Jump to content
Compatible Support Forums
Sign in to follow this  
news

[security-announce] openSUSE-SU-2016:1798-1: important: Security update for the Linux Kernel

Recommended Posts

openSUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

 

Announcement ID: openSUSE-SU-2016:1798-1

Rating: important

References: #970114 #970275 #978469 #980265 #983977 #984755

#986362 #986530 #986572

Cross-References: CVE-2016-4470 CVE-2016-4794 CVE-2016-4997

CVE-2016-5829

Affected Products:

openSUSE Leap 42.1

______________________________________________________________________________

 

An update that solves four vulnerabilities and has 5 fixes

is now available.

 

Description:

 

 

The openSUSE Leap 42.1 was updated to 4.1.27 to receive various security

and bugfixes.

 

The following security bugs were fixed:

- CVE-2016-4997: A buffer overflow in 32bit compat_setsockopt iptables

handling could lead to a local privilege escalation. (bsc#986362)

- CVE-2016-5829: Multiple heap-based buffer overflows in the

hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux

kernel allow local users to cause a denial of service or possibly have

unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2)

HIDIOCSUSAGES ioctl call (bnc#986572).

- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c

in the Linux kernel did not ensure that a certain data structure is

initialized, which allowed local users to cause a denial of service

(system crash) via vectors involving a crafted keyctl request2 command

(bnc#984755).

- CVE-2016-4794: Use-after-free vulnerability in mm/percpu.c in the Linux

kernel allowed local users to cause a denial of service (BUG)

or possibly have unspecified other impact via crafted use of the mmap

and bpf system calls (bnc#980265).

 

The following non-security bugs were fixed:

- Refresh patches.xen/xen-netback-coalesce: Restore copying of SKBs with

head exceeding page size (bsc#978469).

- Refresh patches.xen/xen3-patch-2.6.26 (fix PAT initialization).

- Refresh patches.xen/xen3-patch-2.6.39 (fix ia32_compat inheritance).

- Refresh patches.xen/xen3-patch-3.14: Suppress atomic file position

updates for /proc/xen/xenbus (bsc#970275).

- Refresh patches.xen/xen3-patch-3.16 (drop redundant addition of a

comment).

- Refresh patches.xen/xen3-patch-4.1.7-8.

- base: make module_create_drivers_dir race-free (bnc#983977).

- ipvs: count pre-established TCP states as active (bsc#970114).

- net: thunderx: Fix TL4 configuration for secondary Qsets (bsc#986530).

- net: thunderx: Fix link status reporting (bsc#986530).

 

 

Patch Instructions:

 

To install this openSUSE Security Update use YaST online_update.

Alternatively you can run the command listed for your product:

 

- openSUSE Leap 42.1:

 

zypper in -t patch openSUSE-2016-869=1

 

To bring your system up-to-date, use "zypper patch".

 

 

Package List:

 

- openSUSE Leap 42.1 (i686 x86_64):

 

kernel-debug-4.1.27-24.1

kernel-debug-base-4.1.27-24.1

kernel-debug-base-debuginfo-4.1.27-24.1

kernel-debug-debuginfo-4.1.27-24.1

kernel-debug-debugsource-4.1.27-24.1

kernel-debug-devel-4.1.27-24.1

kernel-debug-devel-debuginfo-4.1.27-24.1

kernel-ec2-4.1.27-24.1

kernel-ec2-base-4.1.27-24.1

kernel-ec2-base-debuginfo-4.1.27-24.1

kernel-ec2-debuginfo-4.1.27-24.1

kernel-ec2-debugsource-4.1.27-24.1

kernel-ec2-devel-4.1.27-24.1

kernel-pv-4.1.27-24.1

kernel-pv-base-4.1.27-24.1

kernel-pv-base-debuginfo-4.1.27-24.1

kernel-pv-debuginfo-4.1.27-24.1

kernel-pv-debugsource-4.1.27-24.1

kernel-pv-devel-4.1.27-24.1

kernel-vanilla-4.1.27-24.1

kernel-vanilla-debuginfo-4.1.27-24.1

kernel-vanilla-debugsource-4.1.27-24.1

kernel-vanilla-devel-4.1.27-24.1

kernel-xen-4.1.27-24.1

kernel-xen-base-4.1.27-24.1

kernel-xen-base-debuginfo-4.1.27-24.1

kernel-xen-debuginfo-4.1.27-24.1

kernel-xen-debugsource-4.1.27-24.1

kernel-xen-devel-4.1.27-24.1

 

- openSUSE Leap 42.1 (i586 x86_64):

 

kernel-default-4.1.27-24.1

kernel-default-base-4.1.27-24.1

kernel-default-base-debuginfo-4.1.27-24.1

kernel-default-debuginfo-4.1.27-24.1

kernel-default-debugsource-4.1.27-24.1

kernel-default-devel-4.1.27-24.1

kernel-obs-build-4.1.27-24.2

kernel-obs-build-debugsource-4.1.27-24.2

kernel-obs-qa-4.1.27-24.1

kernel-obs-qa-xen-4.1.27-24.1

kernel-syms-4.1.27-24.1

 

- openSUSE Leap 42.1 (noarch):

 

kernel-devel-4.1.27-24.1

kernel-docs-4.1.27-24.2

kernel-docs-html-4.1.27-24.2

kernel-docs-pdf-4.1.27-24.2

kernel-macros-4.1.27-24.1

kernel-source-4.1.27-24.1

kernel-source-vanilla-4.1.27-24.1

 

- openSUSE Leap 42.1 (i686):

 

kernel-pae-4.1.27-24.1

kernel-pae-base-4.1.27-24.1

kernel-pae-base-debuginfo-4.1.27-24.1

kernel-pae-debuginfo-4.1.27-24.1

kernel-pae-debugsource-4.1.27-24.1

kernel-pae-devel-4.1.27-24.1

 

 

References:

 

https://www.suse.com/security/cve/CVE-2016-4470.html

https://www.suse.com/security/cve/CVE-2016-4794.html

https://www.suse.com/security/cve/CVE-2016-4997.html

https://www.suse.com/security/cve/CVE-2016-5829.html

https://bugzilla.suse.com/970114

https://bugzilla.suse.com/970275

https://bugzilla.suse.com/978469

https://bugzilla.suse.com/980265

https://bugzilla.suse.com/983977

https://bugzilla.suse.com/984755

https://bugzilla.suse.com/986362

https://bugzilla.suse.com/986530

https://bugzilla.suse.com/986572

 

--

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org

For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×