[security-announce] openSUSE-SU-2016:1798-1: important: Security update for the Linux Kernel
openSUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:1798-1 Rating: important References: #970114 #970275 #978469 #980265 #983977 #984755 #986362 #986530 #986572 Cross-References: CVE-2016-4470 CVE-2016-4794 CVE-2016-4997 CVE-2016-5829 Affected Products: openSUSE Leap 42.1 ______________________________________________________________________________ An update that solves four vulnerabilities and has 5 fixes is now available. Description: The openSUSE Leap 42.1 was updated to 4.1.27 to receive various security and bugfixes. The following security bugs were fixed: - CVE-2016-4997: A buffer overflow in 32bit compat_setsockopt iptables handling could lead to a local privilege escalation. (bsc#986362) - CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572). - CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755). - CVE-2016-4794: Use-after-free vulnerability in mm/percpu.c in the Linux kernel allowed local users to cause a denial of service (BUG) or possibly have unspecified other impact via crafted use of the mmap and bpf system calls (bnc#980265). The following non-security bugs were fixed: - Refresh patches.xen/xen-netback-coalesce: Restore copying of SKBs with head exceeding page size (bsc#978469). - Refresh patches.xen/xen3-patch-2.6.26 (fix PAT initialization). - Refresh patches.xen/xen3-patch-2.6.39 (fix ia32_compat inheritance). - Refresh patches.xen/xen3-patch-3.14: Suppress atomic file position updates for /proc/xen/xenbus (bsc#970275). - Refresh patches.xen/xen3-patch-3.16 (drop redundant addition of a comment). - Refresh patches.xen/xen3-patch-4.1.7-8. - base: make module_create_drivers_dir race-free (bnc#983977). - ipvs: count pre-established TCP states as active (bsc#970114). - net: thunderx: Fix TL4 configuration for secondary Qsets (bsc#986530). - net: thunderx: Fix link status reporting (bsc#986530). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2016-869=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (i686 x86_64): kernel-debug-4.1.27-24.1 kernel-debug-base-4.1.27-24.1 kernel-debug-base-debuginfo-4.1.27-24.1 kernel-debug-debuginfo-4.1.27-24.1 kernel-debug-debugsource-4.1.27-24.1 kernel-debug-devel-4.1.27-24.1 kernel-debug-devel-debuginfo-4.1.27-24.1 kernel-ec2-4.1.27-24.1 kernel-ec2-base-4.1.27-24.1 kernel-ec2-base-debuginfo-4.1.27-24.1 kernel-ec2-debuginfo-4.1.27-24.1 kernel-ec2-debugsource-4.1.27-24.1 kernel-ec2-devel-4.1.27-24.1 kernel-pv-4.1.27-24.1 kernel-pv-base-4.1.27-24.1 kernel-pv-base-debuginfo-4.1.27-24.1 kernel-pv-debuginfo-4.1.27-24.1 kernel-pv-debugsource-4.1.27-24.1 kernel-pv-devel-4.1.27-24.1 kernel-vanilla-4.1.27-24.1 kernel-vanilla-debuginfo-4.1.27-24.1 kernel-vanilla-debugsource-4.1.27-24.1 kernel-vanilla-devel-4.1.27-24.1 kernel-xen-4.1.27-24.1 kernel-xen-base-4.1.27-24.1 kernel-xen-base-debuginfo-4.1.27-24.1 kernel-xen-debuginfo-4.1.27-24.1 kernel-xen-debugsource-4.1.27-24.1 kernel-xen-devel-4.1.27-24.1 - openSUSE Leap 42.1 (i586 x86_64): kernel-default-4.1.27-24.1 kernel-default-base-4.1.27-24.1 kernel-default-base-debuginfo-4.1.27-24.1 kernel-default-debuginfo-4.1.27-24.1 kernel-default-debugsource-4.1.27-24.1 kernel-default-devel-4.1.27-24.1 kernel-obs-build-4.1.27-24.2 kernel-obs-build-debugsource-4.1.27-24.2 kernel-obs-qa-4.1.27-24.1 kernel-obs-qa-xen-4.1.27-24.1 kernel-syms-4.1.27-24.1 - openSUSE Leap 42.1 (noarch): kernel-devel-4.1.27-24.1 kernel-docs-4.1.27-24.2 kernel-docs-html-4.1.27-24.2 kernel-docs-pdf-4.1.27-24.2 kernel-macros-4.1.27-24.1 kernel-source-4.1.27-24.1 kernel-source-vanilla-4.1.27-24.1 - openSUSE Leap 42.1 (i686): kernel-pae-4.1.27-24.1 kernel-pae-base-4.1.27-24.1 kernel-pae-base-debuginfo-4.1.27-24.1 kernel-pae-debuginfo-4.1.27-24.1 kernel-pae-debugsource-4.1.27-24.1 kernel-pae-devel-4.1.27-24.1 References: https://www.suse.com/security/cve/CVE-2016-4470.html https://www.suse.com/security/cve/CVE-2016-4794.html https://www.suse.com/security/cve/CVE-2016-4997.html https://www.suse.com/security/cve/CVE-2016-5829.html https://bugzilla.suse.com/970114 https://bugzilla.suse.com/970275 https://bugzilla.suse.com/978469 https://bugzilla.suse.com/980265 https://bugzilla.suse.com/983977 https://bugzilla.suse.com/984755 https://bugzilla.suse.com/986362 https://bugzilla.suse.com/986530 https://bugzilla.suse.com/986572 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
participants (1)
-
opensuse-security@opensuse.org