You are here
Home > Preporuke > Ranjivosti jezgre operacijskog sustava

Ranjivosti jezgre operacijskog sustava

openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID: openSUSE-SU-2016:1382-1
Rating: important
References: #957988 #970892 #970911 #970948 #970955 #970956
#970958 #970970 #971124 #971360 #971628 #972174
#973378 #974418 #975868
Cross-References: CVE-2016-2185 CVE-2016-2186 CVE-2016-2188
CVE-2016-2847 CVE-2016-3136 CVE-2016-3137
CVE-2016-3138 CVE-2016-3140 CVE-2016-3156
CVE-2016-3689 CVE-2016-3951
Affected Products:
openSUSE Leap 42.1
______________________________________________________________________________

An update that solves 11 vulnerabilities and has four fixes
is now available.

Description:

The openSUSE Leap 42.1 kernel was updated to receive various security and
bugfixes.

The following security bugs were fixed:
– CVE-2016-2847: Limit the per-user amount of pages allocated in pipes
(bsc#970948).
– CVE-2016-3136: mct_u232: add sanity checking in probe (bnc#970955).
– CVE-2016-2188: iowarrior: fix oops with malicious USB descriptors
(bnc#970956).
– CVE-2016-3138: cdc-acm: more sanity checking (bnc#970911).
– CVE-2016-3137: cypress_m8: add endpoint sanity check (bnc#970970).
– CVE-2016-3951: cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind
(bnc#974418).
– CVE-2016-3140: digi_acceleport: do sanity checking for the number of
ports (bnc#970892).
– CVE-2016-2186: powermate: fix oops with malicious USB descriptors
(bnc#970958).
– CVE-2016-2185: usb_driver_claim_interface: add sanity checking
(bnc#971124).
– CVE-2016-3689: ims-pcu: sanity check against missing interfaces
(bnc#971628).
– CVE-2016-3156: ipv4: Do not do expensive useless work during inetdev
destroy (bsc#971360).

The following non-security bugs were fixed:
– ALSA: timer: Call notifier in the same spinlock (bsc#973378).
– ALSA: timer: Protect the whole snd_timer_close() with open race
(bsc#973378).
– ALSA: timer: Sync timer deletion at closing the system timer
(bsc#973378).
– ALSA: timer: Use mod_timer() for rearming the system timer (bsc#973378).
– Backport arm64 patches from SLE12-SP1-ARM
– Fix kABI additions for pipe: limit the per-user amount of pages
allocated in pipes.
– Revert “drm/radeon: call hpd_irq_event on resume” (boo#975868).
– Update config files. Enable RTC_HCTOSYS, build I2C_XGENE_SLIMPRO as a
module.
– backends: guarantee one time reads of shared ring contents (bsc#957988).
– ext4: fix races between buffered IO and collapse / insert range
(bsc#972174).
– ext4: fix races between page faults and hole punching (bsc#972174).
– ext4: fix races of writeback with punch hole and zero range (bsc#972174).
– ext4: move unlocked dio protection from ext4_alloc_file_blocks()
(bsc#972174).
– net: thunderx: Use napi_schedule_irqoff()
– netback: do not use last request to determine minimum Tx credit
(bsc#957988).

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE Leap 42.1:

zypper in -t patch openSUSE-2016-629=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE Leap 42.1 (i686 x86_64):

kernel-debug-4.1.21-14.2
kernel-debug-base-4.1.21-14.2
kernel-debug-base-debuginfo-4.1.21-14.2
kernel-debug-debuginfo-4.1.21-14.2
kernel-debug-debugsource-4.1.21-14.2
kernel-debug-devel-4.1.21-14.2
kernel-debug-devel-debuginfo-4.1.21-14.2
kernel-ec2-4.1.21-14.2
kernel-ec2-base-4.1.21-14.2
kernel-ec2-base-debuginfo-4.1.21-14.2
kernel-ec2-debuginfo-4.1.21-14.2
kernel-ec2-debugsource-4.1.21-14.2
kernel-ec2-devel-4.1.21-14.2
kernel-pv-4.1.21-14.2
kernel-pv-base-4.1.21-14.2
kernel-pv-base-debuginfo-4.1.21-14.2
kernel-pv-debuginfo-4.1.21-14.2
kernel-pv-debugsource-4.1.21-14.2
kernel-pv-devel-4.1.21-14.2
kernel-vanilla-4.1.21-14.2
kernel-vanilla-debuginfo-4.1.21-14.2
kernel-vanilla-debugsource-4.1.21-14.2
kernel-vanilla-devel-4.1.21-14.2
kernel-xen-4.1.21-14.2
kernel-xen-base-4.1.21-14.2
kernel-xen-base-debuginfo-4.1.21-14.2
kernel-xen-debuginfo-4.1.21-14.2
kernel-xen-debugsource-4.1.21-14.2
kernel-xen-devel-4.1.21-14.2

– openSUSE Leap 42.1 (i586 x86_64):

kernel-default-4.1.21-14.2
kernel-default-base-4.1.21-14.2
kernel-default-base-debuginfo-4.1.21-14.2
kernel-default-debuginfo-4.1.21-14.2
kernel-default-debugsource-4.1.21-14.2
kernel-default-devel-4.1.21-14.2
kernel-obs-build-4.1.21-14.4
kernel-obs-build-debugsource-4.1.21-14.4
kernel-obs-qa-4.1.21-14.2
kernel-obs-qa-xen-4.1.21-14.2
kernel-syms-4.1.21-14.2

– openSUSE Leap 42.1 (noarch):

kernel-devel-4.1.21-14.2
kernel-docs-4.1.21-14.5
kernel-docs-html-4.1.21-14.5
kernel-docs-pdf-4.1.21-14.5
kernel-macros-4.1.21-14.2
kernel-source-4.1.21-14.2
kernel-source-vanilla-4.1.21-14.2

– openSUSE Leap 42.1 (i686):

kernel-pae-4.1.21-14.2
kernel-pae-base-4.1.21-14.2
kernel-pae-base-debuginfo-4.1.21-14.2
kernel-pae-debuginfo-4.1.21-14.2
kernel-pae-debugsource-4.1.21-14.2
kernel-pae-devel-4.1.21-14.2

References:

https://www.suse.com/security/cve/CVE-2016-2185.html
https://www.suse.com/security/cve/CVE-2016-2186.html
https://www.suse.com/security/cve/CVE-2016-2188.html
https://www.suse.com/security/cve/CVE-2016-2847.html
https://www.suse.com/security/cve/CVE-2016-3136.html
https://www.suse.com/security/cve/CVE-2016-3137.html
https://www.suse.com/security/cve/CVE-2016-3138.html
https://www.suse.com/security/cve/CVE-2016-3140.html
https://www.suse.com/security/cve/CVE-2016-3156.html
https://www.suse.com/security/cve/CVE-2016-3689.html
https://www.suse.com/security/cve/CVE-2016-3951.html
https://bugzilla.suse.com/957988
https://bugzilla.suse.com/970892
https://bugzilla.suse.com/970911
https://bugzilla.suse.com/970948
https://bugzilla.suse.com/970955
https://bugzilla.suse.com/970956
https://bugzilla.suse.com/970958
https://bugzilla.suse.com/970970
https://bugzilla.suse.com/971124
https://bugzilla.suse.com/971360
https://bugzilla.suse.com/971628
https://bugzilla.suse.com/972174
https://bugzilla.suse.com/973378
https://bugzilla.suse.com/974418
https://bugzilla.suse.com/975868


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
7e

Top
More in Preporuke
Sigurnosni nedostatak programskog paketa jq

Otkriven je sigurnosni nedostatak u programskom paketu jq za operacijski sustav Red Hat. Otkriveni nedostatak potencijalnim napadačima omogućuje rušenje programskog...

Close