Security update for Linux Kernel Live Patch 1 for SP 1

SUSE Security Update: Security update for Linux Kernel Live Patch 1 for SP 1
Announcement ID: SUSE-SU-2016:1032-1
Rating: important
References: #960563 #964732 #966683 #967773
Affected Products:
  • SUSE Linux Enterprise Live Patching 12

  • An update that fixes four vulnerabilities is now available.


    This update for the Linux Kernel 3.12.51-60.20.1 fixes the following

    - CVE-2016-2384: A malicious USB device could cause a kernel crash in the
    alsa usb-audio driver. (bsc#967773)

    - CVE-2015-8812: A flaw was found in the CXGB3 kernel driver when the
    network was considered congested. The kernel would incorrectly
    misinterpret the congestion as an error condition and incorrectly
    free/clean up the skb. When the device would then send the skb's queued,
    these structures would be referenced and may panic the system or allow
    an attacker to escalate privileges in a use-after-free scenario.

    - CVE-2016-0774: A pipe buffer state corruption after unsuccessful atomic
    read from pipe was fixed (bsc#964732).

    - CVE-2015-8709: kernel/ptrace.c in the Linux kernel mishandled uid and
    gid mappings, which allowed local users to gain privileges by
    establishing a user namespace, waiting for a root process to enter that
    namespace with an unsafe uid or gid, and then using the ptrace system
    call. NOTE: the vendor states "there is no kernel bug here." (bsc#960563)

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Live Patching 12:
      zypper in -t patch SUSE-SLE-Live-Patching-12-2016-611=1

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Live Patching 12 (x86_64):
      • kgraft-patch-3_12_51-60_20-default-4-2.1
      • kgraft-patch-3_12_51-60_20-xen-4-2.1