SUSE Security Update: Security update for kgraft-patch-SLE12_Update_1, kgraft-patch-SLE12_Update_2
______________________________________________________________________________

Announcement ID:    SUSE-SU-2015:0832-1
Rating:             important
References:         #920633 #922004 
Cross-References:   CVE-2015-1421
Affected Products:
                    SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________

   An update that solves one vulnerability and has one errata
   is now available.

Description:


   This update supplies kgraft patches to fix one security vulnerability.

   CVE-2015-1421: A use-after-free vulnerability in the sctp_assoc_update
   function in net/sctp/associola.c in the Linux kernel allowed remote
   attackers to cause a denial of service (slab corruption and panic) or
   possibly have unspecified other impact by triggering an INIT collision
   that leads to improper handling of shared-key data.

   This patch supplies kgraft patches for the first kernel update and the
   second kernel update published for SUSE Linux Enterprise Server 12. The
   third kernel update contains the patch already.


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Live Patching 12:

      zypper in -t patch SUSE-SLE-Live-Patching-12-2015-183=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Live Patching 12 (x86_64):

      kgraft-patch-3_12_32-33-default-2-3.1
      kgraft-patch-3_12_32-33-xen-2-3.1
      kgraft-patch-3_12_36-38-default-2-3.1
      kgraft-patch-3_12_36-38-xen-2-3.1


References:

   https://www.suse.com/security/cve/CVE-2015-1421.html
   https://bugzilla.suse.com/920633
   https://bugzilla.suse.com/922004

SuSE: 2015:0832-1: important: kgraft-patch-SLE12_Update_1, kgraft-patch-SLE12_Update_2

May 7, 2015
An update that solves one vulnerability and has one errata An update that solves one vulnerability and has one errata An update that solves one vulnerability and has one errata is ...

Summary

This update supplies kgraft patches to fix one security vulnerability. CVE-2015-1421: A use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel allowed remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data. This patch supplies kgraft patches for the first kernel update and the second kernel update published for SUSE Linux Enterprise Server 12. The third kernel update contains the patch already. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2015-183=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_32-33-default-2-3.1 kgraft-patch-3_12_32-33-xen-2-3.1 kgraft-patch-3_12_36-38-default-2-3.1 kgraft-patch-3_12_36-38-xen-2-3.1

References

#920633 #922004

Cross- CVE-2015-1421

Affected Products:

SUSE Linux Enterprise Live Patching 12

https://www.suse.com/security/cve/CVE-2015-1421.html

https://bugzilla.suse.com/920633

https://bugzilla.suse.com/922004

Severity
Announcement ID: SUSE-SU-2015:0832-1
Rating: important

Related News