Описание
Security update for Linux Kernel Live Patch 9 for SLE 12
This update for the Linux Kernel 3.12.51-52_31 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Список пакетов
SUSE Linux Enterprise Server 12-LTSS
SUSE Linux Enterprise Server for SAP Applications 12
Ссылки
- Link for SUSE-SU-2016:2636-1
- E-Mail link for SUSE-SU-2016:2636-1
- SUSE Security Ratings
- SUSE Bug 1004419
- SUSE Bug 986377
- SUSE CVE CVE-2016-4997 page
- SUSE CVE CVE-2016-5195 page
Описание
The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.
Затронутые продукты
Ссылки
- CVE-2016-4997
- SUSE Bug 1020452
- SUSE Bug 986362
- SUSE Bug 986365
- SUSE Bug 986377
- SUSE Bug 991651
Описание
Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
Затронутые продукты
Ссылки
- CVE-2016-5195
- SUSE Bug 1004418
- SUSE Bug 1004419
- SUSE Bug 1004436
- SUSE Bug 1006323
- SUSE Bug 1006695
- SUSE Bug 1007291
- SUSE Bug 1008110
- SUSE Bug 1030118
- SUSE Bug 1046453
- SUSE Bug 1069496
- SUSE Bug 1149725
- SUSE Bug 870618
- SUSE Bug 986445
- SUSE Bug 998689