SuSE: 2015:2089-1: important: Linux Kernel Live Patch 1
Summary
This kernel live patch for Linux Kernel 3.12.32-33.1 fixes two security issues: - CVE-2015-7613: A race condition in the IPC object implementation in the Linux kernel allowed local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c. (bsc#948701 bsc#948536) - CVE-2015-5707: Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request. (bsc#940342 bsc#940338) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2015-883=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_32-33-default-4-2.3 kgraft-patch-3_12_32-33-xen-4-2.3
References
#940338 #940342 #948536 #948701
Cross- CVE-2015-5707 CVE-2015-7613
Affected Products:
SUSE Linux Enterprise Live Patching 12
https://www.suse.com/security/cve/CVE-2015-5707.html
https://www.suse.com/security/cve/CVE-2015-7613.html
https://bugzilla.suse.com/940338
https://bugzilla.suse.com/940342
https://bugzilla.suse.com/948536
https://bugzilla.suse.com/948701