SUSE alert SUSE-SU-2015:2087-1 (linux-3.12.44)
From: | opensuse-security@opensuse.org | |
To: | opensuse-security-announce@opensuse.org | |
Subject: | [security-announce] SUSE-SU-2015:2087-1: important: Security update for Linux Kernel Live Patch 6 | |
Date: | Tue, 24 Nov 2015 19:13:10 +0100 (CET) | |
Message-ID: | <20151124181310.A3240320FF@maintenance.suse.de> |
SUSE Security Update: Security update for Linux Kernel Live Patch 6 ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:2087-1 Rating: important References: #940338 #940342 #948536 #948701 Cross-References: CVE-2015-5707 CVE-2015-7613 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that solves two vulnerabilities and has two fixes is now available. Description: This kernel live patch for Linux Kernel 3.12.44-52.10.1 fixes two security issues: - CVE-2015-7613: A race condition in the IPC object implementation in the Linux kernel allowed local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c. (bsc#948701 bsc#948536) - CVE-2015-5707: Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request. (bsc#940342 bsc#940338) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2015-888=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_44-52_10-default-2-2.1 kgraft-patch-3_12_44-52_10-xen-2-2.1 References: https://www.suse.com/security/cve/CVE-2015-5707.html https://www.suse.com/security/cve/CVE-2015-7613.html https://bugzilla.suse.com/940338 https://bugzilla.suse.com/940342 https://bugzilla.suse.com/948536 https://bugzilla.suse.com/948701 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org