Описание
Security update for the Linux Kernel
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-1000364: The default stack guard page was too small and could be 'jumped over' by userland programs using more than one page of stack in functions and so lead to memory corruption. This update extends the stack guard page to 1 MB (for 4k pages) and 16 MB (for 64k pages) to reduce this attack vector. This is not a kernel bugfix, but a hardening measure against this kind of userland attack.(bsc#1039348)
The following non-security bugs were fixed:
- fnic now returns 'DID_IMM_RETRY' if rport is not ready (bsc#1035920).
- fnic is now using rport->dd_data to check if rport is online instead of rport_lookup (bsc#1035920).
- The rport check location in fnic_queuecommand_lck was corrected (bsc#1035920).
- xfs: remove patches that caused regression (bsc#1043234).
- mm: enlarge stack guard gap (bnc#1039348, CVE-2017-1000364, bnc#1042921).
- PCI: Allow access to VPD attributes with size 0 (bsc#1018074).
Список пакетов
SUSE Linux Enterprise Server 11 SP4
kernel-bigmem-3.0.101-104.2
kernel-bigmem-base-3.0.101-104.2
kernel-bigmem-devel-3.0.101-104.2
kernel-default-3.0.101-104.2
kernel-default-base-3.0.101-104.2
kernel-default-devel-3.0.101-104.2
kernel-default-man-3.0.101-104.2
kernel-ec2-3.0.101-104.2
kernel-ec2-base-3.0.101-104.2
kernel-ec2-devel-3.0.101-104.2
kernel-pae-3.0.101-104.2
kernel-pae-base-3.0.101-104.2
kernel-pae-devel-3.0.101-104.2
kernel-ppc64-3.0.101-104.2
kernel-ppc64-base-3.0.101-104.2
kernel-ppc64-devel-3.0.101-104.2
kernel-source-3.0.101-104.2
kernel-syms-3.0.101-104.2
kernel-trace-3.0.101-104.2
kernel-trace-base-3.0.101-104.2
kernel-trace-devel-3.0.101-104.2
kernel-xen-3.0.101-104.2
kernel-xen-base-3.0.101-104.2
kernel-xen-devel-3.0.101-104.2
SUSE Linux Enterprise Server for SAP Applications 11 SP4
kernel-bigmem-3.0.101-104.2
kernel-bigmem-base-3.0.101-104.2
kernel-bigmem-devel-3.0.101-104.2
kernel-default-3.0.101-104.2
kernel-default-base-3.0.101-104.2
kernel-default-devel-3.0.101-104.2
kernel-default-man-3.0.101-104.2
kernel-ec2-3.0.101-104.2
kernel-ec2-base-3.0.101-104.2
kernel-ec2-devel-3.0.101-104.2
kernel-pae-3.0.101-104.2
kernel-pae-base-3.0.101-104.2
kernel-pae-devel-3.0.101-104.2
kernel-ppc64-3.0.101-104.2
kernel-ppc64-base-3.0.101-104.2
kernel-ppc64-devel-3.0.101-104.2
kernel-source-3.0.101-104.2
kernel-syms-3.0.101-104.2
kernel-trace-3.0.101-104.2
kernel-trace-base-3.0.101-104.2
kernel-trace-devel-3.0.101-104.2
kernel-xen-3.0.101-104.2
kernel-xen-base-3.0.101-104.2
kernel-xen-devel-3.0.101-104.2
SUSE Linux Enterprise Software Development Kit 11 SP4
kernel-docs-3.0.101-104.7
Ссылки
- Link for SUSE-SU-2017:1628-1
- E-Mail link for SUSE-SU-2017:1628-1
- SUSE Security Ratings
- SUSE Bug 1018074
- SUSE Bug 1035920
- SUSE Bug 1039348
- SUSE Bug 1042921
- SUSE Bug 1043234
- SUSE CVE CVE-2017-1000364 page
Описание
An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).
Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-104.2
SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-104.2
SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-104.2
SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-104.2
Ссылки
- CVE-2017-1000364
- SUSE Bug 1039346
- SUSE Bug 1039348
- SUSE Bug 1042200
- SUSE Bug 1044985
- SUSE Bug 1071943
- SUSE Bug 1075506
- SUSE Bug 1077345
- SUSE Bug 1115893
- SUSE Bug 1149726