MESSAGE
DATE | 2016-10-21 |
FROM | opensuse-security@opensuse.org
|
SUBJECT | Subject: [Hangout-NYLXS] [security-announce] SUSE-SU-2016:2592-1: important:
|
From hangout-bounces-at-nylxs.com Fri Oct 21 14:15:48 2016 Return-Path: X-Original-To: archive-at-mrbrklyn.com Delivered-To: archive-at-mrbrklyn.com Received: from www.mrbrklyn.com (www.mrbrklyn.com [96.57.23.82]) by mrbrklyn.com (Postfix) with ESMTP id A9657160E33; Fri, 21 Oct 2016 14:15:47 -0400 (EDT) X-Original-To: hangout-at-nylxs.com Delivered-To: hangout-at-nylxs.com Received: by mrbrklyn.com (Postfix, from userid 1000) id 50030160E38; Fri, 21 Oct 2016 14:15:38 -0400 (EDT) Resent-From: Ruben Safir Resent-Date: Fri, 21 Oct 2016 14:15:38 -0400 Resent-Message-ID: <20161021181538.GE22290-at-www.mrbrklyn.com> Resent-To: hangout-at-nylxs.com X-Original-To: ruben-at-mrbrklyn.com Delivered-To: ruben-at-mrbrklyn.com Received: from lists5.opensuse.org (lists5.opensuse.org [195.135.221.153]) by mrbrklyn.com (Postfix) with ESMTP id 24776160877 for ; Fri, 21 Oct 2016 13:14:34 -0400 (EDT) Received: from baloo.opensuse.org (localhost [127.0.0.1]) by lists5.opensuse.org (Postfix) with SMTP id B506911CA7; Fri, 21 Oct 2016 17:14:27 +0000 (UTC) X-Original-To: opensuse-security-announce-at-lists5-opensuse.suse.de Delivered-To: opensuse-security-announce-at-lists5-opensuse.suse.de Received: from relay1.suse.de (relay1.suse.de [149.44.160.133]) by lists5.opensuse.org (Postfix) with ESMTP id E237111C42 for ; Fri, 21 Oct 2016 17:14:25 +0000 (UTC) Received: from maintenance.suse.de (maintenance.nue.suse.com [149.44.176.14]) by relay1.suse.de (Postfix) with ESMTP id C11EF1AA8 for ; Fri, 21 Oct 2016 17:14:25 +0000 (UTC) Received: by maintenance.suse.de (Postfix, from userid 32005) id AB71BF7CA; Fri, 21 Oct 2016 19:14:25 +0200 (CEST) From: opensuse-security-at-opensuse.org To: opensuse-security-announce-at-opensuse.org Message-Id: <20161021171425.AB71BF7CA-at-maintenance.suse.de> Date: Fri, 21 Oct 2016 19:14:25 +0200 (CEST) Precedence: bulk Mailing-List: contact opensuse-security-announce+help-at-opensuse.org; run by mlmmj X-Mailinglist: opensuse-security-announce List-Owner: X-MIME-Notice: attachments may have been removed from this message Subject: [Hangout-NYLXS] [security-announce] SUSE-SU-2016:2592-1: important: Security update for the Linux Kernel X-BeenThere: hangout-at-nylxs.com X-Mailman-Version: 2.1.17 Reply-To: NYLXS Discussions List List-Id: NYLXS Discussions List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: hangout-bounces-at-nylxs.com Sender: "hangout"
SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________
Announcement ID: SUSE-SU-2016:2592-1 Rating: important References: #1001419 #1002165 #1004418 #904970 #907150 #920615 #920633 #930408 Cross-References: CVE-2016-5195 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP1 SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Module for Public Cloud 12 SUSE Linux Enterprise Live Patching 12 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________
An update that solves one vulnerability and has 7 fixes is now available.
Description:
The SUSE Linux Enterprise 12 SP1 kernel was updated to fix two issues.
This security bug was fixed:
- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
This non-security bug was fixed:
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).
Patch Instructions:
To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP1:
zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1522=1
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1522=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1522=1
- SUSE Linux Enterprise Module for Public Cloud 12:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2016-1522=1
- SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1522=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1522=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):
kernel-default-debuginfo-3.12.62-60.64.8.2 kernel-default-debugsource-3.12.62-60.64.8.2 kernel-default-extra-3.12.62-60.64.8.2 kernel-default-extra-debuginfo-3.12.62-60.64.8.2
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
kernel-obs-build-3.12.62-60.64.8.3 kernel-obs-build-debugsource-3.12.62-60.64.8.3
- SUSE Linux Enterprise Software Development Kit 12-SP1 (noarch):
kernel-docs-3.12.62-60.64.8.5
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
kernel-default-3.12.62-60.64.8.2 kernel-default-base-3.12.62-60.64.8.2 kernel-default-base-debuginfo-3.12.62-60.64.8.2 kernel-default-debuginfo-3.12.62-60.64.8.2 kernel-default-debugsource-3.12.62-60.64.8.2 kernel-default-devel-3.12.62-60.64.8.2 kernel-syms-3.12.62-60.64.8.2
- SUSE Linux Enterprise Server 12-SP1 (noarch):
kernel-devel-3.12.62-60.64.8.2 kernel-macros-3.12.62-60.64.8.2 kernel-source-3.12.62-60.64.8.2
- SUSE Linux Enterprise Server 12-SP1 (x86_64):
kernel-xen-3.12.62-60.64.8.2 kernel-xen-base-3.12.62-60.64.8.2 kernel-xen-base-debuginfo-3.12.62-60.64.8.2 kernel-xen-debuginfo-3.12.62-60.64.8.2 kernel-xen-debugsource-3.12.62-60.64.8.2 kernel-xen-devel-3.12.62-60.64.8.2
- SUSE Linux Enterprise Server 12-SP1 (s390x):
kernel-default-man-3.12.62-60.64.8.2
- SUSE Linux Enterprise Module for Public Cloud 12 (x86_64):
kernel-ec2-3.12.62-60.64.8.2 kernel-ec2-debuginfo-3.12.62-60.64.8.2 kernel-ec2-debugsource-3.12.62-60.64.8.2 kernel-ec2-devel-3.12.62-60.64.8.2 kernel-ec2-extra-3.12.62-60.64.8.2 kernel-ec2-extra-debuginfo-3.12.62-60.64.8.2
- SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-3_12_62-60_64_8-default-1-2.2 kgraft-patch-3_12_62-60_64_8-xen-1-2.2
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
kernel-default-3.12.62-60.64.8.2 kernel-default-debuginfo-3.12.62-60.64.8.2 kernel-default-debugsource-3.12.62-60.64.8.2 kernel-default-devel-3.12.62-60.64.8.2 kernel-default-extra-3.12.62-60.64.8.2 kernel-default-extra-debuginfo-3.12.62-60.64.8.2 kernel-syms-3.12.62-60.64.8.2 kernel-xen-3.12.62-60.64.8.2 kernel-xen-debuginfo-3.12.62-60.64.8.2 kernel-xen-debugsource-3.12.62-60.64.8.2 kernel-xen-devel-3.12.62-60.64.8.2
- SUSE Linux Enterprise Desktop 12-SP1 (noarch):
kernel-devel-3.12.62-60.64.8.2 kernel-macros-3.12.62-60.64.8.2 kernel-source-3.12.62-60.64.8.2
References:
https://www.suse.com/security/cve/CVE-2016-5195.html https://bugzilla.suse.com/1001419 https://bugzilla.suse.com/1002165 https://bugzilla.suse.com/1004418 https://bugzilla.suse.com/904970 https://bugzilla.suse.com/907150 https://bugzilla.suse.com/920615 https://bugzilla.suse.com/920633 https://bugzilla.suse.com/930408
-- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe-at-opensuse.org For additional commands, e-mail: opensuse-security-announce+help-at-opensuse.org _______________________________________________ hangout mailing list hangout-at-nylxs.com http://www.nylxs.com/
|
|