Security update for kernel live patch 3
Announcement ID: | SUSE-SU-2016:0745-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves two vulnerabilities can now be installed.
Description:
This kernel live patch for Linux Kernel 3.12.38-44.1 fixes two security issues:
Fixes: - CVE-2016-0728: A reference leak in keyring handling with join_session_keyring() could lead to local attackers gain root privileges. (bsc#962078). - CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls. (bsc#955837)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Live Patching 12
zypper in -t patch SUSE-SLE-Live-Patching-12-2016-434=1 SUSE-SLE-Live-Patching-12-2016-436=1 SUSE-SLE-Live-Patching-12-2016-432=1 SUSE-SLE-Live-Patching-12-2016-435=1 SUSE-SLE-Live-Patching-12-2016-430=1 SUSE-SLE-Live-Patching-12-2016-431=1 SUSE-SLE-Live-Patching-12-2016-433=1
Package List:
-
SUSE Linux Enterprise Live Patching 12 (x86_64)
- kgraft-patch-3_12_44-52_10-default-4-2.1
- kgraft-patch-3_12_48-52_27-xen-3-2.1
- kgraft-patch-3_12_44-52_18-default-4-2.1
- kgraft-patch-3_12_48-52_27-default-3-2.1
- kgraft-patch-3_12_51-52_31-default-3-2.1
- kgraft-patch-3_12_38-44-default-5-2.1
- kgraft-patch-3_12_39-47-default-5-2.1
- kgraft-patch-3_12_44-52_18-xen-4-2.1
- kgraft-patch-3_12_51-52_31-xen-3-2.1
- kgraft-patch-3_12_43-52_6-default-5-2.1
- kgraft-patch-3_12_38-44-xen-5-2.1
- kgraft-patch-3_12_43-52_6-xen-5-2.1
- kgraft-patch-3_12_39-47-xen-5-2.1
- kgraft-patch-3_12_44-52_10-xen-4-2.1