You are here
Home > Preporuke > Sigurnosni nedostaci jezgre operacijskog sustava

Sigurnosni nedostaci jezgre operacijskog sustava

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

SUSE Security Update: Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3292-1
Rating: important
References: #1053153 #1055567 #1062847 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________

An update that solves two vulnerabilities and has two fixes
is now available.

Description:

This update for the Linux Kernel 4.4.21-84 fixes several issues.

The following security issues were fixed:

– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).

This non-security issue was fixed:

– bsc#1062847: Enable proper shut down if NIC teaming is enabled

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12:

zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2049=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Live Patching 12 (x86_64):

kgraft-patch-4_4_21-84-default-11-2.1

References:

https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3306-1
Rating: important
References: #1053153 #1055567 #1062847 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________

An update that solves two vulnerabilities and has two fixes
is now available.

Description:

This update for the Linux Kernel 4.4.21-90 fixes several issues.

The following security issues were fixed:

– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).

This non-security issue was fixed:

– bsc#1062847: Enable proper shut down if NIC teaming is enabled

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12:

zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2048=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Live Patching 12 (x86_64):

kgraft-patch-4_4_21-90-default-11-2.1

References:

https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3288-1
Rating: important
References: #1053153 #1055567 #1062847 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________

An update that solves two vulnerabilities and has two fixes
is now available.

Description:

This update for the Linux Kernel 4.4.38-93 fixes several issues.

The following security issues were fixed:

– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).

This non-security issue was fixed:

– bsc#1062847: Enable proper shut down if NIC teaming is enabled

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12:

zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2050=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Live Patching 12 (x86_64):

kgraft-patch-4_4_38-93-default-11-2.1

References:

https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3290-1
Rating: important
References: #1053153 #1055567 #1062847 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________

An update that solves two vulnerabilities and has two fixes
is now available.

Description:

This update for the Linux Kernel 4.4.49-92_11 fixes several issues.

The following security issues were fixed:

– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).

This non-security issue was fixed:

– bsc#1062847: Enable proper shut down if NIC teaming is enabled

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12:

zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2057=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Live Patching 12 (x86_64):

kgraft-patch-4_4_49-92_11-default-9-2.1

References:

https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3291-1
Rating: important
References: #1053153 #1055567 #1062847 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________

An update that solves two vulnerabilities and has two fixes
is now available.

Description:

This update for the Linux Kernel 4.4.49-92_14 fixes several issues.

The following security issues were fixed:

– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).

This non-security issue was fixed:

– bsc#1062847: Enable proper shut down if NIC teaming is enabled

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12:

zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2052=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Live Patching 12 (x86_64):

kgraft-patch-4_4_49-92_14-default-8-2.1

References:

https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3310-1
Rating: important
References: #1053153 #1055567 #1062847 #1069708 #1070307

Cross-References: CVE-2017-1000405 CVE-2017-10661 CVE-2017-16939

Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________

An update that solves three vulnerabilities and has two
fixes is now available.

Description:

This update for the Linux Kernel 4.4.59-92_17 fixes several issues.

The following security issues were fixed:

– CVE-2017-1000405: Problematic use of pmd_mkdirty() in the touch_pmd()
function allowed users to overwrite read-only huge pages (e.g. the zero
huge page and sealed shmem files) (bsc#1070307).
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).

This non-security issue was fixed:

– bsc#1062847: Enable proper shut down if NIC teaming is enabled

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12:

zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2051=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Live Patching 12 (x86_64):

kgraft-patch-4_4_59-92_17-default-7-2.1

References:

https://www.suse.com/security/cve/CVE-2017-1000405.html
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708
https://bugzilla.suse.com/1070307


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3286-1
Rating: important
References: #1053153 #1055567 #1062847 #1069708 #1070307

Cross-References: CVE-2017-1000405 CVE-2017-10661 CVE-2017-16939

Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________

An update that solves three vulnerabilities and has two
fixes is now available.

Description:

This update for the Linux Kernel 4.4.59-92_20 fixes several issues.

The following security issues were fixed:

– CVE-2017-1000405: Problematic use of pmd_mkdirty() in the touch_pmd()
function allowed users to overwrite read-only huge pages (e.g. the zero
huge page and sealed shmem files) (bsc#1070307).
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).

This non-security issue was fixed:

– bsc#1062847: Enable proper shut down if NIC teaming is enabled

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12:

zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2047=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Live Patching 12 (x86_64):

kgraft-patch-4_4_59-92_20-default-7-2.1

References:

https://www.suse.com/security/cve/CVE-2017-1000405.html
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708
https://bugzilla.suse.com/1070307


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3296-1
Rating: important
References: #1053153 #1055567 #1062847 #1069708 #1070307

Cross-References: CVE-2017-1000405 CVE-2017-10661 CVE-2017-16939

Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________

An update that solves three vulnerabilities and has two
fixes is now available.

Description:

This update for the Linux Kernel 4.4.59-92_24 fixes several issues.

The following security issues were fixed:

– CVE-2017-1000405: Problematic use of pmd_mkdirty() in the touch_pmd()
function allowed users to overwrite read-only huge pages (e.g. the zero
huge page and sealed shmem files) (bsc#1070307).
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).

This non-security issue was fixed:

– bsc#1062847: Enable proper shut down if NIC teaming is enabled

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12:

zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2046=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Live Patching 12 (x86_64):

kgraft-patch-4_4_59-92_24-default-6-2.1

References:

https://www.suse.com/security/cve/CVE-2017-1000405.html
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708
https://bugzilla.suse.com/1070307


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3300-1
Rating: important
References: #1055567 #1062847 #1069708 #1070307
Cross-References: CVE-2017-1000405 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________

An update that solves two vulnerabilities and has two fixes
is now available.

Description:

This update for the Linux Kernel 4.4.74-92_29 fixes several issues.

The following security issues were fixed:

– CVE-2017-1000405: Problematic use of pmd_mkdirty() in the touch_pmd()
function allowed users to overwrite read-only huge pages (e.g. the zero
huge page and sealed shmem files) (bsc#1070307).
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).

This non-security issue was fixed:

– bsc#1062847: Enable proper shut down if NIC teaming is enabled

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12:

zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2069=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Live Patching 12 (x86_64):

kgraft-patch-4_4_74-92_29-default-6-2.1

References:

https://www.suse.com/security/cve/CVE-2017-1000405.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708
https://bugzilla.suse.com/1070307


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3284-1
Rating: important
References: #1055567 #1062847 #1069708 #1070307
Cross-References: CVE-2017-1000405 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________

An update that solves two vulnerabilities and has two fixes
is now available.

Description:

This update for the Linux Kernel 4.4.74-92_32 fixes several issues.

The following security issues were fixed:

– CVE-2017-1000405: Problematic use of pmd_mkdirty() in the touch_pmd()
function allowed users to overwrite read-only huge pages (e.g. the zero
huge page and sealed shmem files) (bsc#1070307).
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).

This non-security issue was fixed:

– bsc#1062847: Enable proper shut down if NIC teaming is enabled

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12:

zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2055=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Live Patching 12 (x86_64):

kgraft-patch-4_4_74-92_32-default-5-2.1

References:

https://www.suse.com/security/cve/CVE-2017-1000405.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708
https://bugzilla.suse.com/1070307


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
 

SUSE Security Update: Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP2)

______________________________________________________________________________

 

Announcement ID:    SUSE-SU-2017:3295-1

Rating:             important

References:         #1055567 #1062847 #1069708 #1070307 

Cross-References:   CVE-2017-1000405 CVE-2017-16939

Affected Products:

                    SUSE Linux Enterprise Live Patching 12

______________________________________________________________________________

 

   An update that solves two vulnerabilities and has two fixes

   is now available.

 

Description:

 

   This update for the Linux Kernel 4.4.74-92_35 fixes several issues.

 

   The following security issues were fixed:

 

   - CVE-2017-1000405: Problematic use of pmd_mkdirty() in the touch_pmd()

     function allowed users to overwrite read-only huge pages (e.g. the zero

     huge page and sealed shmem files) (bsc#1070307).

   - CVE-2017-16939: The XFRM dump policy implementation in

     net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or

     cause a denial of service (use-after-free) via a crafted SO_RCVBUF

     setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink

     messages (bsc#1069708).

 

   This non-security issue was fixed:

 

   - bsc#1062847: Enable proper shut down if NIC teaming is enabled

 

 

Patch Instructions:

 

   To install this SUSE Security Update use YaST online_update.

   Alternatively you can run the command listed for your product:

 

   - SUSE Linux Enterprise Live Patching 12:

 

      zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2053=1

 

   To bring your system up-to-date, use “zypper patch”.

 

 

Package List:

 

   - SUSE Linux Enterprise Live Patching 12 (x86_64):

 

      kgraft-patch-4_4_74-92_35-default-5-2.1

 

 

References:

 

   https://www.suse.com/security/cve/CVE-2017-1000405.html

   https://www.suse.com/security/cve/CVE-2017-16939.html

   https://bugzilla.suse.com/1055567

   https://bugzilla.suse.com/1062847

   https://bugzilla.suse.com/1069708

   https://bugzilla.suse.com/1070307

 

– 

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org

For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3297-1
Rating: important
References: #1055567 #1062847 #1069708 #1070307
Cross-References: CVE-2017-1000405 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________

An update that solves two vulnerabilities and has two fixes
is now available.

Description:

This update for the Linux Kernel 4.4.74-92_38 fixes several issues.

The following security issues were fixed:

– CVE-2017-1000405: Problematic use of pmd_mkdirty() in the touch_pmd()
function allowed users to overwrite read-only huge pages (e.g. the zero
huge page and sealed shmem files) (bsc#1070307).
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).

This non-security issue was fixed:

– bsc#1062847: Enable proper shut down if NIC teaming is enabled

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12:

zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2054=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Live Patching 12 (x86_64):

kgraft-patch-4_4_74-92_38-default-4-2.1

References:

https://www.suse.com/security/cve/CVE-2017-1000405.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708
https://bugzilla.suse.com/1070307


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3285-1
Rating: important
References: #1055567 #1062847 #1069708 #1070307
Cross-References: CVE-2017-1000405 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________

An update that solves two vulnerabilities and has two fixes
is now available.

Description:

This update for the Linux Kernel 4.4.90-92_45 fixes several issues.

The following security issues were fixed:

– CVE-2017-1000405: Problematic use of pmd_mkdirty() in the touch_pmd()
function allowed users to overwrite read-only huge pages (e.g. the zero
huge page and sealed shmem files) (bsc#1070307).
– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted SO_RCVBUF
setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
messages (bsc#1069708).

This non-security issue was fixed:

– bsc#1062847: Enable proper shut down if NIC teaming is enabled

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12:

zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2056=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Live Patching 12 (x86_64):

kgraft-patch-4_4_90-92_45-default-2-2.1

References:

https://www.suse.com/security/cve/CVE-2017-1000405.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1062847
https://bugzilla.suse.com/1069708
https://bugzilla.suse.com/1070307


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 17 for SLE 12)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3289-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.60-52_60 fixes several issues.

The following security issues were fixed:

– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-2060=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_60-52_60-default-11-2.1
kgraft-patch-3_12_60-52_60-xen-11-2.1

References:

https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 18 for SLE 12)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3304-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.60-52_63 fixes several issues.

The following security issues were fixed:

– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-2058=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_60-52_63-default-11-2.1
kgraft-patch-3_12_60-52_63-xen-11-2.1

References:

https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 19 for SLE 12)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3308-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_66 fixes several issues.

The following security issues were fixed:

– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-2059=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_66-default-10-2.1
kgraft-patch-3_12_61-52_66-xen-10-2.1

References:

https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 20 for SLE 12)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3287-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_69 fixes several issues.

The following security issues were fixed:

– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-2063=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_69-default-8-2.1
kgraft-patch-3_12_61-52_69-xen-8-2.1

References:

https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 21 for SLE 12)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3302-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_72 fixes several issues.

The following security issues were fixed:

– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-2062=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_72-default-7-2.1
kgraft-patch-3_12_61-52_72-xen-7-2.1

References:

https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 22 for SLE 12)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3299-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_77 fixes several issues.

The following security issues were fixed:

– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-2065=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_77-default-7-2.1
kgraft-patch-3_12_61-52_77-xen-7-2.1

References:

https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 23 for SLE 12)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3309-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_80 fixes several issues.

The following security issues were fixed:

– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-2064=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_80-default-6-2.1
kgraft-patch-3_12_61-52_80-xen-6-2.1

References:

https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 24 for SLE 12)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3293-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_83 fixes several issues.

The following security issues were fixed:

– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-2067=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_83-default-5-2.1
kgraft-patch-3_12_61-52_83-xen-5-2.1

References:

https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 25 for SLE 12)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3301-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_86 fixes several issues.

The following security issues were fixed:

– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-2066=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_86-default-5-2.1
kgraft-patch-3_12_61-52_86-xen-5-2.1

References:

https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 26 for SLE 12)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3303-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_89 fixes several issues.

The following security issues were fixed:

– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-2070=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_89-default-5-2.1
kgraft-patch-3_12_61-52_89-xen-5-2.1

References:

https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 27 for SLE 12)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3305-1
Rating: important
References: #1053153 #1069708
Cross-References: CVE-2017-10661 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_92 fixes several issues.

The following security issues were fixed:

– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
gain privileges or cause a denial of service (list corruption or
use-after-free) via simultaneous file-descriptor operations that
leverage improper might_cancel queueing (bsc#1053153).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-2068=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_92-default-4-2.1
kgraft-patch-3_12_61-52_92-xen-4-2.1

References:

https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1053153
https://bugzilla.suse.com/1069708


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 28 for SLE 12)
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:3307-1
Rating: important
References: #1064388 #1064392 #1069708
Cross-References: CVE-2017-15649 CVE-2017-16939
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that solves two vulnerabilities and has one
errata is now available.

Description:

This update for the Linux Kernel 3.12.61-52_101 fixes several issues.

The following security issues were fixed:

– CVE-2017-16939: The XFRM dump policy implementation in
net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a
denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
(bsc#1069708).
– CVE-2017-15649: net/packet/af_packet.c allowed local users to gain
privileges via crafted system calls that trigger mishandling of
packet_fanout data structures, because of a race condition (involving
fanout_add and packet_do_bind) that leads to a use-after-free
(bsc#1064392).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-2061=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_101-default-2-2.1
kgraft-patch-3_12_61-52_101-xen-2-2.1

References:

https://www.suse.com/security/cve/CVE-2017-15649.html
https://www.suse.com/security/cve/CVE-2017-16939.html
https://bugzilla.suse.com/1064388
https://bugzilla.suse.com/1064392
https://bugzilla.suse.com/1069708


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorPetar Bertok
Cert idNCERT-REF-2017-12-0129-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa go-toolset-7

Otkriveni su sigurnosni nedostaci u programskom paketu go-toolset-7 za operacijski sustav Red Hat. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog...

Close