The SUSE Linux Enterprise 12 SP2 RT kernel was updated to 4.4.88 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-1000365: The Linux Kernel imposes a size restriction on the
arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY
(1/4 of the size), but did not take the argument and environment pointers into
account, which allowed attackers to bypass this limitation (bnc#1039354)
- CVE-2017-1000112: Prevent race condition in net-packet code that could have
been exploited by unprivileged users to gain root access. (bnc#1052311)
- CVE-2017-1000251: The native Bluetooth stack was vulnerable to a stack
overflow vulnerability in the processing of L2CAP configuration
responses resulting in remote code execution in kernel space (bnc#1057389)
- CVE-2017-14051: An integer overflow in the qla2x00_sysfs_write_optrom_ctl
function in drivers/scsi/qla2xxx/qla_attr.c allowed local users to cause a
denial of service (memory corruption and system crash) by leveraging root
access (bnc#1056588)
- CVE-2017-8831: The saa7164_bus_get function allowed local users to cause a
denial of service (out-of-bounds array access) or possibly have unspecified
other impact by changing a certain sequence-number value, aka a 'double fetch'
vulnerability (bnc#1037994)
- CVE-2017-1000252: Wrong gsi values via KVM_IRQFD allowed unprivileged users
using KVM to cause DoS on Intel systems (bsc#1058038).
- CVE-2017-1000111: Prevent in packet_set_ring on PACKET_RESERVE (bsc#1052365).
- CVE-2017-10810: Memory leak in the virtio_gpu_object_create function in
drivers/gpu/drm/virtio/virtgpu_object.c allowed attackers to cause a denial of
service (memory consumption) by triggering object-initialization failures
(bnc#1047277).
- CVE-2017-11472: The acpi_ns_terminate() function did not flush the operand
cache and causes a kernel stack dump, which allowed local users to obtain
sensitive information from kernel...