Описание
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.74 to receive the following security update:
- CVE-2017-7533: Bug in inotify code allowed privilege escalation (bnc#1049483).
Список пакетов
SUSE Linux Enterprise Desktop 12 SP2
kernel-default-4.4.74-92.32.1
kernel-default-devel-4.4.74-92.32.1
kernel-default-extra-4.4.74-92.32.1
kernel-devel-4.4.74-92.32.1
kernel-macros-4.4.74-92.32.1
kernel-source-4.4.74-92.32.1
kernel-syms-4.4.74-92.32.1
SUSE Linux Enterprise High Availability Extension 12 SP2
cluster-md-kmp-default-4.4.74-92.32.1
cluster-network-kmp-default-4.4.74-92.32.1
dlm-kmp-default-4.4.74-92.32.1
gfs2-kmp-default-4.4.74-92.32.1
ocfs2-kmp-default-4.4.74-92.32.1
SUSE Linux Enterprise Live Patching 12
kgraft-patch-4_4_74-92_32-default-1-2.1
SUSE Linux Enterprise Server 12 SP2
kernel-default-4.4.74-92.32.1
kernel-default-base-4.4.74-92.32.1
kernel-default-devel-4.4.74-92.32.1
kernel-default-man-4.4.74-92.32.1
kernel-devel-4.4.74-92.32.1
kernel-macros-4.4.74-92.32.1
kernel-source-4.4.74-92.32.1
kernel-syms-4.4.74-92.32.1
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
kernel-default-4.4.74-92.32.1
kernel-default-base-4.4.74-92.32.1
kernel-default-devel-4.4.74-92.32.1
kernel-devel-4.4.74-92.32.1
kernel-macros-4.4.74-92.32.1
kernel-source-4.4.74-92.32.1
kernel-syms-4.4.74-92.32.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
kernel-default-4.4.74-92.32.1
kernel-default-base-4.4.74-92.32.1
kernel-default-devel-4.4.74-92.32.1
kernel-default-man-4.4.74-92.32.1
kernel-devel-4.4.74-92.32.1
kernel-macros-4.4.74-92.32.1
kernel-source-4.4.74-92.32.1
kernel-syms-4.4.74-92.32.1
SUSE Linux Enterprise Software Development Kit 12 SP2
kernel-docs-4.4.74-92.32.3
kernel-obs-build-4.4.74-92.32.1
SUSE Linux Enterprise Workstation Extension 12 SP2
kernel-default-extra-4.4.74-92.32.1
Ссылки
- Link for SUSE-SU-2017:2041-1
- E-Mail link for SUSE-SU-2017:2041-1
- SUSE Security Ratings
- SUSE Bug 1049483
- SUSE CVE CVE-2017-7533 page
Описание
Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.
Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP2:kernel-default-4.4.74-92.32.1
SUSE Linux Enterprise Desktop 12 SP2:kernel-default-devel-4.4.74-92.32.1
SUSE Linux Enterprise Desktop 12 SP2:kernel-default-extra-4.4.74-92.32.1
SUSE Linux Enterprise Desktop 12 SP2:kernel-devel-4.4.74-92.32.1
Ссылки
- CVE-2017-7533
- SUSE Bug 1049483
- SUSE Bug 1050677
- SUSE Bug 1050751
- SUSE Bug 1053919