Описание
Security update for Linux Kernel Live Patch 3
This kernel live patch for Linux Kernel 3.12.38-44.1 fixes two security issues:
- CVE-2015-7613: A race condition in the IPC object implementation in the Linux kernel allowed local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c. (bsc#948701 bsc#948536)
- CVE-2015-5707: Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request. (bsc#940342 bsc#940338)
Список пакетов
SUSE Linux Enterprise Live Patching 12
kgraft-patch-3_12_38-44-default-3-2.1
kgraft-patch-3_12_38-44-xen-3-2.1
Ссылки
- Link for SUSE-SU-2015:2090-1
- E-Mail link for SUSE-SU-2015:2090-1
- SUSE Security Ratings
- SUSE Bug 940338
- SUSE Bug 940342
- SUSE Bug 948536
- SUSE Bug 948701
- SUSE CVE CVE-2015-5707 page
- SUSE CVE CVE-2015-7613 page
Описание
Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.
Затронутые продукты
SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-3-2.1
SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-3-2.1
Ссылки
- CVE-2015-5707
- SUSE Bug 923755
- SUSE Bug 940338
- SUSE Bug 940342
- SUSE Bug 963994
Описание
Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.
Затронутые продукты
SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-default-3-2.1
SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_38-44-xen-3-2.1
Ссылки
- CVE-2015-7613
- SUSE Bug 923755
- SUSE Bug 948536
- SUSE Bug 948701
- SUSE Bug 963994