openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID:    openSUSE-SU-2016:3118-1
Rating:             important
References:         #1013533 #1013604 
Cross-References:   CVE-2016-9576 CVE-2016-9794
Affected Products:
                    openSUSE 13.1
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
The openSUSE 13.1 kernel was updated to fix two security issues.
The following security bugs were fixed:
   – CVE-2016-9576: A use-after-free vulnerability in the SCSI generic driver
     allows users with write access to /dev/sg* or /dev/bsg* to elevate their
     privileges (bsc#1013604).
   – CVE-2016-9794: A use-after-free vulnerability in the ALSA pcm layer
     allowed local users to cause a denial of service, memory corruption or
     possibly even to elevate their privileges (bsc#1013533).
Patch Instructions:
   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:
– openSUSE 13.1:
zypper in -t patch openSUSE-2016-1454=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– openSUSE 13.1 (i586 x86_64):
      cloop-2.639-11.40.1
      cloop-debuginfo-2.639-11.40.1
      cloop-debugsource-2.639-11.40.1
      cloop-kmp-default-2.639_k3.12.67_64-11.40.1
      cloop-kmp-default-debuginfo-2.639_k3.12.67_64-11.40.1
      cloop-kmp-desktop-2.639_k3.12.67_64-11.40.1
      cloop-kmp-desktop-debuginfo-2.639_k3.12.67_64-11.40.1
      cloop-kmp-xen-2.639_k3.12.67_64-11.40.1
      cloop-kmp-xen-debuginfo-2.639_k3.12.67_64-11.40.1
      crash-7.0.2-2.40.1
      crash-debuginfo-7.0.2-2.40.1
      crash-debugsource-7.0.2-2.40.1
      crash-devel-7.0.2-2.40.1
      crash-doc-7.0.2-2.40.1
      crash-eppic-7.0.2-2.40.1
      crash-eppic-debuginfo-7.0.2-2.40.1
      crash-gcore-7.0.2-2.40.1
      crash-gcore-debuginfo-7.0.2-2.40.1
      crash-kmp-default-7.0.2_k3.12.67_64-2.40.1
      crash-kmp-default-debuginfo-7.0.2_k3.12.67_64-2.40.1
      crash-kmp-desktop-7.0.2_k3.12.67_64-2.40.1
      crash-kmp-desktop-debuginfo-7.0.2_k3.12.67_64-2.40.1
      crash-kmp-xen-7.0.2_k3.12.67_64-2.40.1
      crash-kmp-xen-debuginfo-7.0.2_k3.12.67_64-2.40.1
      hdjmod-debugsource-1.28-16.40.1
      hdjmod-kmp-default-1.28_k3.12.67_64-16.40.1
      hdjmod-kmp-default-debuginfo-1.28_k3.12.67_64-16.40.1
      hdjmod-kmp-desktop-1.28_k3.12.67_64-16.40.1
      hdjmod-kmp-desktop-debuginfo-1.28_k3.12.67_64-16.40.1
      hdjmod-kmp-xen-1.28_k3.12.67_64-16.40.1
      hdjmod-kmp-xen-debuginfo-1.28_k3.12.67_64-16.40.1
      ipset-6.21.1-2.44.1
      ipset-debuginfo-6.21.1-2.44.1
      ipset-debugsource-6.21.1-2.44.1
      ipset-devel-6.21.1-2.44.1
      ipset-kmp-default-6.21.1_k3.12.67_64-2.44.1
      ipset-kmp-default-debuginfo-6.21.1_k3.12.67_64-2.44.1
      ipset-kmp-desktop-6.21.1_k3.12.67_64-2.44.1
      ipset-kmp-desktop-debuginfo-6.21.1_k3.12.67_64-2.44.1
      ipset-kmp-xen-6.21.1_k3.12.67_64-2.44.1
      ipset-kmp-xen-debuginfo-6.21.1_k3.12.67_64-2.44.1
      iscsitarget-1.4.20.3-13.40.1
      iscsitarget-debuginfo-1.4.20.3-13.40.1
      iscsitarget-debugsource-1.4.20.3-13.40.1
      iscsitarget-kmp-default-1.4.20.3_k3.12.67_64-13.40.1
      iscsitarget-kmp-default-debuginfo-1.4.20.3_k3.12.67_64-13.40.1
      iscsitarget-kmp-desktop-1.4.20.3_k3.12.67_64-13.40.1
      iscsitarget-kmp-desktop-debuginfo-1.4.20.3_k3.12.67_64-13.40.1
      iscsitarget-kmp-xen-1.4.20.3_k3.12.67_64-13.40.1
      iscsitarget-kmp-xen-debuginfo-1.4.20.3_k3.12.67_64-13.40.1
      kernel-default-3.12.67-64.1
      kernel-default-base-3.12.67-64.1
      kernel-default-base-debuginfo-3.12.67-64.1
      kernel-default-debuginfo-3.12.67-64.1
      kernel-default-debugsource-3.12.67-64.1
      kernel-default-devel-3.12.67-64.1
      kernel-syms-3.12.67-64.1
      libipset3-6.21.1-2.44.1
      libipset3-debuginfo-6.21.1-2.44.1
      ndiswrapper-1.58-41.1
      ndiswrapper-debuginfo-1.58-41.1
      ndiswrapper-debugsource-1.58-41.1
      ndiswrapper-kmp-default-1.58_k3.12.67_64-41.1
      ndiswrapper-kmp-default-debuginfo-1.58_k3.12.67_64-41.1
      ndiswrapper-kmp-desktop-1.58_k3.12.67_64-41.1
      ndiswrapper-kmp-desktop-debuginfo-1.58_k3.12.67_64-41.1
      openvswitch-1.11.0-0.47.1
      openvswitch-controller-1.11.0-0.47.1
      openvswitch-controller-debuginfo-1.11.0-0.47.1
      openvswitch-debuginfo-1.11.0-0.47.1
      openvswitch-debugsource-1.11.0-0.47.1
      openvswitch-kmp-default-1.11.0_k3.12.67_64-0.47.1
      openvswitch-kmp-default-debuginfo-1.11.0_k3.12.67_64-0.47.1
      openvswitch-kmp-desktop-1.11.0_k3.12.67_64-0.47.1
      openvswitch-kmp-desktop-debuginfo-1.11.0_k3.12.67_64-0.47.1
      openvswitch-kmp-xen-1.11.0_k3.12.67_64-0.47.1
      openvswitch-kmp-xen-debuginfo-1.11.0_k3.12.67_64-0.47.1
      openvswitch-pki-1.11.0-0.47.1
      openvswitch-switch-1.11.0-0.47.1
      openvswitch-switch-debuginfo-1.11.0-0.47.1
      openvswitch-test-1.11.0-0.47.1
      pcfclock-0.44-258.41.1
      pcfclock-debuginfo-0.44-258.41.1
      pcfclock-debugsource-0.44-258.41.1
      pcfclock-kmp-default-0.44_k3.12.67_64-258.41.1
      pcfclock-kmp-default-debuginfo-0.44_k3.12.67_64-258.41.1
      pcfclock-kmp-desktop-0.44_k3.12.67_64-258.41.1
      pcfclock-kmp-desktop-debuginfo-0.44_k3.12.67_64-258.41.1
      python-openvswitch-1.11.0-0.47.1
      python-openvswitch-test-1.11.0-0.47.1
      python-virtualbox-4.2.36-2.72.1
      python-virtualbox-debuginfo-4.2.36-2.72.1
      vhba-kmp-debugsource-20130607-2.40.1
      vhba-kmp-default-20130607_k3.12.67_64-2.40.1
      vhba-kmp-default-debuginfo-20130607_k3.12.67_64-2.40.1
      vhba-kmp-desktop-20130607_k3.12.67_64-2.40.1
      vhba-kmp-desktop-debuginfo-20130607_k3.12.67_64-2.40.1
      vhba-kmp-xen-20130607_k3.12.67_64-2.40.1
      vhba-kmp-xen-debuginfo-20130607_k3.12.67_64-2.40.1
      virtualbox-4.2.36-2.72.1
      virtualbox-debuginfo-4.2.36-2.72.1
      virtualbox-debugsource-4.2.36-2.72.1
      virtualbox-devel-4.2.36-2.72.1
      virtualbox-guest-kmp-default-4.2.36_k3.12.67_64-2.72.1
      virtualbox-guest-kmp-default-debuginfo-4.2.36_k3.12.67_64-2.72.1
      virtualbox-guest-kmp-desktop-4.2.36_k3.12.67_64-2.72.1
      virtualbox-guest-kmp-desktop-debuginfo-4.2.36_k3.12.67_64-2.72.1
      virtualbox-guest-tools-4.2.36-2.72.1
      virtualbox-guest-tools-debuginfo-4.2.36-2.72.1
      virtualbox-guest-x11-4.2.36-2.72.1
      virtualbox-guest-x11-debuginfo-4.2.36-2.72.1
      virtualbox-host-kmp-default-4.2.36_k3.12.67_64-2.72.1
      virtualbox-host-kmp-default-debuginfo-4.2.36_k3.12.67_64-2.72.1
      virtualbox-host-kmp-desktop-4.2.36_k3.12.67_64-2.72.1
      virtualbox-host-kmp-desktop-debuginfo-4.2.36_k3.12.67_64-2.72.1
      virtualbox-qt-4.2.36-2.72.1
      virtualbox-qt-debuginfo-4.2.36-2.72.1
      virtualbox-websrv-4.2.36-2.72.1
      virtualbox-websrv-debuginfo-4.2.36-2.72.1
      xen-debugsource-4.3.4_10-73.1
      xen-devel-4.3.4_10-73.1
      xen-kmp-default-4.3.4_10_k3.12.67_64-73.1
      xen-kmp-default-debuginfo-4.3.4_10_k3.12.67_64-73.1
      xen-kmp-desktop-4.3.4_10_k3.12.67_64-73.1
      xen-kmp-desktop-debuginfo-4.3.4_10_k3.12.67_64-73.1
      xen-libs-4.3.4_10-73.1
      xen-libs-debuginfo-4.3.4_10-73.1
      xen-tools-domU-4.3.4_10-73.1
      xen-tools-domU-debuginfo-4.3.4_10-73.1
      xtables-addons-2.3-2.39.1
      xtables-addons-debuginfo-2.3-2.39.1
      xtables-addons-debugsource-2.3-2.39.1
      xtables-addons-kmp-default-2.3_k3.12.67_64-2.39.1
      xtables-addons-kmp-default-debuginfo-2.3_k3.12.67_64-2.39.1
      xtables-addons-kmp-desktop-2.3_k3.12.67_64-2.39.1
      xtables-addons-kmp-desktop-debuginfo-2.3_k3.12.67_64-2.39.1
      xtables-addons-kmp-xen-2.3_k3.12.67_64-2.39.1
      xtables-addons-kmp-xen-debuginfo-2.3_k3.12.67_64-2.39.1
– openSUSE 13.1 (i686 x86_64):
      kernel-debug-3.12.67-64.1
      kernel-debug-base-3.12.67-64.1
      kernel-debug-base-debuginfo-3.12.67-64.1
      kernel-debug-debuginfo-3.12.67-64.1
      kernel-debug-debugsource-3.12.67-64.1
      kernel-debug-devel-3.12.67-64.1
      kernel-debug-devel-debuginfo-3.12.67-64.1
      kernel-desktop-3.12.67-64.1
      kernel-desktop-base-3.12.67-64.1
      kernel-desktop-base-debuginfo-3.12.67-64.1
      kernel-desktop-debuginfo-3.12.67-64.1
      kernel-desktop-debugsource-3.12.67-64.1
      kernel-desktop-devel-3.12.67-64.1
      kernel-ec2-3.12.67-64.1
      kernel-ec2-base-3.12.67-64.1
      kernel-ec2-base-debuginfo-3.12.67-64.1
      kernel-ec2-debuginfo-3.12.67-64.1
      kernel-ec2-debugsource-3.12.67-64.1
      kernel-ec2-devel-3.12.67-64.1
      kernel-trace-3.12.67-64.1
      kernel-trace-base-3.12.67-64.1
      kernel-trace-base-debuginfo-3.12.67-64.1
      kernel-trace-debuginfo-3.12.67-64.1
      kernel-trace-debugsource-3.12.67-64.1
      kernel-trace-devel-3.12.67-64.1
      kernel-vanilla-3.12.67-64.1
      kernel-vanilla-debuginfo-3.12.67-64.1
      kernel-vanilla-debugsource-3.12.67-64.1
      kernel-vanilla-devel-3.12.67-64.1
      kernel-xen-3.12.67-64.1
      kernel-xen-base-3.12.67-64.1
      kernel-xen-base-debuginfo-3.12.67-64.1
      kernel-xen-debuginfo-3.12.67-64.1
      kernel-xen-debugsource-3.12.67-64.1
      kernel-xen-devel-3.12.67-64.1
– openSUSE 13.1 (x86_64):
      xen-4.3.4_10-73.1
      xen-doc-html-4.3.4_10-73.1
      xen-libs-32bit-4.3.4_10-73.1
      xen-libs-debuginfo-32bit-4.3.4_10-73.1
      xen-tools-4.3.4_10-73.1
      xen-tools-debuginfo-4.3.4_10-73.1
      xen-xend-tools-4.3.4_10-73.1
      xen-xend-tools-debuginfo-4.3.4_10-73.1
– openSUSE 13.1 (noarch):
      kernel-devel-3.12.67-64.1
      kernel-docs-3.12.67-64.2
      kernel-macros-3.12.67-64.1
      kernel-source-3.12.67-64.1
      kernel-source-vanilla-3.12.67-64.1
      virtualbox-host-source-4.2.36-2.72.1
– openSUSE 13.1 (i686):
      kernel-pae-3.12.67-64.1
      kernel-pae-base-3.12.67-64.1
      kernel-pae-base-debuginfo-3.12.67-64.1
      kernel-pae-debuginfo-3.12.67-64.1
      kernel-pae-debugsource-3.12.67-64.1
      kernel-pae-devel-3.12.67-64.1
– openSUSE 13.1 (i586):
      cloop-kmp-pae-2.639_k3.12.67_64-11.40.1
      cloop-kmp-pae-debuginfo-2.639_k3.12.67_64-11.40.1
      crash-kmp-pae-7.0.2_k3.12.67_64-2.40.1
      crash-kmp-pae-debuginfo-7.0.2_k3.12.67_64-2.40.1
      hdjmod-kmp-pae-1.28_k3.12.67_64-16.40.1
      hdjmod-kmp-pae-debuginfo-1.28_k3.12.67_64-16.40.1
      ipset-kmp-pae-6.21.1_k3.12.67_64-2.44.1
      ipset-kmp-pae-debuginfo-6.21.1_k3.12.67_64-2.44.1
      iscsitarget-kmp-pae-1.4.20.3_k3.12.67_64-13.40.1
      iscsitarget-kmp-pae-debuginfo-1.4.20.3_k3.12.67_64-13.40.1
      ndiswrapper-kmp-pae-1.58_k3.12.67_64-41.1
      ndiswrapper-kmp-pae-debuginfo-1.58_k3.12.67_64-41.1
      openvswitch-kmp-pae-1.11.0_k3.12.67_64-0.47.1
      openvswitch-kmp-pae-debuginfo-1.11.0_k3.12.67_64-0.47.1
      pcfclock-kmp-pae-0.44_k3.12.67_64-258.41.1
      pcfclock-kmp-pae-debuginfo-0.44_k3.12.67_64-258.41.1
      vhba-kmp-pae-20130607_k3.12.67_64-2.40.1
      vhba-kmp-pae-debuginfo-20130607_k3.12.67_64-2.40.1
      virtualbox-guest-kmp-pae-4.2.36_k3.12.67_64-2.72.1
      virtualbox-guest-kmp-pae-debuginfo-4.2.36_k3.12.67_64-2.72.1
      virtualbox-host-kmp-pae-4.2.36_k3.12.67_64-2.72.1
      virtualbox-host-kmp-pae-debuginfo-4.2.36_k3.12.67_64-2.72.1
      xen-kmp-pae-4.3.4_10_k3.12.67_64-73.1
      xen-kmp-pae-debuginfo-4.3.4_10_k3.12.67_64-73.1
      xtables-addons-kmp-pae-2.3_k3.12.67_64-2.39.1
      xtables-addons-kmp-pae-debuginfo-2.3_k3.12.67_64-2.39.1
References:
   https://www.suse.com/security/cve/CVE-2016-9576.html
   https://www.suse.com/security/cve/CVE-2016-9794.html
   https://bugzilla.suse.com/1013533
   https://bugzilla.suse.com/1013604
— 
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
   SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID:    SUSE-SU-2016:3146-1
Rating:             important
References:         #1013533 #1013604 
Cross-References:   CVE-2016-9576 CVE-2016-9794
Affected Products:
                    SUSE Linux Enterprise Workstation Extension 12-SP2
                    SUSE Linux Enterprise Software Development Kit 12-SP2
                    SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
                    SUSE Linux Enterprise Server 12-SP2
                    SUSE Linux Enterprise Live Patching 12
                    SUSE Linux Enterprise High Availability 12-SP2
                    SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
   The SUSE Linux Enterprise 12 SP 2 kernel was updated to fix two security
   issues.
The following security bugs were fixed:
   – CVE-2016-9576: A use-after-free vulnerability in the SCSI generic driver
     allows users with write access to /dev/sg* or /dev/bsg* to elevate their
     privileges (bsc#1013604).
   – CVE-2016-9794: A use-after-free vulnerability in the ALSA pcm layer
     allowed local users to cause a denial of service, memory corruption or
     possibly even to elevate their privileges (bsc#1013533).
Patch Instructions:
   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:
– SUSE Linux Enterprise Workstation Extension 12-SP2:
zypper in -t patch SUSE-SLE-WE-12-SP2-2016-1815=1
– SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2016-1815=1
– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2016-1815=1
– SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1815=1
– SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1815=1
– SUSE Linux Enterprise High Availability 12-SP2:
zypper in -t patch SUSE-SLE-HA-12-SP2-2016-1815=1
– SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2016-1815=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64):
      kernel-default-debuginfo-4.4.21-90.1
      kernel-default-debugsource-4.4.21-90.1
      kernel-default-extra-4.4.21-90.1
      kernel-default-extra-debuginfo-4.4.21-90.1
– SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
      kernel-obs-build-4.4.21-90.1
      kernel-obs-build-debugsource-4.4.21-90.1
– SUSE Linux Enterprise Software Development Kit 12-SP2 (noarch):
kernel-docs-4.4.21-90.3
– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
      kernel-default-4.4.21-90.1
      kernel-default-base-4.4.21-90.1
      kernel-default-base-debuginfo-4.4.21-90.1
      kernel-default-debuginfo-4.4.21-90.1
      kernel-default-debugsource-4.4.21-90.1
      kernel-default-devel-4.4.21-90.1
      kernel-syms-4.4.21-90.1
– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch):
      kernel-devel-4.4.21-90.1
      kernel-macros-4.4.21-90.1
      kernel-source-4.4.21-90.1
– SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
      kernel-default-4.4.21-90.1
      kernel-default-base-4.4.21-90.1
      kernel-default-base-debuginfo-4.4.21-90.1
      kernel-default-debuginfo-4.4.21-90.1
      kernel-default-debugsource-4.4.21-90.1
      kernel-default-devel-4.4.21-90.1
      kernel-syms-4.4.21-90.1
– SUSE Linux Enterprise Server 12-SP2 (noarch):
      kernel-devel-4.4.21-90.1
      kernel-macros-4.4.21-90.1
      kernel-source-4.4.21-90.1
– SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-4_4_21-90-default-1-2.3
– SUSE Linux Enterprise High Availability 12-SP2 (ppc64le s390x x86_64):
      cluster-md-kmp-default-4.4.21-90.1
      cluster-md-kmp-default-debuginfo-4.4.21-90.1
      cluster-network-kmp-default-4.4.21-90.1
      cluster-network-kmp-default-debuginfo-4.4.21-90.1
      dlm-kmp-default-4.4.21-90.1
      dlm-kmp-default-debuginfo-4.4.21-90.1
      gfs2-kmp-default-4.4.21-90.1
      gfs2-kmp-default-debuginfo-4.4.21-90.1
      kernel-default-debuginfo-4.4.21-90.1
      kernel-default-debugsource-4.4.21-90.1
      ocfs2-kmp-default-4.4.21-90.1
      ocfs2-kmp-default-debuginfo-4.4.21-90.1
– SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
      kernel-default-4.4.21-90.1
      kernel-default-debuginfo-4.4.21-90.1
      kernel-default-debugsource-4.4.21-90.1
      kernel-default-devel-4.4.21-90.1
      kernel-default-extra-4.4.21-90.1
      kernel-default-extra-debuginfo-4.4.21-90.1
      kernel-syms-4.4.21-90.1
– SUSE Linux Enterprise Desktop 12-SP2 (noarch):
      kernel-devel-4.4.21-90.1
      kernel-macros-4.4.21-90.1
      kernel-source-4.4.21-90.1
References:
   https://www.suse.com/security/cve/CVE-2016-9576.html
   https://www.suse.com/security/cve/CVE-2016-9794.html
   https://bugzilla.suse.com/1013533
   https://bugzilla.suse.com/1013604
— 
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org



