openSUSE-SU-2017:2111-1: important: Security update for libzypp, zypper

openSUSE Security Update: Security update for libzypp, zypper
______________________________________________________________________________

Announcement ID: openSUSE-SU-2017:2111-1
Rating: important
References: #1009745 #1031756 #1033236 #1038132 #1038984
#1043218 #1045735 #1047785 #1048315
Cross-References: CVE-2017-7435 CVE-2017-7436 CVE-2017-9269

Affected Products:
openSUSE Leap 42.2
______________________________________________________________________________

An update that solves three vulnerabilities and has 6 fixes
is now available.

Description:

The Software Update Stack was updated to receive fixes and enhancements.

libzypp:

Security issues fixed:
– CVE-2017-7435, CVE-2017-7436, CVE-2017-9269: Fix GPG check workflows,
mainly for unsigned repositories and packages. (bsc#1045735, bsc#1038984)

Bug fixes:
– Re-probe on refresh if the repository type changes. (bsc#1048315)
– Propagate proper error code to DownloadProgressReport. (bsc#1047785)
– Allow to trigger an appdata refresh unconditionally. (bsc#1009745)
– Support custom repo variables defined in /etc/zypp/vars.d.
– Adapt loop mounting of ISO images. (bsc#1038132, bsc#1033236)
– Fix potential crash if repository has no baseurl. (bsc#1043218)

zypper:

– Adapt download callback to report and handle unsigned packages.
(bsc#1038984)
– Report missing/optional files as ‘not found’ rather than ‘error’.
(bsc#1047785)
– Document support for custom repository variables defined in
/etc/zypp/vars.d.
– Emphasize that it depends on how fast PackageKit will respond to a
‘quit’ request sent if PK blocks package management.

This update was imported from the SUSE:SLE-12-SP2:Update update project.

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE Leap 42.2:

zypper in -t patch openSUSE-2017-893=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE Leap 42.2 (i586 x86_64):

libzypp-16.15.2-5.9.1
libzypp-debuginfo-16.15.2-5.9.1
libzypp-debugsource-16.15.2-5.9.1
libzypp-devel-16.15.2-5.9.1
libzypp-devel-doc-16.15.2-5.9.1
zypper-1.13.30-5.9.1
zypper-debuginfo-1.13.30-5.9.1
zypper-debugsource-1.13.30-5.9.1

– openSUSE Leap 42.2 (noarch):

zypper-aptitude-1.13.30-5.9.1
zypper-log-1.13.30-5.9.1

References:

https://www.suse.com/security/cve/CVE-2017-7435.html
https://www.suse.com/security/cve/CVE-2017-7436.html
https://www.suse.com/security/cve/CVE-2017-9269.html
https://bugzilla.suse.com/1009745
https://bugzilla.suse.com/1031756
https://bugzilla.suse.com/1033236
https://bugzilla.suse.com/1038132
https://bugzilla.suse.com/1038984
https://bugzilla.suse.com/1043218
https://bugzilla.suse.com/1045735
https://bugzilla.suse.com/1047785
https://bugzilla.suse.com/1048315


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2113-1: important: Security update for puppet

SUSE Security Update: Security update for puppet
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2113-1
Rating: important
References: #1040151
Cross-References: CVE-2017-2295
Affected Products:
SUSE Linux Enterprise Module for Advanced Systems Management 12
SUSE Linux Enterprise Desktop 12-SP3
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for puppet fixes the following issues:

Security issue fixed:
– CVE-2017-2295: Possible code execution vulnerability where an attacker
could force YAML deserialization in an unsafe manner. In default, this
update breaks a backwards compatibility with Puppet agents older than
3.2.2 as the SLE12 master doesn’t support other fact formats than pson
in default anymore. In order to allow users to continue using their
SLE12 master/SLE11 agents setup and fix CVE-2017-2295 for the others, a
new puppet master boolean option “dangerous_fact_formats” was added.
When it’s set to true it enables using dangerous fact formats (e.g.
YAML). When it’s set to false, only PSON fact format is accepted.
(bsc#1040151)

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Module for Advanced Systems Management 12:

zypper in -t patch SUSE-SLE-Module-Adv-Systems-Management-12-2017-1310=1

– SUSE Linux Enterprise Desktop 12-SP3:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2017-1310=1

– SUSE Linux Enterprise Desktop 12-SP2:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1310=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Module for Advanced Systems Management 12 (ppc64le s390x x86_64):

puppet-3.8.5-15.3.3
puppet-server-3.8.5-15.3.3

– SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

puppet-3.8.5-15.3.3

– SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

puppet-3.8.5-15.3.3

References:

https://www.suse.com/security/cve/CVE-2017-2295.html
https://bugzilla.suse.com/1040151


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2114-1: important: Security update for Linux Kernel Live Patch 0 for SLE 12 SP3

SUSE Security Update: Security update for Linux Kernel Live Patch 0 for SLE 12 SP3
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2114-1
Rating: important
References: #1050751
Cross-References: CVE-2017-7533
Affected Products:
SUSE Linux Enterprise Live Patching 12-SP3
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for the Linux Kernel 4.4.73-5 fixes one issue.

The following security bugs were fixed:

– CVE-2017-7533: A bug in inotify code allowed local users to escalate
privilege (bsc#1050751).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Live Patching 12-SP3:

zypper in -t patch SUSE-SLE-Live-Patching-12-SP3-2017-1313=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Live Patching 12-SP3 (x86_64):

kgraft-patch-4_4_73-5-default-2-2.3.2
kgraft-patch-4_4_73-5-default-debuginfo-2-2.3.2
kgraft-patch-SLE12-SP3_Update_0-debugsource-2-2.3.2

References:

https://www.suse.com/security/cve/CVE-2017-7533.html
https://bugzilla.suse.com/1050751


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE-SU-2017:2119-1: important: Security update for mariadb

openSUSE Security Update: Security update for mariadb
______________________________________________________________________________

Announcement ID: openSUSE-SU-2017:2119-1
Rating: important
References: #1048715 #963041
Cross-References: CVE-2017-3308 CVE-2017-3309 CVE-2017-3453
CVE-2017-3456 CVE-2017-3464
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________

An update that fixes 5 vulnerabilities is now available.

Description:

This MariaDB update to version 10.0.31 GA fixes the following issues:

Security issues fixed:
– CVE-2017-3308: Subcomponent: Server: DML: Easily “exploitable”
vulnerability allows low privileged attacker with network access via
multiple protocols to compromise MariaDB Server. Successful attacks of
this vulnerability can result in unauthorized ability to cause a hang or
frequently repeatable crash (complete DOS). (bsc#1048715)
– CVE-2017-3309: Subcomponent: Server: Optimizer: Easily “exploitable”
vulnerability allows low privileged attacker with network access via
multiple protocols to compromise MariaDB Server. Successful attacks of
this vulnerability can result in unauthorized ability to cause a hang or
frequently repeatable crash (complete DOS). (bsc#1048715)
– CVE-2017-3453: Subcomponent: Server: Optimizer: Easily “exploitable”
vulnerability allows low privileged attacker with network access via
multiple protocols to compromise MariaDB Server. Successful attacks of
this vulnerability can result in unauthorized ability to cause a hang or
frequently repeatable crash (complete DOS). (bsc#1048715)
– CVE-2017-3456: Subcomponent: Server: DML: Easily “exploitable”
vulnerability allows low privileged attacker with network access via
multiple protocols to compromise MariaDB Server. Successful attacks of
this vulnerability can result in unauthorized ability to cause a hang or
frequently repeatable crash (complete DOS). (bsc#1048715)
– CVE-2017-3464: Subcomponent: Server: DDL: Easily “exploitable”
vulnerability allows low privileged attacker with network access via
multiple protocols to compromise MariaDB Server. Successful attacks of
this vulnerability can result in unauthorized ability to cause a hang or
frequently repeatable crash (complete DOS). (bsc#1048715)

Bug fixes:
– switch from ‘Restart=on-failure’ to ‘Restart=on-abort’ in mysql.service
in order to follow the upstream. It also fixes hanging
mysql-systemd-helper when mariadb fails (e.g. because of the
misconfiguration) (bsc#963041)
– XtraDB updated to 5.6.36-82.0
– TokuDB updated to 5.6.36-82.0
– Innodb updated to 5.6.36
– Performance Schema updated to 5.6.36

Release notes and changelog:
– https://kb.askmonty.org/en/mariadb-10031-release-notes
– https://kb.askmonty.org/en/mariadb-10031-changelog

This update was imported from the SUSE:SLE-12-SP1:Update update project.

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE Leap 42.3:

zypper in -t patch openSUSE-2017-902=1

– openSUSE Leap 42.2:

zypper in -t patch openSUSE-2017-902=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE Leap 42.3 (i586 x86_64):

libmysqlclient-devel-10.0.31-23.1
libmysqlclient18-10.0.31-23.1
libmysqlclient18-debuginfo-10.0.31-23.1
libmysqlclient_r18-10.0.31-23.1
libmysqld-devel-10.0.31-23.1
libmysqld18-10.0.31-23.1
libmysqld18-debuginfo-10.0.31-23.1
mariadb-10.0.31-23.1
mariadb-bench-10.0.31-23.1
mariadb-bench-debuginfo-10.0.31-23.1
mariadb-client-10.0.31-23.1
mariadb-client-debuginfo-10.0.31-23.1
mariadb-debuginfo-10.0.31-23.1
mariadb-debugsource-10.0.31-23.1
mariadb-errormessages-10.0.31-23.1
mariadb-test-10.0.31-23.1
mariadb-test-debuginfo-10.0.31-23.1
mariadb-tools-10.0.31-23.1
mariadb-tools-debuginfo-10.0.31-23.1

– openSUSE Leap 42.3 (x86_64):

libmysqlclient18-32bit-10.0.31-23.1
libmysqlclient18-debuginfo-32bit-10.0.31-23.1
libmysqlclient_r18-32bit-10.0.31-23.1

– openSUSE Leap 42.2 (i586 x86_64):

libmysqlclient-devel-10.0.31-20.7.1
libmysqlclient18-10.0.31-20.7.1
libmysqlclient18-debuginfo-10.0.31-20.7.1
libmysqlclient_r18-10.0.31-20.7.1
libmysqld-devel-10.0.31-20.7.1
libmysqld18-10.0.31-20.7.1
libmysqld18-debuginfo-10.0.31-20.7.1
mariadb-10.0.31-20.7.1
mariadb-bench-10.0.31-20.7.1
mariadb-bench-debuginfo-10.0.31-20.7.1
mariadb-client-10.0.31-20.7.1
mariadb-client-debuginfo-10.0.31-20.7.1
mariadb-debuginfo-10.0.31-20.7.1
mariadb-debugsource-10.0.31-20.7.1
mariadb-errormessages-10.0.31-20.7.1
mariadb-test-10.0.31-20.7.1
mariadb-test-debuginfo-10.0.31-20.7.1
mariadb-tools-10.0.31-20.7.1
mariadb-tools-debuginfo-10.0.31-20.7.1

– openSUSE Leap 42.2 (x86_64):

libmysqlclient18-32bit-10.0.31-20.7.1
libmysqlclient18-debuginfo-32bit-10.0.31-20.7.1
libmysqlclient_r18-32bit-10.0.31-20.7.1

References:

https://www.suse.com/security/cve/CVE-2017-3308.html
https://www.suse.com/security/cve/CVE-2017-3309.html
https://www.suse.com/security/cve/CVE-2017-3453.html
https://www.suse.com/security/cve/CVE-2017-3456.html
https://www.suse.com/security/cve/CVE-2017-3464.html
https://bugzilla.suse.com/1048715
https://bugzilla.suse.com/963041


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE-SU-2017:2112-1: important: Security update for the Linux Kernel

openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID: openSUSE-SU-2017:2112-1
Rating: important
References: #1005778 #1011913 #1012829 #1013887 #1016119
#1019695 #1022476 #1022600 #1022604 #1028286
#1030552 #1031717 #1033587 #1036215 #1036632
#1037838 #1039153 #1040347 #1042257 #1042286
#1042422 #1043598 #1044443 #1044623 #1045404
#1045563 #1045922 #1046651 #1046682 #1047121
#1048146 #1048155 #1048348 #1048421 #1048451
#1048501 #1048891 #1048912 #1048914 #1048916
#1048919 #1049231 #1049289 #1049361 #1049483
#1049486 #1049603 #1049619 #1049645 #1049706
#1049882 #1050061 #1050188 #1050320 #1050322
#1051022 #1051048 #1051059 #1051239 #1051471
#1051478 #1051479 #1051663 #964063 #974215

Cross-References: CVE-2017-11473 CVE-2017-7533 CVE-2017-7541
CVE-2017-7542
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that solves four vulnerabilities and has 61 fixes
is now available.

Description:

The openSUSE Leap 42.3 kernel was updated to 4.4.79 to receive various
security and bugfixes.

The following security bugs were fixed:

– CVE-2017-7542: The ip6_find_1stfragopt function in
net/ipv6/output_core.c in the Linux kernel allowed local users to cause
a denial of service (integer overflow and infinite loop) by leveraging
the ability to open a raw socket (bnc#1049882).
– CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function
in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users
to gain privileges via a crafted ACPI table (bnc#1049603).
– CVE-2017-7533: A bug in inotify code allowed local users to escalate
privilege (bnc#1049483).
– CVE-2017-7541: The brcmf_cfg80211_mgmt_tx function in
drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux
kernel allowed local users to cause a denial of service (buffer overflow
and system crash) or possibly gain privileges via a crafted
NL80211_CMD_FRAME Netlink packet (bnc#1049645).

The following non-security bugs were fixed:

– ACPI / processor: Avoid reserving IO regions too early (bsc#1051478).
– ALSA: fm801: Initialize chip after IRQ handler is registered
(bsc#1031717).
– Added sbitmap patch to blacklist.conf Add a patch “sbitmap: fix wakeup
hang after sbq resize” to the blacklist.conf file because it is not
needed in SLE 12 SP2.
– Btrfs: incremental send, fix invalid path for link commands
(bsc#1051479).
– Btrfs: incremental send, fix invalid path for unlink commands
(bsc#1051479).
– Btrfs: send, fix invalid path after renaming and linking file
(bsc#1051479).
– Delete
patches.drivers/0004-iommu-amd-reduce-delay-waiting-for-command-buffer-spac
e. Remove the patch because it caused problems for users. See
bsc#1048348.
– Drop patches; obsoleted by ‘scsi: Add STARGET_CREATE_REMOVE state’
– Fix kABI breakage by KVM CVE fix (bsc#1045922).
– IB/rxe: Fix kernel panic from skb destructor (bsc#1049361).
– KVM: nVMX: Fix nested VPID vmx exec control (bsc#1051478).
– KVM: nVMX: fix msr bitmaps to prevent L2 from accessing L0 x2APIC
(bsc#1051478).
– KVM: x86: avoid simultaneous queueing of both IRQ and SMI (bsc#1051478).
– NFS: Cache aggressively when file is open for writing (bsc#1033587).
– NFS: Do not flush caches for a getattr that races with writeback
(bsc#1033587).
– NFS: invalidate file size when taking a lock (git-fixes).
– PCI / PM: Fix native PME handling during system suspend/resume
(bsc#1051478).
– PCI: Add Mellanox device IDs (bsc#1051478).
– PCI: Convert Mellanox broken INTx quirks to be for listed devices only
(bsc#1051478).
– PCI: Correct PCI_STD_RESOURCE_END usage (bsc#1051478).
– PCI: Enable ECRC only if device supports it (bsc#1051478).
– PCI: Support INTx masking on ConnectX-4 with firmware x.14.1100+
(bsc#1051478).
– PCI: dwc: Fix uninitialized variable in dw_handle_msi_irq()
(bsc#1051478).
– PCI: dwc: dra7xx: Use RW1C for IRQSTATUS_MSI and IRQSTATUS_MAIN
(bsc#1051478).
– PM / Hibernate: Fix scheduling while atomic during hibernation
(bsc#1051059).
– RDMA/qedr: Prevent memory overrun in verbs’ user responses (bsc#1022604
FATE#321747).
– README.BRANCH: Add Oliver as openSUSE-42.3 branch co-maintainer
– Refresh patches.kabi/Fix-kABI-breakage-by-KVM-CVE-fix.patch. Fix a
stupid bug where the VCPU_REGS_TF shift was used as a mask.
– Revert “Add “shutdown” to “struct class”.” (kabi).
– Revert “mm/list_lru.c: fix list_lru_count_node() to be race free” (kabi).
– Revert “powerpc/numa: Fix percpu allocations to be NUMA aware”
(bsc#1048914).
– Revert “powerpc/numa: Fix percpu allocations to be NUMA aware”
(bsc#1048914).
– Revert “tpm: Issue a TPM2_Shutdown for TPM2 devices.” (kabi).
– Update patches.drivers/0011-hpsa-remove-abort-handler.patch (bsc#1022600
fate#321928 bsc#1016119).
– Update
patches.fixes/xfs-refactor-log-record-unpack-and-data-processing.patch
(bsc#1043598, bsc#1036215).
– apply mainline tags to some hyperv patches
– arm64: kernel: restrict /dev/mem read() calls to linear region
(bsc#1046651).++ kernel-source.spec (revision 3)%define patchversion
4.4.79Version: 4.4.79Release: .g4dc78e3
– arm64: mm: remove page_mapping check in __sync_icache_dcache
(bsc#1040347).
– blacklist 2400fd822f46 powerpc/asm: Mark cr0 as clobbered in mftb()
– blacklist.conf: 9eeacd3a2f17 not a bug fix (bnc#1050061)
– blacklist.conf: Blacklist 4e201566402c (‘genirq/msi: Drop artificial PCI
dependency’) (bsc#1051478) This commit just removes an include and does
not fix a real issue.
– blacklist.conf: Blacklist aa2369f11ff7 (‘mm/gup.c: fix access_ok()
argument type’) (bsc#1051478) Fixes only a compile-warning.
– blacklist.conf: Blacklist c133c7615751 (‘x86/nmi: Fix timeout test in
test_nmi_ipi()’) It only fixes a self-test (bsc#1051478).
– blacklist.conf: Blacklist c9525a3fab63 (‘x86/watchdog: Fix Kconfig help
text file path reference to lockup watchdog documentation’) Updates only
kconfig help-text (bsc#1051478).
– blacklist.conf: Blacklist e80e7edc55ba (‘PCI/MSI: Initialize MSI
capability for all architectures’) This only fixes machines not
supported by our kernels.
– blacklist.conf: Do not need 55d728a40d36, we do it differently in SLE
– blacklist.conf: add inapplicable commits for wifi (bsc#1031717)
– blacklist.conf: blacklist 7b73305160f1, unneeded cleanup
– blacklist.conf: da0510c47519fe0999cffe316e1d370e29f952be # FRV not
applicable to SLE
– blkfront: add uevent for size change (bnc#1036632).
– block: Fix front merge check (bsc#1051239).
– brcmfmac: Fix glom_skb leak in brcmf_sdiod_recv_chain (bsc#1031717).
– btrfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
– btrfs: add cond_resched to btrfs_qgroup_trace_leaf_items (bsc#1028286).
– btrfs: fix lockup in find_free_extent with read-only block groups
(bsc#1046682).
– cpuidle: dt: Add missing ‘of_node_put()’ (bnc#1022476).
– cxgb4: fix BUG() on interrupt deallocating path of ULD (bsc#1005778).
– cxgb4: fix a NULL dereference (bsc#1005778).
– cxgb4: fix memory leak in init_one() (bsc#1005778).
– dentry name snapshots (bsc#1049483).
– device-dax: fix sysfs attribute deadlock (bsc#1048919).
– drm/i915: Fix scaler init during CRTC HW state readout (bsc#1031717).
– drm/vmwgfx: Fix large topology crash (bsc#1048155).
– drm/vmwgfx: Support topology greater than texture size (bsc#1048155).
– efi/libstub: Skip GOP with PIXEL_BLT_ONLY format (bnc#974215).
– ext2: Do not clear SGID when inheriting ACLs (bsc#1030552).
– ext4: Do not clear SGID when inheriting ACLs (bsc#1030552).
– ext4: avoid unnecessary stalls in ext4_evict_inode() (bsc#1049486).
– ext4: handle the rest of ext4_mb_load_buddy() ENOMEM errors
(bsc#1012829).
– gcov: add support for gcc version >= 6 (bsc#1051663).
– gcov: support GCC 7.1 (bsc#1051663).
– gfs2: fix flock panic issue (bsc#1012829).
– hv: print extra debug in kvp_on_msg in error paths (bnc#1039153).
– hv_netvsc: Exclude non-TCP port numbers from vRSS hashing (bsc#1048421).
– hv_netvsc: Fix the queue index computation in forwarding case
(bsc#1048421).
– i2c: designware-baytrail: fix potential null pointer dereference on dev
(bsc#1011913).
– introduce the walk_process_tree() helper (bnc#1022476).
– iommu/amd: Fix interrupt remapping when disable guest_mode (bsc#1051471).
– iwlwifi: mvm: reset the fw_dump_desc pointer after ASSERT (bsc#1031717).
– iwlwifi: mvm: unconditionally stop device after init (bsc#1031717).
– iwlwifi: pcie: fix command completion name debug (bsc#1031717).
– kABI-fix for “x86/panic: replace smp_send_stop() with kdump friendly
version in panic path” (bsc#1051478).
– kABI: protect lwtunnel include in ip6_route.h (kabi).
– kABI: protect struct iscsi_tpg_attrib (kabi).
– kABI: protect struct tpm_chip (kabi).
– kABI: protect struct xfrm_dst (kabi).
– kvm: nVMX: Fix nested_vmx_check_msr_bitmap_controls (bsc#1051478).
– libnvdimm, pmem: fix a NULL pointer BUG in nd_pmem_notify (bsc#1048919).
– libnvdimm, region: fix flush hint detection crash (bsc#1048919).
– libnvdimm: fix badblock range handling of ARS range (bsc#1051048).
– lightnvm: fix “warning: ‘ret’ may be used uninitialized”
(FATE#319466).
– md-cluster: Fix a memleak in an error handling path (bsc#1049289).
– mm: make PR_SET_THP_DISABLE immediately active (bnc#1048891).
– mwifiex: do not update MCS set from hostapd (bsc#1031717).
– net/ena: switch to pci_alloc_irq_vectors (bsc#1047121).
– net: ena: add hardware hints capability to the driver (bsc#1047121).
– net: ena: add hardware hints capability to the driver (bsc#1047121).
– net: ena: add missing return when ena_com_get_io_handlers() fails
(bsc#1047121).
– net: ena: add missing return when ena_com_get_io_handlers() fails
(bsc#1047121).
– net: ena: add missing unmap bars on device removal (bsc#1047121).
– net: ena: add missing unmap bars on device removal (bsc#1047121).
– net: ena: add reset reason for each device FLR (bsc#1047121).
– net: ena: add reset reason for each device FLR (bsc#1047121).
– net: ena: add support for out of order rx buffers refill (bsc#1047121).
– net: ena: add support for out of order rx buffers refill (bsc#1047121).
– net: ena: allow the driver to work with small number of msix vectors
(bsc#1047121).
– net: ena: allow the driver to work with small number of msix vectors
(bsc#1047121).
– net: ena: bug fix in lost tx packets detection mechanism (bsc#1047121).
– net: ena: bug fix in lost tx packets detection mechanism (bsc#1047121).
– net: ena: change return value for unsupported features unsupported
return value (bsc#1047121).
– net: ena: change return value for unsupported features unsupported
return value (bsc#1047121).
– net: ena: change sizeof() argument to be the type pointer (bsc#1047121).
– net: ena: change sizeof() argument to be the type pointer (bsc#1047121).
– net: ena: disable admin msix while working in polling mode (bsc#1047121).
– net: ena: disable admin msix while working in polling mode (bsc#1047121).
– net: ena: fix bug that might cause hang after consecutive open/close
interface (bsc#1047121).
– net: ena: fix bug that might cause hang after consecutive open/close
interface (bsc#1047121).
– net: ena: fix race condition between submit and completion admin command
(bsc#1047121).
– net: ena: fix race condition between submit and completion admin command
(bsc#1047121).
– net: ena: fix rare uncompleted admin command false alarm (bsc#1047121).
– net: ena: fix rare uncompleted admin command false alarm (bsc#1047121).
– net: ena: fix theoretical Rx hang on low memory systems (bsc#1047121).
– net: ena: fix theoretical Rx hang on low memory systems (bsc#1047121).
– net: ena: separate skb allocation to dedicated function (bsc#1047121).
– net: ena: separate skb allocation to dedicated function (bsc#1047121).
– net: ena: update driver’s rx drop statistics (bsc#1047121).
– net: ena: update driver’s rx drop statistics (bsc#1047121).
– net: ena: update ena driver to version 1.1.7 (bsc#1047121).
– net: ena: update ena driver to version 1.1.7 (bsc#1047121).
– net: ena: update ena driver to version 1.2.0 (bsc#1047121).
– net: ena: update ena driver to version 1.2.0 (bsc#1047121).
– net: ena: use lower_32_bits()/upper_32_bits() to split dma address
(bsc#1047121).
– net: ena: use lower_32_bits()/upper_32_bits() to split dma address
(bsc#1047121).
– net: ena: use napi_schedule_irqoff when possible (bsc#1047121).
– net: ena: use napi_schedule_irqoff when possible (bsc#1047121).
– net: hns: Bugfix for Tx timeout handling in hns driver (bsc#1048451).
– net: phy: Do not perform software reset for Generic PHY (bsc#1042286).
– nvme: also provide a UUID in the WWID sysfs attribute (bsc#1048146).
– nvme: wwid_show: strip trailing 0-bytes (bsc#1048146).
– nvmet: identify controller: improve standard compliance (bsc#1048146).
– ocfs2: Do not clear SGID when inheriting ACLs (bsc#1030552).
– ocfs2: Make ocfs2_set_acl() static (bsc#1030552).
– ocfs2: fix deadlock caused by recursive locking in xattr (bsc#1012829).
– perf/x86/intel: Cure bogus unwind from PEBS entries (bsc#1051478).
– perf/x86/intel: Fix PEBSv3 record drain (bsc#1051478).
– perf/x86: Fix spurious NMI with PEBS Load Latency event (bsc#1051478).
– platform/x86: ideapad-laptop: Add IdeaPad 310-15IKB to no_hw_rfkill
(bsc#1051022).
– platform/x86: ideapad-laptop: Add IdeaPad V310-15ISK to no_hw_rfkill
(bsc#1051022).
– platform/x86: ideapad-laptop: Add IdeaPad V510-15IKB to no_hw_rfkill
(bsc#1051022).
– platform/x86: ideapad-laptop: Add Lenovo Yoga 910-13IKB to no_hw_rfkill
dmi list (bsc#1051022).
– platform/x86: ideapad-laptop: Add Y520-15IKBN to no_hw_rfkill
(bsc#1051022).
– platform/x86: ideapad-laptop: Add Y700 15-ACZ to no_hw_rfkill DMI list
(bsc#1051022).
– platform/x86: ideapad-laptop: Add Y720-15IKBN to no_hw_rfkill
(bsc#1051022).
– platform/x86: ideapad-laptop: Add several models to no_hw_rfkill
(bsc#1051022).
– powerpc/fadump: Add a warning when ‘fadump_reserve_mem=’ is used
(bsc#1049231).
– powerpc: Add POWER9 architected mode to cputable (bsc#1048916,
fate#321439).
– powerpc: Support POWER9 in architected mode (bsc#1048916, fate#321439).
– prctl: propagate has_child_subreaper flag to every descendant
(bnc#1022476).
– qed: Add missing static/local dcbx info (bsc#1019695).
– qed: Correct print in iscsi error-flow (bsc#1019695).
– reiserfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
– reorder upstream commit d0c2c9973ecd net: use core MTU range checking in
virt drivers
– rpm/kernel-binary.spec.in: find-debuginfo.sh should not touch build-id
This needs rpm-4.14+ (bsc#964063).
– s390/crash: Remove unused KEXEC_NOTE_BYTES (bsc#1049706).
– s390/kdump: remove code to create ELF notes in the crashed system
(bsc#1049706).
– sched/core: Allow __sched_setscheduler() in interrupts when PI is not
used (bnc#1022476).
– sched/debug: Print the scheduler topology group mask (bnc#1022476).
– sched/fair, cpumask: Export for_each_cpu_wrap() (bnc#1022476).
– sched/fair: Fix O(nr_cgroups) in load balance path (bnc#1022476).
– sched/fair: Use task_groups instead of leaf_cfs_rq_list to walk all
cfs_rqs (bnc#1022476).
– sched/topology: Add sched_group_capacity debugging (bnc#1022476).
– sched/topology: Fix building of overlapping sched-groups (bnc#1022476).
– sched/topology: Fix overlapping sched_group_capacity (bnc#1022476).
– sched/topology: Move comment about asymmetric node setups (bnc#1022476).
– sched/topology: Refactor function build_overlap_sched_groups()
(bnc#1022476).
– sched/topology: Remove FORCE_SD_OVERLAP (bnc#1022476).
– sched/topology: Simplify build_overlap_sched_groups() (bnc#1022476).
– sched/topology: Small cleanup (bnc#1022476).
– sched/topology: Verify the first group matches the child domain
(bnc#1022476).
– scsi: Add STARGET_CREATE_REMOVE state to scsi_target_state (bsc#1013887).
– scsi: aacraid: Do not copy uninitialized stack memory to userspace
(bsc#1048912).
– scsi: aacraid: fix leak of data from stack back to userspace
(bsc#1048912).
– scsi: kABI fix for new state STARGET_CREATED_REMOVE (bsc#1013887).
– scsi: lpfc: Add MDS Diagnostic support (bsc#1037838).
– scsi: lpfc: Add auto EQ delay logic (bsc#1042257).
– scsi: lpfc: Added recovery logic for running out of NVMET IO context
resources (bsc#1037838).
– scsi: lpfc: Adding additional stats counters for nvme (bsc#1037838).
– scsi: lpfc: Cleanup entry_repost settings on SLI4 queues (bsc#1037838).
– scsi: lpfc: Driver responds LS_RJT to Beacon Off ELS – Linux
(bsc#1044623).
– scsi: lpfc: Fix NMI watchdog assertions when running nvmet IOPS tests
(bsc#1037838).
– scsi: lpfc: Fix NVME I+T not registering NVME as a supported FC4 type
(bsc#1037838).
– scsi: lpfc: Fix NVMEI driver not decrementing counter causing bad rport
state (bsc#1037838).
– scsi: lpfc: Fix NVMEI’s handling of NVMET’s PRLI response attributes
(bsc#1037838).
– scsi: lpfc: Fix SLI3 drivers attempting NVME ELS commands (bsc#1044623).
– scsi: lpfc: Fix crash after firmware flash when IO is running
(bsc#1044623).
– scsi: lpfc: Fix crash doing IO with resets (bsc#1044623).
– scsi: lpfc: Fix crash in lpfc_sli_ringtxcmpl_put when nvmet gets an
abort request (bsc#1044623).
– scsi: lpfc: Fix debugfs root inode “lpfc” not getting deleted on driver
unload (bsc#1037838).
– scsi: lpfc: Fix defects reported by Coverity Scan (bsc#1042257).
– scsi: lpfc: Fix nvme io stoppage after link bounce (bsc#1045404).
– scsi: lpfc: Fix nvmet RQ resource needs for large block writes
(bsc#1037838).
– scsi: lpfc: Fix system crash when port is reset (bsc#1037838).
– scsi: lpfc: Fix system panic when express lane enabled (bsc#1044623).
– scsi: lpfc: Fix used-RPI accounting problem (bsc#1037838).
– scsi: lpfc: Reduce time spent in IRQ for received NVME commands
(bsc#1044623).
– scsi: lpfc: Separate NVMET RQ buffer posting from IO resources
SGL/iocbq/context (bsc#1037838).
– scsi: lpfc: Separate NVMET data buffer pool fir ELS/CT (bsc#1037838).
– scsi: lpfc: Vport creation is failing with “Link Down” error
(bsc#1044623).
– scsi: lpfc: fix refcount error on node list (bsc#1045404).
– scsi: lpfc: update to revision to 11.4.0.1 (bsc#1044623).
– scsi: lpfc: update version to 11.2.0.14 (bsc#1037838).
– scsi: qedf: Fix a return value in case of error in
‘qedf_alloc_global_queues’ (bsc#1048912).
– scsi: qedi: Remove WARN_ON for untracked cleanup (bsc#1044443).
– scsi: qedi: Remove WARN_ON from clear task context (bsc#1044443).
– sfc: Add ethtool -m support for QSFP modules (bsc#1049619).
– string.h: add memcpy_and_pad() (bsc#1048146).
– timers: Plug locking race vs. timer migration (bnc#1022476).
– udf: Fix deadlock between writeback and udf_setsize() (bsc#1012829).
– udf: Fix races with i_size changes during readpage (bsc#1012829).
– x86/LDT: Print the real LDT base address (bsc#1051478).
– x86/mce: Make timer handling more robust (bsc#1042422).
– x86/panic: replace smp_send_stop() with kdump friendly version in panic
path (bsc#1051478).
– x86/platform/uv/BAU: Disable BAU on single hub configurations
(bsc#1050320).
– x86/platform/uv/BAU: Fix congested_response_us not taking effect
(bsc#1050322).
– xen/pvh*: Support > 32 VCPUs at domain restore (bnc#1045563).
– xen: hold lock_device_hotplug throughout vcpu hotplug operations
(bsc#1042422).
– xfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
– xfs: detect and handle invalid iclog size set by mkfs (bsc#1043598).
– xfs: detect and trim torn writes during log recovery (bsc#1036215).
– xfs: do not BUG() on mixed direct and mapped I/O (bsc#1050188).
– xfs: refactor and open code log record crc check (bsc#1036215).
– xfs: refactor log record start detection into a new helper (bsc#1036215).
– xfs: return start block of first bad log record during recovery
(bsc#1036215).
– xfs: support a crc verification only log record pass (bsc#1036215).
– xgene: Do not fail probe, if there is no clk resource for SGMII
interfaces (bsc#1048501).

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE Leap 42.3:

zypper in -t patch openSUSE-2017-890=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE Leap 42.3 (noarch):

kernel-devel-4.4.79-4.2
kernel-docs-4.4.79-4.2
kernel-docs-html-4.4.79-4.2
kernel-docs-pdf-4.4.79-4.2
kernel-macros-4.4.79-4.2
kernel-source-4.4.79-4.2
kernel-source-vanilla-4.4.79-4.2

– openSUSE Leap 42.3 (x86_64):

kernel-debug-4.4.79-4.2
kernel-debug-base-4.4.79-4.2
kernel-debug-base-debuginfo-4.4.79-4.2
kernel-debug-debuginfo-4.4.79-4.2
kernel-debug-debugsource-4.4.79-4.2
kernel-debug-devel-4.4.79-4.2
kernel-debug-devel-debuginfo-4.4.79-4.2
kernel-default-4.4.79-4.2
kernel-default-base-4.4.79-4.2
kernel-default-base-debuginfo-4.4.79-4.2
kernel-default-debuginfo-4.4.79-4.2
kernel-default-debugsource-4.4.79-4.2
kernel-default-devel-4.4.79-4.2
kernel-obs-build-4.4.79-4.2
kernel-obs-build-debugsource-4.4.79-4.2
kernel-obs-qa-4.4.79-4.2
kernel-syms-4.4.79-4.2
kernel-vanilla-4.4.79-4.2
kernel-vanilla-base-4.4.79-4.2
kernel-vanilla-base-debuginfo-4.4.79-4.2
kernel-vanilla-debuginfo-4.4.79-4.2
kernel-vanilla-debugsource-4.4.79-4.2
kernel-vanilla-devel-4.4.79-4.2

References:

https://www.suse.com/security/cve/CVE-2017-11473.html
https://www.suse.com/security/cve/CVE-2017-7533.html
https://www.suse.com/security/cve/CVE-2017-7541.html
https://www.suse.com/security/cve/CVE-2017-7542.html
https://bugzilla.suse.com/1005778
https://bugzilla.suse.com/1011913
https://bugzilla.suse.com/1012829
https://bugzilla.suse.com/1013887
https://bugzilla.suse.com/1016119
https://bugzilla.suse.com/1019695
https://bugzilla.suse.com/1022476
https://bugzilla.suse.com/1022600
https://bugzilla.suse.com/1022604
https://bugzilla.suse.com/1028286
https://bugzilla.suse.com/1030552
https://bugzilla.suse.com/1031717
https://bugzilla.suse.com/1033587
https://bugzilla.suse.com/1036215
https://bugzilla.suse.com/1036632
https://bugzilla.suse.com/1037838
https://bugzilla.suse.com/1039153
https://bugzilla.suse.com/1040347
https://bugzilla.suse.com/1042257
https://bugzilla.suse.com/1042286
https://bugzilla.suse.com/1042422
https://bugzilla.suse.com/1043598
https://bugzilla.suse.com/1044443
https://bugzilla.suse.com/1044623
https://bugzilla.suse.com/1045404
https://bugzilla.suse.com/1045563
https://bugzilla.suse.com/1045922
https://bugzilla.suse.com/1046651
https://bugzilla.suse.com/1046682
https://bugzilla.suse.com/1047121
https://bugzilla.suse.com/1048146
https://bugzilla.suse.com/1048155
https://bugzilla.suse.com/1048348
https://bugzilla.suse.com/1048421
https://bugzilla.suse.com/1048451
https://bugzilla.suse.com/1048501
https://bugzilla.suse.com/1048891
https://bugzilla.suse.com/1048912
https://bugzilla.suse.com/1048914
https://bugzilla.suse.com/1048916
https://bugzilla.suse.com/1048919
https://bugzilla.suse.com/1049231
https://bugzilla.suse.com/1049289
https://bugzilla.suse.com/1049361
https://bugzilla.suse.com/1049483
https://bugzilla.suse.com/1049486
https://bugzilla.suse.com/1049603
https://bugzilla.suse.com/1049619
https://bugzilla.suse.com/1049645
https://bugzilla.suse.com/1049706
https://bugzilla.suse.com/1049882
https://bugzilla.suse.com/1050061
https://bugzilla.suse.com/1050188
https://bugzilla.suse.com/1050320
https://bugzilla.suse.com/1050322
https://bugzilla.suse.com/1051022
https://bugzilla.suse.com/1051048
https://bugzilla.suse.com/1051059
https://bugzilla.suse.com/1051239
https://bugzilla.suse.com/1051471
https://bugzilla.suse.com/1051478
https://bugzilla.suse.com/1051479
https://bugzilla.suse.com/1051663
https://bugzilla.suse.com/964063
https://bugzilla.suse.com/974215


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE-SU-2017:2110-1: important: Security update for the Linux Kernel

openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID: openSUSE-SU-2017:2110-1
Rating: important
References: #1006180 #1011913 #1012829 #1013887 #1022476
#1028173 #1028286 #1029693 #1030552 #1031515
#1031717 #1033587 #1034075 #1034762 #1036303
#1036632 #1037344 #1038078 #1038616 #1039915
#1040307 #1040351 #1041958 #1042286 #1042314
#1042422 #1042778 #1043652 #1044112 #1044636
#1045154 #1045563 #1045922 #1046682 #1046985
#1047048 #1047096 #1047118 #1047121 #1047152
#1047277 #1047343 #1047354 #1047651 #1047653
#1047670 #1048155 #1048221 #1048317 #1048891
#1048914 #1049483 #1049486 #1049603 #1049645
#1049882 #1050061 #1050188 #1051022 #1051059
#1051239 #1051478 #1051479 #1051663 #964063
#974215
Cross-References: CVE-2017-10810 CVE-2017-11473 CVE-2017-7533
CVE-2017-7541 CVE-2017-7542
Affected Products:
openSUSE Leap 42.2
______________________________________________________________________________

An update that solves 5 vulnerabilities and has 61 fixes is
now available.

Description:

The openSUSE Leap 42.2 kernel was updated to 4.4.79 to receive various
security and bugfixes.

The following security bugs were fixed:

– CVE-2017-7542: The ip6_find_1stfragopt function in
net/ipv6/output_core.c in the Linux kernel allowed local users to cause
a denial of service (integer overflow and infinite loop) by leveraging
the ability to open a raw socket (bnc#1049882).
– CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function
in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users
to gain privileges via a crafted ACPI table (bnc#1049603).
– CVE-2017-7533: A bug in inotify code allowed local users to escalate
privilege (bnc#1049483).
– CVE-2017-7541: The brcmf_cfg80211_mgmt_tx function in
drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux
kernel allowed local users to cause a denial of service (buffer overflow
and system crash) or possibly gain privileges via a crafted
NL80211_CMD_FRAME Netlink packet (bnc#1049645).
– CVE-2017-10810: Memory leak in the virtio_gpu_object_create function in
drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel allowed
attackers to cause a denial of service (memory consumption) by
triggering object-initialization failures (bnc#1047277).

The following non-security bugs were fixed:

– acpi / processor: Avoid reserving IO regions too early (bsc#1051478).
– af_key: Add lock to key dump (bsc#1047653).
– af_key: Fix slab-out-of-bounds in pfkey_compile_policy (bsc#1047354).
– alsa: fm801: Initialize chip after IRQ handler is registered
(bsc#1031717).
– alsa: hda – Fix endless loop of codec configure (bsc#1031717).
– alsa: hda – set input_path bitmap to zero after moving it to new place
(bsc#1031717).
– b43: Add missing MODULE_FIRMWARE() (bsc#1037344).
– bcache: force trigger gc (bsc#1038078).
– bcache: only recovery I/O error for writethrough mode (bsc#1043652).
– bdi: Fix use-after-free in wb_congested_put() (bsc#1040307).
– blacklist 2400fd822f46 powerpc/asm: Mark cr0 as clobbered in mftb()
– blacklist.conf:
– blacklist.conf: 1151f838cb62 is high-risk and we’re not aware of any
systems that might need it in SP2.
– blacklist.conf: 8b8642af15ed not a supported driver
– blacklist.conf: 9eeacd3a2f17 not a bug fix (bnc#1050061)
– blacklist.conf: add inapplicable commits for wifi (bsc#1031717)
– blacklist.conf: add unapplicable/cosmetic iwlwifi fixes (bsc#1031717).
– blacklist.conf: add unapplicable drm fixes (bsc#1031717).
– blacklist.conf: Blacklist 4e201566402c (‘genirq/msi: Drop artificial PCI
dependency’) (bsc#1051478) This commit just removes an include and does
not fix a real issue.
– blacklist.conf: blacklist 7b73305160f1, unneeded cleanup
– blacklist.conf: Blacklist aa2369f11ff7 (‘mm/gup.c: fix access_ok()
argument type’) (bsc#1051478) Fixes only a compile-warning.
– blacklist.conf: Blacklist c133c7615751 (‘x86/nmi: Fix timeout test in
test_nmi_ipi()’) It only fixes a self-test (bsc#1051478).
– blacklist.conf: Blacklist c9525a3fab63 (‘x86/watchdog: Fix Kconfig help
text file path reference to lockup watchdog documentation’) Updates only
kconfig help-text (bsc#1051478).
– blacklist.conf: Blacklist e80e7edc55ba (‘PCI/MSI: Initialize MSI
capability for all architectures’) This only fixes machines not
supported by our kernels.
– blacklist.conf: build time cleanup our kernel compiles. No need to shut
up warnings nobody looks at
– blacklist.conf: cleanup, no bugs fixed
– blacklist.conf: cxgb4 commit does not fit for SP2
– blacklist.conf: da0510c47519fe0999cffe316e1d370e29f952be # FRV not
applicable to SLE
– blacklist.conf: Do not need 55d728a40d36, we do it differently in SLE
– blacklist.conf: kABI breakage This touches struct device.
– blacklist.conf: lp8788 is not compiled
– blacklist.conf: unneeded Fixing debug statements on BE systems for IrDA
– blkfront: add uevent for size change (bnc#1036632).
– block: Allow bdi re-registration (bsc#1040307).
– block: Fix front merge check (bsc#1051239).
– block: Make del_gendisk() safer for disks without queues (bsc#1040307).
– block: Move bdi_unregister() to del_gendisk() (bsc#1040307).
– brcmfmac: Fix glom_skb leak in brcmf_sdiod_recv_chain (bsc#1031717).
– btrfs: add cond_resched to btrfs_qgroup_trace_leaf_items (bsc#1028286).
– btrfs: Add WARN_ON for qgroup reserved underflow (bsc#1031515).
– btrfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
– btrfs: fix lockup in find_free_extent with read-only block groups
(bsc#1046682).
– btrfs: incremental send, fix invalid path for link commands
(bsc#1051479).
– btrfs: incremental send, fix invalid path for unlink commands
(bsc#1051479).
– btrfs: resume qgroup rescan on rw remount (bsc#1047152).
– btrfs: send, fix invalid path after renaming and linking file
(bsc#1051479).
– cpuidle: dt: Add missing ‘of_node_put()’ (bnc#1022476).
– crypto: s5p-sss – fix incorrect usage of scatterlists api (bsc#1048317).
– cx82310_eth: use skb_cow_head() to deal with cloned skbs (bsc# 1045154).
– cxl: Unlock on error in probe (bsc#1034762, Pending SUSE Kernel Fixes).
– dentry name snapshots (bsc#1049483).
– dm: fix second blk_delay_queue() parameter to be in msec units not
(bsc#1047670).
– drivers: hv: Fix the bug in generating the guest ID (fate#320485).
– drivers: hv: util: Fix a typo (fate#320485).
– drivers: hv: vmbus: Get the current time from the current clocksource
(fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).
– drivers: hv: vmbus: Increase the time between retries in
vmbus_post_msg() (fate#320485, bnc#1044112).
– drivers: hv: vmbus: Move the code to signal end of message (fate#320485).
– drivers: hv: vmbus: Move the definition of generate_guest_id()
(fate#320485).
– drivers: hv: vmbus: Move the definition of hv_x64_msr_hypercall_contents
(fate#320485).
– drivers: hv: vmbus: Restructure the clockevents code (fate#320485).
– drm/amdgpu: Fix overflow of watermark calcs at > 4k resolutions
(bsc#1031717).
– drm/bochs: Implement nomodeset (bsc#1047096).
– drm/i915/fbdev: Stop repeating tile configuration on stagnation
(bsc#1031717).
– drm/i915: Fix scaler init during CRTC HW state readout (bsc#1031717).
– drm/virtio: do not leak bo on drm_gem_object_init failure (bsc#1047277).
– drm/vmwgfx: Fix large topology crash (bsc#1048155).
– drm/vmwgfx: Support topology greater than texture size (bsc#1048155).
– drop patches; obsoleted by ‘scsi: Add STARGET_CREATE_REMOVE state’
– efi/libstub: Skip GOP with PIXEL_BLT_ONLY format (bnc#974215).
– ext2: Do not clear SGID when inheriting ACLs (bsc#1030552).
– ext4: avoid unnecessary stalls in ext4_evict_inode() (bsc#1049486).
– ext4: Do not clear SGID when inheriting ACLs (bsc#1030552).
– ext4: handle the rest of ext4_mb_load_buddy() ENOMEM errors
(bsc#1012829).
– Fix kABI breakage by KVM CVE fix (bsc#1045922).
– fs/fcntl: f_setown, avoid undefined behaviour (bnc#1006180).
– gcov: add support for gcc version >= 6 (bsc#1051663).
– gcov: support GCC 7.1 (bsc#1051663).
– gfs2: fix flock panic issue (bsc#1012829).
– hrtimer: Catch invalid clockids again (bsc#1047651).
– hrtimer: Revert CLOCK_MONOTONIC_RAW support (bsc#1047651).
– hv_utils: drop .getcrosststamp() support from PTP driver (fate#320485,
bnc#1044112, bnc#1042778, bnc#1029693).
– hv_utils: fix TimeSync work on pre-TimeSync-v4 hosts (fate#320485,
bnc#1044112, bnc#1042778, bnc#1029693).
– hv_util: switch to using timespec64 (fate#320485).
– i2c: designware-baytrail: fix potential null pointer dereference on dev
(bsc#1011913).
– i40e: add hw struct local variable (bsc#1039915).
– i40e: add private flag to control source pruning (bsc#1034075).
– i40e: add VSI info to macaddr messages (bsc#1039915).
– i40e: avoid looping to check whether we’re in VLAN mode (bsc#1039915).
– i40e: avoid O(n^2) loop when deleting all filters (bsc#1039915).
– i40e: delete filter after adding its replacement when converting
(bsc#1039915).
– i40e: do not add broadcast filter for VFs (bsc#1039915).
– i40e: do not allow i40e_vsi_(add|kill)_vlan to operate when VIDactive_filters from hash contents (bsc#1039915).
– i40e: refactor i40e_put_mac_in_vlan to avoid changing f->vlan
(bsc#1039915).
– i40e: refactor i40e_update_filter_state to avoid passing aq_err
(bsc#1039915).
– i40e: refactor Rx filter handling (bsc#1039915).
– i40e: Removal of workaround for simple MAC address filter deletion
(bsc#1039915).
– i40e: remove code to handle dev_addr specially (bsc#1039915).
– i40e: removed unreachable code (bsc#1039915).
– i40e: remove duplicate add/delete adminq command code for filters
(bsc#1039915).
– i40e: remove second check of VLAN_N_VID in i40e_vlan_rx_add_vid
(bsc#1039915).
– i40e: rename i40e_put_mac_in_vlan and i40e_del_mac_all_vlan
(bsc#1039915).
– i40e: restore workaround for removing default MAC filter (bsc#1039915).
– i40e: set broadcast promiscuous mode for each active VLAN (bsc#1039915).
– i40e: store MAC/VLAN filters in a hash with the MAC Address as key
(bsc#1039915).
– i40e: use (add|rm)_vlan_all_mac helper functions when changing PVID
(bsc#1039915).
– i40e: when adding or removing MAC filters, correctly handle VLANs
(bsc#1039915).
– i40e: When searching all MAC/VLAN filters, ignore removed filters
(bsc#1039915).
– i40e: write HENA for VFs (bsc#1039915).
– iio: hid-sensor: fix return of -EINVAL on invalid values in ret or value
(bsc#1031717).
– Input: gpio-keys – fix check for disabling unsupported keys
(bsc#1031717).
– introduce the walk_process_tree() helper (bnc#1022476).
– ipv4: Should use consistent conditional judgement for ip fragment in
__ip_append_data and ip_finish_output (bsc#1041958).
– ipv6: Should use consistent conditional judgement for ip6 fragment
between __ip6_append_data and ip6_finish_output (bsc#1041958).
– iwlwifi: mvm: compare full command ID (FATE#321353, FATE#323335).
– iwlwifi: mvm: reset the fw_dump_desc pointer after ASSERT (bsc#1031717).
– iwlwifi: mvm: synchronize firmware DMA paging memory (FATE#321353,
FATE#323335).
– iwlwifi: mvm: unconditionally stop device after init (bsc#1031717).
– iwlwifi: mvm: unmap the paging memory before freeing it (FATE#321353,
FATE#323335).
– iwlwifi: pcie: fix command completion name debug (bsc#1031717).
– kABI-fix for “x86/panic: replace smp_send_stop() with kdump friendly
version in panic path” (bsc#1051478).
– kABI: protect lwtunnel include in ip6_route.h (kabi).
– kABI: protect struct iscsi_tpg_attrib (kabi).
– kABI: protect struct tpm_chip (kabi).
– kABI: protect struct xfrm_dst (kabi).
– kABI: protect struct xfrm_dst (kabi).
– kvm: nVMX: fix msr bitmaps to prevent L2 from accessing L0 x2APIC
(bsc#1051478).
– kvm: nVMX: Fix nested_vmx_check_msr_bitmap_controls (bsc#1051478).
– kvm: nVMX: Fix nested VPID vmx exec control (bsc#1051478).
– kvm: x86: avoid simultaneous queueing of both IRQ and SMI (bsc#1051478).
– mac80211_hwsim: Replace bogus hrtimer clockid (bsc#1047651).
– md: fix sleep in atomic (bsc#1040351).
– mm: adaptive hash table scaling (bnc#1036303).
– mm-adaptive-hash-table-scaling-v5 (bnc#1036303).
– mm: call page_ext_init() after all struct pages are initialized (VM
Debugging Functionality, bsc#1047048).
– mm: drop HASH_ADAPT (bnc#1036303).
– mm: fix classzone_idx underflow in shrink_zones() (VM Functionality,
bsc#1042314).
– mm: make PR_SET_THP_DISABLE immediately active (bnc#1048891).
– More Git-commit header fixups No functional change intended.
– mwifiex: do not update MCS set from hostapd (bsc#1031717).
– net: account for current skb length when deciding about UFO
(bsc#1041958).
– net: ena: add hardware hints capability to the driver (bsc#1047121).
– net: ena: add missing return when ena_com_get_io_handlers() fails
(bsc#1047121).
– net: ena: add missing unmap bars on device removal (bsc#1047121).
– net: ena: add reset reason for each device FLR (bsc#1047121).
– net: ena: add support for out of order rx buffers refill (bsc#1047121).
– net: ena: allow the driver to work with small number of msix vectors
(bsc#1047121).
– net: ena: bug fix in lost tx packets detection mechanism (bsc#1047121).
– net: ena: change return value for unsupported features unsupported
return value (bsc#1047121).
– net: ena: change sizeof() argument to be the type pointer (bsc#1047121).
– net: ena: disable admin msix while working in polling mode (bsc#1047121).
– net: ena: fix bug that might cause hang after consecutive open/close
interface (bsc#1047121).
– net: ena: fix race condition between submit and completion admin command
(bsc#1047121).
– net: ena: fix rare uncompleted admin command false alarm (bsc#1047121).
– net: ena: fix theoretical Rx hang on low memory systems (bsc#1047121).
– net: ena: separate skb allocation to dedicated function (bsc#1047121).
– net: ena: update driver’s rx drop statistics (bsc#1047121).
– net: ena: update ena driver to version 1.1.7 (bsc#1047121).
– net: ena: update ena driver to version 1.2.0 (bsc#1047121).
– net: ena: use lower_32_bits()/upper_32_bits() to split dma address
(bsc#1047121).
– net: ena: use napi_schedule_irqoff when possible (bsc#1047121).
– net: handle NAPI_GRO_FREE_STOLEN_HEAD case also in napi_frags_finish()
(bsc#1042286).
– net/mlx5: Fix driver load error flow when firmware is stuck (git-fixes).
– net: phy: Do not perform software reset for Generic PHY (bsc#1042286).
– nfs: Cache aggressively when file is open for writing (bsc#1033587).
– nfs: Do not flush caches for a getattr that races with writeback
(bsc#1033587).
– nfs: invalidate file size when taking a lock (git-fixes).
– nfs: only invalidate dentrys that are clearly invalid (bsc#1047118).
– ocfs2: Do not clear SGID when inheriting ACLs (bsc#1030552).
– ocfs2: fix deadlock caused by recursive locking in xattr (bsc#1012829).
– ocfs2: Make ocfs2_set_acl() static (bsc#1030552).
– pci: Add Mellanox device IDs (bsc#1051478).
– pci: Convert Mellanox broken INTx quirks to be for listed devices only
(bsc#1051478).
– pci: Correct PCI_STD_RESOURCE_END usage (bsc#1051478).
– pci: dwc: dra7xx: Use RW1C for IRQSTATUS_MSI and IRQSTATUS_MAIN
(bsc#1051478).
– pci: dwc: Fix uninitialized variable in dw_handle_msi_irq()
(bsc#1051478).
– pci: Enable ECRC only if device supports it (bsc#1051478).
– PCI / PM: Fix native PME handling during system suspend/resume
(bsc#1051478).
– pci: Support INTx masking on ConnectX-4 with firmware x.14.1100+
(bsc#1051478).
– perf/x86: Fix spurious NMI with PEBS Load Latency event (bsc#1051478).
– perf/x86/intel: Cure bogus unwind from PEBS entries (bsc#1051478).
– perf/x86/intel: Fix PEBSv3 record drain (bsc#1051478).
– platform/x86: ideapad-laptop: Add IdeaPad 310-15IKB to no_hw_rfkill
(bsc#1051022).
– platform/x86: ideapad-laptop: Add IdeaPad V310-15ISK to no_hw_rfkill
(bsc#1051022).
– platform/x86: ideapad-laptop: Add IdeaPad V510-15IKB to no_hw_rfkill
(bsc#1051022).
– platform/x86: ideapad-laptop: Add Lenovo Yoga 910-13IKB to no_hw_rfkill
dmi list (bsc#1051022).
– platform/x86: ideapad-laptop: Add several models to no_hw_rfkill
(bsc#1051022).
– platform/x86: ideapad-laptop: Add Y520-15IKBN to no_hw_rfkill
(bsc#1051022).
– platform/x86: ideapad-laptop: Add Y700 15-ACZ to no_hw_rfkill DMI list
(bsc#1051022).
– platform/x86: ideapad-laptop: Add Y720-15IKBN to no_hw_rfkill
(bsc#1051022).
– Pm / Hibernate: Fix scheduling while atomic during hibernation
(bsc#1051059).
– prctl: propagate has_child_subreaper flag to every descendant
(bnc#1022476).
– README.BRANCH: Add Oliver as openSUSE-42.2 branch co-maintainer
– Refresh patches.kabi/Fix-kABI-breakage-by-KVM-CVE-fix.patch. Fix a
stupid bug where the VCPU_REGS_TF shift was used as a mask.
– reiserfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
– Revert “ACPI / video: Add force_native quirk for HP Pavilion dv6”
(bsc#1031717).
– Revert “Add “shutdown” to “struct class”.” (kabi).
– Revert “kvm: x86: fix emulation of RSM and IRET instructions” (kabi).
– Revert “mm/list_lru.c: fix list_lru_count_node() to be race free” (kabi).
– Revert “powerpc/numa: Fix percpu allocations to be NUMA aware”
(bsc#1048914).
– Revert “tpm: Issue a TPM2_Shutdown for TPM2 devices.” (kabi).
– rpm/kernel-binary.spec.in: find-debuginfo.sh should not touch build-id
This needs rpm-4.14+ (bsc#964063).
– sched/core: Allow __sched_setscheduler() in interrupts when PI is not
used (bnc#1022476).
– sched/debug: Print the scheduler topology group mask (bnc#1022476).
– sched/fair, cpumask: Export for_each_cpu_wrap() (bnc#1022476).
– sched/fair: Fix O(nr_cgroups) in load balance path (bnc#1022476).
– sched/fair: Use task_groups instead of leaf_cfs_rq_list to walk all
cfs_rqs (bnc#1022476).
– sched/topology: Add sched_group_capacity debugging (bnc#1022476).
– sched/topology: Fix building of overlapping sched-groups (bnc#1022476).
– sched/topology: Fix overlapping sched_group_capacity (bnc#1022476).
– sched/topology: Move comment about asymmetric node setups (bnc#1022476).
– sched/topology: Refactor function build_overlap_sched_groups()
(bnc#1022476).
– sched/topology: Remove FORCE_SD_OVERLAP (bnc#1022476).
– sched/topology: Simplify build_overlap_sched_groups() (bnc#1022476).
– sched/topology: Small cleanup (bnc#1022476).
– sched/topology: Verify the first group matches the child domain
(bnc#1022476).
– scsi: Add STARGET_CREATE_REMOVE state to scsi_target_state (bsc#1013887).
– scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).
– scsi: kABI fix for new state STARGET_CREATED_REMOVE (bsc#1013887).
– scsi: storvsc: Workaround for virtual DVD SCSI version (fate#320485,
bnc#1044636).
– smsc75xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
– sr9700: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
– sysctl: do not print negative flag for proc_douintvec (bnc#1046985).
– timers: Plug locking race vs. timer migration (bnc#1022476).
– udf: Fix deadlock between writeback and udf_setsize() (bsc#1012829).
– udf: Fix races with i_size changes during readpage (bsc#1012829).
– x86/LDT: Print the real LDT base address (bsc#1051478).
– x86/mce: Make timer handling more robust (bsc#1042422).
– x86/panic: replace smp_send_stop() with kdump friendly version in panic
path (bsc#1051478).
– xen: allocate page for shared info page from low memory (bnc#1038616).
– xen/balloon: do not online new memory initially (bnc#1028173).
– xen: hold lock_device_hotplug throughout vcpu hotplug operations
(bsc#1042422).
– xen-netfront: Rework the fix for Rx stall during OOM and network stress
(git-fixes).
– xen/pvh*: Support > 32 VCPUs at domain restore (bnc#1045563).
– xfrm: NULL dereference on allocation failure (bsc#1047343).
– xfrm: Oops on error in pfkey_msg2xfrm_state() (bsc#1047653).
– xfs: do not BUG() on mixed direct and mapped I/O (bsc#1050188).
– xfs: Do not clear SGID when inheriting ACLs (bsc#1030552).

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE Leap 42.2:

zypper in -t patch openSUSE-2017-891=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE Leap 42.2 (x86_64):

kernel-debug-4.4.79-18.23.1
kernel-debug-base-4.4.79-18.23.1
kernel-debug-base-debuginfo-4.4.79-18.23.1
kernel-debug-debuginfo-4.4.79-18.23.1
kernel-debug-debugsource-4.4.79-18.23.1
kernel-debug-devel-4.4.79-18.23.1
kernel-debug-devel-debuginfo-4.4.79-18.23.1
kernel-default-4.4.79-18.23.1
kernel-default-base-4.4.79-18.23.1
kernel-default-base-debuginfo-4.4.79-18.23.1
kernel-default-debuginfo-4.4.79-18.23.1
kernel-default-debugsource-4.4.79-18.23.1
kernel-default-devel-4.4.79-18.23.1
kernel-obs-build-4.4.79-18.23.1
kernel-obs-build-debugsource-4.4.79-18.23.1
kernel-obs-qa-4.4.79-18.23.1
kernel-syms-4.4.79-18.23.1
kernel-vanilla-4.4.79-18.23.1
kernel-vanilla-base-4.4.79-18.23.1
kernel-vanilla-base-debuginfo-4.4.79-18.23.1
kernel-vanilla-debuginfo-4.4.79-18.23.1
kernel-vanilla-debugsource-4.4.79-18.23.1
kernel-vanilla-devel-4.4.79-18.23.1

– openSUSE Leap 42.2 (noarch):

kernel-devel-4.4.79-18.23.1
kernel-docs-4.4.79-18.23.2
kernel-docs-html-4.4.79-18.23.2
kernel-docs-pdf-4.4.79-18.23.2
kernel-macros-4.4.79-18.23.1
kernel-source-4.4.79-18.23.1
kernel-source-vanilla-4.4.79-18.23.1

References:

https://www.suse.com/security/cve/CVE-2017-10810.html
https://www.suse.com/security/cve/CVE-2017-11473.html
https://www.suse.com/security/cve/CVE-2017-7533.html
https://www.suse.com/security/cve/CVE-2017-7541.html
https://www.suse.com/security/cve/CVE-2017-7542.html
https://bugzilla.suse.com/1006180
https://bugzilla.suse.com/1011913
https://bugzilla.suse.com/1012829
https://bugzilla.suse.com/1013887
https://bugzilla.suse.com/1022476
https://bugzilla.suse.com/1028173
https://bugzilla.suse.com/1028286
https://bugzilla.suse.com/1029693
https://bugzilla.suse.com/1030552
https://bugzilla.suse.com/1031515
https://bugzilla.suse.com/1031717
https://bugzilla.suse.com/1033587
https://bugzilla.suse.com/1034075
https://bugzilla.suse.com/1034762
https://bugzilla.suse.com/1036303
https://bugzilla.suse.com/1036632
https://bugzilla.suse.com/1037344
https://bugzilla.suse.com/1038078
https://bugzilla.suse.com/1038616
https://bugzilla.suse.com/1039915
https://bugzilla.suse.com/1040307
https://bugzilla.suse.com/1040351
https://bugzilla.suse.com/1041958
https://bugzilla.suse.com/1042286
https://bugzilla.suse.com/1042314
https://bugzilla.suse.com/1042422
https://bugzilla.suse.com/1042778
https://bugzilla.suse.com/1043652
https://bugzilla.suse.com/1044112
https://bugzilla.suse.com/1044636
https://bugzilla.suse.com/1045154
https://bugzilla.suse.com/1045563
https://bugzilla.suse.com/1045922
https://bugzilla.suse.com/1046682
https://bugzilla.suse.com/1046985
https://bugzilla.suse.com/1047048
https://bugzilla.suse.com/1047096
https://bugzilla.suse.com/1047118
https://bugzilla.suse.com/1047121
https://bugzilla.suse.com/1047152
https://bugzilla.suse.com/1047277
https://bugzilla.suse.com/1047343
https://bugzilla.suse.com/1047354
https://bugzilla.suse.com/1047651
https://bugzilla.suse.com/1047653
https://bugzilla.suse.com/1047670
https://bugzilla.suse.com/1048155
https://bugzilla.suse.com/1048221
https://bugzilla.suse.com/1048317
https://bugzilla.suse.com/1048891
https://bugzilla.suse.com/1048914
https://bugzilla.suse.com/1049483
https://bugzilla.suse.com/1049486
https://bugzilla.suse.com/1049603
https://bugzilla.suse.com/1049645
https://bugzilla.suse.com/1049882
https://bugzilla.suse.com/1050061
https://bugzilla.suse.com/1050188
https://bugzilla.suse.com/1051022
https://bugzilla.suse.com/1051059
https://bugzilla.suse.com/1051239
https://bugzilla.suse.com/1051478
https://bugzilla.suse.com/1051479
https://bugzilla.suse.com/1051663
https://bugzilla.suse.com/964063
https://bugzilla.suse.com/974215


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2109-1: important: Security update for tcmu-runner

SUSE Security Update: Security update for tcmu-runner
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2109-1
Rating: important
References: #1049485 #1049488 #1049489 #1049490 #1049491

Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Server 12-SP3
______________________________________________________________________________

An update that contains security fixes can now be installed.

Description:

This update for tcmu-runner fixes the following issues:

– qcow handler opens up an information leak via the CheckConfig D-Bus
method (bsc#1049491)
– glfs handler allows local DoS via crafted CheckConfig strings
(bsc#1049485)
– UnregisterHandler dbus method in tcmu-runner daemon for non-existing
handler causes denial of service (bsc#1049488)
– UnregisterHandler D-Bus method in tcmu-runner daemon for internal
handler causes denial of service (bsc#1049489)
– Memory leaks can be triggered in tcmu-runner daemon by calling D-Bus
method for (Un)RegisterHandler (bsc#1049490)

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Software Development Kit 12-SP3:

zypper in -t patch SUSE-SLE-SDK-12-SP3-2017-1311=1

– SUSE Linux Enterprise Server 12-SP3:

zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1311=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):

tcmu-runner-debuginfo-1.2.0-2.3.1
tcmu-runner-debugsource-1.2.0-2.3.1
tcmu-runner-devel-1.2.0-2.3.1

– SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

libtcmu1-1.2.0-2.3.1
libtcmu1-debuginfo-1.2.0-2.3.1
tcmu-runner-1.2.0-2.3.1
tcmu-runner-debuginfo-1.2.0-2.3.1
tcmu-runner-debugsource-1.2.0-2.3.1

References:

https://bugzilla.suse.com/1049485
https://bugzilla.suse.com/1049488
https://bugzilla.suse.com/1049489
https://bugzilla.suse.com/1049490
https://bugzilla.suse.com/1049491


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2102-1: important: Security update for Linux Kernel Live Patch 22 for SLE 12

SUSE Security Update: Security update for Linux Kernel Live Patch 22 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2102-1
Rating: important
References: #1042892 #1046191 #1050751
Cross-References: CVE-2017-7533 CVE-2017-7645 CVE-2017-9242

Affected Products:
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_77 fixes several issues.

The following security bugs were fixed:

– CVE-2017-7533: A bug in inotify code allowed local users to escalate
privilege (bsc#1050751).
– CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux
kernel allowed remote attackers to cause a denial of service (system
crash) via a long RPC reply, related to net/sunrpc/svc.c,
fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
– CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c
in the Linux kernel is too late in checking whether an overwrite of an
skb data structure may occur, which allowed local users to cause a
denial of service (system crash) via crafted system calls (bsc#1042892).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12:

zypper in -t patch SUSE-SLE-SAP-12-2017-1301=1

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1301=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12 (x86_64):

kgraft-patch-3_12_61-52_77-default-3-2.1
kgraft-patch-3_12_61-52_77-xen-3-2.1

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_77-default-3-2.1
kgraft-patch-3_12_61-52_77-xen-3-2.1

References:

https://www.suse.com/security/cve/CVE-2017-7533.html
https://www.suse.com/security/cve/CVE-2017-7645.html
https://www.suse.com/security/cve/CVE-2017-9242.html
https://bugzilla.suse.com/1042892
https://bugzilla.suse.com/1046191
https://bugzilla.suse.com/1050751


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2099-1: important: Security update for Linux Kernel Live Patch 16 for SLE 12

SUSE Security Update: Security update for Linux Kernel Live Patch 16 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2099-1
Rating: important
References: #1027575 #1042892 #1046191 #1050751
Cross-References: CVE-2017-2636 CVE-2017-7533 CVE-2017-7645
CVE-2017-9242
Affected Products:
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.60-52_57 fixes several issues.

The following security bugs were fixed:

– CVE-2017-7533: A bug in inotify code allowed local users to escalate
privilege (bsc#1050751).
– CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux
kernel allowed remote attackers to cause a denial of service (system
crash) via a long RPC reply, related to net/sunrpc/svc.c,
fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
– CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux
kernel allowed local users to gain privileges or cause a denial of
service (double free) by setting the HDLC line discipline (bsc#1027575).
– CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c
in the Linux kernel is too late in checking whether an overwrite of an
skb data structure may occur, which allowed local users to cause a
denial of service (system crash) via crafted system calls (bsc#1042892).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12:

zypper in -t patch SUSE-SLE-SAP-12-2017-1304=1

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1304=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12 (x86_64):

kgraft-patch-3_12_60-52_57-default-8-2.1
kgraft-patch-3_12_60-52_57-xen-8-2.1

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_60-52_57-default-8-2.1
kgraft-patch-3_12_60-52_57-xen-8-2.1

References:

https://www.suse.com/security/cve/CVE-2017-2636.html
https://www.suse.com/security/cve/CVE-2017-7533.html
https://www.suse.com/security/cve/CVE-2017-7645.html
https://www.suse.com/security/cve/CVE-2017-9242.html
https://bugzilla.suse.com/1027575
https://bugzilla.suse.com/1042892
https://bugzilla.suse.com/1046191
https://bugzilla.suse.com/1050751


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2098-1: important: Security update for Linux Kernel Live Patch 23 for SLE 12

SUSE Security Update: Security update for Linux Kernel Live Patch 23 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2098-1
Rating: important
References: #1042892 #1046191 #1050751
Cross-References: CVE-2017-7533 CVE-2017-7645 CVE-2017-9242

Affected Products:
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_80 fixes several issues.

The following security bugs were fixed:

– CVE-2017-7533: A bug in inotify code allowed local users to escalate
privilege (bsc#1050751).
– CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux
kernel allowed remote attackers to cause a denial of service (system
crash) via a long RPC reply, related to net/sunrpc/svc.c,
fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
– CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c
in the Linux kernel is too late in checking whether an overwrite of an
skb data structure may occur, which allowed local users to cause a
denial of service (system crash) via crafted system calls (bsc#1042892).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12:

zypper in -t patch SUSE-SLE-SAP-12-2017-1300=1

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1300=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12 (x86_64):

kgraft-patch-3_12_61-52_80-default-2-2.1
kgraft-patch-3_12_61-52_80-xen-2-2.1

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_80-default-2-2.1
kgraft-patch-3_12_61-52_80-xen-2-2.1

References:

https://www.suse.com/security/cve/CVE-2017-7533.html
https://www.suse.com/security/cve/CVE-2017-7645.html
https://www.suse.com/security/cve/CVE-2017-9242.html
https://bugzilla.suse.com/1042892
https://bugzilla.suse.com/1046191
https://bugzilla.suse.com/1050751


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2103-1: important: Security update for Linux Kernel Live Patch 20 for SLE 12

SUSE Security Update: Security update for Linux Kernel Live Patch 20 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2103-1
Rating: important
References: #1042892 #1044878 #1046191 #1050751
Cross-References: CVE-2017-7533 CVE-2017-7645 CVE-2017-9242

Affected Products:
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that solves three vulnerabilities and has one
errata is now available.

Description:

This update for the Linux Kernel 3.12.61-52_69 fixes several issues.

The following security bugs were fixed:

– CVE-2017-7533: A bug in inotify code allowed local users to escalate
privilege (bsc#1050751).
– CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux
kernel allowed remote attackers to cause a denial of service (system
crash) via a long RPC reply, related to net/sunrpc/svc.c,
fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
– A SUSE Linux Enterprise specific regression in tearing down network
namespaces was fixed (bsc#1044878)
– CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c
in the Linux kernel is too late in checking whether an overwrite of an
skb data structure may occur, which allowed local users to cause a
denial of service (system crash) via crafted system calls (bsc#1042892).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12:

zypper in -t patch SUSE-SLE-SAP-12-2017-1303=1

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1303=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12 (x86_64):

kgraft-patch-3_12_61-52_69-default-4-2.1
kgraft-patch-3_12_61-52_69-xen-4-2.1

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_69-default-4-2.1
kgraft-patch-3_12_61-52_69-xen-4-2.1

References:

https://www.suse.com/security/cve/CVE-2017-7533.html
https://www.suse.com/security/cve/CVE-2017-7645.html
https://www.suse.com/security/cve/CVE-2017-9242.html
https://bugzilla.suse.com/1042892
https://bugzilla.suse.com/1044878
https://bugzilla.suse.com/1046191
https://bugzilla.suse.com/1050751


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2095-1: important: Security update for Linux Kernel Live Patch 18 for SLE 12

SUSE Security Update: Security update for Linux Kernel Live Patch 18 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2095-1
Rating: important
References: #1027575 #1042892 #1046191 #1050751
Cross-References: CVE-2017-2636 CVE-2017-7533 CVE-2017-7645
CVE-2017-9242
Affected Products:
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.60-52_63 fixes several issues.

The following security bugs were fixed:

– CVE-2017-7533: A bug in inotify code allowed local users to escalate
privilege (bsc#1050751).
– CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux
kernel allowed remote attackers to cause a denial of service (system
crash) via a long RPC reply, related to net/sunrpc/svc.c,
fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
– CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux
kernel allowed local users to gain privileges or cause a denial of
service (double free) by setting the HDLC line discipline (bsc#1027575).
– CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c
in the Linux kernel is too late in checking whether an overwrite of an
skb data structure may occur, which allowed local users to cause a
denial of service (system crash) via crafted system calls (bsc#1042892).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12:

zypper in -t patch SUSE-SLE-SAP-12-2017-1297=1

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1297=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12 (x86_64):

kgraft-patch-3_12_60-52_63-default-7-2.1
kgraft-patch-3_12_60-52_63-xen-7-2.1

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_60-52_63-default-7-2.1
kgraft-patch-3_12_60-52_63-xen-7-2.1

References:

https://www.suse.com/security/cve/CVE-2017-2636.html
https://www.suse.com/security/cve/CVE-2017-7533.html
https://www.suse.com/security/cve/CVE-2017-7645.html
https://www.suse.com/security/cve/CVE-2017-9242.html
https://bugzilla.suse.com/1027575
https://bugzilla.suse.com/1042892
https://bugzilla.suse.com/1046191
https://bugzilla.suse.com/1050751


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2096-1: important: Security update for Linux Kernel Live Patch 19 for SLE 12

SUSE Security Update: Security update for Linux Kernel Live Patch 19 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2096-1
Rating: important
References: #1027575 #1042892 #1044878 #1046191 #1050751

Cross-References: CVE-2017-2636 CVE-2017-7533 CVE-2017-7645
CVE-2017-9242
Affected Products:
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

Continue reading “SUSE-SU-2017:2096-1: important: Security update for Linux Kernel Live Patch 19 for SLE 12”

SUSE-SU-2017:2090-1: important: Security update for Linux Kernel Live Patch 16 for SLE 12 SP1

SUSE Security Update: Security update for Linux Kernel Live Patch 16 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2090-1
Rating: important
References: #1038564 #1042892 #1050751
Cross-References: CVE-2017-7533 CVE-2017-8890 CVE-2017-9242

Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

Continue reading “SUSE-SU-2017:2090-1: important: Security update for Linux Kernel Live Patch 16 for SLE 12 SP1”

SUSE-SU-2017:2094-1: important: Security update for Linux Kernel Live Patch 15 for SLE 12 SP1

SUSE Security Update: Security update for Linux Kernel Live Patch 15 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2094-1
Rating: important
References: #1038564 #1042892 #1044878 #1050751
Cross-References: CVE-2017-7533 CVE-2017-8890 CVE-2017-9242

Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

Continue reading “SUSE-SU-2017:2094-1: important: Security update for Linux Kernel Live Patch 15 for SLE 12 SP1”

SUSE-SU-2017:2089-1: important: Security update for Linux Kernel Live Patch 17 for SLE 12 SP1

SUSE Security Update: Security update for Linux Kernel Live Patch 17 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2089-1
Rating: important
References: #1038564 #1042892 #1050751
Cross-References: CVE-2017-7533 CVE-2017-8890 CVE-2017-9242

Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

Continue reading “SUSE-SU-2017:2089-1: important: Security update for Linux Kernel Live Patch 17 for SLE 12 SP1”

SUSE-SU-2017:2093-1: important: Security update for Linux Kernel Live Patch 17 for SLE 12

SUSE Security Update: Security update for Linux Kernel Live Patch 17 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2093-1
Rating: important
References: #1027575 #1042892 #1046191 #1050751
Cross-References: CVE-2017-2636 CVE-2017-7533 CVE-2017-7645
CVE-2017-9242
Affected Products:
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

Continue reading “SUSE-SU-2017:2093-1: important: Security update for Linux Kernel Live Patch 17 for SLE 12”

SUSE-SU-2017:2088-1: important: Security update for Linux Kernel Live Patch 8 for SLE 12 SP1

SUSE Security Update: Security update for Linux Kernel Live Patch 8 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2088-1
Rating: important
References: #1027575 #1038564 #1042892 #1046191 #1050751

Cross-References: CVE-2017-2636 CVE-2017-7533 CVE-2017-7645
CVE-2017-8890 CVE-2017-9242
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes 5 vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.62-60_64_8 fixes several issues.

The following security bugs were fixed:

– CVE-2017-7533: A bug in inotify code allowed local users to escalate
privilege (bsc#1050751).
– CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux
kernel allowed remote attackers to cause a denial of service (system
crash) via a long RPC reply, related to net/sunrpc/svc.c,
fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
– CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux
kernel allowed local users to gain privileges or cause a denial of
service (double free) by setting the HDLC line discipline (bsc#1027575).
– CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c
in the Linux kernel is too late in checking whether an overwrite of an
skb data structure may occur, which allowed local users to cause a
denial of service (system crash) via crafted system calls (bsc#1042892).
– CVE-2017-8890: The inet_csk_clone_lock function in
net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to
cause a denial of service (double free) or possibly have unspecified
other impact by leveraging use of the accept system call (bsc#1038564).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1295=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1295=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_62-60_64_8-default-10-2.1
kgraft-patch-3_12_62-60_64_8-xen-10-2.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_62-60_64_8-default-10-2.1
kgraft-patch-3_12_62-60_64_8-xen-10-2.1

References:

https://www.suse.com/security/cve/CVE-2017-2636.html
https://www.suse.com/security/cve/CVE-2017-7533.html
https://www.suse.com/security/cve/CVE-2017-7645.html
https://www.suse.com/security/cve/CVE-2017-8890.html
https://www.suse.com/security/cve/CVE-2017-9242.html
https://bugzilla.suse.com/1027575
https://bugzilla.suse.com/1038564
https://bugzilla.suse.com/1042892
https://bugzilla.suse.com/1046191
https://bugzilla.suse.com/1050751


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2092-1: important: Security update for Linux Kernel Live Patch 13 for SLE 12 SP1

SUSE Security Update: Security update for Linux Kernel Live Patch 13 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2092-1
Rating: important
References: #1027575 #1038564 #1042892 #1046191 #1050751

Cross-References: CVE-2017-2636 CVE-2017-7533 CVE-2017-7645
CVE-2017-8890 CVE-2017-9242
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes 5 vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.69-60_64_32 fixes several issues.

The following security bugs were fixed:

– CVE-2017-7533: A bug in inotify code allowed local users to escalate
privilege (bsc#1050751).
– CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux
kernel allowed remote attackers to cause a denial of service (system
crash) via a long RPC reply, related to net/sunrpc/svc.c,
fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
– CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux
kernel allowed local users to gain privileges or cause a denial of
service (double free) by setting the HDLC line discipline (bsc#1027575).
– CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c
in the Linux kernel is too late in checking whether an overwrite of an
skb data structure may occur, which allowed local users to cause a
denial of service (system crash) via crafted system calls (bsc#1042892).
– CVE-2017-8890: The inet_csk_clone_lock function in
net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to
cause a denial of service (double free) or possibly have unspecified
other impact by leveraging use of the accept system call (bsc#1038564).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1293=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1293=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_69-60_64_32-default-5-2.1
kgraft-patch-3_12_69-60_64_32-xen-5-2.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_69-60_64_32-default-5-2.1
kgraft-patch-3_12_69-60_64_32-xen-5-2.1

References:

https://www.suse.com/security/cve/CVE-2017-2636.html
https://www.suse.com/security/cve/CVE-2017-7533.html
https://www.suse.com/security/cve/CVE-2017-7645.html
https://www.suse.com/security/cve/CVE-2017-8890.html
https://www.suse.com/security/cve/CVE-2017-9242.html
https://bugzilla.suse.com/1027575
https://bugzilla.suse.com/1038564
https://bugzilla.suse.com/1042892
https://bugzilla.suse.com/1046191
https://bugzilla.suse.com/1050751


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2091-1: important: Security update for Linux Kernel Live Patch 14 for SLE 12 SP1

SUSE Security Update: Security update for Linux Kernel Live Patch 14 for SLE 12 SP1
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2091-1
Rating: important
References: #1038564 #1042892 #1046191 #1050751
Cross-References: CVE-2017-7533 CVE-2017-7645 CVE-2017-8890
CVE-2017-9242
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.69-60_64_35 fixes several issues.

The following security bugs were fixed:

– CVE-2017-7533: A bug in inotify code allowed local users to escalate
privilege (bsc#1050751).
– CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux
kernel allowed remote attackers to cause a denial of service (system
crash) via a long RPC reply, related to net/sunrpc/svc.c,
fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
– CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c
in the Linux kernel is too late in checking whether an overwrite of an
skb data structure may occur, which allowed local users to cause a
denial of service (system crash) via crafted system calls (bsc#1042892).
– CVE-2017-8890: The inet_csk_clone_lock function in
net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to
cause a denial of service (double free) or possibly have unspecified
other impact by leveraging use of the accept system call (bsc#1038564).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1294=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1294=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

kgraft-patch-3_12_69-60_64_35-default-4-2.1
kgraft-patch-3_12_69-60_64_35-xen-4-2.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

kgraft-patch-3_12_69-60_64_35-default-4-2.1
kgraft-patch-3_12_69-60_64_35-xen-4-2.1

References:

https://www.suse.com/security/cve/CVE-2017-7533.html
https://www.suse.com/security/cve/CVE-2017-7645.html
https://www.suse.com/security/cve/CVE-2017-8890.html
https://www.suse.com/security/cve/CVE-2017-9242.html
https://bugzilla.suse.com/1038564
https://bugzilla.suse.com/1042892
https://bugzilla.suse.com/1046191
https://bugzilla.suse.com/1050751


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org