Linux Compatible
  • News
    • Channels
    • Archive
    • Search
    • Submit
  • Articles
    • Categories
  • Knowledgebase
  • Compatibility
    • Search
  • Links
  • Forums
  • Twitter
Advertisement

Latest News
[ Windows | Linux | Apple ]

· HP Elitebook x360 1040 G5 Review and more
· NSS and Systemd Updates for Ubuntu Linux
· Rssh, Gsoap, Uriparser, Systemd, Rdekstop, Chromium Updates for Debian
· Firefox, Webkit2gtk, Hiawatha, Cairo, Flatpak Updates for Arch Linux
· 13 openSUSE Updates
· GeForce 418.91 Driver Performance Analysis and more
· Geary 0.13.0 released
· Tiff and Mosquitto Updates for Debian
· Docker Update for openSUSE
· Debian GNU/Linux 9.8 released

Linux Compatibility
· Brother DCP-L2540DN
· Sound Blaster E5
· WD Elements 500GB external hard drive
· Canon D660U Flatbad scanner
· Umax Astra 4500 USB Scanner
· Logitech QuickCam Pro 4000
· Dell Latitude E6420
· Creative Sound Blaster Z
· Photosmart 5520
· TB-5300 Slimline Design Tablet

New Forum Topics
· Dale
by: Dale Blinco
on: 2018-02-05 00:26
1 replies, 4017 views

· modem driver needed
by: jongiffen777
on: 2017-12-13 11:11
1 replies, 5749 views

· Need a decent browser for XP Pro!
by: percy
on: 2017-12-05 11:02
2 replies, 7160 views

· Comodo Time Machine + Faronics Deep Freeze
by: Jabberwocky
on: 2017-11-15 23:17
1 replies, 5680 views

· Linux compatablity
by: ibme
on: 2017-10-04 18:05
1 replies, 7615 views

News Channels
· Drivers
· Guides
· Reviews
· Security
· Software
· Press Release
· Updates
· Interviews
· Linux
· General
· Debian
· Red Hat
· Slackware
· Gentoo
· Mandriva
· White Box
· SUSE
· GNOME
· KDE
· CentOS
· Ubuntu
· MEPIS
· Android
· Oracle Linux
· Arch Linux

What's New
Login to see an overview of all news stories since your last visit.

Welcome to our website

To take full advantage of all features you need to login or register. Registration is completely free and takes only a few seconds.

Linux Compatible » News » September 2017 » Linux Kernel/Xen Updates for SUSE Enterprise

Linux Kernel/Xen Updates for SUSE Enterprise

Posted by Philipp Esselbach on: 09/13/2017 07:32 AM [ Print | 0 comment(s) ]

The following updates has been released for SUSE Linux Enterprise:

SUSE-SU-2017:2420-1: important: Security update for xen
SUSE-SU-2017:2423-1: important: Security update for Linux Kernel Live Patch 11 for SLE 12 SP1
SUSE-SU-2017:2424-1: important: Security update for Linux Kernel Live Patch 10 for SLE 12 SP1
SUSE-SU-2017:2436-1: important: Security update for Linux Kernel Live Patch 15 for SLE 12 SP1
SUSE-SU-2017:2437-1: important: Security update for Linux Kernel Live Patch 12 for SLE 12 SP1
SUSE-SU-2017:2438-1: important: Security update for Linux Kernel Live Patch 8 for SLE 12 SP1
SUSE-SU-2017:2439-1: important: Security update for Linux Kernel Live Patch 16 for SLE 12 SP1
SUSE-SU-2017:2440-1: important: Security update for Linux Kernel Live Patch 13 for SLE 12 SP1
SUSE-SU-2017:2441-1: important: Security update for Linux Kernel Live Patch 17 for SLE 12 SP1




SUSE-SU-2017:2420-1: important: Security update for xen
SUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2420-1
Rating: important
References: #1027519 #1055695 #1056278 #1056280 #1056281
#1056282 #1057358
Cross-References: CVE-2017-14316 CVE-2017-14317 CVE-2017-14318
CVE-2017-14319
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Desktop 12-SP3
______________________________________________________________________________

An update that solves four vulnerabilities and has three
fixes is now available.

Description:

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-14316: Missing bound check in function `alloc_heap_pages` for
an internal array allowed attackers using crafted hypercalls to execute
arbitrary code within Xen (XSA-231, bsc#1056278)
- CVE-2017-14318: The function __gnttab_cache_flush missed a check for
grant tables, allowing a malicious guest to crash the host or for x86 PV
guests to potentially escalate privileges (XSA-232, bsc#1056280)
- CVE-2017-14317: A race in cxenstored may have cause a double-free
allowind for DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious
or buggy x86 PV guest to escalate its privileges or crash the hypervisor
(XSA-234, bsc#1056282).

These non-security issues were fixed:

- bsc#1057358: Fixed boot into SUSE Linux Enterprise 12.3 with secure boot
- bsc#1055695: Fixed restoring updates for HVM guests for ballooned domUs


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Software Development Kit 12-SP3:

zypper in -t patch SUSE-SLE-SDK-12-SP3-2017-1500=1

- SUSE Linux Enterprise Server 12-SP3:

zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1500=1

- SUSE Linux Enterprise Desktop 12-SP3:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2017-1500=1

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 x86_64):

xen-debugsource-4.9.0_12-3.15.1
xen-devel-4.9.0_12-3.15.1

- SUSE Linux Enterprise Server 12-SP3 (x86_64):

xen-4.9.0_12-3.15.1
xen-debugsource-4.9.0_12-3.15.1
xen-doc-html-4.9.0_12-3.15.1
xen-libs-32bit-4.9.0_12-3.15.1
xen-libs-4.9.0_12-3.15.1
xen-libs-debuginfo-32bit-4.9.0_12-3.15.1
xen-libs-debuginfo-4.9.0_12-3.15.1
xen-tools-4.9.0_12-3.15.1
xen-tools-debuginfo-4.9.0_12-3.15.1
xen-tools-domU-4.9.0_12-3.15.1
xen-tools-domU-debuginfo-4.9.0_12-3.15.1

- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

xen-4.9.0_12-3.15.1
xen-debugsource-4.9.0_12-3.15.1
xen-libs-32bit-4.9.0_12-3.15.1
xen-libs-4.9.0_12-3.15.1
xen-libs-debuginfo-32bit-4.9.0_12-3.15.1
xen-libs-debuginfo-4.9.0_12-3.15.1


References:

https://www.suse.com/security/cve/CVE-2017-14316.html
https://www.suse.com/security/cve/CVE-2017-14317.html
https://www.suse.com/security/cve/CVE-2017-14318.html
https://www.suse.com/security/cve/CVE-2017-14319.html
https://bugzilla.suse.com/1027519
https://bugzilla.suse.com/1055695
https://bugzilla.suse.com/1056278
https://bugzilla.suse.com/1056280
https://bugzilla.suse.com/1056281
https://bugzilla.suse.com/1056282
https://bugzilla.suse.com/1057358


SUSE-SU-2017:2423-1: important: Security update for Linux Kernel Live Patch 11 for SLE 12 SP1
SUSE Security Update: Security update for Linux Kernel Live Patch 11 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2423-1
Rating: important
References: #1052311 #1052368
Cross-References: CVE-2017-1000112
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for the Linux Kernel 3.12.67-60_64_24 fixes several issues.

The following security bugs were fixed:

- CVE-2017-1000112: Prevent a race condition in net-packet code that could
have been exploited by unprivileged users to gain root access
(bsc#1052368).


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1502=1

- SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1502=1

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_67-60_64_24-default-8-2.1
kgraft-patch-3_12_67-60_64_24-xen-8-2.1

- SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_67-60_64_24-default-8-2.1
kgraft-patch-3_12_67-60_64_24-xen-8-2.1


References:

https://www.suse.com/security/cve/CVE-2017-1000112.html
https://bugzilla.suse.com/1052311
https://bugzilla.suse.com/1052368


SUSE-SU-2017:2424-1: important: Security update for Linux Kernel Live Patch 10 for SLE 12 SP1
SUSE Security Update: Security update for Linux Kernel Live Patch 10 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2424-1
Rating: important
References: #1052311 #1052368
Cross-References: CVE-2017-1000112
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for the Linux Kernel 3.12.67-60_64_21 fixes several issues.

The following security bugs were fixed:

- CVE-2017-1000112: Prevent a race condition in net-packet code that could
have been exploited by unprivileged users to gain root access
(bsc#1052368).


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1501=1

- SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1501=1

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_67-60_64_21-default-9-2.2
kgraft-patch-3_12_67-60_64_21-xen-9-2.2

- SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_67-60_64_21-default-9-2.2
kgraft-patch-3_12_67-60_64_21-xen-9-2.2


References:

https://www.suse.com/security/cve/CVE-2017-1000112.html
https://bugzilla.suse.com/1052311
https://bugzilla.suse.com/1052368



SUSE-SU-2017:2436-1: important: Security update for Linux Kernel Live Patch 15 for SLE 12 SP1
SUSE Security Update: Security update for Linux Kernel Live Patch 15 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2436-1
Rating: important
References: #1052311 #1052368
Cross-References: CVE-2017-1000112
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for the Linux Kernel 3.12.74-60_64_40 fixes several issues.

The following security bugs were fixed:

- CVE-2017-1000112: Prevent a race condition in net-packet code that could
have been exploited by unprivileged users to gain root access
(bsc#1052368).


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1507=1

- SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1507=1

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_74-60_64_40-default-4-2.1
kgraft-patch-3_12_74-60_64_40-xen-4-2.1

- SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_74-60_64_40-default-4-2.1
kgraft-patch-3_12_74-60_64_40-xen-4-2.1


References:

https://www.suse.com/security/cve/CVE-2017-1000112.html
https://bugzilla.suse.com/1052311
https://bugzilla.suse.com/1052368


SUSE-SU-2017:2437-1: important: Security update for Linux Kernel Live Patch 12 for SLE 12 SP1
SUSE Security Update: Security update for Linux Kernel Live Patch 12 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2437-1
Rating: important
References: #1052311 #1052368
Cross-References: CVE-2017-1000112
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for the Linux Kernel 3.12.69-60_64_29 fixes several issues.

The following security bugs were fixed:

- CVE-2017-1000112: Prevent a race condition in net-packet code that could
have been exploited by unprivileged users to gain root access
(bsc#1052368).


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1505=1

- SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1505=1

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_69-60_64_29-default-7-2.1
kgraft-patch-3_12_69-60_64_29-xen-7-2.1

- SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_69-60_64_29-default-7-2.1
kgraft-patch-3_12_69-60_64_29-xen-7-2.1


References:

https://www.suse.com/security/cve/CVE-2017-1000112.html
https://bugzilla.suse.com/1052311
https://bugzilla.suse.com/1052368


SUSE-SU-2017:2438-1: important: Security update for Linux Kernel Live Patch 8 for SLE 12 SP1
SUSE Security Update: Security update for Linux Kernel Live Patch 8 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2438-1
Rating: important
References: #1052311 #1052368
Cross-References: CVE-2017-1000112
Affected Products:
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for the Linux Kernel 3.12.62-60_64_8 fixes several issues.

The following security bugs were fixed:

- CVE-2017-1000112: Prevent a race condition in net-packet code that could
have been exploited by unprivileged users to gain root access
(bsc#1052368).


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1504=1

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_62-60_64_8-default-11-2.1
kgraft-patch-3_12_62-60_64_8-xen-11-2.1


References:

https://www.suse.com/security/cve/CVE-2017-1000112.html
https://bugzilla.suse.com/1052311
https://bugzilla.suse.com/1052368


SUSE-SU-2017:2439-1: important: Security update for Linux Kernel Live Patch 16 for SLE 12 SP1
SUSE Security Update: Security update for Linux Kernel Live Patch 16 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2439-1
Rating: important
References: #1052311 #1052368
Cross-References: CVE-2017-1000112
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for the Linux Kernel 3.12.74-60_64_45 fixes several issues.

The following security bugs were fixed:

- CVE-2017-1000112: Prevent a race condition in net-packet code that could
have been exploited by unprivileged users to gain root access
(bsc#1052368).


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1508=1

- SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1508=1

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_74-60_64_45-default-4-2.1
kgraft-patch-3_12_74-60_64_45-xen-4-2.1

- SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_74-60_64_45-default-4-2.1
kgraft-patch-3_12_74-60_64_45-xen-4-2.1


References:

https://www.suse.com/security/cve/CVE-2017-1000112.html
https://bugzilla.suse.com/1052311
https://bugzilla.suse.com/1052368


SUSE-SU-2017:2440-1: important: Security update for Linux Kernel Live Patch 13 for SLE 12 SP1
SUSE Security Update: Security update for Linux Kernel Live Patch 13 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2440-1
Rating: important
References: #1052311 #1052368
Cross-References: CVE-2017-1000112
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for the Linux Kernel 3.12.69-60_64_32 fixes several issues.

The following security bugs were fixed:

- CVE-2017-1000112: Prevent a race condition in net-packet code that could
have been exploited by unprivileged users to gain root access
(bsc#1052368).


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1506=1

- SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1506=1

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_69-60_64_32-default-6-2.1
kgraft-patch-3_12_69-60_64_32-xen-6-2.1

- SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_69-60_64_32-default-6-2.1
kgraft-patch-3_12_69-60_64_32-xen-6-2.1


References:

https://www.suse.com/security/cve/CVE-2017-1000112.html
https://bugzilla.suse.com/1052311
https://bugzilla.suse.com/1052368


SUSE-SU-2017:2441-1: important: Security update for Linux Kernel Live Patch 17 for SLE 12 SP1
SUSE Security Update: Security update for Linux Kernel Live Patch 17 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2441-1
Rating: important
References: #1052311 #1052368
Cross-References: CVE-2017-1000112
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for the Linux Kernel 3.12.74-60_64_48 fixes several issues.

The following security bugs were fixed:

- CVE-2017-1000112: Prevent a race condition in net-packet code that could
have been exploited by unprivileged users to gain root access
(bsc#1052368).


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1509=1

- SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1509=1

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_74-60_64_48-default-3-2.1
kgraft-patch-3_12_74-60_64_48-xen-3-2.1

- SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_74-60_64_48-default-3-2.1
kgraft-patch-3_12_74-60_64_48-xen-3-2.1


References:

https://www.suse.com/security/cve/CVE-2017-1000112.html
https://bugzilla.suse.com/1052311
https://bugzilla.suse.com/1052368



« Xen/Emacs24/Tcpdump Updates for Debian 8/9 · Kernel/Bluez Updates for CentOS 6 »

Linux Compatible » News » September 2017 » Linux Kernel/Xen Updates for SUSE Enterprise
All products mentioned are registered trademarks or trademarks of their respective owners.
© 2002-2018 Esselbach Internet Solutions - All Rights Reserved. Terms and privacy policy
Powered by Contentteller® Business Edition