Описание
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-1000364: The default stack guard page was too small and could be 'jumped over' by userland programs using more than one page of stack in functions and so lead to memory corruption. This update extends the stack guard page to 1 MB (for 4k pages) and 16 MB (for 64k pages) to reduce this attack vector. This is not a kernel bugfix, but a hardening measure against this kind of userland attack.(bsc#1039348)
The following non-security bugs were fixed:
netfilter: A use-after-free was fixed that could cause a kernel panic on a system shutdown. (bsc#1042292)
Список пакетов
SUSE Linux Enterprise Module for Public Cloud 12
kernel-ec2-3.12.61-52.77.1
kernel-ec2-devel-3.12.61-52.77.1
kernel-ec2-extra-3.12.61-52.77.1
SUSE Linux Enterprise Server 12-LTSS
kernel-default-3.12.61-52.77.1
kernel-default-base-3.12.61-52.77.1
kernel-default-devel-3.12.61-52.77.1
kernel-default-man-3.12.61-52.77.1
kernel-devel-3.12.61-52.77.1
kernel-macros-3.12.61-52.77.1
kernel-source-3.12.61-52.77.1
kernel-syms-3.12.61-52.77.1
kernel-xen-3.12.61-52.77.1
kernel-xen-base-3.12.61-52.77.1
kernel-xen-devel-3.12.61-52.77.1
kgraft-patch-3_12_61-52_77-default-1-4.1
kgraft-patch-3_12_61-52_77-xen-1-4.1
SUSE Linux Enterprise Server for SAP Applications 12
kernel-default-3.12.61-52.77.1
kernel-default-base-3.12.61-52.77.1
kernel-default-devel-3.12.61-52.77.1
kernel-devel-3.12.61-52.77.1
kernel-macros-3.12.61-52.77.1
kernel-source-3.12.61-52.77.1
kernel-syms-3.12.61-52.77.1
kernel-xen-3.12.61-52.77.1
kernel-xen-base-3.12.61-52.77.1
kernel-xen-devel-3.12.61-52.77.1
kgraft-patch-3_12_61-52_77-default-1-4.1
kgraft-patch-3_12_61-52_77-xen-1-4.1
Ссылки
- Link for SUSE-SU-2017:1618-1
- E-Mail link for SUSE-SU-2017:1618-1
- SUSE Security Ratings
- SUSE Bug 1039348
- SUSE Bug 1042292
- SUSE CVE CVE-2017-1000364 page
Описание
An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).
Затронутые продукты
SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.77.1
SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.77.1
SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.77.1
SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.77.1
Ссылки
- CVE-2017-1000364
- SUSE Bug 1039346
- SUSE Bug 1039348
- SUSE Bug 1042200
- SUSE Bug 1044985
- SUSE Bug 1071943
- SUSE Bug 1075506
- SUSE Bug 1077345
- SUSE Bug 1115893
- SUSE Bug 1149726