SUSE-SU-2017:2908-1: important: Security update for the Linux Kernel

SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2908-1
Rating: important
References: #1001459 #1012985 #1023287 #1027149 #1028217
#1030531 #1030552 #1031515 #1033960 #1034405
#1035531 #1035738 #1037182 #1037183 #1037994
#1038544 #1038564 #1038879 #1038883 #1038981
#1038982 #1039348 #1039354 #1039456 #1039721
#1039864 #1039882 #1039883 #1039885 #1040069
#1041160 #1041429 #1041431 #1042696 #1042832
#1042863 #1044125 #1045327 #1045487 #1045922
#1046107 #1048275 #1048788 #1049645 #1049882
#1053148 #1053152 #1053317 #1056588 #1056982
#1057179 #1058410 #1058507 #1058524 #1059863
#1062471 #1062520 #1063667 #1064388 #856774
#860250 #863764 #878240 #922855 #922871 #986924
#993099 #994364
Cross-References: CVE-2017-1000363 CVE-2017-1000365 CVE-2017-1000380
CVE-2017-10661 CVE-2017-11176 CVE-2017-12153
CVE-2017-12154 CVE-2017-12762 CVE-2017-13080
CVE-2017-14051 CVE-2017-14106 CVE-2017-14140
CVE-2017-15265 CVE-2017-15274 CVE-2017-15649
CVE-2017-7482 CVE-2017-7487 CVE-2017-7518
CVE-2017-7541 CVE-2017-7542 CVE-2017-7889
CVE-2017-8831 CVE-2017-8890 CVE-2017-8924
CVE-2017-8925 CVE-2017-9074 CVE-2017-9075
CVE-2017-9076 CVE-2017-9077 CVE-2017-9242

Affected Products:
SUSE OpenStack Cloud 6
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
SUSE Linux Enterprise Module for Public Cloud 12
______________________________________________________________________________

An update that solves 30 vulnerabilities and has 38 fixes
is now available.

Description:

The SUSE Linux Enterprise 12 SP1 LTS kernel was updated to receive various
security and bugfixes.

The following security bugs were fixed:

– CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local
users to gain privileges via crafted system calls that trigger
mishandling of packet_fanout data structures, because of a race
condition (involving fanout_add and packet_do_bind) that leads to a
use-after-free, a different vulnerability than CVE-2017-6346
(bnc#1064388).
– CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed
reinstallation of the Group Temporal Key (GTK) during the group key
handshake, allowing an attacker within radio range to replay frames from
access points to clients (bnc#1063667).
– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call, a different vulnerability than CVE-2017-12192 (bnc#1045327).
– CVE-2017-15265: Use-after-free vulnerability in the Linux kernel allowed
local users to have unspecified impact via vectors related to
/dev/snd/seq (bnc#1062520).
– CVE-2017-1000365: The Linux Kernel imposes a size restriction on the
arguments and environmental strings passed through
RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but did not take the
argument and environment pointers into account, which allowed attackers
to bypass this limitation. (bnc#1039354).
– CVE-2017-12153: A security flaw was discovered in the
nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux
kernel This function did not check whether the required attributes are
present in a Netlink request. This request can be issued by a user with
the CAP_NET_ADMIN capability and may result in a NULL pointer
dereference and system crash (bnc#1058410).
– CVE-2017-12154: The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the
Linux kernel did not ensure that the “CR8-load exiting” and “CR8-store
exiting” L0 vmcs02 controls exist in cases where L1 omits the “use TPR
shadow” vmcs12 control, which allowed KVM L2 guest OS users to obtain
read and write access to the hardware CR8 register (bnc#1058507).
– CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the
Linux kernel allowed local users to cause a denial of service
(__tcp_select_window divide-by-zero error and system crash) by
triggering a disconnect within a certain tcp_recvmsg code path
(bnc#1056982).
– CVE-2017-14140: The move_pages system call in mm/migrate.c in the Linux
kernel doesn’t check the effective uid of the target process, enabling a
local attacker to learn the memory layout of a setuid executable despite
ASLR (bnc#1057179).
– CVE-2017-14051: An integer overflow in the
qla2x00_sysfs_write_optrom_ctl function in
drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel allowed local users
to cause a denial of service (memory corruption and system crash) by
leveraging root access (bnc#1056588).
– CVE-2017-10661: Race condition in fs/timerfd.c in the Linux kernel
allowed local users to gain privileges or cause a denial of service
(list corruption or use-after-free) via simultaneous file-descriptor
operations that leverage improper might_cancel queueing (bnc#1053152).
– CVE-2017-12762: In /drivers/isdn/i4l/isdn_net.c: A user-controlled
buffer is copied into a local buffer of constant size using strcpy
without a length check which can cause a buffer overflow. (bnc#1053148).
– CVE-2017-8831: The saa7164_bus_get function in
drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed
local users to cause a denial of service (out-of-bounds array access) or
possibly have unspecified other impact by changing a certain
sequence-number value, aka a “double fetch” vulnerability (bnc#1037994).
– CVE-2017-7482: A potential memory corruption was fixed in decoding of
krb5 principals in the kernels kerberos handling. (bnc#1046107).
– CVE-2017-7542: The ip6_find_1stfragopt function in
net/ipv6/output_core.c in the Linux kernel allowed local users to cause
a denial of service (integer overflow and infinite loop) by leveraging
the ability to open a raw socket (bnc#1049882).
– CVE-2017-11176: The mq_notify function in the Linux kernel did not set
the sock pointer to NULL upon entry into the retry logic. During a
user-space close of a Netlink socket, it allowed attackers to cause a
denial of service (use-after-free) or possibly have unspecified other
impact (bnc#1048275).
– CVE-2017-7541: The brcmf_cfg80211_mgmt_tx function in
drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux
kernel allowed local users to cause a denial of service (buffer overflow
and system crash) or possibly gain privileges via a crafted
NL80211_CMD_FRAME Netlink packet (bnc#1049645).
– CVE-2017-7518: The Linux kernel was vulnerable to an incorrect debug
exception(#DB) error. It could occur while emulating a syscall
instruction and potentially lead to guest privilege escalation.
(bsc#1045922).
– CVE-2017-8924: The edge_bulk_in_callback function in
drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to
obtain sensitive information (in the dmesg ringbuffer and syslog) from
uninitialized kernel memory by using a crafted USB device (posing as an
io_ti USB serial device) to trigger an integer underflow (bnc#1037182
bsc#1038982).
– CVE-2017-8925: The omninet_open function in drivers/usb/serial/omninet.c
in the Linux kernel allowed local users to cause a denial of service
(tty exhaustion) by leveraging reference count mishandling (bnc#1037183
bsc#1038981).
– CVE-2017-1000380: sound/core/timer.c in the Linux kernel was vulnerable
to a data race in the ALSA /dev/snd/timer driver resulting in local
users being able to read information belonging to other users, i.e.,
uninitialized memory contents might have been disclosed when a read and
an ioctl happen at the same time (bnc#1044125).
– CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c
in the Linux kernel is too late in checking whether an overwrite of an
skb data structure may occur, which allowed local users to cause a
denial of service (system crash) via crafted system calls (bnc#1041431).
– CVE-2017-1000363: Linux drivers/char/lp.c Out-of-Bounds Write. Due to a
missing bounds check, and the fact that parport_ptr integer is static, a
‘secure boot’ kernel command line adversary (could happen due to
bootloader vulns, e.g. Google Nexus 6’s CVE-2016-10277, where due to a
vulnerability the adversary has partial control over the command line)
could overflow the parport_nr array in the following code, by appending
many (>LP_NO) ‘lp=none’ arguments to the command line (bnc#1039456).
– CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c
in the Linux kernel mishandled inheritance, which allowed local users to
cause a denial of service or possibly have unspecified other impact via
crafted system calls, a related issue to CVE-2017-8890 (bnc#1039885).
– CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c
in the Linux kernel mishandled inheritance, which allowed local users to
cause a denial of service or possibly have unspecified other impact via
crafted system calls, a related issue to CVE-2017-8890 (bnc#1040069).
– CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c
in the Linux kernel mishandled inheritance, which allowed local users to
cause a denial of service or possibly have unspecified other impact via
crafted system calls, a related issue to CVE-2017-8890 (bnc#1039883).
– CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel
did not consider that the nexthdr field may be associated with an
invalid option, which allowed local users to cause a denial of service
(out-of-bounds read and BUG) or possibly have unspecified other impact
via crafted socket and send system calls (bnc#1039882).
– CVE-2017-7487: The ipxitf_ioctl function in net/ipx/af_ipx.c in the
Linux kernel mishandled reference counts, which allowed local users to
cause a denial of service (use-after-free) or possibly have unspecified
other impact via a failed SIOCGIFADDR ioctl call for an IPX interface
(bnc#1038879).
– CVE-2017-8890: The inet_csk_clone_lock function in
net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to
cause a denial of service (double free) or possibly have unspecified
other impact by leveraging use of the accept system call (bnc#1038544).
– CVE-2017-7889: The mm subsystem in the Linux kernel did not properly
enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allowed
local users to read or write to kernel memory locations in the first
megabyte (and bypass slab-allocation access restrictions) via an
application that opens the /dev/mem file, related to arch/x86/mm/init.c
and drivers/char/mem.c (bnc#1034405).

The following new features were implemented:
– the r8152 network driver was updated to support Realtek RTL8152/RTL8153
Based USB Ethernet Adapters (fate#321482)

The following non-security bugs were fixed:

– blkback/blktap: do not leak stack data via response ring (bsc#1042863
XSA-216).
– btrfs: Add WARN_ON for qgroup reserved underflow (bsc#1031515).
– btrfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
– btrfs: Check qgroup level in kernel qgroup assign (bsc#1001459).
– btrfs: qgroup: allow to remove qgroup which has parent but no child
(bsc#1001459).
– btrfs: quota: Automatically update related qgroups or mark INCONSISTENT
flags when assigning/deleting a qgroup relations (bsc#1001459).
– ceph: Correctly return NXIO errors from ceph_llseek (git-fixes).
– ceph: fix file open flags on ppc64 (git-fixes).
– ceph: check i_nlink while converting a file handle to dentry
(bsc#1039864).
– drivers/net: delete non-required instances of include
<linux/init.h> (bsc#993099).
– drivers/net/usb: add device id for NVIDIA Tegra USB 3.0 Ethernet
(bsc#993099).
– drivers/net/usb: Add support for ‘Lenovo OneLink Pro Dock’ (bsc#993099).
– enic: set skb->hash type properly (bsc#922871).
– ext2: Do not clear SGID when inheriting ACLs (bsc#1030552).
– ext4: Do not clear SGID when inheriting ACLs (bsc#1030552).
– firmware: dmi_scan: Fix ordering of product_uuid (bsc#1030531).
– fm10k: correctly check if interface is removed (bsc#922855).
– fs/block_dev: always invalidate cleancache in invalidate_bdev()
(git-fixes).
– fs: fix data invalidation in the cleancache during direct IO (git-fixes).
– fs/xattr.c: zero out memory copied to userspace in getxattr (git-fixes).
– hv: vmbus: Raise retry/wait limits in vmbus_post_msg() (bsc#1023287,
bsc#1028217, bsc#1048788).
– jhash: Update jhash_[321]words functions to use correct initval
(git-fixes).
– kABI: mask an include (bsc#994364).
– md: ensure md devices are freed before module is unloaded (git-fixes).
– md/raid0: apply base queue limits *before* disk_stack_limits (git-fixes).
– md/raid0: update queue parameter in a safer location (git-fixes).
– md/raid1: do not clear bitmap bit when bad-block-list write fails
(git-fixes).
– md/raid10: do not clear bitmap bit when bad-block-list write fails
(git-fixes).
– md/raid10: ensure device failure recorded before write request returns
(git-fixes).
– mlock: fix mlock count can not decrease in race condition (VM
Functionality, bsc#1042696).
– mlx: Revert the mlx5e_tx_notify_hw() changes.(bsc#1033960)
– mm/huge_memory: replace VM_NO_THP VM_BUG_ON with actual VMA check (VM
Functionality, bsc#1042832).
– mm: hugetlb: call huge_pte_alloc() only if ptep is null (VM
Functionality, bsc#1042832).
– mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack
(bnc#1039348).
– netfilter: bridge: Fix the build when IPV6 is disabled (bsc#1027149).
– net: get rid of SET_ETHTOOL_OPS (bsc#993099).
– net/usb/r8152: add device id for Lenovo TP USB 3.0 Ethernet (bsc#993099).
– netvsc: get rid of completion timeouts (bsc#1048788).
– nfs v4.1: Fix Oopsable condition in server callback races (git-fixes).
– ocfs2: Do not clear SGID when inheriting ACLs (bsc#1030552).
– pid_ns: Sleep in TASK_INTERRUPTIBLE in zap_pid_ns_processes
(bnc#1012985).
– powerpc: Add missing error check to prom_find_boot_cpu() (bnc#856774).
– powerpc/book3s: Fix MCE console messages for unrecoverable MCE
(bnc#878240).
– powerpc/bpf/jit: Disable classic BPF JIT on ppc64le (bsc#1041429,
[2017-05-29] Pending SUSE Kernel Fixes).
– powerpc: Fix bad inline asm constraint in create_zero_mask()
(bnc#856774).
– powerpc/64: Fix flush_(d|i)cache_range() called from modules
(bnc#863764).
– printk: prevent userland from spoofing kernel messages (bsc#1039721).
– reiserfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
– rtl8152: correct speed testing (bsc#993099).
– r8152: add functions to set EEE (bsc#993099).
– r8152: add MODULE_VERSION (bsc#993099).
– r8152: add mutex for hw settings (bsc#993099).
– r8152: add pre_reset and post_reset (bsc#993099).
– r8152: add reset_resume function (bsc#993099).
– r8152: add rtl_ops (bsc#993099).
– r8152: add skb_cow_head (bsc#993099).
– r8152: add three functions (bsc#993099).
– r8152: adjust ALDPS function (bsc#993099).
– r8152: adjust lpm timer (bsc#993099).
– r8152: adjust rtl_start_rx (bsc#993099).
– r8152: adjust rx_bottom (bsc#993099).
– r8152: adjust r8152_submit_rx (bsc#993099).
– r8152: adjust the line feed for hw_features (bsc#993099).
– r8152: adjust usb_autopm_xxx (bsc#993099).
– r8152: autoresume before setting feature (bsc#993099).
– r8152: autoresume before setting MAC address (bsc#993099).
– r8152: calculate the dropped packets for rx (bsc#993099).
– r8152: call rtl_start_rx after netif_carrier_on (bsc#993099).
– r8152: clear BMCR_PDOWN (bsc#993099).
– r8152: clear LINK_OFF_WAKE_EN after autoresume (bsc#993099).
– r8152: clear SELECTIVE_SUSPEND when autoresuming (bsc#993099).
– r8152: clear the flag of SCHEDULE_TASKLET in tasklet (bsc#993099).
– r8152: combine PHY reset with set_speed (bsc#993099).
– r8152: constify ethtool_ops structures (bsc#993099).
– r8152: correct some messages (bsc#993099).
– r8152: correct the rx early size (bsc#993099).
– r8152: deal with the empty line and space (bsc#993099).
– r8152: disable ALDPS and EEE before setting PHY (bsc#993099).
– r8152: disable ALDPS (bsc#993099).
– r8152: disable MAC clock speed down (bsc#993099).
– r8152: disable power cut for RTL8153 (bsc#993099).
– r8152: disable teredo for RTL8152 (bsc#993099).
– r8152: disable the capability of zero length (bsc#993099).
– r8152: disable the ECM mode (bsc#993099).
– r8152: disable the tasklet by default (bsc#993099).
– r8152: do not enable napi before rx ready (bsc#993099).
– r8152: ecm and vendor modes coexist (bsc#993099).
– r8152: fix incorrect type in assignment (bsc#993099).
– r8152: fix lockup when runtime PM is enabled (bsc#993099).
– r8152: fix runtime function for RTL8152 (bsc#993099).
– r8152: fix r8152_csum_workaround function (bsc#993099).
– r8152: fix setting RTL8152_UNPLUG (bsc#993099).
– r8152: fix the carrier off when autoresuming (bsc#993099).
– r8152: fix the checking of the usb speed (bsc#993099).
– r8152: fix the issue about U1/U2 (bsc#993099).
– r8152: fix the runtime suspend issues (bsc#993099).
– r8152: fix the submission of the interrupt transfer (bsc#993099).
– r8152: fix the wake event (bsc#993099).
– r8152: fix the warnings and a error from checkpatch.pl (bsc#993099).
– r8152: fix the wrong return value (bsc#993099).
– r8152: fix tx/rx memory overflow (bsc#993099).
– r8152: fix wakeup settings (bsc#993099).
– r8152: change rx early size when the mtu is changed (bsc#993099).
– r8152: change some definitions (bsc#993099).
– r8152: change the descriptor (bsc#993099).
– r8152: change the EEE definition (bsc#993099).
– r8152: change the location of rtl8152_set_mac_address (bsc#993099).
– r8152: check code with checkpatch.pl (bsc#993099).
– r8152: check linking status with netif_carrier_ok (bsc#993099).
– r8152: check RTL8152_UNPLUG and netif_running before autoresume
(bsc#993099).
– r8152: check RTL8152_UNPLUG (bsc#993099).
– r8152: check RTL8152_UNPLUG for rtl8152_close (bsc#993099).
– r8152: check the status before submitting rx (bsc#993099).
– r8152: check tx agg list before spin lock (bsc#993099).
– r8152: check WORK_ENABLE in suspend function (bsc#993099).
– r8152: increase the tx timeout (bsc#993099).
– r8152: load the default MAC address (bsc#993099).
– r8152: modify rtl_ops_init (bsc#993099).
– r8152: modify the check of the flag of PHY_RESET in set_speed function
(bsc#993099).
– r8152: modify the method of accessing PHY (bsc#993099).
– r8152: modify the tx flow (bsc#993099).
– r8152: move enabling PHY (bsc#993099).
– r8152: move PHY settings to hw_phy_cfg (bsc#993099).
– r8152: move rtl8152_unload and ocp_reg_write (bsc#993099).
– r8152: move r8152b_get_version (bsc#993099).
– r8152: move some functions (bsc#993099).
– r8152: move some functions (bsc#993099).
– r8152: move some functions from probe to open (bsc#993099).
– r8152: move the actions of saving the information of the device
(bsc#993099).
– r8152: move the setting for the default speed (bsc#993099).
– r8152: move the settings of PHY to a work queue (bsc#993099).
– r8152: nway reset after setting eee (bsc#993099).
– r8152: redefine REALTEK_USB_DEVICE (bsc#993099).
– r8152: reduce the frequency of spin_lock (bsc#993099).
– r8152: reduce the number of Tx (bsc#993099).
– r8152: remove a netif_carrier_off in rtl8152_open function (bsc#993099).
– r8152: remove cancel_delayed_work_sync in rtl8152_set_speed (bsc#993099).
– r8152: remove clearing bp (bsc#993099).
– r8152: remove generic_ocp_read before writing (bsc#993099).
– r8152: remove rtl_phy_reset function (bsc#993099).
– r8152: remove rtl8152_get_stats (bsc#993099).
– r8152: remove r8153_enable_eee (bsc#993099).
– r8152: remove sram_read (bsc#993099).
– r8152: remove the definitions of the PID (bsc#993099).
– r8152: remove the duplicate init for the list of rx_done (bsc#993099).
– r8152: remove the setting of LAN_WAKE_EN (bsc#993099).
– r8152: rename rx_buf_sz (bsc#993099).
– r8152: rename tx_underun (bsc#993099).
– r8152: replace get_protocol with vlan_get_protocol (bsc#993099).
– r8152: replace netdev_alloc_skb_ip_align with napi_alloc_skb
(bsc#993099).
– r8152: replace netif_rx with netif_receive_skb (bsc#993099).
– r8152: replace some tabs with spaces (bsc#993099).
– r8152: replace some types from int to bool (bsc#993099).
– r8152: replace spin_lock_irqsave and spin_unlock_irqrestore (bsc#993099).
– r8152: replace strncpy with strlcpy (bsc#993099).
– r8152: replace tasklet with NAPI (bsc#993099).
– r8152: replace the return value of rtl_ops_init (bsc#993099).
– r8152: replace tp->netdev with netdev (bsc#993099).
– r8152: reset device when tx timeout (bsc#993099).
– r8152: reset the bmu (bsc#993099).
– r8152: reset tp->speed before autoresuming in open function
(bsc#993099).
– r8152: restore hw settings (bsc#993099).
– r8152: return -EBUSY for runtime suspend (bsc#993099).
– r8152: save the speed (bsc#993099).
– r8152: separate USB_RX_EARLY_AGG (bsc#993099).
– r8152: set disable_hub_initiated_lpm (bsc#993099).
– r8152: set RTL8152_UNPLUG when finding -ENODEV (bsc#993099).
– r8152: split DRIVER_VERSION (bsc#993099).
– r8152: split rtl8152_enable (bsc#993099).
– r8152: stop submitting intr for -EPROTO (bsc#993099).
– r8152: support dumping the hw counters (bsc#993099).
– r8152: support ethtool eee (bsc#993099).
– r8152: support get_msglevel and set_msglevel (bsc#993099).
– r8152: support IPv6 (bsc#993099).
– r8152: support jumbo frame for RTL8153 (bsc#993099).
– r8152: support nway_reset of ethtool (bsc#993099).
– r8152: support RTL8153 (bsc#993099).
– r8152: support runtime suspend (bsc#993099).
– r8152: support rx checksum (bsc#993099).
– r8152: support setting rx coalesce (bsc#993099).
– r8152: support stopping/waking tx queue (bsc#993099).
– r8152: support the new RTL8153 chip (bsc#993099).
– r8152: support TSO (bsc#993099).
– r8152: support VLAN (bsc#993099).
– r8152: support WOL (bsc#993099).
– r8152: up the priority of the transmission (bsc#993099).
– r8152: use BIT macro (bsc#993099).
– r8152: use eth_hw_addr_random (bsc#993099).
– r8152: Use kmemdup instead of kmalloc + memcpy (bsc#993099).
– r8152: use test_and_clear_bit (bsc#993099).
– r8152: use usleep_range (bsc#993099).
– r8152: wake up the device before dumping the hw counter (bsc#993099).
– scsi: qla2xxx: Get mutex lock before checking optrom_state (bsc#1053317).
– sched/fair: Fix min_vruntime tracking (bnc#1012985).
– sched/loadavg: Fix loadavg artifacts on fully idle and on fully loaded
systems (bnc#1012985).
– sched/rt: Fix PI handling vs. sched_setscheduler() (bnc#1012985).
– sunrpc: Update RPCBIND_MAXNETIDLEN (git-fixes).
– syscall: fix dereferencing NULL payload with nonzero length
(bsc#1045327, bsc#1062471).
– tcp: do not inherit fastopen_req from parent (bsc#1038544).
– timekeeping: Ignore the bogus sleep time if pm_trace is enabled
(bsc#994364).
– tracing/kprobes: Enforce kprobes teardown after testing (bnc#1012985).
– usb: wusbcore: fix NULL-deref at probe (bsc#1045487).
– xen: Linux 3.12.74.
– xen/PCI-MSI: fix sysfs teardown in DomU (bsc#986924).
– xfs: fix a couple error sequence jumps in xfs_mountfs() (bsc#1035531).
– xfs: fix coccinelle warnings (bsc#1035531).
– xfs: handle error if xfs_btree_get_bufs fails (bsc#1059863).
– xfs: use ->b_state to fix buffer I/O accounting release race
(bsc#1041160) (bsc#1041160).
– xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present
(bsc#1058524).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE OpenStack Cloud 6:

zypper in -t patch SUSE-OpenStack-Cloud-6-2017-1799=1

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1799=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1799=1

– SUSE Linux Enterprise Module for Public Cloud 12:

zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2017-1799=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE OpenStack Cloud 6 (noarch):

kernel-devel-3.12.74-60.64.63.1
kernel-macros-3.12.74-60.64.63.1
kernel-source-3.12.74-60.64.63.1

– SUSE OpenStack Cloud 6 (x86_64):

kernel-default-3.12.74-60.64.63.1
kernel-default-base-3.12.74-60.64.63.1
kernel-default-base-debuginfo-3.12.74-60.64.63.1
kernel-default-debuginfo-3.12.74-60.64.63.1
kernel-default-debugsource-3.12.74-60.64.63.1
kernel-default-devel-3.12.74-60.64.63.1
kernel-syms-3.12.74-60.64.63.1
kernel-xen-3.12.74-60.64.63.1
kernel-xen-base-3.12.74-60.64.63.1
kernel-xen-base-debuginfo-3.12.74-60.64.63.1
kernel-xen-debuginfo-3.12.74-60.64.63.1
kernel-xen-debugsource-3.12.74-60.64.63.1
kernel-xen-devel-3.12.74-60.64.63.1
kgraft-patch-3_12_74-60_64_63-default-1-2.1
kgraft-patch-3_12_74-60_64_63-xen-1-2.1

– SUSE Linux Enterprise Server for SAP 12-SP1 (ppc64le x86_64):

kernel-default-3.12.74-60.64.63.1
kernel-default-base-3.12.74-60.64.63.1
kernel-default-base-debuginfo-3.12.74-60.64.63.1
kernel-default-debuginfo-3.12.74-60.64.63.1
kernel-default-debugsource-3.12.74-60.64.63.1
kernel-default-devel-3.12.74-60.64.63.1
kernel-syms-3.12.74-60.64.63.1

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kernel-xen-3.12.74-60.64.63.1
kernel-xen-base-3.12.74-60.64.63.1
kernel-xen-base-debuginfo-3.12.74-60.64.63.1
kernel-xen-debuginfo-3.12.74-60.64.63.1
kernel-xen-debugsource-3.12.74-60.64.63.1
kernel-xen-devel-3.12.74-60.64.63.1
kgraft-patch-3_12_74-60_64_63-default-1-2.1
kgraft-patch-3_12_74-60_64_63-xen-1-2.1

– SUSE Linux Enterprise Server for SAP 12-SP1 (noarch):

kernel-devel-3.12.74-60.64.63.1
kernel-macros-3.12.74-60.64.63.1
kernel-source-3.12.74-60.64.63.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):

kernel-default-3.12.74-60.64.63.1
kernel-default-base-3.12.74-60.64.63.1
kernel-default-base-debuginfo-3.12.74-60.64.63.1
kernel-default-debuginfo-3.12.74-60.64.63.1
kernel-default-debugsource-3.12.74-60.64.63.1
kernel-default-devel-3.12.74-60.64.63.1
kernel-syms-3.12.74-60.64.63.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (noarch):

kernel-devel-3.12.74-60.64.63.1
kernel-macros-3.12.74-60.64.63.1
kernel-source-3.12.74-60.64.63.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kernel-xen-3.12.74-60.64.63.1
kernel-xen-base-3.12.74-60.64.63.1
kernel-xen-base-debuginfo-3.12.74-60.64.63.1
kernel-xen-debuginfo-3.12.74-60.64.63.1
kernel-xen-debugsource-3.12.74-60.64.63.1
kernel-xen-devel-3.12.74-60.64.63.1
kgraft-patch-3_12_74-60_64_63-default-1-2.1
kgraft-patch-3_12_74-60_64_63-xen-1-2.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (s390x):

kernel-default-man-3.12.74-60.64.63.1

– SUSE Linux Enterprise Module for Public Cloud 12 (x86_64):

kernel-ec2-3.12.74-60.64.63.1
kernel-ec2-debuginfo-3.12.74-60.64.63.1
kernel-ec2-debugsource-3.12.74-60.64.63.1
kernel-ec2-devel-3.12.74-60.64.63.1
kernel-ec2-extra-3.12.74-60.64.63.1
kernel-ec2-extra-debuginfo-3.12.74-60.64.63.1

References:

https://www.suse.com/security/cve/CVE-2017-1000363.html
https://www.suse.com/security/cve/CVE-2017-1000365.html
https://www.suse.com/security/cve/CVE-2017-1000380.html
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-11176.html
https://www.suse.com/security/cve/CVE-2017-12153.html
https://www.suse.com/security/cve/CVE-2017-12154.html
https://www.suse.com/security/cve/CVE-2017-12762.html
https://www.suse.com/security/cve/CVE-2017-13080.html
https://www.suse.com/security/cve/CVE-2017-14051.html
https://www.suse.com/security/cve/CVE-2017-14106.html
https://www.suse.com/security/cve/CVE-2017-14140.html
https://www.suse.com/security/cve/CVE-2017-15265.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://www.suse.com/security/cve/CVE-2017-15649.html
https://www.suse.com/security/cve/CVE-2017-7482.html
https://www.suse.com/security/cve/CVE-2017-7487.html
https://www.suse.com/security/cve/CVE-2017-7518.html
https://www.suse.com/security/cve/CVE-2017-7541.html
https://www.suse.com/security/cve/CVE-2017-7542.html
https://www.suse.com/security/cve/CVE-2017-7889.html
https://www.suse.com/security/cve/CVE-2017-8831.html
https://www.suse.com/security/cve/CVE-2017-8890.html
https://www.suse.com/security/cve/CVE-2017-8924.html
https://www.suse.com/security/cve/CVE-2017-8925.html
https://www.suse.com/security/cve/CVE-2017-9074.html
https://www.suse.com/security/cve/CVE-2017-9075.html
https://www.suse.com/security/cve/CVE-2017-9076.html
https://www.suse.com/security/cve/CVE-2017-9077.html
https://www.suse.com/security/cve/CVE-2017-9242.html
https://bugzilla.suse.com/1001459
https://bugzilla.suse.com/1012985
https://bugzilla.suse.com/1023287
https://bugzilla.suse.com/1027149
https://bugzilla.suse.com/1028217
https://bugzilla.suse.com/1030531
https://bugzilla.suse.com/1030552
https://bugzilla.suse.com/1031515
https://bugzilla.suse.com/1033960
https://bugzilla.suse.com/1034405
https://bugzilla.suse.com/1035531
https://bugzilla.suse.com/1035738
https://bugzilla.suse.com/1037182
https://bugzilla.suse.com/1037183
https://bugzilla.suse.com/1037994
https://bugzilla.suse.com/1038544
https://bugzilla.suse.com/1038564
https://bugzilla.suse.com/1038879
https://bugzilla.suse.com/1038883
https://bugzilla.suse.com/1038981
https://bugzilla.suse.com/1038982
https://bugzilla.suse.com/1039348
https://bugzilla.suse.com/1039354
https://bugzilla.suse.com/1039456
https://bugzilla.suse.com/1039721
https://bugzilla.suse.com/1039864
https://bugzilla.suse.com/1039882
https://bugzilla.suse.com/1039883
https://bugzilla.suse.com/1039885
https://bugzilla.suse.com/1040069
https://bugzilla.suse.com/1041160
https://bugzilla.suse.com/1041429
https://bugzilla.suse.com/1041431
https://bugzilla.suse.com/1042696
https://bugzilla.suse.com/1042832
https://bugzilla.suse.com/1042863
https://bugzilla.suse.com/1044125
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1045487
https://bugzilla.suse.com/1045922
https://bugzilla.suse.com/1046107
https://bugzilla.suse.com/1048275
https://bugzilla.suse.com/1048788
https://bugzilla.suse.com/1049645
https://bugzilla.suse.com/1049882
https://bugzilla.suse.com/1053148
https://bugzilla.suse.com/1053152
https://bugzilla.suse.com/1053317
https://bugzilla.suse.com/1056588
https://bugzilla.suse.com/1056982
https://bugzilla.suse.com/1057179
https://bugzilla.suse.com/1058410
https://bugzilla.suse.com/1058507
https://bugzilla.suse.com/1058524
https://bugzilla.suse.com/1059863
https://bugzilla.suse.com/1062471
https://bugzilla.suse.com/1062520
https://bugzilla.suse.com/1063667
https://bugzilla.suse.com/1064388
https://bugzilla.suse.com/856774
https://bugzilla.suse.com/860250
https://bugzilla.suse.com/863764
https://bugzilla.suse.com/878240
https://bugzilla.suse.com/922855
https://bugzilla.suse.com/922871
https://bugzilla.suse.com/986924
https://bugzilla.suse.com/993099
https://bugzilla.suse.com/994364


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

CESA-2017:3080 Important CentOS 6 tomcat6 Security Update

CentOS Errata and Security Advisory 2017:3080 Important

Upstream details at : https://access.redhat.com/errata/RHSA-2017:3080

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
f54b6d93d6877aa8d15e0b1910dab0560b9f439ac53cc6171c7da57d5287e3be tomcat6-6.0.24-111.el6_9.noarch.rpm
0249d6b4061656e106a48680caa74706e6a856640bf304d1d7534c59a6eacb7b tomcat6-admin-webapps-6.0.24-111.el6_9.noarch.rpm
d67864afbf9585832bfbc2711b89a628d1cc1be4bea3d075b93318115a50fd84 tomcat6-docs-webapp-6.0.24-111.el6_9.noarch.rpm
3653f1d30cdb47d423b28ecf217bcba8346ec2849ca00c329a692d872088173b tomcat6-el-2.1-api-6.0.24-111.el6_9.noarch.rpm
0f597cddfa8240ccc4606542f52f664783d55162ea2a2b5f48f3efdb0d953982 tomcat6-javadoc-6.0.24-111.el6_9.noarch.rpm
709845ffeb526027fba6f819236edeb50f21fe59e67eb55eb76fbbee31635708 tomcat6-jsp-2.1-api-6.0.24-111.el6_9.noarch.rpm
6cb703774287209f9c8c591007798309089446a76c621a91b2200c1a2504b924 tomcat6-lib-6.0.24-111.el6_9.noarch.rpm
d48b5d92a79b9b98f74fd007dd16c96314e6f51c58563487f16a74146d9f64ea tomcat6-servlet-2.5-api-6.0.24-111.el6_9.noarch.rpm
88ec61de388e1dd353e87636442ee7fb835ab5212645652bab3f2a5464b2f317 tomcat6-webapps-6.0.24-111.el6_9.noarch.rpm

x86_64:
f54b6d93d6877aa8d15e0b1910dab0560b9f439ac53cc6171c7da57d5287e3be tomcat6-6.0.24-111.el6_9.noarch.rpm
0249d6b4061656e106a48680caa74706e6a856640bf304d1d7534c59a6eacb7b tomcat6-admin-webapps-6.0.24-111.el6_9.noarch.rpm
d67864afbf9585832bfbc2711b89a628d1cc1be4bea3d075b93318115a50fd84 tomcat6-docs-webapp-6.0.24-111.el6_9.noarch.rpm
3653f1d30cdb47d423b28ecf217bcba8346ec2849ca00c329a692d872088173b tomcat6-el-2.1-api-6.0.24-111.el6_9.noarch.rpm
0f597cddfa8240ccc4606542f52f664783d55162ea2a2b5f48f3efdb0d953982 tomcat6-javadoc-6.0.24-111.el6_9.noarch.rpm
709845ffeb526027fba6f819236edeb50f21fe59e67eb55eb76fbbee31635708 tomcat6-jsp-2.1-api-6.0.24-111.el6_9.noarch.rpm
6cb703774287209f9c8c591007798309089446a76c621a91b2200c1a2504b924 tomcat6-lib-6.0.24-111.el6_9.noarch.rpm
d48b5d92a79b9b98f74fd007dd16c96314e6f51c58563487f16a74146d9f64ea tomcat6-servlet-2.5-api-6.0.24-111.el6_9.noarch.rpm
88ec61de388e1dd353e87636442ee7fb835ab5212645652bab3f2a5464b2f317 tomcat6-webapps-6.0.24-111.el6_9.noarch.rpm

Source:
ba857eb2777da91f86634ead63fa60f762cd4035919bef69966d7d95ee708c79 tomcat6-6.0.24-111.el6_9.src.rpm


Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

CESA-2017:3081 Important CentOS 7 tomcat Security Update

CentOS Errata and Security Advisory 2017:3081 Important

Upstream details at : https://access.redhat.com/errata/RHSA-2017:3081

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
1d033d848fb070ce731bfc768129169c2cd611bc11dc8653f5c58cb1bdfd05b9 tomcat-7.0.76-3.el7_4.noarch.rpm
3fef90d9cd773b7c399ed6ad442d6bc6380c0c314e99d92d583c8aae5b369c70 tomcat-admin-webapps-7.0.76-3.el7_4.noarch.rpm
cc9dd653559a23925e450bfb446d94d2bda2a98f22bf4109e030240fa2ad20a3 tomcat-docs-webapp-7.0.76-3.el7_4.noarch.rpm
156136608e5705defebcd04383800714ac64368b390e1992099db8fe147046eb tomcat-el-2.2-api-7.0.76-3.el7_4.noarch.rpm
aaa1246b0c12bd623bba6542c6cedaad6a97d3e38fad4966e1f7fbbadb6908ed tomcat-javadoc-7.0.76-3.el7_4.noarch.rpm
3286080d1506c088e8e68c9c41ed8fd5724465ab5b7e322ef9c8ff6d6d60df16 tomcat-jsp-2.2-api-7.0.76-3.el7_4.noarch.rpm
f6c79a4f7d436f6f619be26db6eef983ab97add568110ad8aa23ee0ea50e7eb3 tomcat-jsvc-7.0.76-3.el7_4.noarch.rpm
5c867e9a48a014d635134a35b7cfa16433bf58119cca39a0194e4163dff5ed54 tomcat-lib-7.0.76-3.el7_4.noarch.rpm
961dc90fbf11540be166f76a98224ca6ec920060a48bfdab9d2ef525026991f2 tomcat-servlet-3.0-api-7.0.76-3.el7_4.noarch.rpm
6415299ddddb2dd85e5fd14ac1b183dc1a297f94db23ad0be08ea8e7d0ae53dc tomcat-webapps-7.0.76-3.el7_4.noarch.rpm

Source:
3b05b59c5528f3efa27c0d843a6801a0c9ba8804aff08ffb0b6103379b84cd2a tomcat-7.0.76-3.el7_4.src.rpm


Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

SUSE-SU-2017:2871-1: important: Security update for wget

SUSE Security Update: Security update for wget
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2871-1
Rating: important
References: #1064715 #1064716
Cross-References: CVE-2017-13089 CVE-2017-13090
Affected Products:
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for wget fixes the following security issues:

– CVE-2017-13089,CVE-2017-13090: Missing checks for negative
remaining_chunk_size in skip_short_body and fd_read_body could cause
stack buffer overflows, which could have been exploited by malicious
servers. (bsc#1064715,bsc#1064716)

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1794=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

wget-1.14-21.3.1
wget-debuginfo-1.14-21.3.1
wget-debugsource-1.14-21.3.1

References:

https://www.suse.com/security/cve/CVE-2017-13089.html
https://www.suse.com/security/cve/CVE-2017-13090.html
https://bugzilla.suse.com/1064715
https://bugzilla.suse.com/1064716


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

CEEA-2017:3052 CentOS 7 tzdata Enhancement Update

CentOS Errata and Enhancement Advisory 2017:3052

Upstream details at : https://access.redhat.com/errata/RHEA-2017:3052

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
c9f0d7fde7ab3952e0ba0343757b60f1477cf62074063cd9f35afeffc3d18032 tzdata-2017c-1.el7.noarch.rpm
f3dd206595a2476b7e11197263ef695d8844aaae58cbb4b39dc2a89a35ce8d7a tzdata-java-2017c-1.el7.noarch.rpm

Source:
501c2b5e270663d3803ef40654ae931e254e9fac61ef6a27a7d55faffe75cbfc tzdata-2017c-1.el7.src.rpm


Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

Fwd: Updates to the Check_MK User Manual
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==

CESA-2017:3071 Moderate CentOS 6 ntp Security Update

CentOS Errata and Security Advisory 2017:3071 Moderate

Upstream details at : https://access.redhat.com/errata/RHSA-2017:3071

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
e2dc7d323fdff02674abf27c51cba5cd3bf2b9c9185851bc003ca2cb61234d0a ntp-4.2.6p5-12.el6.centos.1.i686.rpm
158ab373f5d0392f4e3168fc548d889218036ca71e3612c22fd655343a834dac ntpdate-4.2.6p5-12.el6.centos.1.i686.rpm
98157086964064a8175b71c4b70121a4109802cf5678b17b70c10e650d0b043d ntp-doc-4.2.6p5-12.el6.centos.1.noarch.rpm
bb7742afa687e7d0d0d2031d8dbfc938e1a239a65cc1d51da35d5321113688dc ntp-perl-4.2.6p5-12.el6.centos.1.i686.rpm

x86_64:
b90705825a7665764895b2b0f5f0fa253f3cd8053f7ba4e4bf22ea0eb60ad119 ntp-4.2.6p5-12.el6.centos.1.x86_64.rpm
5383d9b247aa508f0d02fa89e11e2e8a3760537f680d0323abd9af544d16d3e5 ntpdate-4.2.6p5-12.el6.centos.1.x86_64.rpm
98157086964064a8175b71c4b70121a4109802cf5678b17b70c10e650d0b043d ntp-doc-4.2.6p5-12.el6.centos.1.noarch.rpm
43f5fbf0dc6b734fca4848fc47bae07ff975b24929c8ad160383ed68dedcadce ntp-perl-4.2.6p5-12.el6.centos.1.x86_64.rpm

Source:
ad6efac5d8fa6c0476a3c2e19ef9e4660ba834bf7a411b668f05346167a5f483 ntp-4.2.6p5-12.el6.centos.1.src.rpm


Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

SUSE-SU-2017:2839-1: important: Security update for openvpn

SUSE Security Update: Security update for openvpn
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2839-1
Rating: important
References: #1060877
Cross-References: CVE-2017-12166
Affected Products:
SUSE OpenStack Cloud 6
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1-LTSS
SUSE Linux Enterprise Server 12-LTSS
SUSE Linux Enterprise Desktop 12-SP3
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for openvpn fixes the following issues:

– CVE-2017-12166: Lack of bound check in read_key in old legacy key
handling before using values could be used for a remote buffer overflow
(bsc#1060877).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE OpenStack Cloud 6:

zypper in -t patch SUSE-OpenStack-Cloud-6-2017-1762=1

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1762=1

– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1762=1

– SUSE Linux Enterprise Server 12-SP3:

zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1762=1

– SUSE Linux Enterprise Server 12-SP2:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1762=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1762=1

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1762=1

– SUSE Linux Enterprise Desktop 12-SP3:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2017-1762=1

– SUSE Linux Enterprise Desktop 12-SP2:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1762=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE OpenStack Cloud 6 (x86_64):

openvpn-2.3.8-16.20.1
openvpn-auth-pam-plugin-2.3.8-16.20.1
openvpn-auth-pam-plugin-debuginfo-2.3.8-16.20.1
openvpn-debuginfo-2.3.8-16.20.1
openvpn-debugsource-2.3.8-16.20.1

– SUSE Linux Enterprise Server for SAP 12-SP1 (ppc64le x86_64):

openvpn-2.3.8-16.20.1
openvpn-auth-pam-plugin-2.3.8-16.20.1
openvpn-auth-pam-plugin-debuginfo-2.3.8-16.20.1
openvpn-debuginfo-2.3.8-16.20.1
openvpn-debugsource-2.3.8-16.20.1

– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

openvpn-2.3.8-16.20.1
openvpn-auth-pam-plugin-2.3.8-16.20.1
openvpn-auth-pam-plugin-debuginfo-2.3.8-16.20.1
openvpn-debuginfo-2.3.8-16.20.1
openvpn-debugsource-2.3.8-16.20.1

– SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

openvpn-2.3.8-16.20.1
openvpn-auth-pam-plugin-2.3.8-16.20.1
openvpn-auth-pam-plugin-debuginfo-2.3.8-16.20.1
openvpn-debuginfo-2.3.8-16.20.1
openvpn-debugsource-2.3.8-16.20.1

– SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):

openvpn-2.3.8-16.20.1
openvpn-auth-pam-plugin-2.3.8-16.20.1
openvpn-auth-pam-plugin-debuginfo-2.3.8-16.20.1
openvpn-debuginfo-2.3.8-16.20.1
openvpn-debugsource-2.3.8-16.20.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):

openvpn-2.3.8-16.20.1
openvpn-auth-pam-plugin-2.3.8-16.20.1
openvpn-auth-pam-plugin-debuginfo-2.3.8-16.20.1
openvpn-debuginfo-2.3.8-16.20.1
openvpn-debugsource-2.3.8-16.20.1

– SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):

openvpn-2.3.8-16.20.1
openvpn-auth-pam-plugin-2.3.8-16.20.1
openvpn-auth-pam-plugin-debuginfo-2.3.8-16.20.1
openvpn-debuginfo-2.3.8-16.20.1
openvpn-debugsource-2.3.8-16.20.1

– SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

openvpn-2.3.8-16.20.1
openvpn-debuginfo-2.3.8-16.20.1
openvpn-debugsource-2.3.8-16.20.1

– SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

openvpn-2.3.8-16.20.1
openvpn-debuginfo-2.3.8-16.20.1
openvpn-debugsource-2.3.8-16.20.1

References:

https://www.suse.com/security/cve/CVE-2017-12166.html
https://bugzilla.suse.com/1060877


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE-SU-2017:2902-1: important: Security update for chromium

openSUSE Security Update: Security update for chromium
______________________________________________________________________________

Announcement ID: openSUSE-SU-2017:2902-1
Rating: important
References: #1064066 #1065405
Cross-References: CVE-2017-15386 CVE-2017-15387 CVE-2017-15388
CVE-2017-15389 CVE-2017-15390 CVE-2017-15391
CVE-2017-15392 CVE-2017-15393 CVE-2017-15394
CVE-2017-15395 CVE-2017-15396 CVE-2017-5124
CVE-2017-5125 CVE-2017-5126 CVE-2017-5127
CVE-2017-5128 CVE-2017-5129 CVE-2017-5130
CVE-2017-5131 CVE-2017-5132 CVE-2017-5133

Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________

An update that fixes 21 vulnerabilities is now available.

Description:

This update to Chromium 62.0.3202.75 fixes the following security issues:

– CVE-2017-5124: UXSS with MHTML
– CVE-2017-5125: Heap overflow in Skia
– CVE-2017-5126: Use after free in PDFium
– CVE-2017-5127: Use after free in PDFium
– CVE-2017-5128: Heap overflow in WebGL
– CVE-2017-5129: Use after free in WebAudio
– CVE-2017-5132: Incorrect stack manipulation in WebAssembly.
– CVE-2017-5130: Heap overflow in libxml2
– CVE-2017-5131: Out of bounds write in Skia
– CVE-2017-5133: Out of bounds write in Skia
– CVE-2017-15386: UI spoofing in Blink
– CVE-2017-15387: Content security bypass
– CVE-2017-15388: Out of bounds read in Skia
– CVE-2017-15389: URL spoofing in OmniBox
– CVE-2017-15390: URL spoofing in OmniBox
– CVE-2017-15391: Extension limitation bypass in Extensions.
– CVE-2017-15392: Incorrect registry key handling in PlatformIntegration
– CVE-2017-15393: Referrer leak in Devtools
– CVE-2017-15394: URL spoofing in extensions UI
– CVE-2017-15395: Null pointer dereference in ImageCapture
– CVE-2017-15396: Stack overflow in V8

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE Leap 42.3:

zypper in -t patch openSUSE-2017-1221=1

– openSUSE Leap 42.2:

zypper in -t patch openSUSE-2017-1221=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE Leap 42.3 (x86_64):

chromedriver-62.0.3202.75-118.1
chromedriver-debuginfo-62.0.3202.75-118.1
chromium-62.0.3202.75-118.1
chromium-debuginfo-62.0.3202.75-118.1
chromium-debugsource-62.0.3202.75-118.1

– openSUSE Leap 42.2 (x86_64):

chromedriver-62.0.3202.75-104.32.1
chromedriver-debuginfo-62.0.3202.75-104.32.1
chromium-62.0.3202.75-104.32.1
chromium-debuginfo-62.0.3202.75-104.32.1
chromium-debugsource-62.0.3202.75-104.32.1

References:

https://www.suse.com/security/cve/CVE-2017-15386.html
https://www.suse.com/security/cve/CVE-2017-15387.html
https://www.suse.com/security/cve/CVE-2017-15388.html
https://www.suse.com/security/cve/CVE-2017-15389.html
https://www.suse.com/security/cve/CVE-2017-15390.html
https://www.suse.com/security/cve/CVE-2017-15391.html
https://www.suse.com/security/cve/CVE-2017-15392.html
https://www.suse.com/security/cve/CVE-2017-15393.html
https://www.suse.com/security/cve/CVE-2017-15394.html
https://www.suse.com/security/cve/CVE-2017-15395.html
https://www.suse.com/security/cve/CVE-2017-15396.html
https://www.suse.com/security/cve/CVE-2017-5124.html
https://www.suse.com/security/cve/CVE-2017-5125.html
https://www.suse.com/security/cve/CVE-2017-5126.html
https://www.suse.com/security/cve/CVE-2017-5127.html
https://www.suse.com/security/cve/CVE-2017-5128.html
https://www.suse.com/security/cve/CVE-2017-5129.html
https://www.suse.com/security/cve/CVE-2017-5130.html
https://www.suse.com/security/cve/CVE-2017-5131.html
https://www.suse.com/security/cve/CVE-2017-5132.html
https://www.suse.com/security/cve/CVE-2017-5133.html
https://bugzilla.suse.com/1064066
https://bugzilla.suse.com/1065405


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2864-1: important: Security update for xen

SUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2864-1
Rating: important
References: #1027519 #1057358 #1059777 #1061076 #1061077
#1061080 #1061081 #1061082 #1061084 #1061086
#1061087
Cross-References: CVE-2017-15588 CVE-2017-15589 CVE-2017-15590
CVE-2017-15591 CVE-2017-15592 CVE-2017-15593
CVE-2017-15594 CVE-2017-15595 CVE-2017-5526

Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Desktop 12-SP2
SUSE Container as a Service Platform ALL
______________________________________________________________________________

An update that solves 9 vulnerabilities and has two fixes
is now available.

Description:

This update for xen fixes several issues:

These security issues were fixed:

– CVE-2017-5526: The ES1370 audio device emulation support was vulnerable
to a memory leakage issue allowing a privileged user inside the guest to
cause a DoS and/or potentially crash the Qemu process on the host
(bsc#1059777)
– CVE-2017-15593: Missing cleanup in the page type system allowed a
malicious or buggy PV guest to cause DoS (XSA-242 bsc#1061084)
– CVE-2017-15592: A problem in the shadow pagetable code allowed a
malicious or buggy HVM guest to cause DoS or cause hypervisor memory
corruption potentially allowing the guest to escalate its privilege
(XSA-243 bsc#1061086)
– CVE-2017-15594: Problematic handling of the selector fields in the
Interrupt Descriptor Table (IDT) allowed a malicious or buggy x86 PV
guest to escalate its privileges or cause DoS (XSA-244 bsc#1061087)
– CVE-2017-15591: Missing checks in the handling of DMOPs allowed
malicious or buggy stub domain kernels or tool stacks otherwise living
outside of Domain0 to cause a DoS (XSA-238 bsc#1061077)
– CVE-2017-15589: Intercepted I/O write operations with less than a full
machine word’s worth of data were not properly handled, which allowed a
malicious unprivileged x86 HVM guest to obtain sensitive information
from the host or
other guests (XSA-239 bsc#1061080)
– CVE-2017-15595: In certain configurations of linear page tables a stack
overflow might have occured that allowed a malicious or buggy PV guest
to cause DoS and potentially privilege escalation and information leaks
(XSA-240 bsc#1061081)
– CVE-2017-15588: Under certain conditions x86 PV guests could have caused
the hypervisor to miss a necessary TLB flush for a page. This allowed a
malicious x86 PV guest to access all of system memory, allowing for
privilege escalation, DoS, and information leaks (XSA-241 bsc#1061082)
– CVE-2017-15590: Multiple issues existed with the setup of PCI MSI
interrupts that allowed a malicious or buggy guest to cause DoS and
potentially privilege escalation and information leaks (XSA-237
bsc#1061076)

This non-security issue was fixed:

– bsc#1057358: Fixed boot when secure boot is enabled

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Software Development Kit 12-SP2:

zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-1785=1

– SUSE Linux Enterprise Server 12-SP2:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1785=1

– SUSE Linux Enterprise Desktop 12-SP2:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1785=1

– SUSE Container as a Service Platform ALL:

zypper in -t patch SUSE-CAASP-ALL-2017-1785=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 x86_64):

xen-debugsource-4.7.3_06-43.15.1
xen-devel-4.7.3_06-43.15.1

– SUSE Linux Enterprise Server 12-SP2 (x86_64):

xen-4.7.3_06-43.15.1
xen-debugsource-4.7.3_06-43.15.1
xen-doc-html-4.7.3_06-43.15.1
xen-libs-32bit-4.7.3_06-43.15.1
xen-libs-4.7.3_06-43.15.1
xen-libs-debuginfo-32bit-4.7.3_06-43.15.1
xen-libs-debuginfo-4.7.3_06-43.15.1
xen-tools-4.7.3_06-43.15.1
xen-tools-debuginfo-4.7.3_06-43.15.1
xen-tools-domU-4.7.3_06-43.15.1
xen-tools-domU-debuginfo-4.7.3_06-43.15.1

– SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

xen-4.7.3_06-43.15.1
xen-debugsource-4.7.3_06-43.15.1
xen-libs-32bit-4.7.3_06-43.15.1
xen-libs-4.7.3_06-43.15.1
xen-libs-debuginfo-32bit-4.7.3_06-43.15.1
xen-libs-debuginfo-4.7.3_06-43.15.1

– SUSE Container as a Service Platform ALL (x86_64):

xen-debugsource-4.7.3_06-43.15.1
xen-libs-4.7.3_06-43.15.1
xen-libs-debuginfo-4.7.3_06-43.15.1
xen-tools-domU-4.7.3_06-43.15.1
xen-tools-domU-debuginfo-4.7.3_06-43.15.1

References:

https://www.suse.com/security/cve/CVE-2017-15588.html
https://www.suse.com/security/cve/CVE-2017-15589.html
https://www.suse.com/security/cve/CVE-2017-15590.html
https://www.suse.com/security/cve/CVE-2017-15591.html
https://www.suse.com/security/cve/CVE-2017-15592.html
https://www.suse.com/security/cve/CVE-2017-15593.html
https://www.suse.com/security/cve/CVE-2017-15594.html
https://www.suse.com/security/cve/CVE-2017-15595.html
https://www.suse.com/security/cve/CVE-2017-5526.html
https://bugzilla.suse.com/1027519
https://bugzilla.suse.com/1057358
https://bugzilla.suse.com/1059777
https://bugzilla.suse.com/1061076
https://bugzilla.suse.com/1061077
https://bugzilla.suse.com/1061080
https://bugzilla.suse.com/1061081
https://bugzilla.suse.com/1061082
https://bugzilla.suse.com/1061084
https://bugzilla.suse.com/1061086
https://bugzilla.suse.com/1061087


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE-SU-2017:2905-1: important: Security update for the Linux Kernel

openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID: openSUSE-SU-2017:2905-1
Rating: important
References: #1012382 #1020645 #1022595 #1022600 #1025461
#1028971 #1034048 #1055567 #1056427 #1059863
#1060985 #1061451 #1062520 #1062962 #1063460
#1063475 #1063501 #1063509 #1063520 #1063667
#1063695 #1064206 #1064388 #964944 #966170
#966172 #966186 #966191 #966316 #966318 #969474
#969475 #969476 #969477 #971975
Cross-References: CVE-2017-13080 CVE-2017-15265 CVE-2017-15649

Affected Products:
openSUSE Leap 42.2
______________________________________________________________________________

An update that solves three vulnerabilities and has 32
fixes is now available.

Description:

The openSUSE Leap 42.2 kernel was updated to 4.4.92 to receive various
security and bugfixes.

The following security bugs were fixed:

– CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed
reinstallation of the Group Temporal Key (GTK) during the group key
handshake, allowing an attacker within radio range to replay frames from
access points to clients (bnc#1063667).
– CVE-2017-15265: Race condition in the ALSA subsystem in the Linux kernel
allowed local users to cause a denial of service (use-after-free) or
possibly have unspecified other impact via crafted /dev/snd/seq ioctl
calls, related to sound/core/seq/seq_clientmgr.c and
sound/core/seq/seq_ports.c (bnc#1062520).
– CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local
users to gain privileges via crafted system calls that trigger
mishandling of packet_fanout data structures, because of a race
condition (involving fanout_add and packet_do_bind) that leads to a
use-after-free, a different vulnerability than CVE-2017-6346
(bnc#1064388).

The following non-security bugs were fixed:

– alsa: au88x0: avoid theoretical uninitialized access (bnc#1012382).
– alsa: compress: Remove unused variable (bnc#1012382).
– alsa: usb-audio: Check out-of-bounds access by corrupted buffer
descriptor (bnc#1012382).
– alsa: usx2y: Suppress kernel warning at page allocation failures
(bnc#1012382).
– arm: 8635/1: nommu: allow enabling REMAP_VECTORS_TO_RAM (bnc#1012382).
– arm: dts: r8a7790: Use R-Car Gen 2 fallback binding for msiof nodes
(bnc#1012382).
– arm: remove duplicate ‘const’ annotations’ (bnc#1012382).
– asoc: dapm: fix some pointer error handling (bnc#1012382).
– asoc: dapm: handle probe deferrals (bnc#1012382).
– audit: log 32-bit socketcalls (bnc#1012382).
– blacklist 0e7736c6b806 powerpc/powernv: Fix data type for @r in
pnv_ioda_parse_m64_window()
– blacklist.conf: not fitting cleanup patch
– brcmfmac: setup passive scan if requested by user-space (bnc#1012382).
– bridge: netlink: register netdevice before executing changelink
(bnc#1012382).
– ceph: avoid panic in create_session_open_msg() if utsname() returns NULL
(bsc#1061451).
– ceph: check negative offsets in ceph_llseek() (bsc#1061451).
– driver core: platform: Do not read past the end of “driver_override”
buffer (bnc#1012382).
– drivers: firmware: psci: drop duplicate const from psci_of_match
(bnc#1012382).
– drivers: hv: fcopy: restore correct transfer length (bnc#1012382).
– drm/amdkfd: fix improper return value on error (bnc#1012382).
– drm: bridge: add DT bindings for TI ths8135 (bnc#1012382).
– drm_fourcc: Fix DRM_FORMAT_MOD_LINEAR #define (bnc#1012382).
– drm/i915/bios: ignore HDMI on port A (bnc#1012382).
– ext4: do not allow encrypted operations without keys (bnc#1012382).
– extcon: axp288: Use vbus-valid instead of -present to determine cable
presence (bnc#1012382).
– exynos-gsc: Do not swap cb/cr for semi planar formats (bnc#1012382).
– fix whitespace according to upstream commit
– fs/epoll: cache leftmost node (bsc#1056427).
– ftrace: Fix kmemleak in unregister_ftrace_graph (bnc#1012382).
– gfs2: Fix reference to ERR_PTR in gfs2_glock_iter_next (bnc#1012382).
– hid: i2c-hid: allocate hid buffers for real worst case (bnc#1012382).
– hpsa: correct lun data caching bitmap definition (bsc#1028971).
– hwmon: (gl520sm) Fix overflows and crash seen when writing into limit
attributes (bnc#1012382).
– i2c: meson: fix wrong variable usage in meson_i2c_put_data (bnc#1012382).
– i40e: Initialize 64-bit statistics TX ring seqcount (bsc#969476
FATE#319648 bsc#969477 FATE#319816).
– i40iw: Add missing memory barriers (bsc#969476 FATE#319648 bsc#969477
FATE#319816).
– i40iw: Fix port number for query QP (bsc#969476 FATE#319648 bsc#969477
FATE#319816).
– ib/core: Fix for core panic (bsc#1022595 FATE#322350).
– ib/core: Fix the validations of a multicast LID in attach or detach
operations (bsc#1022595 FATE#322350).
– ib/i40iw: Fix error code in i40iw_create_cq() (bsc#969476 FATE#319648
bsc#969477 FATE#319816).
– ib/ipoib: Fix deadlock over vlan_mutex (bnc#1012382).
– ib/ipoib: Replace list_del of the neigh->list with list_del_init
(bnc#1012382).
– ib/ipoib: rtnl_unlock can not come after free_netdev (bnc#1012382).
– ib/mlx5: Fix Raw Packet QP event handler assignment (bsc#966170
FATE#320225 bsc#966172 FATE#320226).
– ibmvnic: Set state UP (bsc#1062962).
– ib/qib: fix false-postive maybe-uninitialized warning (bnc#1012382).
– igb: re-assign hw address pointer on reset after PCI error (bnc#1012382).
– iio: ad7793: Fix the serial interface reset (bnc#1012382).
– iio: adc: axp288: Drop bogus AXP288_ADC_TS_PIN_CTRL register
modifications (bnc#1012382).
– iio: adc: hx711: Add DT binding for avia,hx711 (bnc#1012382).
– iio: adc: mcp320x: Fix oops on module unload (bnc#1012382).
– iio: adc: mcp320x: Fix readout of negative voltages (bnc#1012382).
– iio: adc: twl4030: Disable the vusb3v1 rugulator in the error handling
path of ‘twl4030_madc_probe()’ (bnc#1012382).
– iio: adc: twl4030: Fix an error handling path in ‘twl4030_madc_probe()’
(bnc#1012382).
– iio: ad_sigma_delta: Implement a dedicated reset function (bnc#1012382).
– iio: core: Return error for failed read_reg (bnc#1012382).
– iommu/io-pgtable-arm: Check for leaf entry before dereferencing it
(bnc#1012382).
– iwlwifi: add workaround to disable wide channels in 5GHz (bnc#1012382).
– ixgbe: Fix incorrect bitwise operations of PTP Rx timestamp flags
(bsc#969474 FATE#319812 bsc#969475 FATE#319814).
– kABI: protect struct rm_data_op (kabi).
– kABI: protect struct sdio_func (kabi).
– libata: transport: Remove circular dependency at free time (bnc#1012382).
– lsm: fix smack_inode_removexattr and xattr_getsecurity memleak
(bnc#1012382).
– md/raid10: submit bio directly to replacement disk (bnc#1012382).
– mips: Ensure bss section ends on a long-aligned address (bnc#1012382).
– mips: Fix minimum alignment requirement of IRQ stack (git-fixes).
– mips: IRQ Stack: Unwind IRQ stack onto task stack (bnc#1012382).
– mips: Lantiq: Fix another request_mem_region() return code check
(bnc#1012382).
– mips: ralink: Fix incorrect assignment on ralink_soc (bnc#1012382).
– mlx5: Avoid that mlx5_ib_sg_to_klms() overflows the klms array
(bsc#966170 FATE#320225 bsc#966172 FATE#320226).
– mm/backing-dev.c: fix an error handling path in ‘cgwb_create()’
(bnc#1063475).
– mm,compaction: serialize waitqueue_active() checks (for real)
(bsc#971975).
– mmc: sdio: fix alignment issue in struct sdio_func (bnc#1012382).
– mm: discard memblock data later (bnc#1063460).
– mm/memblock.c: reversed logic in memblock_discard() (bnc#1063460).
– mm: meminit: mark init_reserved_page as __meminit (bnc#1063509).
– mm/memory_hotplug: change pfn_to_section_nr/section_nr_to_pfn macro to
inline function (bnc#1063501).
– mm/memory_hotplug: define find_{smallest|biggest}_section_pfn as
unsigned long (bnc#1063520).
– net: core: Prevent from dereferencing null pointer when releasing SKB
(bnc#1012382).
– netfilter: invoke synchronize_rcu after set the _hook_ to NULL
(bnc#1012382).
– netfilter: nfnl_cthelper: fix incorrect helper->expect_class_max
(bnc#1012382).
– net/mlx4_core: Enable 4K UAR if SRIOV module parameter is not enabled
(bsc#966191 FATE#320230 bsc#966186 FATE#320228).
– net/mlx5e: Fix wrong delay calculation for overflow check scheduling
(bsc#966170 FATE#320225 bsc#966172 FATE#320226).
– net/mlx5e: Schedule overflow check work to mlx5e workqueue (bsc#966170
FATE#320225 bsc#966172 FATE#320226).
– net/mlx5: Skip mlx5_unload_one if mlx5_load_one fails (bsc#966170
FATE#320225 bsc#966172 FATE#320226).
– net/packet: check length in getsockopt() called with PACKET_HDRLEN
(bnc#1012382).
– nvme: protect against simultaneous shutdown invocations (FATE#319965
bnc#1012382 bsc#964944).
– parisc: perf: Fix potential NULL pointer dereference (bnc#1012382).
– partitions/efi: Fix integer overflow in GPT size calculation
(bnc#1012382).
– qed: Fix stack corruption on probe (bsc#966318 FATE#320158 bsc#966316
FATE#320159).
– rds: ib: add error handle (bnc#1012382).
– rds: RDMA: Fix the composite message user notification (bnc#1012382).
– README.BRANCH: Add Michal and Johannes as co-maintainers.
– sched/cpuset/pm: Fix cpuset vs. suspend-resume bugs (bnc#1012382).
– scsi: hpsa: add ‘ctlr_num’ sysfs attribute (bsc#1028971).
– scsi: hpsa: bump driver version (bsc#1022600 fate#321928).
– scsi: hpsa: change driver version (bsc#1022600 bsc#1028971 fate#321928).
– scsi: hpsa: Check for null device pointers (bsc#1028971).
– scsi: hpsa: Check for null devices in ioaccel (bsc#1028971).
– scsi: hpsa: Check for vpd support before sending (bsc#1028971).
– scsi: hpsa: cleanup reset handler (bsc#1022600 fate#321928).
– scsi: hpsa: correct call to hpsa_do_reset (bsc#1028971).
– scsi: hpsa: correct logical resets (bsc#1028971).
– scsi: hpsa: correct queue depth for externals (bsc#1022600 fate#321928).
– scsi: hpsa: correct resets on retried commands (bsc#1022600 fate#321928).
– scsi: hpsa: correct scsi 6byte lba calculation (bsc#1028971).
– scsi: hpsa: Determine device external status earlier (bsc#1028971).
– scsi: hpsa: do not get enclosure info for external devices (bsc#1022600
fate#321928).
– scsi: hpsa: do not reset enclosures (bsc#1022600 fate#321928).
– scsi: hpsa: do not timeout reset operations (bsc#1022600 bsc#1028971
fate#321928).
– scsi: hpsa: fallback to use legacy REPORT PHYS command (bsc#1028971).
– scsi: hpsa: fix volume offline state (bsc#1022600 bsc#1028971
fate#321928).
– scsi: hpsa: limit outstanding rescans (bsc#1022600 bsc#1028971
fate#321928).
– scsi: hpsa: Prevent sending bmic commands to externals (bsc#1028971).
– scsi: hpsa: remove abort handler (bsc#1022600 fate#321928).
– scsi: hpsa: remove coalescing settings for ioaccel2 (bsc#1028971).
– scsi: hpsa: remove memory allocate failure message (bsc#1028971).
– scsi: hpsa: Remove unneeded void pointer cast (bsc#1028971).
– scsi: hpsa: rescan later if reset in progress (bsc#1022600 fate#321928).
– scsi: hpsa: send ioaccel requests with 0 length down raid path
(bsc#1022600 fate#321928).
– scsi: hpsa: separate monitor events from rescan worker (bsc#1022600
fate#321928).
– scsi: hpsa: update check for logical volume status (bsc#1022600
bsc#1028971 fate#321928).
– scsi: hpsa: update identify physical device structure (bsc#1022600
fate#321928).
– scsi: hpsa: update pci ids (bsc#1022600 bsc#1028971 fate#321928).
– scsi: hpsa: update reset handler (bsc#1022600 fate#321928).
– scsi: hpsa: use designated initializers (bsc#1028971).
– scsi: hpsa: use %phN for short hex dumps (bsc#1028971).
– scsi: libfc: fix a deadlock in fc_rport_work (bsc#1063695).
– scsi: sd: Do not override max_sectors_kb sysfs setting (bsc#1025461).
– scsi: sd: Remove LBPRZ dependency for discards (bsc#1060985). This patch
is originally part of a larger series which can’t be easily backported
to SLE-12. For a reasoning why we think it’s safe to apply, see
bsc#1060985, comment 20.
– scsi: sg: close race condition in sg_remove_sfp_usercontext()
(bsc#1064206).
– sh_eth: use correct name for ECMR_MPDE bit (bnc#1012382).
– staging: iio: ad7192: Fix – use the dedicated reset function avoiding
dma from stack (bnc#1012382).
– stm class: Fix a use-after-free (bnc#1012382).
– supported.conf: mark hid-multitouch as supported (FATE#323670)
– team: call netdev_change_features out of team lock (bsc#1055567).
– team: fix memory leaks (bnc#1012382).
– tpm_tis: Do not fall back to a hardcoded address for TPM2 (bsc#1020645,
fate#321435, fate#321507, fate#321600, bsc#1034048).
– ttpci: address stringop overflow warning (bnc#1012382).
– tty: goldfish: Fix a parameter of a call to free_irq (bnc#1012382).
– usb: chipidea: vbus event may exist before starting gadget (bnc#1012382).
– usb: core: harden cdc_parse_cdc_header (bnc#1012382).
– usb: devio: Do not corrupt user memory (bnc#1012382).
– usb: dummy-hcd: fix connection failures (wrong speed) (bnc#1012382).
– usb: dummy-hcd: Fix erroneous synchronization change (bnc#1012382).
– usb: dummy-hcd: fix infinite-loop resubmission bug (bnc#1012382).
– usb: fix out-of-bounds in usb_set_configuration (bnc#1012382).
– usb: gadgetfs: fix copy_to_user while holding spinlock (bnc#1012382).
– usb: gadgetfs: Fix crash caused by inadequate synchronization
(bnc#1012382).
– usb: gadget: inode.c: fix unbalanced spin_lock in ep0_write
(bnc#1012382).
– usb: gadget: mass_storage: set msg_registered after msg registered
(bnc#1012382).
– usb: gadget: udc: atmel: set vbus irqflags explicitly (bnc#1012382).
– usb: g_mass_storage: Fix deadlock when driver is unbound (bnc#1012382).
– usb: Increase quirk delay for USB devices (bnc#1012382).
– usb: pci-quirks.c: Corrected timeout values used in handshake
(bnc#1012382).
– usb: plusb: Add support for PL-27A1 (bnc#1012382).
– usb: renesas_usbhs: fix the BCLR setting condition for non-DCP pipe
(bnc#1012382).
– usb: renesas_usbhs: fix usbhsf_fifo_clear() for RX direction
(bnc#1012382).
– usb: serial: mos7720: fix control-message error handling (bnc#1012382).
– usb: serial: mos7840: fix control-message error handling (bnc#1012382).
– usb-storage: unusual_devs entry to fix write-access regression for
Seagate external drives (bnc#1012382).
– usb: uas: fix bug in handling of alternate settings (bnc#1012382).
– uwb: ensure that endpoint is interrupt (bnc#1012382).
– uwb: properly check kthread_run return value (bnc#1012382).
– xfs: handle error if xfs_btree_get_bufs fails (bsc#1059863).
– xfs: remove kmem_zalloc_greedy (bnc#1012382).
– xhci: fix finding correct bus_state structure for USB 3.1 hosts
(bnc#1012382).

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE Leap 42.2:

zypper in -t patch openSUSE-2017-1224=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE Leap 42.2 (noarch):

kernel-devel-4.4.92-18.36.1
kernel-docs-4.4.92-18.36.2
kernel-docs-html-4.4.92-18.36.2
kernel-docs-pdf-4.4.92-18.36.2
kernel-macros-4.4.92-18.36.1
kernel-source-4.4.92-18.36.1
kernel-source-vanilla-4.4.92-18.36.1

– openSUSE Leap 42.2 (x86_64):

kernel-debug-4.4.92-18.36.1
kernel-debug-base-4.4.92-18.36.1
kernel-debug-base-debuginfo-4.4.92-18.36.1
kernel-debug-debuginfo-4.4.92-18.36.1
kernel-debug-debugsource-4.4.92-18.36.1
kernel-debug-devel-4.4.92-18.36.1
kernel-debug-devel-debuginfo-4.4.92-18.36.1
kernel-default-4.4.92-18.36.1
kernel-default-base-4.4.92-18.36.1
kernel-default-base-debuginfo-4.4.92-18.36.1
kernel-default-debuginfo-4.4.92-18.36.1
kernel-default-debugsource-4.4.92-18.36.1
kernel-default-devel-4.4.92-18.36.1
kernel-obs-build-4.4.92-18.36.1
kernel-obs-build-debugsource-4.4.92-18.36.1
kernel-obs-qa-4.4.92-18.36.1
kernel-syms-4.4.92-18.36.1
kernel-vanilla-4.4.92-18.36.1
kernel-vanilla-base-4.4.92-18.36.1
kernel-vanilla-base-debuginfo-4.4.92-18.36.1
kernel-vanilla-debuginfo-4.4.92-18.36.1
kernel-vanilla-debugsource-4.4.92-18.36.1
kernel-vanilla-devel-4.4.92-18.36.1

References:

https://www.suse.com/security/cve/CVE-2017-13080.html
https://www.suse.com/security/cve/CVE-2017-15265.html
https://www.suse.com/security/cve/CVE-2017-15649.html
https://bugzilla.suse.com/1012382
https://bugzilla.suse.com/1020645
https://bugzilla.suse.com/1022595
https://bugzilla.suse.com/1022600
https://bugzilla.suse.com/1025461
https://bugzilla.suse.com/1028971
https://bugzilla.suse.com/1034048
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1056427
https://bugzilla.suse.com/1059863
https://bugzilla.suse.com/1060985
https://bugzilla.suse.com/1061451
https://bugzilla.suse.com/1062520
https://bugzilla.suse.com/1062962
https://bugzilla.suse.com/1063460
https://bugzilla.suse.com/1063475
https://bugzilla.suse.com/1063501
https://bugzilla.suse.com/1063509
https://bugzilla.suse.com/1063520
https://bugzilla.suse.com/1063667
https://bugzilla.suse.com/1063695
https://bugzilla.suse.com/1064206
https://bugzilla.suse.com/1064388
https://bugzilla.suse.com/964944
https://bugzilla.suse.com/966170
https://bugzilla.suse.com/966172
https://bugzilla.suse.com/966186
https://bugzilla.suse.com/966191
https://bugzilla.suse.com/966316
https://bugzilla.suse.com/966318
https://bugzilla.suse.com/969474
https://bugzilla.suse.com/969475
https://bugzilla.suse.com/969476
https://bugzilla.suse.com/969477
https://bugzilla.suse.com/971975


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

CESA-2017:2930 Important CentOS 7 kernel Security Update

CentOS Errata and Security Advisory 2017:2930 Important

Upstream details at : https://access.redhat.com/errata/RHSA-2017:2930

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
cbcf80a045ddf5b6604f169cb4dfafc3289dc7415d3e325c35f39e5183d0b9ff kernel-3.10.0-693.5.2.el7.x86_64.rpm
293281676d31bacce91acde6543fcc120916839b0535a4626c61df22e405d455 kernel-abi-whitelists-3.10.0-693.5.2.el7.noarch.rpm
fe6ab3882763b2b44b018bc17e011f0d18e1346e21eb15842bdc7c70bb71c482 kernel-debug-3.10.0-693.5.2.el7.x86_64.rpm
12a1c7b5b51977f4c06eaa46ddd817936ae79d06e5f4d54aed291aabb92f048f kernel-debug-devel-3.10.0-693.5.2.el7.x86_64.rpm
45c462433548861502ea8aecc9819813eafb195fe7f847cd4ba061bc912cdad1 kernel-devel-3.10.0-693.5.2.el7.x86_64.rpm
dad242aabbd78994d2d1e31f9ed115909c2712c0fc2d5f0d3a475ff7fff771a2 kernel-doc-3.10.0-693.5.2.el7.noarch.rpm
9bc5325cf78d0b72989ef9a31013f295119ffad25dbd266d9d1ece25f4d6fc7f kernel-headers-3.10.0-693.5.2.el7.x86_64.rpm
8fd1f5a3de7ec2e8e000281dc06d52c62d8cfb4431fdaa4dff19d25748fd19a8 kernel-tools-3.10.0-693.5.2.el7.x86_64.rpm
c841e5094aefb04c073356099ed14d2f88ac50f81fd1349e857f2afb05ad998f kernel-tools-libs-3.10.0-693.5.2.el7.x86_64.rpm
31e38bd0c6cf6248f831f67cc914335223783551f9e6c026e3ef7e3fb09dc7f2 kernel-tools-libs-devel-3.10.0-693.5.2.el7.x86_64.rpm
3928e3784c6c695ddf02f840493e16c691a2e59e9e0bd74cb4d8825bf848161a perf-3.10.0-693.5.2.el7.x86_64.rpm
bb2fa1dd3cc798fdea47b3d0749731876ad276474dc0bb9d5070dbd32d4ccde9 python-perf-3.10.0-693.5.2.el7.x86_64.rpm

Source:
9cd5a885c657aea4f292b1de5ef66f32eecdcbd6f5b1cd013b7c1314e0e48646 kernel-3.10.0-693.5.2.el7.src.rpm


Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

SUSE-SU-2017:2869-1: important: Security update for the Linux Kernel

SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2869-1
Rating: important
References: #1006180 #1011913 #1012382 #1012829 #1013887
#1019151 #1020645 #1020657 #1021424 #1022476
#1022743 #1022967 #1023175 #1024405 #1028173
#1028286 #1029693 #1030552 #1030850 #1031515
#1031717 #1031784 #1033587 #1034048 #1034075
#1034762 #1036303 #1036632 #1037344 #1037404
#1037994 #1038078 #1038583 #1038616 #1038792
#1039915 #1040307 #1040351 #1041958 #1042286
#1042314 #1042422 #1042778 #1043652 #1044112
#1044636 #1045154 #1045563 #1045922 #1046682
#1046821 #1046985 #1047027 #1047048 #1047096
#1047118 #1047121 #1047152 #1047277 #1047343
#1047354 #1047487 #1047651 #1047653 #1047670
#1048155 #1048221 #1048317 #1048891 #1048893
#1048914 #1048934 #1049226 #1049483 #1049486
#1049580 #1049603 #1049645 #1049882 #1050061
#1050188 #1051022 #1051059 #1051239 #1051399
#1051478 #1051479 #1051556 #1051663 #1051790
#1052049 #1052223 #1052533 #1052580 #1052593
#1052709 #1052773 #1052794 #1052888 #1053117
#1053802 #1053915 #1053919 #1054084 #1055013
#1055096 #1055359 #1055493 #1055755 #1055896
#1056261 #1056588 #1056827 #1056982 #1057015
#1058038 #1058116 #1058410 #1058507 #1059051
#1059465 #1060197 #1061017 #1061046 #1061064
#1061067 #1061172 #1061831 #1061872 #1063667
#1064206 #1064388 #964063 #971975 #974215
#981309
Cross-References: CVE-2017-1000252 CVE-2017-10810 CVE-2017-11472
CVE-2017-11473 CVE-2017-12134 CVE-2017-12153
CVE-2017-12154 CVE-2017-13080 CVE-2017-14051
CVE-2017-14106 CVE-2017-14489 CVE-2017-15649
CVE-2017-7518 CVE-2017-7541 CVE-2017-7542
CVE-2017-8831
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Live Patching 12
SUSE Linux Enterprise High Availability 12-SP2
SUSE Linux Enterprise Desktop 12-SP2
SUSE Container as a Service Platform ALL
OpenStack Cloud Magnum Orchestration 7
______________________________________________________________________________

An update that solves 16 vulnerabilities and has 120 fixes
is now available.

Description:

The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.90 to receive
various security and bugfixes.

The following security bugs were fixed:

– CVE-2017-1000252: The KVM subsystem in the Linux kernel allowed guest OS
users to cause a denial of service (assertion failure, and hypervisor
hang or crash) via an out-of bounds guest_irq value, related to
arch/x86/kvm/vmx.c and virt/kvm/eventfd.c (bnc#1058038).
– CVE-2017-10810: Memory leak in the virtio_gpu_object_create function in
drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel allowed
attackers to cause a denial of service (memory consumption) by
triggering object-initialization failures (bnc#1047277).
– CVE-2017-11472: The acpi_ns_terminate() function in
drivers/acpi/acpica/nsutils.c in the Linux kernel did not flush the
operand cache and causes a kernel stack dump, which allowed local users
to obtain sensitive information from kernel memory and bypass the KASLR
protection mechanism (in the kernel through 4.9) via a crafted ACPI
table (bnc#1049580).
– CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function
in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users
to gain privileges via a crafted ACPI table (bnc#1049603).
– CVE-2017-12134: The xen_biovec_phys_mergeable function in
drivers/xen/biomerge.c in Xen might allow local OS guest users to
corrupt block device data streams and consequently obtain sensitive
memory information, cause a denial of service, or gain host OS
privileges by leveraging incorrect block IO merge-ability calculation
(bnc#1051790 bnc#1053919).
– CVE-2017-12153: A security flaw was discovered in the
nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux
kernel This function did not check whether the required attributes are
present in a Netlink request. This request can be issued by a user with
the CAP_NET_ADMIN capability and may result in a NULL pointer
dereference and system crash (bnc#1058410).
– CVE-2017-12154: The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the
Linux kernel did not ensure that the “CR8-load exiting” and “CR8-store
exiting” L0 vmcs02 controls exist in cases where L1 omits the “use TPR
shadow” vmcs12 control, which allowed KVM L2 guest OS users to obtain
read and write access to the hardware CR8 register (bnc#1058507).
– CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed
reinstallation of the Group Temporal Key (GTK) during the group key
handshake, allowing an attacker within radio range to replay frames from
access points to clients (bnc#1063667).
– CVE-2017-14051: An integer overflow in the
qla2x00_sysfs_write_optrom_ctl function in
drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel allowed local users
to cause a denial of service (memory corruption and system crash) by
leveraging root access (bnc#1056588).
– CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the
Linux kernel allowed local users to cause a denial of service
(__tcp_select_window divide-by-zero error and system crash) by
triggering a disconnect within a certain tcp_recvmsg code path
(bnc#1056982).
– CVE-2017-14489: The iscsi_if_rx function in
drivers/scsi/scsi_transport_iscsi.c in the Linux kernel allowed local
users to cause a denial of service (panic) by leveraging incorrect
length validation (bnc#1059051).
– CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local
users to gain privileges via crafted system calls that trigger
mishandling of packet_fanout data structures, because of a race
condition (involving fanout_add and packet_do_bind) that leads to a
use-after-free, a different vulnerability than CVE-2017-6346
(bnc#1064388).
– CVE-2017-7518: The Linux kernel was vulnerable to an incorrect debug
exception(#DB) error. It could occur while emulating a syscall
instruction and potentially lead to guest privilege escalation.
(bsc#1045922).
– CVE-2017-7541: The brcmf_cfg80211_mgmt_tx function in
drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux
kernel allowed local users to cause a denial of service (buffer overflow
and system crash) or possibly gain privileges via a crafted
NL80211_CMD_FRAME Netlink packet (bnc#1049645).
– CVE-2017-7542: The ip6_find_1stfragopt function in
net/ipv6/output_core.c in the Linux kernel allowed local users to cause
a denial of service (integer overflow and infinite loop) by leveraging
the ability to open a raw socket (bnc#1049882).
– CVE-2017-8831: The saa7164_bus_get function in
drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed
local users to cause a denial of service (out-of-bounds array access) or
possibly have unspecified other impact by changing a certain
sequence-number value, aka a “double fetch” vulnerability (bnc#1037994).

The following non-security bugs were fixed:

– acpi / processor: Avoid reserving IO regions too early (bsc#1051478).
– acpi / scan: Prefer devices without _HID for _ADR matching (git-fixes).
– af_key: Add lock to key dump (bsc#1047653).
– af_key: Fix slab-out-of-bounds in pfkey_compile_policy (bsc#1047354).
– alsa: fm801: Initialize chip after IRQ handler is registered
(bsc#1031717).
– alsa: hda – Add stereo mic quirk for Lenovo G50-70 (17aa:3978)
(bsc#1020657).
– alsa: hda – Fix endless loop of codec configure (bsc#1031717).
– alsa: hda – Implement mic-mute LED mode enum (bsc#1055013).
– alsa: hda/realtek – Add support headphone Mic for ALC221 of HP platform
(bsc#1024405).
– alsa: hda – set input_path bitmap to zero after moving it to new place
(bsc#1031717).
– alsa: ice1712: Add support for STAudio ADCIII (bsc#1048934).
– alsa: usb-audio: Apply sample rate quirk to Sennheiser headset
(bsc#1052580).
– arc: Re-enable MMU upon Machine Check exception (bnc#1012382).
– arm64: fault: Route pte translation faults via do_translation_fault
(bnc#1012382).
– arm64: Make sure SPsel is always set (bnc#1012382).
– arm: pxa: add the number of DMA requestor lines (bnc#1012382).
– arm: pxa: fix the number of DMA requestor lines (bnc#1012382).
– b43: Add missing MODULE_FIRMWARE() (bsc#1037344).
– bcache: correct cache_dirty_target in __update_writeback_rate()
(bnc#1012382).
– bcache: Correct return value for sysfs attach errors (bnc#1012382).
– bcache: do not subtract sectors_to_gc for bypassed IO (bnc#1012382).
– bcache: fix bch_hprint crash and improve output (bnc#1012382).
– bcache: fix for gc and write-back race (bnc#1012382).
– bcache: Fix leak of bdev reference (bnc#1012382).
– bcache: force trigger gc (bsc#1038078).
– bcache: initialize dirty stripes in flash_dev_run() (bnc#1012382).
– bcache: only recovery I/O error for writethrough mode (bsc#1043652).
– bdi: Fix use-after-free in wb_congested_put() (bsc#1040307).
– blacklist 2400fd822f46 powerpc/asm: Mark cr0 as clobbered in mftb()
– blacklist.conf: 9eeacd3a2f17 not a bug fix (bnc#1050061)
– blacklist.conf: add unapplicable/cosmetic iwlwifi fixes (bsc#1031717).
– blacklist.conf: add unapplicable drm fixes (bsc#1031717).
– blacklist.conf: Blacklist 4e201566402c (‘genirq/msi: Drop artificial PCI
dependency’) (bsc#1051478) This commit just removes an include and does
not fix a real issue.
– blacklist.conf: Blacklist aa2369f11ff7 (‘mm/gup.c: fix access_ok()
argument type’) (bsc#1051478) Fixes only a compile-warning.
– blacklist.conf: Blacklist c133c7615751 (‘x86/nmi: Fix timeout test in
test_nmi_ipi()’) It only fixes a self-test (bsc#1051478).
– blacklist.conf: Blacklist c9525a3fab63 (‘x86/watchdog: Fix Kconfig help
text file path reference to lockup watchdog documentation’) Updates only
kconfig help-text (bsc#1051478).
– blacklist.conf: Blacklist e80e7edc55ba (‘PCI/MSI: Initialize MSI
capability for all architectures’) This only fixes machines not
supported by our kernels.
– blkfront: add uevent for size change (bnc#1036632).
– block: Allow bdi re-registration (bsc#1040307).
– block: do not allow updates through sysfs until registration completes
(bsc#1047027).
– block: Fix front merge check (bsc#1051239).
– block: Make del_gendisk() safer for disks without queues (bsc#1040307).
– block: Move bdi_unregister() to del_gendisk() (bsc#1040307).
– block: Relax a check in blk_start_queue() (bnc#1012382).
– bluetooth: bnep: fix possible might sleep error in bnep_session
(bsc#1031784).
– bluetooth: cmtp: fix possible might sleep error in cmtp_session
(bsc#1031784).
– bluetooth: hidp: fix possible might sleep error in hidp_session_thread
(bsc#1031784).
– bnxt: add a missing rcu synchronization (bnc#1038583).
– bnxt: do not busy-poll when link is down (bnc#1038583).
– bnxt_en: Enable MRU enables bit when configuring VNIC MRU (bnc#1038583).
– bnxt_en: Fix and clarify link_info->advertising (bnc#1038583).
– bnxt_en: Fix a VXLAN vs GENEVE issue (bnc#1038583).
– bnxt_en: Fix NULL pointer dereference in a failure path during open
(bnc#1038583).
– bnxt_en: Fix NULL pointer dereference in reopen failure path
(bnc#1038583).
– bnxt_en: fix pci cleanup in bnxt_init_one() failure path (bnc#1038583).
– bnxt_en: Fix ring arithmetic in bnxt_setup_tc() (bnc#1038583).
– bnxt_en: Fix TX push operation on ARM64 (bnc#1038583).
– bnxt_en: Fix “uninitialized variable” bug in TPA code path (bnc#1038583).
– bnxt_en: Fix VF virtual link state (bnc#1038583).
– bnxt_en: initialize rc to zero to avoid returning garbage (bnc#1038583).
– bnxt_en: Pad TX packets below 52 bytes (bnc#1038583).
– bnxt_en: Refactor TPA code path (bnc#1038583).
– brcmfmac: Fix glom_skb leak in brcmf_sdiod_recv_chain (bsc#1031717).
– bsg-lib: do not free job in bsg_prepare_job (bnc#1012382).
– btrfs: add cond_resched to btrfs_qgroup_trace_leaf_items (bsc#1028286).
– btrfs: Add WARN_ON for qgroup reserved underflow (bsc#1031515).
– btrfs: change how we decide to commit transactions during flushing
(bsc#1060197).
– btrfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
– btrfs: fix early ENOSPC due to delalloc (bsc#1049226).
– btrfs: fix lockup in find_free_extent with read-only block groups
(bsc#1046682).
– btrfs: fix NULL pointer dereference from free_reloc_roots()
(bnc#1012382).
– btrfs: incremental send, fix invalid path for link commands
(bsc#1051479).
– btrfs: incremental send, fix invalid path for unlink commands
(bsc#1051479).
– btrfs: prevent to set invalid default subvolid (bnc#1012382).
– btrfs: propagate error to btrfs_cmp_data_prepare caller (bnc#1012382).
– btrfs: qgroup: move noisy underflow warning to debugging build
(bsc#1055755).
– btrfs: resume qgroup rescan on rw remount (bsc#1047152).
– btrfs: send, fix invalid path after renaming and linking file
(bsc#1051479).
– ceph: fix readpage from fscache (bsc#1057015).
– cifs: Fix SMB3.1.1 guest authentication to Samba (bnc#1012382).
– cifs: release auth_key.response for reconnect (bnc#1012382).
– class: Add “shutdown” to “struct class” (bsc#1053117).
– cpuidle: dt: Add missing ‘of_node_put()’ (bnc#1022476).
– crypto: AF_ALG – remove SGL terminator indicator when chaining
(bnc#1012382).
– crypto: s5p-sss – fix incorrect usage of scatterlists api (bsc#1048317).
– crypto: talitos – Do not provide setkey for non hmac hashing algs
(bnc#1012382).
– crypto: talitos – fix sha224 (bnc#1012382).
– cx82310_eth: use skb_cow_head() to deal with cloned skbs (bsc# 1045154).
– cxgb4: Fix stack out-of-bounds read due to wrong size to
t4_record_mbox() (bsc#1021424 bsc#1022743).
– cxl: Fix driver use count (bnc#1012382).
– cxl: Unlock on error in probe (bsc#1034762, Pending SUSE Kernel Fixes).
– dentry name snapshots (bsc#1049483).
– dmaengine: mmp-pdma: add number of requestors (bnc#1012382).
– dm: fix second blk_delay_queue() parameter to be in msec units not
(bsc#1047670).
– drivers: hv: Fix the bug in generating the guest ID (fate#320485).
– drivers: hv: util: Fix a typo (fate#320485).
– drivers: hv: vmbus: Get the current time from the current clocksource
(fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).
– drivers: hv: vmbus: Increase the time between retries in
vmbus_post_msg() (fate#320485, bnc#1044112).
– drivers: hv: vmbus: Move the code to signal end of message (fate#320485).
– drivers: hv: vmbus: Move the definition of generate_guest_id()
(fate#320485).
– drivers: hv: vmbus: Move the definition of hv_x64_msr_hypercall_contents
(fate#320485).
– drivers: hv: vmbus: Restructure the clockevents code (fate#320485).
– drivers: net: xgene: Fix wrong logical operation (bsc#1056827).
– drm: Add driver-private objects to atomic state (bsc#1055493).
– drm/amdgpu: Fix overflow of watermark calcs at > 4k resolutions
(bsc#1031717).
– drm/bochs: Implement nomodeset (bsc#1047096).
– drm/dp: Introduce MST topology state to track available link bandwidth
(bsc#1055493).
– drm/i915/fbdev: Stop repeating tile configuration on stagnation
(bsc#1031717).
– drm/i915: Fix scaler init during CRTC HW state readout (bsc#1031717).
– drm/i915: Serialize GTT/Aperture accesses on BXT (bsc#1046821).
– drm/virtio: do not leak bo on drm_gem_object_init failure (bsc#1047277).
– drm/vmwgfx: Fix large topology crash (bsc#1048155).
– drm/vmwgfx: Limit max desktop dimensions to 8Kx8K (bsc#1048155).
– drm/vmwgfx: Support topology greater than texture size (bsc#1048155).
– efi/libstub: Skip GOP with PIXEL_BLT_ONLY format (bnc#974215).
– ext2: Do not clear SGID when inheriting ACLs (bsc#1030552).
– ext4: avoid unnecessary stalls in ext4_evict_inode() (bsc#1049486).
– ext4: Do not clear SGID when inheriting ACLs (bsc#1030552).
– ext4: fix incorrect quotaoff if the quota feature is enabled
(bnc#1012382).
– ext4: fix quota inconsistency during orphan cleanup for read-only mounts
(bnc#1012382).
– ext4: handle the rest of ext4_mb_load_buddy() ENOMEM errors
(bsc#1012829).
– f2fs: check hot_data for roll-forward recovery (bnc#1012382).
– fix xen_swiotlb_dma_mmap prototype (bnc#1012382).
– fs/fcntl: f_setown, avoid undefined behaviour (bnc#1006180).
– ftrace: Fix memleak when unregistering dynamic ops when tracing disabled
(bnc#1012382).
– ftrace: Fix selftest goto location on error (bnc#1012382).
– fuse: initialize the flock flag in fuse_file on allocation (git-fixes).
– gcov: add support for gcc version >= 6 (bsc#1051663).
– gcov: support GCC 7.1 (bsc#1051663).
– genirq: Fix for_each_action_of_desc() macro (bsc#1061064).
– getcwd: Close race with d_move called by lustre (bsc#1052593).
– gfs2: Do not clear SGID when inheriting ACLs (bsc#1012829).
– gfs2: Fix debugfs glocks dump (bnc#1012382).
– gfs2: fix flock panic issue (bsc#1012829).
– gianfar: Fix Tx flow control deactivation (bnc#1012382).
– hid: usbhid: Add HID_QUIRK_NOGET for Aten CS-1758 KVM switch
(bnc#1022967).
– hrtimer: Catch invalid clockids again (bsc#1047651).
– hrtimer: Revert CLOCK_MONOTONIC_RAW support (bsc#1047651).
– hv_utils: drop .getcrosststamp() support from PTP driver (fate#320485,
bnc#1044112, bnc#1042778, bnc#1029693).
– hv_utils: fix TimeSync work on pre-TimeSync-v4 hosts (fate#320485,
bnc#1044112, bnc#1042778, bnc#1029693).
– hv_util: switch to using timespec64 (fate#320485).
– i2c: designware-baytrail: fix potential null pointer dereference on dev
(bsc#1011913).
– i40e: add hw struct local variable (bsc#1039915).
– i40e: add private flag to control source pruning (bsc#1034075).
– i40e: add VSI info to macaddr messages (bsc#1039915).
– i40e: avoid looping to check whether we’re in VLAN mode (bsc#1039915).
– i40e: avoid O(n^2) loop when deleting all filters (bsc#1039915).
– i40e: delete filter after adding its replacement when converting
(bsc#1039915).
– i40e: do not add broadcast filter for VFs (bsc#1039915).
– i40e: do not allow i40e_vsi_(add|kill)_vlan to operate when VIDactive_filters from hash contents (bsc#1039915).
– i40e: refactor i40e_put_mac_in_vlan to avoid changing f->vlan
(bsc#1039915).
– i40e: refactor i40e_update_filter_state to avoid passing aq_err
(bsc#1039915).
– i40e: refactor Rx filter handling (bsc#1039915).
– i40e: Removal of workaround for simple MAC address filter deletion
(bsc#1039915).
– i40e: remove code to handle dev_addr specially (bsc#1039915).
– i40e: removed unreachable code (bsc#1039915).
– i40e: remove duplicate add/delete adminq command code for filters
(bsc#1039915).
– i40e: remove second check of VLAN_N_VID in i40e_vlan_rx_add_vid
(bsc#1039915).
– i40e: rename i40e_put_mac_in_vlan and i40e_del_mac_all_vlan
(bsc#1039915).
– i40e: restore workaround for removing default MAC filter (bsc#1039915).
– i40e: set broadcast promiscuous mode for each active VLAN (bsc#1039915).
– i40e: store MAC/VLAN filters in a hash with the MAC Address as key
(bsc#1039915).
– i40e: use (add|rm)_vlan_all_mac helper functions when changing PVID
(bsc#1039915).
– i40e: when adding or removing MAC filters, correctly handle VLANs
(bsc#1039915).
– i40e: When searching all MAC/VLAN filters, ignore removed filters
(bsc#1039915).
– i40e: write HENA for VFs (bsc#1039915).
– ib/hfi1: Wait for QSFP modules to initialize (bsc#1019151).
– ibmvnic: Check for transport event on driver resume (bsc#1051556,
bsc#1052709).
– ibmvnic: Clean up resources on probe failure (fate#323285, bsc#1058116).
– ibmvnic: Initialize SCRQ’s during login renegotiation (bsc#1052223).
– ibmvnic: Report rx buffer return codes as netdev_dbg (bsc#1052794).
– iio: hid-sensor: fix return of -EINVAL on invalid values in ret or value
(bsc#1031717).
– input: gpio-keys – fix check for disabling unsupported keys
(bsc#1031717).
– input: i8042 – add Gigabyte P57 to the keyboard reset table
(bnc#1012382).
– introduce the walk_process_tree() helper (bnc#1022476).
– iommu/amd: Fix schedule-while-atomic BUG in initialization code
(bsc1052533).
– iommu/vt-d: Avoid calling virt_to_phys() on null pointer (bsc#1061067).
– ipv4: Should use consistent conditional judgement for ip fragment in
__ip_append_data and ip_finish_output (bsc#1041958).
– ipv6: accept 64k – 1 packet length in ip6_find_1stfragopt()
(bnc#1012382).
– ipv6: add rcu grace period before freeing fib6_node (bnc#1012382).
– ipv6: fix memory leak with multiple tables during netns destruction
(bnc#1012382).
– ipv6: fix sparse warning on rt6i_node (bnc#1012382).
– ipv6: fix typo in fib6_net_exit() (bnc#1012382).
– ipv6: Should use consistent conditional judgement for ip6 fragment
between __ip6_append_data and ip6_finish_output (bsc#1041958).
– iwlwifi: missing error code in iwl_trans_pcie_alloc() (bsc#1031717).
– iwlwifi: mvm: compare full command ID (FATE#321353, FATE#323335).
– iwlwifi: mvm: do not send CTDP commands via debugfs if not supported
(bsc#1031717).
– iwlwifi: mvm: reset the fw_dump_desc pointer after ASSERT (bsc#1031717).
– iwlwifi: mvm: synchronize firmware DMA paging memory (FATE#321353,
FATE#323335).
– iwlwifi: mvm: unconditionally stop device after init (bsc#1031717).
– iwlwifi: mvm: unmap the paging memory before freeing it (FATE#321353,
FATE#323335).
– iwlwifi: pcie: fix command completion name debug (bsc#1031717).
– kABI-fix for “x86/panic: replace smp_send_stop() with kdump friendly
version in panic path” (bsc#1051478).
– kABI: protect enum pid_type (kabi).
– kABI: protect lwtunnel include in ip6_route.h (kabi).
– kABI: protect struct iscsi_np (kabi).
– kABI: protect struct iscsi_tpg_attrib (kabi).
– kABI: protect struct se_lun (kabi).
– kABI: protect struct tpm_chip (kabi).
– kABI: protect struct xfrm_dst (kabi).
– kABI: protect struct xfrm_dst (kabi).
– kabi/severities: ignore nfs_pgio_data_destroy
– kABI: uninline task_tgid_nr_nr (kabi).
– kernel/*: switch to memdup_user_nul() (bsc#1048893).
– keys: fix writing past end of user-supplied buffer in keyring_read()
(bnc#1012382).
– keys: prevent creating a different user’s keyrings (bnc#1012382).
– keys: prevent KEYCTL_READ on negative key (bnc#1012382).
– kvm: async_pf: Fix #DF due to inject “Page not Present” and “Page Ready”
exceptions simultaneously (bsc#1061017).
– kvm: nVMX: fix msr bitmaps to prevent L2 from accessing L0 x2APIC
(bsc#1051478).
– kvm: nVMX: Fix nested_vmx_check_msr_bitmap_controls (bsc#1051478).
– kvm: nVMX: Fix nested VPID vmx exec control (bsc#1051478).
– kvm: PPC: Book3S: Fix race and leak in kvm_vm_ioctl_create_spapr_tce()
(bnc#1012382).
– kvm: SVM: Add a missing ‘break’ statement (bsc#1061017).
– kvm: VMX: do not change SN bit in vmx_update_pi_irte() (bsc#1061017).
– kvm: VMX: remove WARN_ON_ONCE in kvm_vcpu_trigger_posted_interrupt
(bsc#1061017).
– kvm: VMX: use cmpxchg64 (bnc#1012382).
– kvm: x86: avoid simultaneous queueing of both IRQ and SMI (bsc#1051478).
– libnvdimm: fix badblock range handling of ARS range (bsc#1023175).
– libnvdimm, pmem: fix a NULL pointer BUG in nd_pmem_notify (bsc#1023175).
– lib: test_rhashtable: fix for large entry counts (bsc#1055359).
– lib: test_rhashtable: Fix KASAN warning (bsc#1055359).
– lightnvm: remove unused rq parameter of nvme_nvm_rqtocmd() to kill
warning (FATE#319466).
– mac80211: flush hw_roc_start work before cancelling the ROC
(bnc#1012382).
– mac80211_hwsim: Replace bogus hrtimer clockid (bsc#1047651).
– md/bitmap: disable bitmap_resize for file-backed bitmaps (bsc#1061172).
– md: fix sleep in atomic (bsc#1040351).
– md/raid5: fix a race condition in stripe batch (linux-stable).
– md/raid5: preserve STRIPE_ON_UNPLUG_LIST in break_stripe_batch_list
(bnc#1012382).
– md/raid5: release/flush io in raid5_do_work() (bnc#1012382).
– media: uvcvideo: Prevent heap overflow when accessing mapped controls
(bnc#1012382).
– media: v4l2-compat-ioctl32: Fix timespec conversion (bnc#1012382).
– mips: math-emu: .: Fix cases of both infinite inputs
(bnc#1012382).
– mips: math-emu: .: Fix cases of input values with
opposite signs (bnc#1012382).
– mips: math-emu: .: Fix cases of both inputs zero
(bnc#1012382).
– mips: math-emu: .: Fix quiet NaN propagation
(bnc#1012382).
– mips: math-emu: .: Fix cases of both inputs negative
(bnc#1012382).
– mips: math-emu: MINA.: Fix some cases of infinity and zero inputs
(bnc#1012382).
– mm: adaptive hash table scaling (bnc#1036303).
– mm: call page_ext_init() after all struct pages are initialized (VM
Debugging Functionality, bsc#1047048).
– mm: drop HASH_ADAPT (bnc#1036303).
– mm: fix classzone_idx underflow in shrink_zones() (VM Functionality,
bsc#1042314).
– mm, madvise: ensure poisoned pages are removed from per-cpu lists (VM hw
poison — git fixes).
– mm: make PR_SET_THP_DISABLE immediately active (bnc#1048891).
– mm/page_alloc.c: apply gfp_allowed_mask before the first allocation
attempt (bnc#971975 VM — git fixes).
– mm: prevent double decrease of nr_reserved_highatomic (bnc#1012382).
– mptsas: Fixup device hotplug for VMWare ESXi (bsc#1030850).
– mwifiex: do not update MCS set from hostapd (bsc#1031717).
– net: account for current skb length when deciding about UFO
(bsc#1041958).
– net: ena: add hardware hints capability to the driver (bsc#1047121).
– net: ena: add missing return when ena_com_get_io_handlers() fails
(bsc#1047121).
– net: ena: add missing unmap bars on device removal (bsc#1047121).
– net: ena: add reset reason for each device FLR (bsc#1047121).
– net: ena: add support for out of order rx buffers refill (bsc#1047121).
– net: ena: allow the driver to work with small number of msix vectors
(bsc#1047121).
– net: ena: bug fix in lost tx packets detection mechanism (bsc#1047121).
– net: ena: change return value for unsupported features unsupported
return value (bsc#1047121).
– net: ena: change sizeof() argument to be the type pointer (bsc#1047121).
– net: ena: disable admin msix while working in polling mode (bsc#1047121).
– net: ena: fix bug that might cause hang after consecutive open/close
interface (bsc#1047121).
– net: ena: fix race condition between submit and completion admin command
(bsc#1047121).
– net: ena: fix rare uncompleted admin command false alarm (bsc#1047121).
– net: ena: fix theoretical Rx hang on low memory systems (bsc#1047121).
– net: ena: separate skb allocation to dedicated function (bsc#1047121).
– net: ena: update driver’s rx drop statistics (bsc#1047121).
– net: ena: update ena driver to version 1.1.7 (bsc#1047121).
– net: ena: update ena driver to version 1.2.0 (bsc#1047121).
– net: ena: use lower_32_bits()/upper_32_bits() to split dma address
(bsc#1047121).
– net: ena: use napi_schedule_irqoff when possible (bsc#1047121).
– netfilter: fix IS_ERR_VALUE usage (bsc#1052888).
– netfilter: x_tables: pack percpu counter allocations (bsc#1052888).
– netfilter: x_tables: pass xt_counters struct instead of packet counter
(bsc#1052888).
– netfilter: x_tables: pass xt_counters struct to counter allocator
(bsc#1052888).
– net: handle NAPI_GRO_FREE_STOLEN_HEAD case also in napi_frags_finish()
(bsc#1042286).
– net/mlx5: Fix driver load error flow when firmware is stuck (git-fixes).
– net: phy: Do not perform software reset for Generic PHY (bsc#1042286).
– new helper: memdup_user_nul() (bsc#1048893).
– nfs: Cache aggressively when file is open for writing (bsc#1033587).
– nfsd: Fix general protection fault in release_lock_stateid()
(bnc#1012382).
– nfs: Do not flush caches for a getattr that races with writeback
(bsc#1033587).
– nfs: flush data when locking a file to ensure cache coherence for mmap
(bsc#981309).
– nfs: invalidate file size when taking a lock (git-fixes).
– nfs: only invalidate dentrys that are clearly invalid (bsc#1047118).
– ocfs2: Do not clear SGID when inheriting ACLs (bsc#1030552).
– ocfs2: fix deadlock caused by recursive locking in xattr (bsc#1012829).
– ocfs2: Make ocfs2_set_acl() static (bsc#1030552).
– of: fix “/cpus” reference leak in of_numa_parse_cpu_nodes()
(bsc#1056827).
– ovl: fix dentry leak for default_permissions (bsc#1054084).
– pci: Add Mellanox device IDs (bsc#1051478).
– pci: Allow PCI express root ports to find themselves (bsc#1061046).
– pci: Convert Mellanox broken INTx quirks to be for listed devices only
(bsc#1051478).
– pci: Correct PCI_STD_RESOURCE_END usage (bsc#1051478).
– pci: dwc: dra7xx: Use RW1C for IRQSTATUS_MSI and IRQSTATUS_MAIN
(bsc#1051478).
– pci: dwc: Fix uninitialized variable in dw_handle_msi_irq()
(bsc#1051478).
– pci: Enable ECRC only if device supports it (bsc#1051478).
– pci: fix oops when try to find Root Port for a PCI device (bsc#1061046).
– pci: Fix race condition with driver_override (bnc#1012382).
– pci / pm: Fix native PME handling during system suspend/resume
(bsc#1051478).
– pci: shpchp: Enable bridge bus mastering if MSI is enabled (bnc#1012382).
– pci: Support INTx masking on ConnectX-4 with firmware x.14.1100+
(bsc#1051478).
– percpu_ref: allow operation mode switching operations to be called
concurrently (bsc#1055096).
– percpu_ref: remove unnecessary RCU grace period for staggered atomic
switching confirmation (bsc#1055096).
– percpu_ref: reorganize __percpu_ref_switch_to_atomic() and relocate
percpu_ref_switch_to_atomic() (bsc#1055096).
– percpu_ref: restructure operation mode switching (bsc#1055096).
– percpu_ref: unify staggered atomic switching wait behavior (bsc#1055096).
– perf/x86: Fix RDPMC vs. mm_struct tracking (bsc#1061831).
– perf/x86: Fix spurious NMI with PEBS Load Latency event (bsc#1051478).
– perf/x86/intel: Cure bogus unwind from PEBS entries (bsc#1051478).
– perf/x86/intel: Fix PEBSv3 record drain (bsc#1051478).
– perf/x86: kABI Workaround for ‘perf/x86: Fix RDPMC vs. mm_struct
tracking’ (bsc#1061831).
– platform/x86: ideapad-laptop: Add IdeaPad 310-15IKB to no_hw_rfkill
(bsc#1051022).
– platform/x86: ideapad-laptop: Add IdeaPad V310-15ISK to no_hw_rfkill
(bsc#1051022).
– platform/x86: ideapad-laptop: Add IdeaPad V510-15IKB to no_hw_rfkill
(bsc#1051022).
– platform/x86: ideapad-laptop: Add Lenovo Yoga 910-13IKB to no_hw_rfkill
dmi list (bsc#1051022).
– platform/x86: ideapad-laptop: Add several models to no_hw_rfkill
(bsc#1051022).
– platform/x86: ideapad-laptop: Add Y520-15IKBN to no_hw_rfkill
(bsc#1051022).
– platform/x86: ideapad-laptop: Add Y700 15-ACZ to no_hw_rfkill DMI list
(bsc#1051022).
– platform/x86: ideapad-laptop: Add Y720-15IKBN to no_hw_rfkill
(bsc#1051022).
– pm / Hibernate: Fix scheduling while atomic during hibernation
(bsc#1051059).
– powerpc: Fix DAR reporting when alignment handler faults (bnc#1012382).
– powerpc/pseries: Fix parent_dn reference leak in add_dt_node()
(bnc#1012382).
– prctl: propagate has_child_subreaper flag to every descendant
(bnc#1022476).
– qeth: fix L3 next-hop im xmit qeth hdr (bnc#1052773, LTC#157374).
– qlge: avoid memcpy buffer overflow (bnc#1012382).
– reiserfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
– Revert “ACPI / video: Add force_native quirk for HP Pavilion dv6”
(bsc#1031717).
– Revert “net: fix percpu memory leaks” (bnc#1012382).
– Revert “net: phy: Correctly process PHY_HALTED in phy_stop_machine()”
(bnc#1012382).
– Revert “net: use lib/percpu_counter API for fragmentation mem
accounting” (bnc#1012382).
– Revert “powerpc/numa: Fix percpu allocations to be NUMA aware”
(bsc#1048914).
– Revert “tpm: Issue a TPM2_Shutdown for TPM2 devices.” (kabi).
– rpm/kernel-binary.spec.in: find-debuginfo.sh should not touch build-id
This needs rpm-4.14+ (bsc#964063).
– rtnetlink: fix rtnl_vfinfo_size (bsc#1056261).
– s390: export symbols for crash-kmp (bsc#1053915).
– sched/core: Allow __sched_setscheduler() in interrupts when PI is not
used (bnc#1022476).
– sched/debug: Print the scheduler topology group mask (bnc#1022476).
– sched/fair, cpumask: Export for_each_cpu_wrap() (bnc#1022476).
– sched/fair: Fix O(nr_cgroups) in load balance path (bnc#1022476).
– sched/fair: Use task_groups instead of leaf_cfs_rq_list to walk all
cfs_rqs (bnc#1022476).
– sched/topology: Add sched_group_capacity debugging (bnc#1022476).
– sched/topology: Fix building of overlapping sched-groups (bnc#1022476).
– sched/topology: Fix overlapping sched_group_capacity (bnc#1022476).
– sched/topology: Move comment about asymmetric node setups (bnc#1022476).
– sched/topology: Refactor function build_overlap_sched_groups()
(bnc#1022476).
– sched/topology: Remove FORCE_SD_OVERLAP (bnc#1022476).
– sched/topology: Simplify build_overlap_sched_groups() (bnc#1022476).
– sched/topology: Small cleanup (bnc#1022476).
– sched/topology: Verify the first group matches the child domain
(bnc#1022476).
– scsi: Add STARGET_CREATE_REMOVE state to scsi_target_state (bsc#1013887).
– scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).
– scsi_devinfo: fixup string compare (bsc#1037404).
– scsi_dh_alua: suppress errors from unsupported devices (bsc#1038792).
– scsi: ILLEGAL REQUEST + ASC==27 => target failure (bsc#1059465).
– scsi: kABI fix for new state STARGET_CREATED_REMOVE (bsc#1013887).
– scsi: megaraid_sas: Check valid aen class range to avoid kernel panic
(bnc#1012382).
– scsi: megaraid_sas: Return pended IOCTLs with cmd_status
MFI_STAT_WRONG_STATE in case adapter is dead (bnc#1012382).
– scsi: sg: close race condition in sg_remove_sfp_usercontext()
(bsc#1064206).
– scsi: sg: factor out sg_fill_request_table() (bnc#1012382).
– scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE (bnc#1012382).
– scsi: sg: off by one in sg_ioctl() (bnc#1012382).
– scsi: sg: remove ‘save_scat_len’ (bnc#1012382).
– scsi: sg: use standard lists for sg_requests (bnc#1012382).
– scsi: storvsc: fix memory leak on ring buffer busy (bnc#1012382).
– scsi: storvsc: Workaround for virtual DVD SCSI version (fate#320485,
bnc#1044636).
– scsi: zfcp: add handling for FCP_RESID_OVER to the fcp ingress path
(bnc#1012382).
– scsi: zfcp: fix capping of unsuccessful GPN_FT SAN response trace
records (bnc#1012382).
– scsi: zfcp: fix missing trace records for early returns in TMF eh
handlers (bnc#1012382).
– scsi: zfcp: fix passing fsf_req to SCSI trace on TMF to correlate with
HBA (bnc#1012382).
– scsi: zfcp: fix payload with full FCP_RSP IU in SCSI trace records
(bnc#1012382).
– scsi: zfcp: fix queuecommand for scsi_eh commands when DIX enabled
(bnc#1012382).
– scsi: zfcp: trace HBA FSF response by default on dismiss or timedout
late response (bnc#1012382).
– scsi: zfcp: trace high part of “new” 64 bit SCSI LUN (bnc#1012382).
– seccomp: fix the usage of get/put_seccomp_filter() in
seccomp_get_filter() (bnc#1012382).
– skd: Avoid that module unloading triggers a use-after-free (bnc#1012382).
– skd: Submit requests to firmware before triggering the doorbell
(bnc#1012382).
– smb3: Do not ignore O_SYNC/O_DSYNC and O_DIRECT flags (bnc#1012382).
– smb: Validate negotiate (to protect against downgrade) even if signing
off (bnc#1012382).
– smsc75xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
– sr9700: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
– supported.conf: clear mistaken external support flag for cifs.ko
(bsc#1053802).
– swiotlb-xen: implement xen_swiotlb_dma_mmap callback (bnc#1012382).
– sysctl: do not print negative flag for proc_douintvec (bnc#1046985).
– sysctl: fix lax sysctl_check_table() sanity check (bsc#1048893).
– sysctl: fold sysctl_writes_strict checks into helper (bsc#1048893).
– sysctl: kdoc’ify sysctl_writes_strict (bsc#1048893).
– sysctl: simplify unsigned int support (bsc#1048893).
– timers: Plug locking race vs. timer migration (bnc#1022476).
– timer/sysclt: Restrict timer migration sysctl values to 0 and 1
(bnc#1012382).
– tpm: fix: return rc when devm_add_action() fails (bsc#1020645,
fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes
8e0ee3c9faed).
– tpm: Issue a TPM2_Shutdown for TPM2 devices (bsc#1053117).
– tpm: KABI fix (bsc#1053117).
– tpm: read burstcount from TPM_STS in one 32-bit transaction
(bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048,
git-fixes 27084efee0c3).
– tpm_tis_core: Choose appropriate timeout for reading burstcount
(bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048,
git-fixes aec04cbdf723).
– tpm_tis_core: convert max timeouts from msec to jiffies (bsc#1020645,
fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes
aec04cbdf723).
– tracing: Apply trace_clock changes to instance max buffer (bnc#1012382).
– tracing: Erase irqsoff trace with empty write (bnc#1012382).
– tracing: Fix trace_pipe behavior for instance traces (bnc#1012382).
– tty: fix __tty_insert_flip_char regression (bnc#1012382).
– tty: improve tty_insert_flip_char() fast path (bnc#1012382).
– tty: improve tty_insert_flip_char() slow path (bnc#1012382).
– tty: serial: msm: Support more bauds (git-fixes).
– ubifs: Correctly evict xattr inodes (bsc#1012829).
– ubifs: Do not leak kernel memory to the MTD (bsc#1012829).
– udf: Fix deadlock between writeback and udf_setsize() (bsc#1012829).
– udf: Fix races with i_size changes during readpage (bsc#1012829).
– usb: core: fix device node leak (bsc#1047487).
– vfs: fix missing inode_get_dev sites (bsc#1052049).
– vfs: Return -ENXIO for negative SEEK_HOLE / SEEK_DATA offsets
(bnc#1012382).
– video: fbdev: aty: do not leak uninitialized padding in clk to userspace
(bnc#1012382).
– Workaround for kABI compatibility with DP-MST patches (bsc#1055493).
– x86/dmi: Switch dmi_remap() from ioremap() to ioremap_cache()
(bsc#1051399).
– x86/fpu: Do not let userspace set bogus xcomp_bv (bnc#1012382).
– x86/fsgsbase/64: Report FSBASE and GSBASE correctly in core dumps
(bnc#1012382).
– x86/ldt: Fix off by one in get_segment_base() (bsc#1061872).
– x86/LDT: Print the real LDT base address (bsc#1051478).
– x86/mce: Make timer handling more robust (bsc#1042422).
– x86/panic: replace smp_send_stop() with kdump friendly version in panic
path (bsc#1051478).
– xen: allocate page for shared info page from low memory (bnc#1038616).
– xen/balloon: do not online new memory initially (bnc#1028173).
– xen: hold lock_device_hotplug throughout vcpu hotplug operations
(bsc#1042422).
– xen-netfront: Rework the fix for Rx stall during OOM and network stress
(git-fixes).
– xen/pvh*: Support > 32 VCPUs at domain restore (bnc#1045563).
– xfrm: NULL dereference on allocation failure (bsc#1047343).
– xfrm: Oops on error in pfkey_msg2xfrm_state() (bsc#1047653).
– xfs/dmapi: fix incorrect file->f_path.dentry->d_inode usage
(bsc#1055896).
– xfs: do not BUG() on mixed direct and mapped I/O (bsc#1050188).
– xfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
– xfs: fix inobt inode allocation search optimization (bsc#1012829).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Workstation Extension 12-SP2:

zypper in -t patch SUSE-SLE-WE-12-SP2-2017-1786=1

– SUSE Linux Enterprise Software Development Kit 12-SP2:

zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-1786=1

– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1786=1

– SUSE Linux Enterprise Server 12-SP2:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1786=1

– SUSE Linux Enterprise Live Patching 12:

zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1786=1

– SUSE Linux Enterprise High Availability 12-SP2:

zypper in -t patch SUSE-SLE-HA-12-SP2-2017-1786=1

– SUSE Linux Enterprise Desktop 12-SP2:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1786=1

– SUSE Container as a Service Platform ALL:

zypper in -t patch SUSE-CAASP-ALL-2017-1786=1

– OpenStack Cloud Magnum Orchestration 7:

zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1786=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64):

kernel-default-debuginfo-4.4.90-92.45.1
kernel-default-debugsource-4.4.90-92.45.1
kernel-default-extra-4.4.90-92.45.1
kernel-default-extra-debuginfo-4.4.90-92.45.1

– SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):

kernel-obs-build-4.4.90-92.45.1
kernel-obs-build-debugsource-4.4.90-92.45.1

– SUSE Linux Enterprise Software Development Kit 12-SP2 (noarch):

kernel-docs-4.4.90-92.45.3

– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

kernel-default-4.4.90-92.45.1
kernel-default-base-4.4.90-92.45.1
kernel-default-base-debuginfo-4.4.90-92.45.1
kernel-default-debuginfo-4.4.90-92.45.1
kernel-default-debugsource-4.4.90-92.45.1
kernel-default-devel-4.4.90-92.45.1
kernel-syms-4.4.90-92.45.1

– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch):

kernel-devel-4.4.90-92.45.1
kernel-macros-4.4.90-92.45.1
kernel-source-4.4.90-92.45.1

– SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):

kernel-default-4.4.90-92.45.1
kernel-default-base-4.4.90-92.45.1
kernel-default-base-debuginfo-4.4.90-92.45.1
kernel-default-debuginfo-4.4.90-92.45.1
kernel-default-debugsource-4.4.90-92.45.1
kernel-default-devel-4.4.90-92.45.1
kernel-syms-4.4.90-92.45.1

– SUSE Linux Enterprise Server 12-SP2 (noarch):

kernel-devel-4.4.90-92.45.1
kernel-macros-4.4.90-92.45.1
kernel-source-4.4.90-92.45.1

– SUSE Linux Enterprise Server 12-SP2 (s390x):

kernel-default-man-4.4.90-92.45.1

– SUSE Linux Enterprise Live Patching 12 (x86_64):

kgraft-patch-4_4_90-92_45-default-1-2.4

– SUSE Linux Enterprise High Availability 12-SP2 (ppc64le s390x x86_64):

cluster-md-kmp-default-4.4.90-92.45.1
cluster-md-kmp-default-debuginfo-4.4.90-92.45.1
cluster-network-kmp-default-4.4.90-92.45.1
cluster-network-kmp-default-debuginfo-4.4.90-92.45.1
dlm-kmp-default-4.4.90-92.45.1
dlm-kmp-default-debuginfo-4.4.90-92.45.1
gfs2-kmp-default-4.4.90-92.45.1
gfs2-kmp-default-debuginfo-4.4.90-92.45.1
kernel-default-debuginfo-4.4.90-92.45.1
kernel-default-debugsource-4.4.90-92.45.1
ocfs2-kmp-default-4.4.90-92.45.1
ocfs2-kmp-default-debuginfo-4.4.90-92.45.1

– SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

kernel-default-4.4.90-92.45.1
kernel-default-debuginfo-4.4.90-92.45.1
kernel-default-debugsource-4.4.90-92.45.1
kernel-default-devel-4.4.90-92.45.1
kernel-default-extra-4.4.90-92.45.1
kernel-default-extra-debuginfo-4.4.90-92.45.1
kernel-syms-4.4.90-92.45.1

– SUSE Linux Enterprise Desktop 12-SP2 (noarch):

kernel-devel-4.4.90-92.45.1
kernel-macros-4.4.90-92.45.1
kernel-source-4.4.90-92.45.1

– SUSE Container as a Service Platform ALL (x86_64):

kernel-default-4.4.90-92.45.1
kernel-default-debuginfo-4.4.90-92.45.1
kernel-default-debugsource-4.4.90-92.45.1

– OpenStack Cloud Magnum Orchestration 7 (x86_64):

kernel-default-4.4.90-92.45.1
kernel-default-debuginfo-4.4.90-92.45.1
kernel-default-debugsource-4.4.90-92.45.1

References:

https://www.suse.com/security/cve/CVE-2017-1000252.html
https://www.suse.com/security/cve/CVE-2017-10810.html
https://www.suse.com/security/cve/CVE-2017-11472.html
https://www.suse.com/security/cve/CVE-2017-11473.html
https://www.suse.com/security/cve/CVE-2017-12134.html
https://www.suse.com/security/cve/CVE-2017-12153.html
https://www.suse.com/security/cve/CVE-2017-12154.html
https://www.suse.com/security/cve/CVE-2017-13080.html
https://www.suse.com/security/cve/CVE-2017-14051.html
https://www.suse.com/security/cve/CVE-2017-14106.html
https://www.suse.com/security/cve/CVE-2017-14489.html
https://www.suse.com/security/cve/CVE-2017-15649.html
https://www.suse.com/security/cve/CVE-2017-7518.html
https://www.suse.com/security/cve/CVE-2017-7541.html
https://www.suse.com/security/cve/CVE-2017-7542.html
https://www.suse.com/security/cve/CVE-2017-8831.html
https://bugzilla.suse.com/1006180
https://bugzilla.suse.com/1011913
https://bugzilla.suse.com/1012382
https://bugzilla.suse.com/1012829
https://bugzilla.suse.com/1013887
https://bugzilla.suse.com/1019151
https://bugzilla.suse.com/1020645
https://bugzilla.suse.com/1020657
https://bugzilla.suse.com/1021424
https://bugzilla.suse.com/1022476
https://bugzilla.suse.com/1022743
https://bugzilla.suse.com/1022967
https://bugzilla.suse.com/1023175
https://bugzilla.suse.com/1024405
https://bugzilla.suse.com/1028173
https://bugzilla.suse.com/1028286
https://bugzilla.suse.com/1029693
https://bugzilla.suse.com/1030552
https://bugzilla.suse.com/1030850
https://bugzilla.suse.com/1031515
https://bugzilla.suse.com/1031717
https://bugzilla.suse.com/1031784
https://bugzilla.suse.com/1033587
https://bugzilla.suse.com/1034048
https://bugzilla.suse.com/1034075
https://bugzilla.suse.com/1034762
https://bugzilla.suse.com/1036303
https://bugzilla.suse.com/1036632
https://bugzilla.suse.com/1037344
https://bugzilla.suse.com/1037404
https://bugzilla.suse.com/1037994
https://bugzilla.suse.com/1038078
https://bugzilla.suse.com/1038583
https://bugzilla.suse.com/1038616
https://bugzilla.suse.com/1038792
https://bugzilla.suse.com/1039915
https://bugzilla.suse.com/1040307
https://bugzilla.suse.com/1040351
https://bugzilla.suse.com/1041958
https://bugzilla.suse.com/1042286
https://bugzilla.suse.com/1042314
https://bugzilla.suse.com/1042422
https://bugzilla.suse.com/1042778
https://bugzilla.suse.com/1043652
https://bugzilla.suse.com/1044112
https://bugzilla.suse.com/1044636
https://bugzilla.suse.com/1045154
https://bugzilla.suse.com/1045563
https://bugzilla.suse.com/1045922
https://bugzilla.suse.com/1046682
https://bugzilla.suse.com/1046821
https://bugzilla.suse.com/1046985
https://bugzilla.suse.com/1047027
https://bugzilla.suse.com/1047048
https://bugzilla.suse.com/1047096
https://bugzilla.suse.com/1047118
https://bugzilla.suse.com/1047121
https://bugzilla.suse.com/1047152
https://bugzilla.suse.com/1047277
https://bugzilla.suse.com/1047343
https://bugzilla.suse.com/1047354
https://bugzilla.suse.com/1047487
https://bugzilla.suse.com/1047651
https://bugzilla.suse.com/1047653
https://bugzilla.suse.com/1047670
https://bugzilla.suse.com/1048155
https://bugzilla.suse.com/1048221
https://bugzilla.suse.com/1048317
https://bugzilla.suse.com/1048891
https://bugzilla.suse.com/1048893
https://bugzilla.suse.com/1048914
https://bugzilla.suse.com/1048934
https://bugzilla.suse.com/1049226
https://bugzilla.suse.com/1049483
https://bugzilla.suse.com/1049486
https://bugzilla.suse.com/1049580
https://bugzilla.suse.com/1049603
https://bugzilla.suse.com/1049645
https://bugzilla.suse.com/1049882
https://bugzilla.suse.com/1050061
https://bugzilla.suse.com/1050188
https://bugzilla.suse.com/1051022
https://bugzilla.suse.com/1051059
https://bugzilla.suse.com/1051239
https://bugzilla.suse.com/1051399
https://bugzilla.suse.com/1051478
https://bugzilla.suse.com/1051479
https://bugzilla.suse.com/1051556
https://bugzilla.suse.com/1051663
https://bugzilla.suse.com/1051790
https://bugzilla.suse.com/1052049
https://bugzilla.suse.com/1052223
https://bugzilla.suse.com/1052533
https://bugzilla.suse.com/1052580
https://bugzilla.suse.com/1052593
https://bugzilla.suse.com/1052709
https://bugzilla.suse.com/1052773
https://bugzilla.suse.com/1052794
https://bugzilla.suse.com/1052888
https://bugzilla.suse.com/1053117
https://bugzilla.suse.com/1053802
https://bugzilla.suse.com/1053915
https://bugzilla.suse.com/1053919
https://bugzilla.suse.com/1054084
https://bugzilla.suse.com/1055013
https://bugzilla.suse.com/1055096
https://bugzilla.suse.com/1055359
https://bugzilla.suse.com/1055493
https://bugzilla.suse.com/1055755
https://bugzilla.suse.com/1055896
https://bugzilla.suse.com/1056261
https://bugzilla.suse.com/1056588
https://bugzilla.suse.com/1056827
https://bugzilla.suse.com/1056982
https://bugzilla.suse.com/1057015
https://bugzilla.suse.com/1058038
https://bugzilla.suse.com/1058116
https://bugzilla.suse.com/1058410
https://bugzilla.suse.com/1058507
https://bugzilla.suse.com/1059051
https://bugzilla.suse.com/1059465
https://bugzilla.suse.com/1060197
https://bugzilla.suse.com/1061017
https://bugzilla.suse.com/1061046
https://bugzilla.suse.com/1061064
https://bugzilla.suse.com/1061067
https://bugzilla.suse.com/1061172
https://bugzilla.suse.com/1061831
https://bugzilla.suse.com/1061872
https://bugzilla.suse.com/1063667
https://bugzilla.suse.com/1064206
https://bugzilla.suse.com/1064388
https://bugzilla.suse.com/964063
https://bugzilla.suse.com/971975
https://bugzilla.suse.com/974215
https://bugzilla.suse.com/981309


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

CESA-2017:3075 Important CentOS 7 wget Security Update

CentOS Errata and Security Advisory 2017:3075 Important

Upstream details at : https://access.redhat.com/errata/RHSA-2017:3075

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
d74e0e13c9f03a464eb508b06ff96dd93a58297e0515f1a29015fec5334f1b80 wget-1.14-15.el7_4.1.x86_64.rpm

Source:
0dec11e33a32973c79bcd6a690907a2f8e99507d1ff3f38be7f5f34996f5fe87 wget-1.14-15.el7_4.1.src.rpm


Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

openSUSE-SU-2017:2892-1: important: Security update for openvpn

openSUSE Security Update: Security update for openvpn
______________________________________________________________________________

Announcement ID: openSUSE-SU-2017:2892-1
Rating: important
References: #1060877
Cross-References: CVE-2017-12166
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for openvpn fixes the following issues:

– CVE-2017-12166: Lack of bound check in read_key in old legacy key
handling before using values could be used for a remote buffer overflow
(bsc#1060877).

This update was imported from the SUSE:SLE-12:Update update project.

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE Leap 42.3:

zypper in -t patch openSUSE-2017-1202=1

– openSUSE Leap 42.2:

zypper in -t patch openSUSE-2017-1202=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE Leap 42.3 (i586 x86_64):

openvpn-2.3.8-14.1
openvpn-auth-pam-plugin-2.3.8-14.1
openvpn-auth-pam-plugin-debuginfo-2.3.8-14.1
openvpn-debuginfo-2.3.8-14.1
openvpn-debugsource-2.3.8-14.1
openvpn-devel-2.3.8-14.1
openvpn-down-root-plugin-2.3.8-14.1
openvpn-down-root-plugin-debuginfo-2.3.8-14.1

– openSUSE Leap 42.2 (i586 x86_64):

openvpn-2.3.8-8.13.1
openvpn-auth-pam-plugin-2.3.8-8.13.1
openvpn-auth-pam-plugin-debuginfo-2.3.8-8.13.1
openvpn-debuginfo-2.3.8-8.13.1
openvpn-debugsource-2.3.8-8.13.1
openvpn-devel-2.3.8-8.13.1
openvpn-down-root-plugin-2.3.8-8.13.1
openvpn-down-root-plugin-debuginfo-2.3.8-8.13.1

References:

https://www.suse.com/security/cve/CVE-2017-12166.html
https://bugzilla.suse.com/1060877


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

CEEA-2017:3052 CentOS 6 tzdata Enhancement Update

CentOS Errata and Enhancement Advisory 2017:3052

Upstream details at : https://access.redhat.com/errata/RHEA-2017:3052

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
7a35a774683c1ddda053e063c7d74ad70f7da0d98b958930699f09f175e31f21 tzdata-2017c-1.el6.noarch.rpm
a5ee76588834b62c84bbd990ed5af2d69e342c161c6a08a1be0352c987068c90 tzdata-java-2017c-1.el6.noarch.rpm

x86_64:
7a35a774683c1ddda053e063c7d74ad70f7da0d98b958930699f09f175e31f21 tzdata-2017c-1.el6.noarch.rpm
a5ee76588834b62c84bbd990ed5af2d69e342c161c6a08a1be0352c987068c90 tzdata-java-2017c-1.el6.noarch.rpm

Source:
f3d624d4b5340378fb0eee2f99d9269c6847ff4487c4997afcb6e28c6a7b82be tzdata-2017c-1.el6.src.rpm


Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

SUSE-SU-2017:2873-1: important: Security update for xen

SUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2873-1
Rating: important
References: #1059777 #1061076 #1061077 #1061080 #1061081
#1061082 #1061084 #1061086 #1061087
Cross-References: CVE-2017-15588 CVE-2017-15589 CVE-2017-15590
CVE-2017-15591 CVE-2017-15592 CVE-2017-15593
CVE-2017-15594 CVE-2017-15595 CVE-2017-5526

Affected Products:
SUSE OpenStack Cloud 6
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes 9 vulnerabilities is now available.

Description:

This update for xen fixes several issues:

These security issues were fixed:

– CVE-2017-5526: The ES1370 audio device emulation support was vulnerable
to a memory leakage issue allowing a privileged user inside the guest to
cause a DoS and/or potentially crash the Qemu process on the host
(bsc#1059777)
– CVE-2017-15593: Missing cleanup in the page type system allowed a
malicious or buggy PV guest to cause DoS (XSA-242 bsc#1061084)
– CVE-2017-15592: A problem in the shadow pagetable code allowed a
malicious or buggy HVM guest to cause DoS or cause hypervisor memory
corruption potentially allowing the guest to escalate its privilege
(XSA-243 bsc#1061086)
– CVE-2017-15594: Problematic handling of the selector fields in the
Interrupt Descriptor Table (IDT) allowed a malicious or buggy x86 PV
guest to escalate its privileges or cause DoS (XSA-244 bsc#1061087)
– CVE-2017-15591: Missing checks in the handling of DMOPs allowed
malicious or buggy stub domain kernels or tool stacks otherwise living
outside of Domain0 to cause a DoS (XSA-238 bsc#1061077)
– CVE-2017-15589: Intercepted I/O write operations with less than a full
machine word’s worth of data were not properly handled, which allowed a
malicious unprivileged x86 HVM guest to obtain sensitive information
from the host or
other guests (XSA-239 bsc#1061080)
– CVE-2017-15595: In certain configurations of linear page tables a stack
overflow might have occured that allowed a malicious or buggy PV guest
to cause DoS and potentially privilege escalation and information leaks
(XSA-240 bsc#1061081)
– CVE-2017-15588: Under certain conditions x86 PV guests could have caused
the hypervisor to miss a necessary TLB flush for a page. This allowed a
malicious x86 PV guest to access all of system memory, allowing for
privilege escalation, DoS, and information leaks (XSA-241 bsc#1061082)
– CVE-2017-15590: Multiple issues existed with the setup of PCI MSI
interrupts that allowed a malicious or buggy guest to cause DoS and
potentially privilege escalation and information leaks (XSA-237
bsc#1061076)

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE OpenStack Cloud 6:

zypper in -t patch SUSE-OpenStack-Cloud-6-2017-1795=1

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1795=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1795=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE OpenStack Cloud 6 (x86_64):

xen-4.5.5_18-22.31.1
xen-debugsource-4.5.5_18-22.31.1
xen-doc-html-4.5.5_18-22.31.1
xen-kmp-default-4.5.5_18_k3.12.74_60.64.60-22.31.1
xen-kmp-default-debuginfo-4.5.5_18_k3.12.74_60.64.60-22.31.1
xen-libs-32bit-4.5.5_18-22.31.1
xen-libs-4.5.5_18-22.31.1
xen-libs-debuginfo-32bit-4.5.5_18-22.31.1
xen-libs-debuginfo-4.5.5_18-22.31.1
xen-tools-4.5.5_18-22.31.1
xen-tools-debuginfo-4.5.5_18-22.31.1
xen-tools-domU-4.5.5_18-22.31.1
xen-tools-domU-debuginfo-4.5.5_18-22.31.1

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

xen-4.5.5_18-22.31.1
xen-debugsource-4.5.5_18-22.31.1
xen-doc-html-4.5.5_18-22.31.1
xen-kmp-default-4.5.5_18_k3.12.74_60.64.60-22.31.1
xen-kmp-default-debuginfo-4.5.5_18_k3.12.74_60.64.60-22.31.1
xen-libs-32bit-4.5.5_18-22.31.1
xen-libs-4.5.5_18-22.31.1
xen-libs-debuginfo-32bit-4.5.5_18-22.31.1
xen-libs-debuginfo-4.5.5_18-22.31.1
xen-tools-4.5.5_18-22.31.1
xen-tools-debuginfo-4.5.5_18-22.31.1
xen-tools-domU-4.5.5_18-22.31.1
xen-tools-domU-debuginfo-4.5.5_18-22.31.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

xen-4.5.5_18-22.31.1
xen-debugsource-4.5.5_18-22.31.1
xen-doc-html-4.5.5_18-22.31.1
xen-kmp-default-4.5.5_18_k3.12.74_60.64.60-22.31.1
xen-kmp-default-debuginfo-4.5.5_18_k3.12.74_60.64.60-22.31.1
xen-libs-32bit-4.5.5_18-22.31.1
xen-libs-4.5.5_18-22.31.1
xen-libs-debuginfo-32bit-4.5.5_18-22.31.1
xen-libs-debuginfo-4.5.5_18-22.31.1
xen-tools-4.5.5_18-22.31.1
xen-tools-debuginfo-4.5.5_18-22.31.1
xen-tools-domU-4.5.5_18-22.31.1
xen-tools-domU-debuginfo-4.5.5_18-22.31.1

References:

https://www.suse.com/security/cve/CVE-2017-15588.html
https://www.suse.com/security/cve/CVE-2017-15589.html
https://www.suse.com/security/cve/CVE-2017-15590.html
https://www.suse.com/security/cve/CVE-2017-15591.html
https://www.suse.com/security/cve/CVE-2017-15592.html
https://www.suse.com/security/cve/CVE-2017-15593.html
https://www.suse.com/security/cve/CVE-2017-15594.html
https://www.suse.com/security/cve/CVE-2017-15595.html
https://www.suse.com/security/cve/CVE-2017-5526.html
https://bugzilla.suse.com/1059777
https://bugzilla.suse.com/1061076
https://bugzilla.suse.com/1061077
https://bugzilla.suse.com/1061080
https://bugzilla.suse.com/1061081
https://bugzilla.suse.com/1061082
https://bugzilla.suse.com/1061084
https://bugzilla.suse.com/1061086
https://bugzilla.suse.com/1061087


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2872-1: important: Security update for MozillaFirefox, mozilla-nss

SUSE Security Update: Security update for MozillaFirefox, mozilla-nss
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2872-1
Rating: important
References: #1060445 #1061005
Cross-References: CVE-2017-7793 CVE-2017-7805 CVE-2017-7810
CVE-2017-7814 CVE-2017-7818 CVE-2017-7819
CVE-2017-7823 CVE-2017-7824 CVE-2017-7825

Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Server 11-SP3-LTSS
SUSE Linux Enterprise Point of Sale 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________

An update that fixes 9 vulnerabilities is now available.

Description:

This update for MozillaFirefox and mozilla-nss fixes the following issues:

Mozilla Firefox was updated to ESR 52.4 (bsc#1060445)

* MFSA 2017-22/CVE-2017-7825: OS X fonts render some Tibetan and Arabic
unicode characters as spaces
* MFSA 2017-22/CVE-2017-7805: Use-after-free in TLS 1.2 generating
handshake hashes
* MFSA 2017-22/CVE-2017-7819: Use-after-free while resizing images in
design mode
* MFSA 2017-22/CVE-2017-7818: Use-after-free during ARIA array manipulation
* MFSA 2017-22/CVE-2017-7793: Use-after-free with Fetch API
* MFSA 2017-22/CVE-2017-7824: Buffer overflow when drawing and validating
elements with ANGLE
* MFSA 2017-22/CVE-2017-7810: Memory safety bugs fixed in Firefox 56 and
Firefox ESR 52.4
* MFSA 2017-22/CVE-2017-7823: CSP sandbox directive did not create a
unique origin
* MFSA 2017-22/CVE-2017-7814: Blob and data URLs bypass phishing and
malware protection warnings

Mozilla Network Security Services (Mozilla NSS) received a security fix:

* MFSA 2017-22/CVE-2017-7805: Use-after-free in TLS 1.2 generating
handshake hashes (bsc#1061005, bsc#1060445)

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Software Development Kit 11-SP4:

zypper in -t patch sdksp4-firefox-201710-13330=1

– SUSE Linux Enterprise Server 11-SP4:

zypper in -t patch slessp4-firefox-201710-13330=1

– SUSE Linux Enterprise Server 11-SP3-LTSS:

zypper in -t patch slessp3-firefox-201710-13330=1

– SUSE Linux Enterprise Point of Sale 11-SP3:

zypper in -t patch sleposp3-firefox-201710-13330=1

– SUSE Linux Enterprise Debuginfo 11-SP4:

zypper in -t patch dbgsp4-firefox-201710-13330=1

– SUSE Linux Enterprise Debuginfo 11-SP3:

zypper in -t patch dbgsp3-firefox-201710-13330=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x):

MozillaFirefox-devel-52.4.0esr-72.13.2
mozilla-nss-devel-3.29.5-47.6.1

– SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 x86_64):

MozillaFirefox-52.4.0esr-72.13.2
MozillaFirefox-translations-52.4.0esr-72.13.2
libfreebl3-3.29.5-47.6.1
libsoftokn3-3.29.5-47.6.1
mozilla-nss-3.29.5-47.6.1
mozilla-nss-tools-3.29.5-47.6.1

– SUSE Linux Enterprise Server 11-SP4 (ppc64 x86_64):

libfreebl3-32bit-3.29.5-47.6.1
libsoftokn3-32bit-3.29.5-47.6.1
mozilla-nss-32bit-3.29.5-47.6.1

– SUSE Linux Enterprise Server 11-SP4 (ia64):

libfreebl3-x86-3.29.5-47.6.1
libsoftokn3-x86-3.29.5-47.6.1
mozilla-nss-x86-3.29.5-47.6.1

– SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x):

MozillaFirefox-52.4.0esr-72.13.2
MozillaFirefox-translations-52.4.0esr-72.13.2
libfreebl3-3.29.5-47.6.1
libsoftokn3-3.29.5-47.6.1
mozilla-nss-3.29.5-47.6.1
mozilla-nss-tools-3.29.5-47.6.1

– SUSE Linux Enterprise Server 11-SP3-LTSS (s390x):

libfreebl3-32bit-3.29.5-47.6.1
libsoftokn3-32bit-3.29.5-47.6.1
mozilla-nss-32bit-3.29.5-47.6.1

– SUSE Linux Enterprise Point of Sale 11-SP3 (i586):

MozillaFirefox-52.4.0esr-72.13.2
MozillaFirefox-translations-52.4.0esr-72.13.2
libfreebl3-3.29.5-47.6.1
libsoftokn3-3.29.5-47.6.1
mozilla-nss-3.29.5-47.6.1
mozilla-nss-tools-3.29.5-47.6.1

– SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

MozillaFirefox-debuginfo-52.4.0esr-72.13.2
mozilla-nss-debuginfo-3.29.5-47.6.1
mozilla-nss-debugsource-3.29.5-47.6.1

– SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):

MozillaFirefox-debuginfo-52.4.0esr-72.13.2
mozilla-nss-debuginfo-3.29.5-47.6.1
mozilla-nss-debugsource-3.29.5-47.6.1

References:

https://www.suse.com/security/cve/CVE-2017-7793.html
https://www.suse.com/security/cve/CVE-2017-7805.html
https://www.suse.com/security/cve/CVE-2017-7810.html
https://www.suse.com/security/cve/CVE-2017-7814.html
https://www.suse.com/security/cve/CVE-2017-7818.html
https://www.suse.com/security/cve/CVE-2017-7819.html
https://www.suse.com/security/cve/CVE-2017-7823.html
https://www.suse.com/security/cve/CVE-2017-7824.html
https://www.suse.com/security/cve/CVE-2017-7825.html
https://bugzilla.suse.com/1060445
https://bugzilla.suse.com/1061005


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

OPNsense 17.7.7 released
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SUSE-SU-2017:2856-1: important: Security update for xen

SUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2856-1
Rating: important
References: #1027519 #1059777 #1061076 #1061080 #1061081
#1061082 #1061084 #1061086 #1061087
Cross-References: CVE-2017-15588 CVE-2017-15589 CVE-2017-15590
CVE-2017-15592 CVE-2017-15593 CVE-2017-15594
CVE-2017-15595 CVE-2017-5526
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that solves 8 vulnerabilities and has one errata
is now available.

Description:

This update for xen fixes several issues:

These security issues were fixed:

– CVE-2017-5526: The ES1370 audio device emulation support was vulnerable
to a memory leakage issue allowing a privileged user inside the guest to
cause a DoS and/or potentially crash the Qemu process on the host
(bsc#1059777)
– CVE-2017-15593: Missing cleanup in the page type system allowed a
malicious or buggy PV guest to cause DoS (XSA-242 bsc#1061084)
– CVE-2017-15592: A problem in the shadow pagetable code allowed a
malicious or buggy HVM guest to cause DoS or cause hypervisor memory
corruption potentially allowing the guest to escalate its privilege
(XSA-243 bsc#1061086)
– CVE-2017-15594: Problematic handling of the selector fields in the
Interrupt Descriptor Table (IDT) allowed a malicious or buggy x86 PV
guest to escalate its privileges or cause DoS (XSA-244 bsc#1061087)
– CVE-2017-15589: Intercepted I/O write operations with less than a full
machine word’s worth of data were not properly handled, which allowed a
malicious unprivileged x86 HVM guest to obtain sensitive information
from the host or
other guests (XSA-239 bsc#1061080)
– CVE-2017-15595: In certain configurations of linear page tables a stack
overflow might have occured that allowed a malicious or buggy PV guest
to cause DoS and potentially privilege escalation and information leaks
(XSA-240 bsc#1061081)
– CVE-2017-15588: Under certain conditions x86 PV guests could have caused
the hypervisor to miss a necessary TLB flush for a page. This allowed a
malicious x86 PV guest to access all of system memory, allowing for
privilege escalation, DoS, and information leaks (XSA-241 bsc#1061082)
– CVE-2017-15590: Multiple issues existed with the setup of PCI MSI
interrupts that allowed a malicious or buggy guest to cause DoS and
potentially privilege escalation and information leaks (XSA-237
bsc#1061076)

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1778=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

xen-4.4.4_24-22.54.1
xen-debugsource-4.4.4_24-22.54.1
xen-doc-html-4.4.4_24-22.54.1
xen-kmp-default-4.4.4_24_k3.12.61_52.92-22.54.1
xen-kmp-default-debuginfo-4.4.4_24_k3.12.61_52.92-22.54.1
xen-libs-32bit-4.4.4_24-22.54.1
xen-libs-4.4.4_24-22.54.1
xen-libs-debuginfo-32bit-4.4.4_24-22.54.1
xen-libs-debuginfo-4.4.4_24-22.54.1
xen-tools-4.4.4_24-22.54.1
xen-tools-debuginfo-4.4.4_24-22.54.1
xen-tools-domU-4.4.4_24-22.54.1
xen-tools-domU-debuginfo-4.4.4_24-22.54.1

References:

https://www.suse.com/security/cve/CVE-2017-15588.html
https://www.suse.com/security/cve/CVE-2017-15589.html
https://www.suse.com/security/cve/CVE-2017-15590.html
https://www.suse.com/security/cve/CVE-2017-15592.html
https://www.suse.com/security/cve/CVE-2017-15593.html
https://www.suse.com/security/cve/CVE-2017-15594.html
https://www.suse.com/security/cve/CVE-2017-15595.html
https://www.suse.com/security/cve/CVE-2017-5526.html
https://bugzilla.suse.com/1027519
https://bugzilla.suse.com/1059777
https://bugzilla.suse.com/1061076
https://bugzilla.suse.com/1061080
https://bugzilla.suse.com/1061081
https://bugzilla.suse.com/1061082
https://bugzilla.suse.com/1061084
https://bugzilla.suse.com/1061086
https://bugzilla.suse.com/1061087


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org