[SUSE-SU-2016:2592-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
28
CVEs
1
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 SP1 kernel was updated to fix two issues.
This security bug was fixed:
- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
This non-security bug was fixed:
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).
- ID
- SUSE-SU-2016:2592-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2016/suse-su-20162592-1/
- Published
-
2016-10-21T13:16:53
(8 years ago) - Modified
-
2016-10-21T13:16:53
(8 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2016-757
- ASA-201610-11
- ASA-201610-14
- CISA-2022:0303
- CISCO-SA-20161026-LINUX
- DSA-3696-1
- ELSA-2016-2098
- ELSA-2016-2105
- ELSA-2016-2124
- ELSA-2016-3632
- ELSA-2016-3633
- ELSA-2016-3634
- FEDORA-2016-c3558808cd
- FEDORA-2016-c8a0c7eece
- FEDORA-2016-db4b75b352
- openSUSE-SU-2020:0554-1
- RHSA-2016:2098
- RHSA-2016:2105
- RHSA-2016:2110
- RHSA-2017:0372
- SSA:2016-305-01
- SUSE-SU-2016:2585-1
- SUSE-SU-2016:2593-1
- SUSE-SU-2016:2596-1
- SUSE-SU-2016:2614-1
- SUSE-SU-2016:2629-1
- SUSE-SU-2016:2630-1
- SUSE-SU-2016:2631-1
- SUSE-SU-2016:2632-1
- SUSE-SU-2016:2633-1
- SUSE-SU-2016:2634-1
- SUSE-SU-2016:2635-1
- SUSE-SU-2016:2636-1
- SUSE-SU-2016:2637-1
- SUSE-SU-2016:2638-1
- SUSE-SU-2016:2655-1
- SUSE-SU-2016:2657-1
- SUSE-SU-2016:2658-1
- SUSE-SU-2016:2659-1
- SUSE-SU-2016:2673-1
- SUSE-SU-2016:3069-1
- SUSE-SU-2016:3304-1
- USN-3104-1
- USN-3104-2
- USN-3105-1
- USN-3105-2
- USN-3106-1
- USN-3106-2
- USN-3106-3
- USN-3106-4
- USN-3107-1
- USN-3107-2
- VU:243144
Source | # ID | Name | URL |
---|---|---|---|
Suse | SUSE ratings | https://www.suse.com/support/security/rating/ | |
Suse | URL of this CSAF notice | https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2592-1.json | |
Suse | URL for SUSE-SU-2016:2592-1 | https://www.suse.com/support/update/announcement/2016/suse-su-20162592-1/ | |
Suse | E-Mail link for SUSE-SU-2016:2592-1 | https://lists.suse.com/pipermail/sle-security-updates/2016-October/002345.html | |
Bugzilla | SUSE Bug 1001419 | https://bugzilla.suse.com/1001419 | |
Bugzilla | SUSE Bug 1002165 | https://bugzilla.suse.com/1002165 | |
Bugzilla | SUSE Bug 1004418 | https://bugzilla.suse.com/1004418 | |
Bugzilla | SUSE Bug 904970 | https://bugzilla.suse.com/904970 | |
Bugzilla | SUSE Bug 907150 | https://bugzilla.suse.com/907150 | |
Bugzilla | SUSE Bug 920615 | https://bugzilla.suse.com/920615 | |
Bugzilla | SUSE Bug 920633 | https://bugzilla.suse.com/920633 | |
Bugzilla | SUSE Bug 930408 | https://bugzilla.suse.com/930408 | |
CVE | SUSE CVE CVE-2016-5195 page | https://www.suse.com/security/cve/CVE-2016-5195/ |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kernel-xen?arch=x86_64&distro=sles-12&sp=1 | suse | kernel-xen | < 3.12.62-60.64.8.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-xen?arch=x86_64&distro=sled-12&sp=1 | suse | kernel-xen | < 3.12.62-60.64.8.2 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-xen-devel?arch=x86_64&distro=sles-12&sp=1 | suse | kernel-xen-devel | < 3.12.62-60.64.8.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-xen-devel?arch=x86_64&distro=sled-12&sp=1 | suse | kernel-xen-devel | < 3.12.62-60.64.8.2 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-xen-base?arch=x86_64&distro=sles-12&sp=1 | suse | kernel-xen-base | < 3.12.62-60.64.8.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12&sp=1 | suse | kernel-syms | < 3.12.62-60.64.8.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sled-12&sp=1 | suse | kernel-syms | < 3.12.62-60.64.8.2 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-syms?arch=s390x&distro=sles-12&sp=1 | suse | kernel-syms | < 3.12.62-60.64.8.2 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-syms?arch=ppc64le&distro=sles-12&sp=1 | suse | kernel-syms | < 3.12.62-60.64.8.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12&sp=1 | suse | kernel-source | < 3.12.62-60.64.8.2 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sled-12&sp=1 | suse | kernel-source | < 3.12.62-60.64.8.2 | sled-12 | noarch | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12&sp=1 | suse | kernel-macros | < 3.12.62-60.64.8.2 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sled-12&sp=1 | suse | kernel-macros | < 3.12.62-60.64.8.2 | sled-12 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12&sp=1 | suse | kernel-devel | < 3.12.62-60.64.8.2 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sled-12&sp=1 | suse | kernel-devel | < 3.12.62-60.64.8.2 | sled-12 | noarch | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12&sp=1 | suse | kernel-default | < 3.12.62-60.64.8.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sled-12&sp=1 | suse | kernel-default | < 3.12.62-60.64.8.2 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default?arch=s390x&distro=sles-12&sp=1 | suse | kernel-default | < 3.12.62-60.64.8.2 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default?arch=ppc64le&distro=sles-12&sp=1 | suse | kernel-default | < 3.12.62-60.64.8.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-man?arch=s390x&distro=sles-12&sp=1 | suse | kernel-default-man | < 3.12.62-60.64.8.2 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-extra?arch=x86_64&distro=sled-12&sp=1 | suse | kernel-default-extra | < 3.12.62-60.64.8.2 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12&sp=1 | suse | kernel-default-devel | < 3.12.62-60.64.8.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sled-12&sp=1 | suse | kernel-default-devel | < 3.12.62-60.64.8.2 | sled-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=s390x&distro=sles-12&sp=1 | suse | kernel-default-devel | < 3.12.62-60.64.8.2 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=ppc64le&distro=sles-12&sp=1 | suse | kernel-default-devel | < 3.12.62-60.64.8.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12&sp=1 | suse | kernel-default-base | < 3.12.62-60.64.8.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=s390x&distro=sles-12&sp=1 | suse | kernel-default-base | < 3.12.62-60.64.8.2 | sles-12 | s390x | |
Affected | pkg:rpm/suse/kernel-default-base?arch=ppc64le&distro=sles-12&sp=1 | suse | kernel-default-base | < 3.12.62-60.64.8.2 | sles-12 | ppc64le |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |