4.90-6_12 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Live Patching 12-SP3:
zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-681=1
Package List:
– SUSE Linux Enterprise Live Patching 12-SP3 (x86_64):
kgraft-patch-4_4_92-6_18-default-5-2.1
kgraft-patch-4_4_92-6_18-default-debuginfo-5-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP3)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1028-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for the Linux Kernel 4.4.92-6_30 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Live Patching 12-SP3:
zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-680=1
Package List:
– SUSE Linux Enterprise Live Patching 12-SP3 (ppc64le x86_64):
kgraft-patch-4_4_92-6_30-default-4-2.1
kgraft-patch-4_4_92-6_30-default-debuginfo-4-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP3)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1028-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for the Linux Kernel 4.4.92-6_30 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Live Patching 12-SP3:
zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-680=1
Package List:
– SUSE Linux Enterprise Live Patching 12-SP3 (ppc64le x86_64):
kgraft-patch-4_4_92-6_30-default-4-2.1
kgraft-patch-4_4_92-6_30-default-debuginfo-4-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP3)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1027-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for the Linux Kernel 4.4.103-6_33 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Live Patching 12-SP3:
zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-678=1
Package List:
– SUSE Linux Enterprise Live Patching 12-SP3 (ppc64le x86_64):
kgraft-patch-4_4_103-6_33-default-4-2.1
kgraft-patch-4_4_103-6_33-default-debuginfo-4-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP3)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1022-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for the Linux Kernel 4.4.103-6_38 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Live Patching 12-SP3:
zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-679=1
Package List:
– SUSE Linux Enterprise Live Patching 12-SP3 (ppc64le x86_64):
kgraft-patch-4_4_103-6_38-default-4-2.1
kgraft-patch-4_4_103-6_38-default-debuginfo-4-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1012-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP2
SUSE Linux Enterprise Server 12-SP2-LTSS
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for the Linux Kernel 4.4.59-92_17 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server for SAP 12-SP2:
zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-666=1
– SUSE Linux Enterprise Server 12-SP2-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-666=1
Package List:
– SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):
kgraft-patch-4_4_59-92_17-default-10-2.2
– SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):
kgraft-patch-4_4_59-92_17-default-10-2.2
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1012-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP2
SUSE Linux Enterprise Server 12-SP2-LTSS
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for the Linux Kernel 4.4.59-92_17 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server for SAP 12-SP2:
zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-666=1
– SUSE Linux Enterprise Server 12-SP2-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-666=1
Package List:
– SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):
kgraft-patch-4_4_59-92_17-default-10-2.2
– SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):
kgraft-patch-4_4_59-92_17-default-10-2.2
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1019-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP2
SUSE Linux Enterprise Server 12-SP2-LTSS
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for the Linux Kernel 4.4.59-92_20 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server for SAP 12-SP2:
zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-711=1
– SUSE Linux Enterprise Server 12-SP2-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-711=1
Package List:
– SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):
kgraft-patch-4_4_59-92_20-default-10-2.2
– SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):
kgraft-patch-4_4_59-92_20-default-10-2.2
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1021-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP2
SUSE Linux Enterprise Server 12-SP2-LTSS
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for the Linux Kernel 4.4.59-92_24 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server for SAP 12-SP2:
zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-665=1
– SUSE Linux Enterprise Server 12-SP2-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-665=1
Package List:
– SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):
kgraft-patch-4_4_59-92_24-default-9-2.2
– SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):
kgraft-patch-4_4_59-92_24-default-9-2.2
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1033-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP2
SUSE Linux Enterprise Server 12-SP2-LTSS
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for the Linux Kernel 4.4.74-92_29 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server for SAP 12-SP2:
zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-669=1
– SUSE Linux Enterprise Server 12-SP2-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-669=1
Package List:
– SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):
kgraft-patch-4_4_74-92_29-default-9-2.2
– SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):
kgraft-patch-4_4_74-92_29-default-9-2.2
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1023-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP2
SUSE Linux Enterprise Server 12-SP2-LTSS
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for the Linux Kernel 4.4.74-92_32 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server for SAP 12-SP2:
zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-670=1
– SUSE Linux Enterprise Server 12-SP2-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-670=1
Package List:
– SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):
kgraft-patch-4_4_74-92_32-default-8-2.2
– SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):
kgraft-patch-4_4_74-92_32-default-8-2.2
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP1)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1025-1
Rating: important
References: #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.74-60_64_40 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-1000004: A race condition vulnerability existed in the sound
system, which could lead to a deadlock and denial of service condition
(bsc#1076017)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server for SAP 12-SP1:
zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-687=1
– SUSE Linux Enterprise Server 12-SP1-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-687=1
Package List:
– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):
kgraft-patch-3_12_74-60_64_40-default-9-2.1
kgraft-patch-3_12_74-60_64_40-xen-9-2.1
– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):
kgraft-patch-3_12_74-60_64_40-default-9-2.1
kgraft-patch-3_12_74-60_64_40-xen-9-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP1)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1015-1
Rating: important
References: #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.74-60_64_48 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-1000004: A race condition vulnerability existed in the sound
system, which could lead to a deadlock and denial of service condition
(bsc#1076017)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server for SAP 12-SP1:
zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-688=1
– SUSE Linux Enterprise Server 12-SP1-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-688=1
Package List:
– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):
kgraft-patch-3_12_74-60_64_48-default-8-2.1
kgraft-patch-3_12_74-60_64_48-xen-8-2.1
– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):
kgraft-patch-3_12_74-60_64_48-default-8-2.1
kgraft-patch-3_12_74-60_64_48-xen-8-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1031-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP2
SUSE Linux Enterprise Server 12-SP2-LTSS
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for the Linux Kernel 4.4.103-92_56 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server for SAP 12-SP2:
zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-671=1
– SUSE Linux Enterprise Server 12-SP2-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-671=1
Package List:
– SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):
kgraft-patch-4_4_103-92_56-default-4-2.2
– SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):
kgraft-patch-4_4_103-92_56-default-4-2.2
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP1)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:0992-1
Rating: important
References: #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.74-60_64_51 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-1000004: A race condition vulnerability existed in the sound
system, which could lead to a deadlock and denial of service condition
(bsc#1076017)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server for SAP 12-SP1:
zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-686=1
– SUSE Linux Enterprise Server 12-SP1-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-686=1
Package List:
– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):
kgraft-patch-3_12_74-60_64_51-default-7-2.1
kgraft-patch-3_12_74-60_64_51-xen-7-2.1
– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):
kgraft-patch-3_12_74-60_64_51-default-7-2.1
kgraft-patch-3_12_74-60_64_51-xen-7-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP1)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1032-1
Rating: important
References: #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.74-60_64_54 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-1000004: A race condition vulnerability existed in the sound
system, which could lead to a deadlock and denial of service condition
(bsc#1076017)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server for SAP 12-SP1:
zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-685=1
– SUSE Linux Enterprise Server 12-SP1-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-685=1
Package List:
– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):
kgraft-patch-3_12_74-60_64_54-default-7-2.1
kgraft-patch-3_12_74-60_64_54-xen-7-2.1
– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):
kgraft-patch-3_12_74-60_64_54-default-7-2.1
kgraft-patch-3_12_74-60_64_54-xen-7-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP1)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1014-1
Rating: important
References: #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.74-60_64_60 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-1000004: A race condition vulnerability existed in the sound
system, which could lead to a deadlock and denial of service condition
(bsc#1076017)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server for SAP 12-SP1:
zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-691=1
– SUSE Linux Enterprise Server 12-SP1-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-691=1
Package List:
– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):
kgraft-patch-3_12_74-60_64_60-default-6-2.1
kgraft-patch-3_12_74-60_64_60-xen-6-2.1
– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):
kgraft-patch-3_12_74-60_64_60-default-6-2.1
kgraft-patch-3_12_74-60_64_60-xen-6-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1034-1
Rating: important
References: #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.74-60_64_63 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-1000004: A race condition vulnerability existed in the sound
system, which could lead to a deadlock and denial of service condition
(bsc#1076017)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server for SAP 12-SP1:
zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-692=1
– SUSE Linux Enterprise Server 12-SP1-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-692=1
Package List:
– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):
kgraft-patch-3_12_74-60_64_63-default-4-2.1
kgraft-patch-3_12_74-60_64_63-xen-4-2.1
– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):
kgraft-patch-3_12_74-60_64_63-default-4-2.1
kgraft-patch-3_12_74-60_64_63-xen-4-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP1)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1018-1
Rating: important
References: #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.74-60_64_66 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-1000004: A race condition vulnerability existed in the sound
system, which could lead to a deadlock and denial of service condition
(bsc#1076017)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server for SAP 12-SP1:
zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-693=1
– SUSE Linux Enterprise Server 12-SP1-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-693=1
Package List:
– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):
kgraft-patch-3_12_74-60_64_66-default-3-2.1
kgraft-patch-3_12_74-60_64_66-xen-3-2.1
– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):
kgraft-patch-3_12_74-60_64_66-default-3-2.1
kgraft-patch-3_12_74-60_64_66-xen-3-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP1)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1026-1
Rating: important
References: #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1068 CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.74-60_64_82 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-7566: The Linux kernel had a buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server for SAP 12-SP1:
zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-695=1
– SUSE Linux Enterprise Server 12-SP1-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-695=1
Package List:
– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):
kgraft-patch-3_12_74-60_64_82-default-2-2.1
kgraft-patch-3_12_74-60_64_82-xen-2-2.1
– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):
kgraft-patch-3_12_74-60_64_82-default-2-2.1
kgraft-patch-3_12_74-60_64_82-xen-2-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP1)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1026-1
Rating: important
References: #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1068 CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.74-60_64_82 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-7566: The Linux kernel had a buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server for SAP 12-SP1:
zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-695=1
– SUSE Linux Enterprise Server 12-SP1-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-695=1
Package List:
– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):
kgraft-patch-3_12_74-60_64_82-default-2-2.1
kgraft-patch-3_12_74-60_64_82-xen-2-2.1
– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):
kgraft-patch-3_12_74-60_64_82-default-2-2.1
kgraft-patch-3_12_74-60_64_82-xen-2-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 27 for SLE 12)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1001-1
Rating: important
References: #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.61-52_92 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-1000004: A race condition vulnerability existed in the sound
system, which could lead to a deadlock and denial of service condition
(bsc#1076017)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2018-705=1
Package List:
– SUSE Linux Enterprise Server 12-LTSS (x86_64):
kgraft-patch-3_12_61-52_92-default-6-2.1
kgraft-patch-3_12_61-52_92-xen-6-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 29 for SLE 12)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1029-1
Rating: important
References: #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.61-52_106 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-1000004: A race condition vulnerability existed in the sound
system, which could lead to a deadlock and denial of service condition
(bsc#1076017)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2018-697=1
Package List:
– SUSE Linux Enterprise Server 12-LTSS (x86_64):
kgraft-patch-3_12_61-52_106-default-4-2.1
kgraft-patch-3_12_61-52_106-xen-4-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 31 for SLE 12)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1016-1
Rating: important
References: #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1068 CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.61-52_119 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-7566: The Linux kernel had a buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2018-710=1
Package List:
– SUSE Linux Enterprise Server 12-LTSS (x86_64):
kgraft-patch-3_12_61-52_119-default-3-2.1
kgraft-patch-3_12_61-52_119-xen-3-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 32 for SLE 12)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1030-1
Rating: important
References: #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1068 CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.61-52_122 fixes several issues.
The following security issues were fixed:
– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-7566: The Linux kernel had a buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2018-707=1
Package List:
– SUSE Linux Enterprise Server 12-LTSS (x86_64):
kgraft-patch-3_12_61-52_122-default-3-2.1
kgraft-patch-3_12_61-52_122-xen-3-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 33 for SLE 12)
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:1035-1
Rating: important
References: #1083488
Cross-References: CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for the Linux Kernel 3.12.61-52_125 fixes one issue.
The following security issue was fixed:
– CVE-2018-7566: The Linux kernel had a buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2018-708=1
Package List:
– SUSE Linux Enterprise Server 12-LTSS (x86_64):
kgraft-patch-3_12_61-52_125-default-2-2.1
kgraft-patch-3_12_61-52_125-xen-2-2.1
References:
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1083488
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org