The SUSE Linux Enterprise 11 Service Pack 2 LTSS kernel has been updated
to fix security issues on kernels on the x86_64 architecture.
The following security bugs have been fixed:
*
CVE-2014-9322: A local privilege escalation in the x86_64 32bit
compatibility signal handling was fixed, which could have been used by
local attackers to crash the machine or execute code.
*
CVE-2014-9090: The do_double_fault function in
arch/x86/kernel/traps.c in the Linux kernel did not properly handle faults
associated with the Stack Segment (SS) segment register, which allowed
local users to cause a denial of service (panic) via a modify_ldt system
call, as demonstrated by sigreturn_32 in the 1
-clock-tests test suite.
*
CVE-2014-8133: Insufficient validation of TLS register usage could
have leaked information from the kernel stack to userspace.
Security Issues:
* CVE-2014-8133
<<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133</a>>
* CVE-2014-9090
<<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9090">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9090</a>>
* CVE-2014-9322
<<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322</a>>
download.suse.com/patch/finder/?keywords=17cbd241265ffb7301400d4f2497c986
download.suse.com/patch/finder/?keywords=ea18fe4b0ce01bc702a6120012e00755
download.suse.com/patch/finder/?keywords=eb83dad7b182df22a0ec3ccf37ff136d
download.suse.com/patch/finder/?keywords=fd8795d7eb65884e7e60e637c1890c6f
bugzilla.suse.com/show_bug.cgi?id=907818
bugzilla.suse.com/show_bug.cgi?id=909077
bugzilla.suse.com/show_bug.cgi?id=910251