Jump to content
Compatible Support Forums
Sign in to follow this  
news

[security-announce] SUSE-SU-2016:2596-1: important: Security update for the Linux Kernel

Recommended Posts

SUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

 

Announcement ID: SUSE-SU-2016:2596-1

Rating: important

References: #1004418

Cross-References: CVE-2016-5195

Affected Products:

SUSE Linux Enterprise Server 11-SP2-LTSS

SUSE Linux Enterprise Debuginfo 11-SP2

______________________________________________________________________________

 

An update that fixes one vulnerability is now available.

 

Description:

 

 

The SUSE Linux Enterprise 11 SP2 LTSS kernel was updated to fix one

security issue.

 

This security bug was fixed:

 

- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is

reportedly exploited in the wild (bsc#1004418).

 

 

Patch Instructions:

 

To install this SUSE Security Update use YaST online_update.

Alternatively you can run the command listed for your product:

 

- SUSE Linux Enterprise Server 11-SP2-LTSS:

 

zypper in -t patch slessp2-kernel-source-12807=1

 

- SUSE Linux Enterprise Debuginfo 11-SP2:

 

zypper in -t patch dbgsp2-kernel-source-12807=1

 

To bring your system up-to-date, use "zypper patch".

 

 

Package List:

 

- SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64):

 

kernel-default-3.0.101-0.7.44.1

kernel-default-base-3.0.101-0.7.44.1

kernel-default-devel-3.0.101-0.7.44.1

kernel-source-3.0.101-0.7.44.1

kernel-syms-3.0.101-0.7.44.1

kernel-trace-3.0.101-0.7.44.1

kernel-trace-base-3.0.101-0.7.44.1

kernel-trace-devel-3.0.101-0.7.44.1

 

- SUSE Linux Enterprise Server 11-SP2-LTSS (i586 x86_64):

 

kernel-ec2-3.0.101-0.7.44.1

kernel-ec2-base-3.0.101-0.7.44.1

kernel-ec2-devel-3.0.101-0.7.44.1

kernel-xen-3.0.101-0.7.44.1

kernel-xen-base-3.0.101-0.7.44.1

kernel-xen-devel-3.0.101-0.7.44.1

 

- SUSE Linux Enterprise Server 11-SP2-LTSS (s390x):

 

kernel-default-man-3.0.101-0.7.44.1

 

- SUSE Linux Enterprise Server 11-SP2-LTSS (i586):

 

kernel-pae-3.0.101-0.7.44.1

kernel-pae-base-3.0.101-0.7.44.1

kernel-pae-devel-3.0.101-0.7.44.1

 

- SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64):

 

kernel-default-debuginfo-3.0.101-0.7.44.1

kernel-default-debugsource-3.0.101-0.7.44.1

kernel-default-devel-debuginfo-3.0.101-0.7.44.1

kernel-trace-debuginfo-3.0.101-0.7.44.1

kernel-trace-debugsource-3.0.101-0.7.44.1

kernel-trace-devel-debuginfo-3.0.101-0.7.44.1

 

- SUSE Linux Enterprise Debuginfo 11-SP2 (i586 x86_64):

 

kernel-ec2-debuginfo-3.0.101-0.7.44.1

kernel-ec2-debugsource-3.0.101-0.7.44.1

kernel-xen-debuginfo-3.0.101-0.7.44.1

kernel-xen-debugsource-3.0.101-0.7.44.1

kernel-xen-devel-debuginfo-3.0.101-0.7.44.1

 

- SUSE Linux Enterprise Debuginfo 11-SP2 (i586):

 

kernel-pae-debuginfo-3.0.101-0.7.44.1

kernel-pae-debugsource-3.0.101-0.7.44.1

kernel-pae-devel-debuginfo-3.0.101-0.7.44.1

 

 

References:

 

https://www.suse.com/security/cve/CVE-2016-5195.html

https://bugzilla.suse.com/1004418

 

--

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org

For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×