You are here
Home > Preporuke > Sigurnosni nedostaci programske jezgre

Sigurnosni nedostaci programske jezgre

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

SUSE Security Update: Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP3)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1024-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447

Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________

An update that solves four vulnerabilities and has one
errata is now available.

Description:

This update for the Linux Kernel 4.4.82-6_3 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12-SP3:

zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-684=1

Package List:

– SUSE Linux Enterprise Live Patching 12-SP3 (x86_64):

kgraft-patch-4_4_82-6_3-default-7-2.1
kgraft-patch-4_4_82-6_3-default-debuginfo-7-2.1

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP3)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1020-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447

Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________

An update that solves four vulnerabilities and has one
errata is now available.

Description:

This update for the Linux Kernel 4.4.82-6_9 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12-SP3:

zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-683=1

Package List:

– SUSE Linux Enterprise Live Patching 12-SP3 (x86_64):

kgraft-patch-4_4_82-6_9-default-6-2.1
kgraft-patch-4_4_82-6_9-default-debuginfo-6-2.1

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP3)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1013-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447

Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________

An update that solves four vulnerabilities and has one
errata is now available.

Description:

This update for the Linux Kernel 4.4.90-6_12 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12-SP3:

zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-681=1

Package List:

– SUSE Linux Enterprise Live Patching 12-SP3 (x86_64):

kgraft-patch-4_4_92-6_18-default-5-2.1
kgraft-patch-4_4_92-6_18-default-debuginfo-5-2.1

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP3)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1028-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447

Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________

An update that solves four vulnerabilities and has one
errata is now available.

Description:

This update for the Linux Kernel 4.4.92-6_30 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12-SP3:

zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-680=1

Package List:

– SUSE Linux Enterprise Live Patching 12-SP3 (ppc64le x86_64):

kgraft-patch-4_4_92-6_30-default-4-2.1
kgraft-patch-4_4_92-6_30-default-debuginfo-4-2.1

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP3)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1028-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447

Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________

An update that solves four vulnerabilities and has one
errata is now available.

Description:

This update for the Linux Kernel 4.4.92-6_30 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12-SP3:

zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-680=1

Package List:

– SUSE Linux Enterprise Live Patching 12-SP3 (ppc64le x86_64):

kgraft-patch-4_4_92-6_30-default-4-2.1
kgraft-patch-4_4_92-6_30-default-debuginfo-4-2.1

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP3)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1027-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447

Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________

An update that solves four vulnerabilities and has one
errata is now available.

Description:

This update for the Linux Kernel 4.4.103-6_33 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12-SP3:

zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-678=1

Package List:

– SUSE Linux Enterprise Live Patching 12-SP3 (ppc64le x86_64):

kgraft-patch-4_4_103-6_33-default-4-2.1
kgraft-patch-4_4_103-6_33-default-debuginfo-4-2.1

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP3)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1022-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447

Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________

An update that solves four vulnerabilities and has one
errata is now available.

Description:

This update for the Linux Kernel 4.4.103-6_38 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12-SP3:

zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2018-679=1

Package List:

– SUSE Linux Enterprise Live Patching 12-SP3 (ppc64le x86_64):

kgraft-patch-4_4_103-6_38-default-4-2.1
kgraft-patch-4_4_103-6_38-default-debuginfo-4-2.1

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1012-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447

Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP2
SUSE Linux Enterprise Server 12-SP2-LTSS
______________________________________________________________________________

An update that solves four vulnerabilities and has one
errata is now available.

Description:

This update for the Linux Kernel 4.4.59-92_17 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP2:

zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-666=1

– SUSE Linux Enterprise Server 12-SP2-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-666=1

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):

kgraft-patch-4_4_59-92_17-default-10-2.2

– SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):

kgraft-patch-4_4_59-92_17-default-10-2.2

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1012-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447

Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP2
SUSE Linux Enterprise Server 12-SP2-LTSS
______________________________________________________________________________

An update that solves four vulnerabilities and has one
errata is now available.

Description:

This update for the Linux Kernel 4.4.59-92_17 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP2:

zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-666=1

– SUSE Linux Enterprise Server 12-SP2-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-666=1

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):

kgraft-patch-4_4_59-92_17-default-10-2.2

– SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):

kgraft-patch-4_4_59-92_17-default-10-2.2

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1019-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447

Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP2
SUSE Linux Enterprise Server 12-SP2-LTSS
______________________________________________________________________________

An update that solves four vulnerabilities and has one
errata is now available.

Description:

This update for the Linux Kernel 4.4.59-92_20 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP2:

zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-711=1

– SUSE Linux Enterprise Server 12-SP2-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-711=1

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):

kgraft-patch-4_4_59-92_20-default-10-2.2

– SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):

kgraft-patch-4_4_59-92_20-default-10-2.2

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1021-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447

Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP2
SUSE Linux Enterprise Server 12-SP2-LTSS
______________________________________________________________________________

An update that solves four vulnerabilities and has one
errata is now available.

Description:

This update for the Linux Kernel 4.4.59-92_24 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP2:

zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-665=1

– SUSE Linux Enterprise Server 12-SP2-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-665=1

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):

kgraft-patch-4_4_59-92_24-default-9-2.2

– SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):

kgraft-patch-4_4_59-92_24-default-9-2.2

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1033-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447

Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP2
SUSE Linux Enterprise Server 12-SP2-LTSS
______________________________________________________________________________

An update that solves four vulnerabilities and has one
errata is now available.

Description:

This update for the Linux Kernel 4.4.74-92_29 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP2:

zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-669=1

– SUSE Linux Enterprise Server 12-SP2-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-669=1

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):

kgraft-patch-4_4_74-92_29-default-9-2.2

– SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):

kgraft-patch-4_4_74-92_29-default-9-2.2

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1023-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447

Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP2
SUSE Linux Enterprise Server 12-SP2-LTSS
______________________________________________________________________________

An update that solves four vulnerabilities and has one
errata is now available.

Description:

This update for the Linux Kernel 4.4.74-92_32 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP2:

zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-670=1

– SUSE Linux Enterprise Server 12-SP2-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-670=1

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):

kgraft-patch-4_4_74-92_32-default-8-2.2

– SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):

kgraft-patch-4_4_74-92_32-default-8-2.2

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP1)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1025-1
Rating: important
References: #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.74-60_64_40 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-1000004: A race condition vulnerability existed in the sound
system, which could lead to a deadlock and denial of service condition
(bsc#1076017)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-687=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-687=1

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_74-60_64_40-default-9-2.1
kgraft-patch-3_12_74-60_64_40-xen-9-2.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_74-60_64_40-default-9-2.1
kgraft-patch-3_12_74-60_64_40-xen-9-2.1

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP1)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1015-1
Rating: important
References: #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.74-60_64_48 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-1000004: A race condition vulnerability existed in the sound
system, which could lead to a deadlock and denial of service condition
(bsc#1076017)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-688=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-688=1

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_74-60_64_48-default-8-2.1
kgraft-patch-3_12_74-60_64_48-xen-8-2.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_74-60_64_48-default-8-2.1
kgraft-patch-3_12_74-60_64_48-xen-8-2.1

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1031-1
Rating: important
References: #1073230 #1076017 #1083488 #1085114 #1085447

Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP2
SUSE Linux Enterprise Server 12-SP2-LTSS
______________________________________________________________________________

An update that solves four vulnerabilities and has one
errata is now available.

Description:

This update for the Linux Kernel 4.4.103-92_56 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
video driver (bsc#1085447).
– CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
for bridging allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bsc#1085114).
– CVE-2018-7566: Prevent buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).
– CVE-2018-1000004: Prevent race condition in the sound system that could
have lead to a deadlock and denial of service condition (bsc#1076017).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP2:

zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-671=1

– SUSE Linux Enterprise Server 12-SP2-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-671=1

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):

kgraft-patch-4_4_103-92_56-default-4-2.2

– SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):

kgraft-patch-4_4_103-92_56-default-4-2.2

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1073230
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP1)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:0992-1
Rating: important
References: #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.74-60_64_51 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-1000004: A race condition vulnerability existed in the sound
system, which could lead to a deadlock and denial of service condition
(bsc#1076017)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-686=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-686=1

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_74-60_64_51-default-7-2.1
kgraft-patch-3_12_74-60_64_51-xen-7-2.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_74-60_64_51-default-7-2.1
kgraft-patch-3_12_74-60_64_51-xen-7-2.1

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP1)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1032-1
Rating: important
References: #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.74-60_64_54 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-1000004: A race condition vulnerability existed in the sound
system, which could lead to a deadlock and denial of service condition
(bsc#1076017)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-685=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-685=1

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_74-60_64_54-default-7-2.1
kgraft-patch-3_12_74-60_64_54-xen-7-2.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_74-60_64_54-default-7-2.1
kgraft-patch-3_12_74-60_64_54-xen-7-2.1

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP1)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1014-1
Rating: important
References: #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.74-60_64_60 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-1000004: A race condition vulnerability existed in the sound
system, which could lead to a deadlock and denial of service condition
(bsc#1076017)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-691=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-691=1

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_74-60_64_60-default-6-2.1
kgraft-patch-3_12_74-60_64_60-xen-6-2.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_74-60_64_60-default-6-2.1
kgraft-patch-3_12_74-60_64_60-xen-6-2.1

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1034-1
Rating: important
References: #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.74-60_64_63 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-1000004: A race condition vulnerability existed in the sound
system, which could lead to a deadlock and denial of service condition
(bsc#1076017)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-692=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-692=1

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_74-60_64_63-default-4-2.1
kgraft-patch-3_12_74-60_64_63-xen-4-2.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_74-60_64_63-default-4-2.1
kgraft-patch-3_12_74-60_64_63-xen-4-2.1

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP1)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1018-1
Rating: important
References: #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.74-60_64_66 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-1000004: A race condition vulnerability existed in the sound
system, which could lead to a deadlock and denial of service condition
(bsc#1076017)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-693=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-693=1

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_74-60_64_66-default-3-2.1
kgraft-patch-3_12_74-60_64_66-xen-3-2.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_74-60_64_66-default-3-2.1
kgraft-patch-3_12_74-60_64_66-xen-3-2.1

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP1)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1026-1
Rating: important
References: #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1068 CVE-2018-7566

Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.74-60_64_82 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-7566: The Linux kernel had a buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-695=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-695=1

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_74-60_64_82-default-2-2.1
kgraft-patch-3_12_74-60_64_82-xen-2-2.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_74-60_64_82-default-2-2.1
kgraft-patch-3_12_74-60_64_82-xen-2-2.1

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP1)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1026-1
Rating: important
References: #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1068 CVE-2018-7566

Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.74-60_64_82 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-7566: The Linux kernel had a buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-695=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-695=1

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_74-60_64_82-default-2-2.1
kgraft-patch-3_12_74-60_64_82-xen-2-2.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_74-60_64_82-default-2-2.1
kgraft-patch-3_12_74-60_64_82-xen-2-2.1

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 27 for SLE 12)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1001-1
Rating: important
References: #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_92 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-1000004: A race condition vulnerability existed in the sound
system, which could lead to a deadlock and denial of service condition
(bsc#1076017)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2018-705=1

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_92-default-6-2.1
kgraft-patch-3_12_61-52_92-xen-6-2.1

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 29 for SLE 12)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1029-1
Rating: important
References: #1076017 #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_106 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-1000004: A race condition vulnerability existed in the sound
system, which could lead to a deadlock and denial of service condition
(bsc#1076017)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2018-697=1

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_106-default-4-2.1
kgraft-patch-3_12_61-52_106-xen-4-2.1

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1000004.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1076017
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 31 for SLE 12)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1016-1
Rating: important
References: #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1068 CVE-2018-7566

Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_119 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-7566: The Linux kernel had a buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2018-710=1

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_119-default-3-2.1
kgraft-patch-3_12_61-52_119-xen-3-2.1

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 32 for SLE 12)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1030-1
Rating: important
References: #1083488 #1085114 #1085447
Cross-References: CVE-2017-13166 CVE-2018-1068 CVE-2018-7566

Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_122 fixes several issues.

The following security issues were fixed:

– CVE-2017-13166: An elevation of privilege vulnerability was fixed in the
kernel v4l2 video driver. (bsc#1085447).
– CVE-2018-1068: A flaw was found in the Linux kernels implementation of
32-bit syscall interface for bridging. This allowed a privileged user to
arbitrarily write to a limited range of kernel memory (bsc#1085114).
– CVE-2018-7566: The Linux kernel had a buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2018-707=1

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_122-default-3-2.1
kgraft-patch-3_12_61-52_122-xen-3-2.1

References:

https://www.suse.com/security/cve/CVE-2017-13166.html
https://www.suse.com/security/cve/CVE-2018-1068.html
https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1083488
https://bugzilla.suse.com/1085114
https://bugzilla.suse.com/1085447


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE Security Update: Security update for the Linux Kernel (Live Patch 33 for SLE 12)
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:1035-1
Rating: important
References: #1083488
Cross-References: CVE-2018-7566
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for the Linux Kernel 3.12.61-52_125 fixes one issue.

The following security issue was fixed:

– CVE-2018-7566: The Linux kernel had a buffer overflow via an
SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
a local user (bsc#1083488).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2018-708=1

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_125-default-2-2.1
kgraft-patch-3_12_61-52_125-xen-2-2.1

References:

https://www.suse.com/security/cve/CVE-2018-7566.html
https://bugzilla.suse.com/1083488


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorPetar Bertok
Cert idNCERT-REF-2018-04-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa mysql

Otkriveni su sigurnosni nedostaci u programskom paketu mysql za operacijski sustav Debian. Otkriveni nedostaci potencijalnim napadačima omogućuju kompromitaciju servera, otkrivanje...

Close