SuSE: 2015:2090-1: important: Linux Kernel Live Patch 3
Summary
This kernel live patch for Linux Kernel 3.12.38-44.1 fixes two security issues: - CVE-2015-7613: A race condition in the IPC object implementation in the Linux kernel allowed local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c. (bsc#948701 bsc#948536) - CVE-2015-5707: Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request. (bsc#940342 bsc#940338) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2015-885=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_38-44-default-3-2.1 kgraft-patch-3_12_38-44-xen-3-2.1
References
#940338 #940342 #948536 #948701
Cross- CVE-2015-5707 CVE-2015-7613
Affected Products:
SUSE Linux Enterprise Live Patching 12
https://www.suse.com/security/cve/CVE-2015-5707.html
https://www.suse.com/security/cve/CVE-2015-7613.html
https://bugzilla.suse.com/940338
https://bugzilla.suse.com/940342
https://bugzilla.suse.com/948536
https://bugzilla.suse.com/948701