Security update for Linux Kernel Live Patch 24 for SLE 12
SUSE Patch
security@suse.de
SUSE Security Team
SUSE-SU-2017:2497-1
Final
1
1
2017-09-15T12:34:26Z
current
2017-09-15T12:34:26Z
2017-09-15T12:34:26Z
cve-database/bin/generate-cvrf.pl
2017-02-24T01:00:00Z
Security update for Linux Kernel Live Patch 24 for SLE 12
This update for the Linux Kernel 3.12.61-52_83 fixes several issues.
The following security bugs were fixed:
- CVE-2017-1000112: Prevent a race condition in net-packet code that could have been exploited by unprivileged users to gain root access (bsc#1052368).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply (bsc#1046191).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel was too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
SUSE-SLE-SERVER-12-2017-1547
Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
https://www.suse.com/support/update/announcement/2017/suse-su-20172497-1/
Link for SUSE-SU-2017:2497-1
https://lists.suse.com/pipermail/sle-security-updates/2017-September/003234.html
E-Mail link for SUSE-SU-2017:2497-1
https://www.suse.com/support/security/rating/
SUSE Security Ratings
https://bugzilla.suse.com/1042892
SUSE Bug 1042892
https://bugzilla.suse.com/1046191
SUSE Bug 1046191
https://bugzilla.suse.com/1052311
SUSE Bug 1052311
https://bugzilla.suse.com/1052368
SUSE Bug 1052368
https://www.suse.com/security/cve/CVE-2017-1000112/
SUSE CVE CVE-2017-1000112 page
https://www.suse.com/security/cve/CVE-2017-7645/
SUSE CVE CVE-2017-7645 page
https://www.suse.com/security/cve/CVE-2017-9242/
SUSE CVE CVE-2017-9242 page
SUSE Linux Enterprise Server 12-LTSS
kgraft-patch-3_12_61-52_83-default-2-2.2
kgraft-patch-3_12_61-52_83-xen-2-2.2
kgraft-patch-3_12_61-52_83-default-2-2.2 as a component of SUSE Linux Enterprise Server 12-LTSS
kgraft-patch-3_12_61-52_83-xen-2-2.2 as a component of SUSE Linux Enterprise Server 12-LTSS
Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb->len becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev->len - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 ("[IPv4/IPv6]: UFO Scatter-gather approach") on Oct 18 2005.
CVE-2017-1000112
SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-2-2.2
SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-2-2.2
important
6.2
AV:L/AC:H/Au:N/C:C/I:C/A:C
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
https://www.suse.com/support/update/announcement/2017/suse-su-20172497-1/
https://www.suse.com/security/cve/CVE-2017-1000112.html
CVE-2017-1000112
https://bugzilla.suse.com/1052311
SUSE Bug 1052311
https://bugzilla.suse.com/1052365
SUSE Bug 1052365
https://bugzilla.suse.com/1052368
SUSE Bug 1052368
https://bugzilla.suse.com/1072162
SUSE Bug 1072162
https://bugzilla.suse.com/1115893
SUSE Bug 1115893
The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.
CVE-2017-7645
SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-2-2.2
SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-2-2.2
important
6.3
AV:N/AC:M/Au:S/C:N/I:N/A:C
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
https://www.suse.com/support/update/announcement/2017/suse-su-20172497-1/
https://www.suse.com/security/cve/CVE-2017-7645.html
CVE-2017-7645
https://bugzilla.suse.com/1034670
SUSE Bug 1034670
https://bugzilla.suse.com/1036741
SUSE Bug 1036741
https://bugzilla.suse.com/1046191
SUSE Bug 1046191
https://bugzilla.suse.com/1087082
SUSE Bug 1087082
The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.
CVE-2017-9242
SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-2-2.2
SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-2-2.2
important
4.6
AV:L/AC:L/Au:N/C:P/I:P/A:P
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
https://www.suse.com/support/update/announcement/2017/suse-su-20172497-1/
https://www.suse.com/security/cve/CVE-2017-9242.html
CVE-2017-9242
https://bugzilla.suse.com/1041431
SUSE Bug 1041431
https://bugzilla.suse.com/1042892
SUSE Bug 1042892