[prev in list] [next in list] [prev in thread] [next in thread] 

List:       suse-security-announce
Subject:    [security-announce] SUSE-SU-2018:1033-1: important: Security update for the Linux Kernel (Live Patch
From:       opensuse-security () opensuse ! org
Date:       2018-04-20 13:50:41
Message-ID: 20180420135041.0998CFD2B () maintenance ! suse ! de
[Download RAW message or body]

   SUSE Security Update: Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP2)
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:1033-1
Rating:             important
References:         #1073230 #1076017 #1083488 #1085114 #1085447 
                    
Cross-References:   CVE-2017-13166 CVE-2018-1000004 CVE-2018-1068
                    CVE-2018-7566
Affected Products:
                    SUSE Linux Enterprise Server for SAP 12-SP2
                    SUSE Linux Enterprise Server 12-SP2-LTSS
______________________________________________________________________________

   An update that solves four vulnerabilities and has one
   errata is now available.

Description:

   This update for the Linux Kernel 4.4.74-92_29 fixes several issues.

   The following security issues were fixed:

   - CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2
     video driver (bsc#1085447).
   - CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface
     for bridging allowed a privileged user to arbitrarily write to a limited
     range of kernel memory (bsc#1085114).
   - CVE-2018-7566: Prevent buffer overflow via an
     SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by
     a local user (bsc#1083488).
   - CVE-2018-1000004: Prevent race condition in the sound system that could
     have lead to a deadlock and denial of service condition (bsc#1076017).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server for SAP 12-SP2:

      zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-669=1

   - SUSE Linux Enterprise Server 12-SP2-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-669=1



Package List:

   - SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):

      kgraft-patch-4_4_74-92_29-default-9-2.2

   - SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):

      kgraft-patch-4_4_74-92_29-default-9-2.2


References:

   https://www.suse.com/security/cve/CVE-2017-13166.html
   https://www.suse.com/security/cve/CVE-2018-1000004.html
   https://www.suse.com/security/cve/CVE-2018-1068.html
   https://www.suse.com/security/cve/CVE-2018-7566.html
   https://bugzilla.suse.com/1073230
   https://bugzilla.suse.com/1076017
   https://bugzilla.suse.com/1083488
   https://bugzilla.suse.com/1085114
   https://bugzilla.suse.com/1085447

-- 
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic