Discover Government News

   SUSE Security Update: Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:3291-1
Rating:             important
References:         #1053153 #1055567 #1062847 #1069708 
Cross-References:   CVE-2017-10661 CVE-2017-16939
Affected Products:
                    SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________

   An update that solves two vulnerabilities and has two fixes
   is now available.

Description:

   This update for the Linux Kernel 4.4.49-92_14 fixes several issues.

   The following security issues were fixed:

   - CVE-2017-16939: The XFRM dump policy implementation in
     net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or
     cause a denial of service (use-after-free) via a crafted SO_RCVBUF
     setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink
     messages (bsc#1069708).
   - CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to
     gain privileges or cause a denial of service (list corruption or
     use-after-free) via simultaneous file-descriptor operations that
     leverage improper might_cancel queueing (bsc#1053153).

   This non-security issue was fixed:

   - bsc#1062847: Enable proper shut down if NIC teaming is enabled


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Live Patching 12:

      zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2052=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Live Patching 12 (x86_64):

      kgraft-patch-4_4_49-92_14-default-8-2.1


References:

   https://www.suse.com/security/cve/CVE-2017-10661.html
   https://www.suse.com/security/cve/CVE-2017-16939.html
   https://bugzilla.suse.com/1053153
   https://bugzilla.suse.com/1055567
   https://bugzilla.suse.com/1062847
   https://bugzilla.suse.com/1069708

SuSE: 2017:3291-1: important: the Linux Kernel (Live Patch 6 for SLE 12 SP2)

December 14, 2017
An update that solves two vulnerabilities and has two fixes An update that solves two vulnerabilities and has two fixes An update that solves two vulnerabilities and has two fixes ...

Summary

This update for the Linux Kernel 4.4.49-92_14 fixes several issues. The following security issues were fixed: - CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bsc#1069708). - CVE-2017-10661: Race condition in fs/timerfd.c allowed local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing (bsc#1053153). This non-security issue was fixed: - bsc#1062847: Enable proper shut down if NIC teaming is enabled Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-2052=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-4_4_49-92_14-default-8-2.1

References

#1053153 #1055567 #1062847 #1069708

Cross- CVE-2017-10661 CVE-2017-16939

Affected Products:

SUSE Linux Enterprise Live Patching 12

https://www.suse.com/security/cve/CVE-2017-10661.html

https://www.suse.com/security/cve/CVE-2017-16939.html

https://bugzilla.suse.com/1053153

https://bugzilla.suse.com/1055567

https://bugzilla.suse.com/1062847

https://bugzilla.suse.com/1069708

Severity
Announcement ID: SUSE-SU-2017:3291-1
Rating: important

Related News