Описание
Security update for the Linux Kernel
The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security fixes.
The following security bugs were fixed:
-
CVE-2017-1000364: The default stack guard page was too small and could be 'jumped over' by userland programs using more than one page of stack in functions and so lead to memory corruption. This update extends the stack guard page to 1 MB (for 4k pages) and 16 MB (for 64k pages) to reduce this attack vector. This is not a kernel bugfix, but a hardening measure against this kind of userland attack.(bsc#1039348)
-
CVE-2015-3288: mm/memory.c in the Linux kernel mishandled anonymous pages, which allowed local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero (bnc#979021).
Список пакетов
SUSE Linux Enterprise Point of Sale 11 SP3
SUSE Linux Enterprise Server 11 SP3-LTSS
Ссылки
- Link for SUSE-SU-2017:1613-1
- E-Mail link for SUSE-SU-2017:1613-1
- SUSE Security Ratings
- SUSE Bug 1039348
- SUSE Bug 979021
- SUSE CVE CVE-2015-3288 page
- SUSE CVE CVE-2017-1000364 page
Описание
mm/memory.c in the Linux kernel before 4.1.4 mishandles anonymous pages, which allows local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero.
Затронутые продукты
Ссылки
- CVE-2015-3288
- SUSE Bug 1115893
- SUSE Bug 979021
Описание
An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).
Затронутые продукты
Ссылки
- CVE-2017-1000364
- SUSE Bug 1039346
- SUSE Bug 1039348
- SUSE Bug 1042200
- SUSE Bug 1044985
- SUSE Bug 1071943
- SUSE Bug 1075506
- SUSE Bug 1077345
- SUSE Bug 1115893
- SUSE Bug 1149726