openSUSE-SU-2017:2169-1: important: Security update for the Linux Kernel

openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID: openSUSE-SU-2017:2169-1
Rating: important
References: #1019151 #1023175 #1037404 #1037994 #1038078
#1038792 #1043652 #1047027 #1051399 #1051556
#1052049 #1052223 #1052311 #1052365 #1052533
#1052709 #1052773 #1052794
Cross-References: CVE-2017-1000111 CVE-2017-1000112 CVE-2017-8831

Affected Products:
openSUSE Leap 42.2
______________________________________________________________________________

An update that solves three vulnerabilities and has 15
fixes is now available.

Description:

The openSUSE Leap 42.2 kernel was updated to receive various security and
bugfixes.

The following security bugs were fixed:

– CVE-2017-1000111: Fixed a race condition in net-packet code that could
be exploited to cause out-of-bounds memory access (bsc#1052365).
– CVE-2017-1000112: Fixed a race condition in net-packet code that could
have been exploited by unprivileged users to gain root access.
(bsc#1052311).
– CVE-2017-8831: The saa7164_bus_get function in
drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed
local users to cause a denial of service (out-of-bounds array access) or
possibly have unspecified other impact by changing a certain
sequence-number value, aka a “double fetch” vulnerability (bnc#1037994).

The following non-security bugs were fixed:

– IB/hfi1: Wait for QSFP modules to initialize (bsc#1019151).
– bcache: force trigger gc (bsc#1038078).
– bcache: only recovery I/O error for writethrough mode (bsc#1043652).
– block: do not allow updates through sysfs until registration completes
(bsc#1047027).
– ibmvnic: Check for transport event on driver resume (bsc#1051556,
bsc#1052709).
– ibmvnic: Initialize SCRQ’s during login renegotiation (bsc#1052223).
– ibmvnic: Report rx buffer return codes as netdev_dbg (bsc#1052794).
– iommu/amd: Fix schedule-while-atomic BUG in initialization code
(bsc1052533).
– libnvdimm, pmem: fix a NULL pointer BUG in nd_pmem_notify (bsc#1023175).
– libnvdimm: fix badblock range handling of ARS range (bsc#1023175).
– qeth: fix L3 next-hop im xmit qeth hdr (bnc#1052773, LTC#157374).
– scsi_devinfo: fixup string compare (bsc#1037404).
– scsi_dh_alua: suppress errors from unsupported devices (bsc#1038792).
– vfs: fix missing inode_get_dev sites (bsc#1052049).
– x86/dmi: Switch dmi_remap() from ioremap() to ioremap_cache()
(bsc#1051399).

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE Leap 42.2:

zypper in -t patch openSUSE-2017-929=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE Leap 42.2 (x86_64):

kernel-debug-4.4.79-18.26.2
kernel-debug-base-4.4.79-18.26.2
kernel-debug-base-debuginfo-4.4.79-18.26.2
kernel-debug-debuginfo-4.4.79-18.26.2
kernel-debug-debugsource-4.4.79-18.26.2
kernel-debug-devel-4.4.79-18.26.2
kernel-debug-devel-debuginfo-4.4.79-18.26.2
kernel-default-4.4.79-18.26.2
kernel-default-base-4.4.79-18.26.2
kernel-default-base-debuginfo-4.4.79-18.26.2
kernel-default-debuginfo-4.4.79-18.26.2
kernel-default-debugsource-4.4.79-18.26.2
kernel-default-devel-4.4.79-18.26.2
kernel-obs-build-4.4.79-18.26.2
kernel-obs-build-debugsource-4.4.79-18.26.2
kernel-obs-qa-4.4.79-18.26.1
kernel-syms-4.4.79-18.26.1
kernel-vanilla-4.4.79-18.26.2
kernel-vanilla-base-4.4.79-18.26.2
kernel-vanilla-base-debuginfo-4.4.79-18.26.2
kernel-vanilla-debuginfo-4.4.79-18.26.2
kernel-vanilla-debugsource-4.4.79-18.26.2
kernel-vanilla-devel-4.4.79-18.26.2

– openSUSE Leap 42.2 (noarch):

kernel-devel-4.4.79-18.26.1
kernel-docs-4.4.79-18.26.3
kernel-docs-html-4.4.79-18.26.3
kernel-docs-pdf-4.4.79-18.26.3
kernel-macros-4.4.79-18.26.1
kernel-source-4.4.79-18.26.1
kernel-source-vanilla-4.4.79-18.26.1

References:

https://www.suse.com/security/cve/CVE-2017-1000111.html
https://www.suse.com/security/cve/CVE-2017-1000112.html
https://www.suse.com/security/cve/CVE-2017-8831.html
https://bugzilla.suse.com/1019151
https://bugzilla.suse.com/1023175
https://bugzilla.suse.com/1037404
https://bugzilla.suse.com/1037994
https://bugzilla.suse.com/1038078
https://bugzilla.suse.com/1038792
https://bugzilla.suse.com/1043652
https://bugzilla.suse.com/1047027
https://bugzilla.suse.com/1051399
https://bugzilla.suse.com/1051556
https://bugzilla.suse.com/1052049
https://bugzilla.suse.com/1052223
https://bugzilla.suse.com/1052311
https://bugzilla.suse.com/1052365
https://bugzilla.suse.com/1052533
https://bugzilla.suse.com/1052709
https://bugzilla.suse.com/1052773
https://bugzilla.suse.com/1052794


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org