Security update for kernel live patch 3

Announcement ID: SUSE-SU-2016:0745-1
Rating: important
References:
Cross-References:
CVSS scores:
  • CVE-2016-0728 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2016-0728 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
  • SUSE Linux Enterprise High Performance Computing 12 SP2
  • SUSE Linux Enterprise Live Patching 12
  • SUSE Linux Enterprise Server 12
  • SUSE Linux Enterprise Server 12 SP1
  • SUSE Linux Enterprise Server 12 SP2
  • SUSE Linux Enterprise Server for SAP Applications 12
  • SUSE Linux Enterprise Server for SAP Applications 12 SP1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP2

An update that solves two vulnerabilities can now be installed.

Description:

This kernel live patch for Linux Kernel 3.12.38-44.1 fixes two security issues:

Fixes: - CVE-2016-0728: A reference leak in keyring handling with join_session_keyring() could lead to local attackers gain root privileges. (bsc#962078). - CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls. (bsc#955837)

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Live Patching 12
    zypper in -t patch SUSE-SLE-Live-Patching-12-2016-434=1 SUSE-SLE-Live-Patching-12-2016-436=1 SUSE-SLE-Live-Patching-12-2016-432=1 SUSE-SLE-Live-Patching-12-2016-435=1 SUSE-SLE-Live-Patching-12-2016-430=1 SUSE-SLE-Live-Patching-12-2016-431=1 SUSE-SLE-Live-Patching-12-2016-433=1

Package List:

  • SUSE Linux Enterprise Live Patching 12 (x86_64)
    • kgraft-patch-3_12_44-52_10-default-4-2.1
    • kgraft-patch-3_12_48-52_27-xen-3-2.1
    • kgraft-patch-3_12_44-52_18-default-4-2.1
    • kgraft-patch-3_12_48-52_27-default-3-2.1
    • kgraft-patch-3_12_51-52_31-default-3-2.1
    • kgraft-patch-3_12_38-44-default-5-2.1
    • kgraft-patch-3_12_39-47-default-5-2.1
    • kgraft-patch-3_12_44-52_18-xen-4-2.1
    • kgraft-patch-3_12_51-52_31-xen-3-2.1
    • kgraft-patch-3_12_43-52_6-default-5-2.1
    • kgraft-patch-3_12_38-44-xen-5-2.1
    • kgraft-patch-3_12_43-52_6-xen-5-2.1
    • kgraft-patch-3_12_39-47-xen-5-2.1
    • kgraft-patch-3_12_44-52_10-xen-4-2.1

References: