Security update for kgraft-patch-SLE12_Update_1, kgraft-patch-SLE12_Update_2
Announcement ID: | SUSE-SU-2015:0832-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves one vulnerability and has one security fix can now be installed.
Description:
This update supplies kgraft patches to fix one security vulnerability.
CVE-2015-1421: A use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel allowed remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.
This patch supplies kgraft patches for the first kernel update and the second kernel update published for SUSE Linux Enterprise Server 12. The third kernel update contains the patch already.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Live Patching 12
zypper in -t patch SUSE-SLE-Live-Patching-12-2015-183=1
Package List:
-
SUSE Linux Enterprise Live Patching 12 (x86_64)
- kgraft-patch-3_12_36-38-xen-2-3.1
- kgraft-patch-3_12_36-38-default-2-3.1
- kgraft-patch-3_12_32-33-xen-2-3.1
- kgraft-patch-3_12_32-33-default-2-3.1