Описание
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 SP1 kernel was updated to fix two issues.
This security bug was fixed:
- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
This non-security bug was fixed:
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).
Список пакетов
SUSE Linux Enterprise Desktop 12 SP1
kernel-default-3.12.62-60.64.8.2
kernel-default-devel-3.12.62-60.64.8.2
kernel-default-extra-3.12.62-60.64.8.2
kernel-devel-3.12.62-60.64.8.2
kernel-macros-3.12.62-60.64.8.2
kernel-source-3.12.62-60.64.8.2
kernel-syms-3.12.62-60.64.8.2
kernel-xen-3.12.62-60.64.8.2
kernel-xen-devel-3.12.62-60.64.8.2
SUSE Linux Enterprise Live Patching 12
kgraft-patch-3_12_62-60_64_8-default-1-2.2
kgraft-patch-3_12_62-60_64_8-xen-1-2.2
SUSE Linux Enterprise Module for Public Cloud 12
kernel-ec2-3.12.62-60.64.8.2
kernel-ec2-devel-3.12.62-60.64.8.2
kernel-ec2-extra-3.12.62-60.64.8.2
SUSE Linux Enterprise Server 12 SP1
kernel-default-3.12.62-60.64.8.2
kernel-default-base-3.12.62-60.64.8.2
kernel-default-devel-3.12.62-60.64.8.2
kernel-default-man-3.12.62-60.64.8.2
kernel-devel-3.12.62-60.64.8.2
kernel-macros-3.12.62-60.64.8.2
kernel-source-3.12.62-60.64.8.2
kernel-syms-3.12.62-60.64.8.2
kernel-xen-3.12.62-60.64.8.2
kernel-xen-base-3.12.62-60.64.8.2
kernel-xen-devel-3.12.62-60.64.8.2
SUSE Linux Enterprise Server for SAP Applications 12 SP1
kernel-default-3.12.62-60.64.8.2
kernel-default-base-3.12.62-60.64.8.2
kernel-default-devel-3.12.62-60.64.8.2
kernel-default-man-3.12.62-60.64.8.2
kernel-devel-3.12.62-60.64.8.2
kernel-macros-3.12.62-60.64.8.2
kernel-source-3.12.62-60.64.8.2
kernel-syms-3.12.62-60.64.8.2
kernel-xen-3.12.62-60.64.8.2
kernel-xen-base-3.12.62-60.64.8.2
kernel-xen-devel-3.12.62-60.64.8.2
SUSE Linux Enterprise Software Development Kit 12 SP1
kernel-docs-3.12.62-60.64.8.5
kernel-obs-build-3.12.62-60.64.8.3
SUSE Linux Enterprise Workstation Extension 12 SP1
kernel-default-extra-3.12.62-60.64.8.2
Ссылки
- Link for SUSE-SU-2016:2592-1
- E-Mail link for SUSE-SU-2016:2592-1
- SUSE Security Ratings
- SUSE Bug 1001419
- SUSE Bug 1002165
- SUSE Bug 1004418
- SUSE Bug 904970
- SUSE Bug 907150
- SUSE Bug 920615
- SUSE Bug 920633
- SUSE Bug 930408
- SUSE CVE CVE-2016-5195 page
Описание
Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.64.8.2
SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.64.8.2
SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.64.8.2
SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.64.8.2
Ссылки
- CVE-2016-5195
- SUSE Bug 1004418
- SUSE Bug 1004419
- SUSE Bug 1004436
- SUSE Bug 1006323
- SUSE Bug 1006695
- SUSE Bug 1007291
- SUSE Bug 1008110
- SUSE Bug 1030118
- SUSE Bug 1046453
- SUSE Bug 1069496
- SUSE Bug 1149725
- SUSE Bug 870618
- SUSE Bug 986445
- SUSE Bug 998689