Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2017:1613-1

Опубликовано: 19 июн. 2017
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security fixes.

The following security bugs were fixed:

  • CVE-2017-1000364: The default stack guard page was too small and could be 'jumped over' by userland programs using more than one page of stack in functions and so lead to memory corruption. This update extends the stack guard page to 1 MB (for 4k pages) and 16 MB (for 64k pages) to reduce this attack vector. This is not a kernel bugfix, but a hardening measure against this kind of userland attack.(bsc#1039348)

  • CVE-2015-3288: mm/memory.c in the Linux kernel mishandled anonymous pages, which allowed local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero (bnc#979021).

Список пакетов

SUSE Linux Enterprise Point of Sale 11 SP3
kernel-default-3.0.101-0.47.102.1
kernel-default-base-3.0.101-0.47.102.1
kernel-default-devel-3.0.101-0.47.102.1
kernel-ec2-3.0.101-0.47.102.1
kernel-ec2-base-3.0.101-0.47.102.1
kernel-ec2-devel-3.0.101-0.47.102.1
kernel-pae-3.0.101-0.47.102.1
kernel-pae-base-3.0.101-0.47.102.1
kernel-pae-devel-3.0.101-0.47.102.1
kernel-source-3.0.101-0.47.102.1
kernel-syms-3.0.101-0.47.102.1
kernel-trace-3.0.101-0.47.102.1
kernel-trace-base-3.0.101-0.47.102.1
kernel-trace-devel-3.0.101-0.47.102.1
kernel-xen-3.0.101-0.47.102.1
kernel-xen-base-3.0.101-0.47.102.1
kernel-xen-devel-3.0.101-0.47.102.1
SUSE Linux Enterprise Server 11 SP3-LTSS
kernel-bigsmp-3.0.101-0.47.102.1
kernel-bigsmp-base-3.0.101-0.47.102.1
kernel-bigsmp-devel-3.0.101-0.47.102.1
kernel-default-3.0.101-0.47.102.1
kernel-default-base-3.0.101-0.47.102.1
kernel-default-devel-3.0.101-0.47.102.1
kernel-default-man-3.0.101-0.47.102.1
kernel-ec2-3.0.101-0.47.102.1
kernel-ec2-base-3.0.101-0.47.102.1
kernel-ec2-devel-3.0.101-0.47.102.1
kernel-pae-3.0.101-0.47.102.1
kernel-pae-base-3.0.101-0.47.102.1
kernel-pae-devel-3.0.101-0.47.102.1
kernel-source-3.0.101-0.47.102.1
kernel-syms-3.0.101-0.47.102.1
kernel-trace-3.0.101-0.47.102.1
kernel-trace-base-3.0.101-0.47.102.1
kernel-trace-devel-3.0.101-0.47.102.1
kernel-xen-3.0.101-0.47.102.1
kernel-xen-base-3.0.101-0.47.102.1
kernel-xen-devel-3.0.101-0.47.102.1

Описание

mm/memory.c in the Linux kernel before 4.1.4 mishandles anonymous pages, which allows local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.102.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.102.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.102.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.102.1

Ссылки

Описание

An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.102.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.102.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.102.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.102.1

Ссылки