SUSE-SU-2017:2769-1: important: Security update for Linux Kernel Live Patch 20 for SLE 12

SUSE Security Update: Security update for Linux Kernel Live Patch 20 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2769-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_69 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1714=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_69-default-6-4.1
kgraft-patch-3_12_61-52_69-xen-6-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2770-1: important: Security update for Linux Kernel Live Patch 23 for SLE 12

SUSE Security Update: Security update for Linux Kernel Live Patch 23 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2770-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_80 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1712=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_80-default-4-4.1
kgraft-patch-3_12_61-52_80-xen-4-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2774-1: important: Security update for Linux Kernel Live Patch 25 for SLE 12

SUSE Security Update: Security update for Linux Kernel Live Patch 25 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2774-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_86 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1711=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_86-default-3-4.1
kgraft-patch-3_12_61-52_86-xen-3-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2772-1: important: Security update for Linux Kernel Live Patch 22 for SLE 12

SUSE Security Update: Security update for Linux Kernel Live Patch 22 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2772-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_77 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1713=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_77-default-5-4.1
kgraft-patch-3_12_61-52_77-xen-5-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2771-1: important: Security update for Linux Kernel Live Patch 19 for SLE 12

SUSE Security Update: Security update for Linux Kernel Live Patch 19 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2771-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_66 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1715=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_66-default-8-4.1
kgraft-patch-3_12_61-52_66-xen-8-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2773-1: important: Security update for Linux Kernel Live Patch 26 for SLE 12

SUSE Security Update: Security update for Linux Kernel Live Patch 26 for SLE 12
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2773-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 3.12.61-52_89 fixes one issue.

The following security bugs were fixed:

– CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
– CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1710=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 12-LTSS (x86_64):

kgraft-patch-3_12_61-52_89-default-3-4.1
kgraft-patch-3_12_61-52_89-xen-3-4.1

References:

https://www.suse.com/security/cve/CVE-2017-1000251.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1057950


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

FreeBSD Security Advisory FreeBSD-SA-17:07.wpa [REVISED]

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

=============================================================================
FreeBSD-SA-17:07.wpa Security Advisory
The FreeBSD Project

Topic: WPA2 protocol vulnerability

Category: contrib
Module: wpa
Announced: 2017-10-16
Credits: Mathy Vanhoef
Affects: All supported versions of FreeBSD.
Corrected: 2017-10-17 17:30:18 UTC (stable/11, 11.1-STABLE)
2017-10-17 17:57:18 UTC (releng/11.1, 11.1-RELEASE-p2)
2017-10-17 17:56:03 UTC (releng/11.0, 11.0-RELEASE-p13)
2017-10-19 03:18:22 UTC (stable/10, 10.4-STABLE)
2017-10-19 03:20:17 UTC (releng/10.4, 10.4-RELEASE-p1)
2017-10-19 03:19:42 UTC (releng/10.3, 10.3-RELEASE-p22)
CVE Name: CVE-2017-13077, CVE-2017-13078, CVE-2017-13079,
CVE-2017-13080, CVE-2017-13081, CVE-2017-13082,
CVE-2017-13086, CVE-2017-13087, CVE-2017-13088

For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit .

0. Revision history

v1.0 2017-10-17 Initial release.
v1.1 2017-10-19 Add patches for 10.x releases.

I. Background

Wi-Fi Protected Access II (WPA2) is a security protocol developed by the
Wi-Fi Alliance to secure wireless computer networks.

hostapd and wpa_supplicant are implementations of user space daemon for
access points and wireless client that implements the WPA2 protocol.

II. Problem Description

A vulnerability was found in how a number of implementations can be
triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by
replaying a specific frame that is used to manage the keys.

III. Impact

Such reinstallation of the encryption key can result in two different
types of vulnerabilities: disabling replay protection and significantly
reducing the security of encryption to the point of allowing frames to
be decrypted or some parts of the keys to be determined by an attacker
depending on which cipher is used.

IV. Workaround

An updated version of wpa_supplicant is available in the FreeBSD Ports
Collection. Install version 2.6_2 or later of the
security/wpa_supplicant port/pkg. Once installed, update /etc/rc.conf
to use the new binary:

wpa_supplicant_program=”/usr/local/sbin/wpa_supplicant”

and restart networking.

An updated version of hostapd is available in the FreeBSD Ports
Collection. Install version 2.6_1 or later of the net/hostapd port/pkg.
Once installed, update /etc/rc.conf to use the new binary:

hostapd_program=”/usr/local/sbin/hostapd”

and restart hostapd.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date.

Restart the Wi-Fi network interfaces/hostapd or reboot the system.

2) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64
platforms can be updated via the freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install

Restart the Wi-Fi network interfaces/hostapd or reboot the system.

3) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

[FreeBSD 11.0-RELEASE, 11.1-RELEASE, and 11-STABLE]
# fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-11.patch
# fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-11.patch.asc
# gpg –verify wpa-11.patch.asc

[FreeBSD 10.3-RELEASE, 10.4-RELEASE, and 10-STABLE]
# fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-10.patch
# fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-10.patch.asc
# gpg –verify wpa-10.patch.asc

b) Apply the patch. Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as
described in .

Restart the applicable daemons, or reboot the system.

VI. Correction details

The following list contains the correction revision numbers for each
affected branch.

Branch/path Revision
– ————————————————————————-
stable/11/ r324697
releng/11.0/ r324698
releng/11.1/ r324699
stable/10/ r324739
releng/10.3/ r324740
releng/10.4/ r324741
– ————————————————————————-

To see which files were modified by a particular revision, run the
following command, replacing NNNNNN with the revision number, on a
machine with Subversion installed:

# svn diff -cNNNNNN –summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

VII. References

The latest revision of this advisory is available at

—–BEGIN PGP SIGNATURE—–
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=h/5q
—–END PGP SIGNATURE—–
_______________________________________________
freebsd-security-notifications@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-security-notifications
To unsubscribe, send any mail to “freebsd-security-notifications-unsubscribe@freebsd.org”

openSUSE-SU-2017:2757-1: important: Security update for git

openSUSE Security Update: Security update for git
______________________________________________________________________________

Announcement ID: openSUSE-SU-2017:2757-1
Rating: important
References: #1061041
Cross-References: CVE-2017-14867
Affected Products:
openSUSE Leap 42.2
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for git fixes the following issues:

This security issue was fixed:

– CVE-2017-14867: Git used unsafe Perl scripts to support subcommands such
as cvsserver, which allowed attackers to execute arbitrary OS commands
via shell metacharacters in a module name (bsc#1061041).

This update was imported from the SUSE:SLE-12:Update update project.

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE Leap 42.2:

zypper in -t patch openSUSE-2017-1167=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE Leap 42.2 (noarch):

git-doc-2.12.3-5.14.1

– openSUSE Leap 42.2 (x86_64):

git-2.12.3-5.14.1
git-arch-2.12.3-5.14.1
git-core-2.12.3-5.14.1
git-core-debuginfo-2.12.3-5.14.1
git-credential-gnome-keyring-2.12.3-5.14.1
git-credential-gnome-keyring-debuginfo-2.12.3-5.14.1
git-cvs-2.12.3-5.14.1
git-daemon-2.12.3-5.14.1
git-daemon-debuginfo-2.12.3-5.14.1
git-debugsource-2.12.3-5.14.1
git-email-2.12.3-5.14.1
git-gui-2.12.3-5.14.1
git-svn-2.12.3-5.14.1
git-svn-debuginfo-2.12.3-5.14.1
git-web-2.12.3-5.14.1
gitk-2.12.3-5.14.1

References:

https://www.suse.com/security/cve/CVE-2017-14867.html
https://bugzilla.suse.com/1061041


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

CESA-2017:2911 Important CentOS 6 wpa_supplicant Security Update

CentOS Errata and Security Advisory 2017:2911 Important

Upstream details at : https://access.redhat.com/errata/RHSA-2017:2911

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
1c4e471af89b650f2dd8b47db7a09af8a04368b0ed6532125ca37a7e55220193 wpa_supplicant-0.7.3-9.el6_9.2.i686.rpm

x86_64:
0644c3f6c879b7224014c2576384981597aec268b3c8abef3b616c2f05874117 wpa_supplicant-0.7.3-9.el6_9.2.x86_64.rpm

Source:
c74efa3ad9af3b9eb39e505e9a62dc2423791b27f988a3db9ab1057f1d499ef4 wpa_supplicant-0.7.3-9.el6_9.2.src.rpm


Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

openSUSE-SU-2017:2755-1: important: Security update for wpa_supplicant

openSUSE Security Update: Security update for wpa_supplicant
______________________________________________________________________________

Announcement ID: openSUSE-SU-2017:2755-1
Rating: important
References: #1056061
Cross-References: CVE-2017-13078 CVE-2017-13079 CVE-2017-13080
CVE-2017-13081 CVE-2017-13087 CVE-2017-13088

Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________

An update that fixes 6 vulnerabilities is now available.

Description:

This update for wpa_supplicant fixes the security issues:

– Several vulnerabilities in standard conforming implementations of the
WPA2 protocol have been discovered and published under the code name
KRACK. This update remedies those issues in a backwards compatible
manner, i.e. the updated wpa_supplicant can interface properly with both
vulnerable and patched implementations of WPA2, but an attacker won’t be
able to exploit the KRACK weaknesses in those connections anymore even
if the other party is still vulnerable. [bsc#1056061, CVE-2017-13078,
CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13087,
CVE-2017-13088]

This update was imported from the SUSE:SLE-12:Update update project.

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE Leap 42.3:

zypper in -t patch openSUSE-2017-1163=1

– openSUSE Leap 42.2:

zypper in -t patch openSUSE-2017-1163=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE Leap 42.3 (i586 x86_64):

wpa_supplicant-2.2-13.1
wpa_supplicant-debuginfo-2.2-13.1
wpa_supplicant-debugsource-2.2-13.1
wpa_supplicant-gui-2.2-13.1
wpa_supplicant-gui-debuginfo-2.2-13.1

– openSUSE Leap 42.2 (i586 x86_64):

wpa_supplicant-2.2-9.3.1
wpa_supplicant-debuginfo-2.2-9.3.1
wpa_supplicant-debugsource-2.2-9.3.1
wpa_supplicant-gui-2.2-9.3.1
wpa_supplicant-gui-debuginfo-2.2-9.3.1

References:

https://www.suse.com/security/cve/CVE-2017-13078.html
https://www.suse.com/security/cve/CVE-2017-13079.html
https://www.suse.com/security/cve/CVE-2017-13080.html
https://www.suse.com/security/cve/CVE-2017-13081.html
https://www.suse.com/security/cve/CVE-2017-13087.html
https://www.suse.com/security/cve/CVE-2017-13088.html
https://bugzilla.suse.com/1056061


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

CESA-2017:2907 Important CentOS 7 wpa_supplicant Security Update

CentOS Errata and Security Advisory 2017:2907 Important

Upstream details at : https://access.redhat.com/errata/RHSA-2017:2907

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
bcb982dc33b01aeb8b0807cee6d6b07bfe0ca020fda96d2b64e34e6912daa698 wpa_supplicant-2.6-5.el7_4.1.x86_64.rpm

Source:
d19567c0ecc7a639590f1ebd018618a7e061c42c7549fb60070d6f6581efa71b wpa_supplicant-2.6-5.el7_4.1.src.rpm


Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

SUSE-SU-2017:2752-1: important: Security update for wpa_supplicant

SUSE Security Update: Security update for wpa_supplicant
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2752-1
Rating: important
References: #1056061
Cross-References: CVE-2017-13078 CVE-2017-13079 CVE-2017-13080
CVE-2017-13081 CVE-2017-13087 CVE-2017-13088

Affected Products:
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Server 11-SP3-LTSS
SUSE Linux Enterprise Point of Sale 11-SP3
______________________________________________________________________________

An update that fixes 6 vulnerabilities is now available.

Description:

This update for wpa_supplicant fixes the following issues:

– Several vulnerabilities in standard conforming implementations of the
WPA2 protocol have been discovered and published under the code name
KRACK. This update remedies those issues in a backwards compatible
manner, i.e. the updated wpa_supplicant can interface properly with both
vulnerable and patched implementations of WPA2, but an attacker won’t be
able to exploit the KRACK weaknesses in those connections anymore even
if the other party is still vulnerable. [bsc#1056061, CVE-2017-13078,
CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13087,
CVE-2017-13088]

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Server 11-SP4:

zypper in -t patch slessp4-wpa_supplicant-13318=1

– SUSE Linux Enterprise Server 11-SP3-LTSS:

zypper in -t patch slessp3-wpa_supplicant-13318=1

– SUSE Linux Enterprise Point of Sale 11-SP3:

zypper in -t patch sleposp3-wpa_supplicant-13318=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

wpa_supplicant-0.7.1-6.18.3.1

– SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):

wpa_supplicant-0.7.1-6.18.3.1

– SUSE Linux Enterprise Point of Sale 11-SP3 (i586):

wpa_supplicant-0.7.1-6.18.3.1

References:

https://www.suse.com/security/cve/CVE-2017-13078.html
https://www.suse.com/security/cve/CVE-2017-13079.html
https://www.suse.com/security/cve/CVE-2017-13080.html
https://www.suse.com/security/cve/CVE-2017-13081.html
https://www.suse.com/security/cve/CVE-2017-13087.html
https://www.suse.com/security/cve/CVE-2017-13088.html
https://bugzilla.suse.com/1056061


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

FreeBSD Security Advisory FreeBSD-SA-17:07.wpa

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

=============================================================================
FreeBSD-SA-17:07.wpa Security Advisory
The FreeBSD Project

Topic: WPA2 protocol vulnerability

Category: contrib
Module: wpa
Announced: 2017-10-16
Credits: Mathy Vanhoef
Affects: All supported versions of FreeBSD.
Corrected: 2017-10-17 17:30:18 UTC (stable/11, 11.1-STABLE)
2017-10-17 17:57:18 UTC (releng/11.1, 11.1-RELEASE-p2)
2017-10-17 17:56:03 UTC (releng/11.0, 11.0-RELEASE-p13)
CVE Name: CVE-2017-13077, CVE-2017-13078, CVE-2017-13079,
CVE-2017-13080, CVE-2017-13081, CVE-2017-13082,
CVE-2017-13086, CVE-2017-13087, CVE-2017-13088

For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit .

I. Background

Wi-Fi Protected Access II (WPA2) is a security protocol developed by the
Wi-Fi Alliance to secure wireless computer networks.

hostapd and wpa_supplicant are implementations of user space daemon for
access points and wireless client that implements the WPA2 protocol.

II. Problem Description

A vulnerability was found in how a number of implementations can be
triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by
replaying a specific frame that is used to manage the keys.

III. Impact

Such reinstallation of the encryption key can result in two different
types of vulnerabilities: disabling replay protection and significantly
reducing the security of encryption to the point of allowing frames to
be decrypted or some parts of the keys to be determined by an attacker
depending on which cipher is used.

IV. Workaround

An updated version of wpa_supplicant is available in the FreeBSD Ports
Collection. Install version 2.6_2 or later of the
security/wpa_supplicant port/pkg. Once installed, update /etc/rc.conf
to use the new binary:

wpa_supplicant_program=”/usr/local/sbin/wpa_supplicant”

and restart networking.

An updated version of hostapd is available in the FreeBSD Ports
Collection. Install version 2.6_1 or later of the net/hostapd port/pkg.
Once installed, update /etc/rc.conf to use the new binary:

hostapd_program=”/usr/local/sbin/hostapd”

and restart hostapd.

V. Solution

Patches are currently available for stable/11, releng/11.0, and
releng/11.1. Patches for stable/10, releng/10.3, and releng/10.4 are
still being evaluated.

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date.

Restart the Wi-Fi network interfaces/hostapd or reboot the system.

2) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64
platforms can be updated via the freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install

Restart the Wi-Fi network interfaces/hostapd or reboot the system.

3) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

[FreeBSD 11.0-RELEASE, 11.1-RELEASE, and 11-STABLE]
# fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-11.patch
# fetch https://security.FreeBSD.org/patches/SA-17:07/wpa-11.patch.asc
# gpg –verify wpa-11.patch.asc

b) Apply the patch. Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as
described in .

Restart the applicable daemons, or reboot the system.

VI. Correction details

The following list contains the correction revision numbers for each
affected branch.

Branch/path Revision
– ————————————————————————-
stable/11/ r324697
releng/11.0/ r324698
releng/11.1/ r324699
– ————————————————————————-

To see which files were modified by a particular revision, run the
following command, replacing NNNNNN with the revision number, on a
machine with Subversion installed:

# svn diff -cNNNNNN –summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

VII. References

The latest revision of this advisory is available at

—–BEGIN PGP SIGNATURE—–
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=aNWn
—–END PGP SIGNATURE—–
_______________________________________________
freebsd-security-notifications@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-security-notifications
To unsubscribe, send any mail to “freebsd-security-notifications-unsubscribe@freebsd.org”

SUSE-SU-2017:2745-1: important: Security update for wpa_supplicant

SUSE Security Update: Security update for wpa_supplicant
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2745-1
Rating: important
References: #1056061
Cross-References: CVE-2017-13078 CVE-2017-13079 CVE-2017-13080
CVE-2017-13081 CVE-2017-13087 CVE-2017-13088

Affected Products:
SUSE OpenStack Cloud 6
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1-LTSS
SUSE Linux Enterprise Server 12-LTSS
SUSE Linux Enterprise Desktop 12-SP3
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________

An update that fixes 6 vulnerabilities is now available.

Description:

This update for wpa_supplicant fixes the security issues:

– Several vulnerabilities in standard conforming implementations of the
WPA2 protocol have been discovered and published under the code name
KRACK. This update remedies those issues in a backwards compatible
manner, i.e. the updated wpa_supplicant can interface properly with both
vulnerable and patched implementations of WPA2, but an attacker won’t be
able to exploit the KRACK weaknesses in those connections anymore even
if the other party is still vulnerable. [bsc#1056061, CVE-2017-13078,
CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13087,
CVE-2017-13088]

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE OpenStack Cloud 6:

zypper in -t patch SUSE-OpenStack-Cloud-6-2017-1705=1

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1705=1

– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1705=1

– SUSE Linux Enterprise Server 12-SP3:

zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1705=1

– SUSE Linux Enterprise Server 12-SP2:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1705=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1705=1

– SUSE Linux Enterprise Server 12-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-2017-1705=1

– SUSE Linux Enterprise Desktop 12-SP3:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2017-1705=1

– SUSE Linux Enterprise Desktop 12-SP2:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1705=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE OpenStack Cloud 6 (x86_64):

wpa_supplicant-2.2-15.3.1
wpa_supplicant-debuginfo-2.2-15.3.1
wpa_supplicant-debugsource-2.2-15.3.1

– SUSE Linux Enterprise Server for SAP 12-SP1 (ppc64le x86_64):

wpa_supplicant-2.2-15.3.1
wpa_supplicant-debuginfo-2.2-15.3.1
wpa_supplicant-debugsource-2.2-15.3.1

– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

wpa_supplicant-2.2-15.3.1
wpa_supplicant-debuginfo-2.2-15.3.1
wpa_supplicant-debugsource-2.2-15.3.1

– SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

wpa_supplicant-2.2-15.3.1
wpa_supplicant-debuginfo-2.2-15.3.1
wpa_supplicant-debugsource-2.2-15.3.1

– SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):

wpa_supplicant-2.2-15.3.1
wpa_supplicant-debuginfo-2.2-15.3.1
wpa_supplicant-debugsource-2.2-15.3.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):

wpa_supplicant-2.2-15.3.1
wpa_supplicant-debuginfo-2.2-15.3.1
wpa_supplicant-debugsource-2.2-15.3.1

– SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):

wpa_supplicant-2.2-15.3.1
wpa_supplicant-debuginfo-2.2-15.3.1
wpa_supplicant-debugsource-2.2-15.3.1

– SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

wpa_supplicant-2.2-15.3.1
wpa_supplicant-debuginfo-2.2-15.3.1
wpa_supplicant-debugsource-2.2-15.3.1

– SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

wpa_supplicant-2.2-15.3.1
wpa_supplicant-debuginfo-2.2-15.3.1
wpa_supplicant-debugsource-2.2-15.3.1

References:

https://www.suse.com/security/cve/CVE-2017-13078.html
https://www.suse.com/security/cve/CVE-2017-13079.html
https://www.suse.com/security/cve/CVE-2017-13080.html
https://www.suse.com/security/cve/CVE-2017-13081.html
https://www.suse.com/security/cve/CVE-2017-13087.html
https://www.suse.com/security/cve/CVE-2017-13088.html
https://bugzilla.suse.com/1056061


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2751-1: important: Security update for xen

SUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2751-1
Rating: important
References: #1027519 #1055321 #1059777 #1061076 #1061077
#1061080 #1061081 #1061082 #1061084 #1061086
#1061087
Cross-References: CVE-2017-5526
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Desktop 12-SP3
______________________________________________________________________________

An update that solves one vulnerability and has 10 fixes is
now available.

Description:

This update for xen fixes several issues:

These security issues were fixed:

– CVE-2017-5526: The ES1370 audio device emulation support was vulnerable
to a memory leakage issue allowing a privileged user inside the guest to
cause a DoS and/or potentially crash the Qemu process on the host
(bsc#1059777)
– bsc#1061084: Missing cleanup in the page type system allowed a malicious
or buggy PV guest to cause DoS (XSA-242)
– bsc#1061086: A problem in the shadow pagetable code allowed a malicious
or buggy HVM guest to cause DoS or cause hypervisor memory corruption
potentially allowing the guest to escalate its privilege (XSA-243)
– bsc#1061087: Problematic handling of the selector fields in the
Interrupt Descriptor Table (IDT) allowed a malicious or buggy x86 PV
guest to escalate its privileges or cause DoS (XSA-244)
– bsc#1061077 Missing checks in the handling of DMOPs allowed malicious or
buggy stub domain kernels or tool stacks otherwise living outside of
Domain0 to cause a DoS (XSA-238)
– bsc#1061080: Intercepted I/O write operations with less than a full
machine word’s worth of data were not properly handled, which allowed a
malicious unprivileged x86 HVM guest to obtain sensitive information
from the host or
other guests (XSA-239)
– bsc#1061081: In certain configurations of linear page tables a stack
overflow might have occured that allowed a malicious or buggy PV guest
to cause DoS and potentially privilege escalation and information leaks
(XSA-240)
– bsc#1061082: Under certain conditions x86 PV guests could have caused
the hypervisor to miss a necessary TLB flush for a page. This allowed a
malicious x86 PV guest to access all of system memory, allowing for
privilege escalation, DoS, and information leaks (XSA-241)
– bsc#1061076: Multiple issues existed with the setup of PCI MSI
interrupts that allowed a malicious or buggy guest to cause DoS and
potentially privilege escalation and information leaks (XSA-237)
– bsc#1055321: When dealing with the grant map space of add-to-physmap
operations, ARM specific code failed to release a lock. This allowed a
malicious guest administrator to cause DoS (XSA-235)

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Software Development Kit 12-SP3:

zypper in -t patch SUSE-SLE-SDK-12-SP3-2017-1702=1

– SUSE Linux Enterprise Server 12-SP3:

zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1702=1

– SUSE Linux Enterprise Desktop 12-SP3:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2017-1702=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 x86_64):

xen-debugsource-4.9.0_14-3.18.1
xen-devel-4.9.0_14-3.18.1

– SUSE Linux Enterprise Server 12-SP3 (x86_64):

xen-4.9.0_14-3.18.1
xen-debugsource-4.9.0_14-3.18.1
xen-doc-html-4.9.0_14-3.18.1
xen-libs-32bit-4.9.0_14-3.18.1
xen-libs-4.9.0_14-3.18.1
xen-libs-debuginfo-32bit-4.9.0_14-3.18.1
xen-libs-debuginfo-4.9.0_14-3.18.1
xen-tools-4.9.0_14-3.18.1
xen-tools-debuginfo-4.9.0_14-3.18.1
xen-tools-domU-4.9.0_14-3.18.1
xen-tools-domU-debuginfo-4.9.0_14-3.18.1

– SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

xen-4.9.0_14-3.18.1
xen-debugsource-4.9.0_14-3.18.1
xen-libs-32bit-4.9.0_14-3.18.1
xen-libs-4.9.0_14-3.18.1
xen-libs-debuginfo-32bit-4.9.0_14-3.18.1
xen-libs-debuginfo-4.9.0_14-3.18.1

References:

https://www.suse.com/security/cve/CVE-2017-5526.html
https://bugzilla.suse.com/1027519
https://bugzilla.suse.com/1055321
https://bugzilla.suse.com/1059777
https://bugzilla.suse.com/1061076
https://bugzilla.suse.com/1061077
https://bugzilla.suse.com/1061080
https://bugzilla.suse.com/1061081
https://bugzilla.suse.com/1061082
https://bugzilla.suse.com/1061084
https://bugzilla.suse.com/1061086
https://bugzilla.suse.com/1061087


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

SUSE-SU-2017:2747-1: important: Security update for git

SUSE Security Update: Security update for git
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2747-1
Rating: important
References: #1061041
Cross-References: CVE-2017-14867
Affected Products:
SUSE OpenStack Cloud 6
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1-LTSS
SUSE Container as a Service Platform ALL
OpenStack Cloud Magnum Orchestration 7
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for git fixes the following issues:

This security issue was fixed:

– CVE-2017-14867: Git used unsafe Perl scripts to support subcommands such
as cvsserver, which allowed attackers to execute arbitrary OS commands
via shell metacharacters in a module name (bsc#1061041).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE OpenStack Cloud 6:

zypper in -t patch SUSE-OpenStack-Cloud-6-2017-1704=1

– SUSE Linux Enterprise Software Development Kit 12-SP3:

zypper in -t patch SUSE-SLE-SDK-12-SP3-2017-1704=1

– SUSE Linux Enterprise Software Development Kit 12-SP2:

zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-1704=1

– SUSE Linux Enterprise Server for SAP 12-SP1:

zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1704=1

– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1704=1

– SUSE Linux Enterprise Server 12-SP3:

zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1704=1

– SUSE Linux Enterprise Server 12-SP2:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1704=1

– SUSE Linux Enterprise Server 12-SP1-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1704=1

– SUSE Container as a Service Platform ALL:

zypper in -t patch SUSE-CAASP-ALL-2017-1704=1

– OpenStack Cloud Magnum Orchestration 7:

zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1704=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE OpenStack Cloud 6 (noarch):

git-doc-2.12.3-27.9.1

– SUSE OpenStack Cloud 6 (x86_64):

git-core-2.12.3-27.9.1
git-core-debuginfo-2.12.3-27.9.1
git-debugsource-2.12.3-27.9.1

– SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):

git-2.12.3-27.9.1
git-arch-2.12.3-27.9.1
git-core-2.12.3-27.9.1
git-core-debuginfo-2.12.3-27.9.1
git-cvs-2.12.3-27.9.1
git-daemon-2.12.3-27.9.1
git-daemon-debuginfo-2.12.3-27.9.1
git-debugsource-2.12.3-27.9.1
git-email-2.12.3-27.9.1
git-gui-2.12.3-27.9.1
git-svn-2.12.3-27.9.1
git-svn-debuginfo-2.12.3-27.9.1
git-web-2.12.3-27.9.1
gitk-2.12.3-27.9.1

– SUSE Linux Enterprise Software Development Kit 12-SP3 (noarch):

git-doc-2.12.3-27.9.1

– SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):

git-2.12.3-27.9.1
git-arch-2.12.3-27.9.1
git-core-2.12.3-27.9.1
git-core-debuginfo-2.12.3-27.9.1
git-cvs-2.12.3-27.9.1
git-daemon-2.12.3-27.9.1
git-daemon-debuginfo-2.12.3-27.9.1
git-debugsource-2.12.3-27.9.1
git-email-2.12.3-27.9.1
git-gui-2.12.3-27.9.1
git-svn-2.12.3-27.9.1
git-svn-debuginfo-2.12.3-27.9.1
git-web-2.12.3-27.9.1
gitk-2.12.3-27.9.1

– SUSE Linux Enterprise Software Development Kit 12-SP2 (noarch):

git-doc-2.12.3-27.9.1

– SUSE Linux Enterprise Server for SAP 12-SP1 (ppc64le x86_64):

git-core-2.12.3-27.9.1
git-core-debuginfo-2.12.3-27.9.1
git-debugsource-2.12.3-27.9.1

– SUSE Linux Enterprise Server for SAP 12-SP1 (noarch):

git-doc-2.12.3-27.9.1

– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

git-core-2.12.3-27.9.1
git-core-debuginfo-2.12.3-27.9.1
git-debugsource-2.12.3-27.9.1

– SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch):

git-doc-2.12.3-27.9.1

– SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

git-core-2.12.3-27.9.1
git-core-debuginfo-2.12.3-27.9.1
git-debugsource-2.12.3-27.9.1

– SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):

git-core-2.12.3-27.9.1
git-core-debuginfo-2.12.3-27.9.1
git-debugsource-2.12.3-27.9.1

– SUSE Linux Enterprise Server 12-SP2 (noarch):

git-doc-2.12.3-27.9.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):

git-core-2.12.3-27.9.1
git-core-debuginfo-2.12.3-27.9.1
git-debugsource-2.12.3-27.9.1

– SUSE Linux Enterprise Server 12-SP1-LTSS (noarch):

git-doc-2.12.3-27.9.1

– SUSE Container as a Service Platform ALL (x86_64):

git-core-2.12.3-27.9.1
git-core-debuginfo-2.12.3-27.9.1
git-debugsource-2.12.3-27.9.1

– OpenStack Cloud Magnum Orchestration 7 (x86_64):

git-core-2.12.3-27.9.1
git-core-debuginfo-2.12.3-27.9.1
git-debugsource-2.12.3-27.9.1

References:

https://www.suse.com/security/cve/CVE-2017-14867.html
https://bugzilla.suse.com/1061041


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

Zabbix 3.4.3, 3.2.9 and 3.0.12 released

Greetings!

Zabbix Team is pleased to announce the availability of Zabbix 3.4.3, 3.2.9 and 3.0.12.

Complete Release Notes:

Zabbix 3.4.3: https://www.zabbix.com/rn3.4.3
Zabbix 3.2.9: https://www.zabbix.com/rn3.2.9
Zabbix 3.0.12: https://www.zabbix.com/rn3.0.12

Download: https://www.zabbix.com/download

Kind regards,
Alexei Vladishev,
Zabbix Product Manager, CEO
——————————————————————————
Check out the vibrant tech community on one of the world’s most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Zabbix-announce mailing list
Zabbix-announce@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/zabbix-announce

openSUSE-SU-2017:2739-1: important: Security update for the Linux Kernel

openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID: openSUSE-SU-2017:2739-1
Rating: important
References: #1012382 #1022967 #1052593 #1055493 #1055755
#1055896 #1058038 #1058410 #1058507 #1059051
#1059465 #1060197 #1061017 #1061046 #1061064
#1061067 #1061172 #1061831 #1061872
Cross-References: CVE-2017-1000252 CVE-2017-12153 CVE-2017-12154
CVE-2017-14489
Affected Products:
openSUSE Leap 42.2
______________________________________________________________________________

An update that solves four vulnerabilities and has 15 fixes
is now available.

Description:

The openSUSE Leap 42.2 Kernel was updated to 4.4.90 to receive various
security and bugfixes.

The following security bugs were fixed:

– CVE-2017-1000252: The KVM subsystem in the Linux kernel allowed guest OS
users to cause a denial of service (assertion failure, and hypervisor
hang or crash) via an out-of bounds guest_irq value, related to
arch/x86/kvm/vmx.c and virt/kvm/eventfd.c (bnc#1058038).
– CVE-2017-14489: The iscsi_if_rx function in
drivers/scsi/scsi_transport_iscsi.c in the Linux kernel allowed local
users to cause a denial of service (panic) by leveraging incorrect
length validation (bnc#1059051).
– CVE-2017-12153: A security flaw was discovered in the
nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux
kernel This function did not check whether the required attributes are
present in a Netlink request. This request can be issued by a user with
the CAP_NET_ADMIN capability and may result in a NULL pointer
dereference and system crash (bnc#1058410).
– CVE-2017-12154: The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the
Linux kernel did not ensure that the “CR8-load exiting” and “CR8-store
exiting” L0 vmcs02 controls exist in cases where L1 omits the “use TPR
shadow” vmcs12 control, which allowed KVM L2 guest OS users to obtain
read and write access to the hardware CR8 register (bnc#1058507).

The following non-security bugs were fixed:

– arc: Re-enable MMU upon Machine Check exception (bnc#1012382).
– arm64: fault: Route pte translation faults via do_translation_fault
(bnc#1012382).
– arm64: Make sure SPsel is always set (bnc#1012382).
– arm: pxa: add the number of DMA requestor lines (bnc#1012382).
– arm: pxa: fix the number of DMA requestor lines (bnc#1012382).
– bcache: correct cache_dirty_target in __update_writeback_rate()
(bnc#1012382).
– bcache: Correct return value for sysfs attach errors (bnc#1012382).
– bcache: do not subtract sectors_to_gc for bypassed IO (bnc#1012382).
– bcache: fix bch_hprint crash and improve output (bnc#1012382).
– bcache: fix for gc and write-back race (bnc#1012382).
– bcache: Fix leak of bdev reference (bnc#1012382).
– bcache: initialize dirty stripes in flash_dev_run() (bnc#1012382).
– blacklist.conf: Add commit b5accbb0dfae
– blacklist.conf: add one more
– block: Relax a check in blk_start_queue() (bnc#1012382).
– bsg-lib: do not free job in bsg_prepare_job (bnc#1012382).
– btrfs: change how we decide to commit transactions during flushing
(bsc#1060197).
– btrfs: fix NULL pointer dereference from free_reloc_roots()
(bnc#1012382).
– btrfs: prevent to set invalid default subvolid (bnc#1012382).
– btrfs: propagate error to btrfs_cmp_data_prepare caller (bnc#1012382).
– btrfs: qgroup: move noisy underflow warning to debugging build
(bsc#1055755).
– cifs: Fix SMB3.1.1 guest authentication to Samba (bnc#1012382).
– cifs: release auth_key.response for reconnect (bnc#1012382).
– crypto: AF_ALG – remove SGL terminator indicator when chaining
(bnc#1012382).
– crypto: talitos – Do not provide setkey for non hmac hashing algs
(bnc#1012382).
– crypto: talitos – fix sha224 (bnc#1012382).
– cxl: Fix driver use count (bnc#1012382).
– dmaengine: mmp-pdma: add number of requestors (bnc#1012382).
– drm: Add driver-private objects to atomic state (bsc#1055493).
– drm/dp: Introduce MST topology state to track available link bandwidth
(bsc#1055493).
– ext4: fix incorrect quotaoff if the quota feature is enabled
(bnc#1012382).
– ext4: fix quota inconsistency during orphan cleanup for read-only mounts
(bnc#1012382).
– f2fs: check hot_data for roll-forward recovery (bnc#1012382).
– fix xen_swiotlb_dma_mmap prototype (bnc#1012382).
– ftrace: Fix memleak when unregistering dynamic ops when tracing disabled
(bnc#1012382).
– ftrace: Fix selftest goto location on error (bnc#1012382).
– genirq: Fix for_each_action_of_desc() macro (bsc#1061064).
– getcwd: Close race with d_move called by lustre (bsc#1052593).
– gfs2: Fix debugfs glocks dump (bnc#1012382).
– gianfar: Fix Tx flow control deactivation (bnc#1012382).
– hid: usbhid: Add HID_QUIRK_NOGET for Aten CS-1758 KVM switch
(bnc#1022967).
– input: i8042 – add Gigabyte P57 to the keyboard reset table
(bnc#1012382).
– iommu/vt-d: Avoid calling virt_to_phys() on null pointer (bsc#1061067).
– ipv6: accept 64k – 1 packet length in ip6_find_1stfragopt()
(bnc#1012382).
– ipv6: add rcu grace period before freeing fib6_node (bnc#1012382).
– ipv6: fix memory leak with multiple tables during netns destruction
(bnc#1012382).
– ipv6: fix sparse warning on rt6i_node (bnc#1012382).
– ipv6: fix typo in fib6_net_exit() (bnc#1012382).
– kabi/severities: ignore nfs_pgio_data_destroy
– keys: fix writing past end of user-supplied buffer in keyring_read()
(bnc#1012382).
– keys: prevent creating a different user’s keyrings (bnc#1012382).
– keys: prevent KEYCTL_READ on negative key (bnc#1012382).
– kvm: async_pf: Fix #DF due to inject “Page not Present” and “Page Ready”
exceptions simultaneously (bsc#1061017).
– kvm: PPC: Book3S: Fix race and leak in kvm_vm_ioctl_create_spapr_tce()
(bnc#1012382).
– kvm: SVM: Add a missing ‘break’ statement (bsc#1061017).
– kvm: VMX: do not change SN bit in vmx_update_pi_irte() (bsc#1061017).
– kvm: VMX: remove WARN_ON_ONCE in kvm_vcpu_trigger_posted_interrupt
(bsc#1061017).
– kvm: VMX: use cmpxchg64 (bnc#1012382).
– mac80211: flush hw_roc_start work before cancelling the ROC
(bnc#1012382).
– md/bitmap: disable bitmap_resize for file-backed bitmaps (bsc#1061172).
– md/raid5: preserve STRIPE_ON_UNPLUG_LIST in break_stripe_batch_list
(bnc#1012382).
– md/raid5: release/flush io in raid5_do_work() (bnc#1012382).
– media: uvcvideo: Prevent heap overflow when accessing mapped controls
(bnc#1012382).
– media: v4l2-compat-ioctl32: Fix timespec conversion (bnc#1012382).
– mips: math-emu: <MAXA|MINA>.<D|S>: Fix cases of both
infinite inputs (bnc#1012382).
– mips: math-emu: <MAXA|MINA>.<D|S>: Fix cases of input values
with opposite signs (bnc#1012382).
– mips: math-emu: <MAX|MAXA|MIN|MINA>.<D|S>: Fix cases of both
inputs zero (bnc#1012382).
– mips: math-emu: <MAX|MAXA|MIN|MINA>.<D|S>: Fix quiet NaN
propagation (bnc#1012382).
– mips: math-emu: <MAX|MIN>.<D|S>: Fix cases of both inputs
negative (bnc#1012382).
– mips: math-emu: MINA.<D|S>: Fix some cases of infinity and zero
inputs (bnc#1012382).
– mm: prevent double decrease of nr_reserved_highatomic (bnc#1012382).
– nfsd: Fix general protection fault in release_lock_stateid()
(bnc#1012382).
– pci: Allow PCI express root ports to find themselves (bsc#1061046).
– pci: fix oops when try to find Root Port for a PCI device (bsc#1061046).
– pci: Fix race condition with driver_override (bnc#1012382).
– pci: shpchp: Enable bridge bus mastering if MSI is enabled (bnc#1012382).
– perf/x86: Fix RDPMC vs. mm_struct tracking (bsc#1061831).
– perf/x86: kABI Workaround for ‘perf/x86: Fix RDPMC vs. mm_struct
tracking’ (bsc#1061831).
– powerpc: Fix DAR reporting when alignment handler faults (bnc#1012382).
– powerpc/pseries: Fix parent_dn reference leak in add_dt_node()
(bnc#1012382).
– qlge: avoid memcpy buffer overflow (bnc#1012382).
– Revert “net: fix percpu memory leaks” (bnc#1012382).
– Revert “net: phy: Correctly process PHY_HALTED in phy_stop_machine()”
(bnc#1012382).
– Revert “net: use lib/percpu_counter API for fragmentation mem
accounting” (bnc#1012382).
– scsi: ILLEGAL REQUEST + ASC==27 => target failure (bsc#1059465).
– scsi: megaraid_sas: Check valid aen class range to avoid kernel panic
(bnc#1012382).
– scsi: megaraid_sas: Return pended IOCTLs with cmd_status
MFI_STAT_WRONG_STATE in case adapter is dead (bnc#1012382).
– scsi: sg: factor out sg_fill_request_table() (bnc#1012382).
– scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE (bnc#1012382).
– scsi: sg: off by one in sg_ioctl() (bnc#1012382).
– scsi: sg: remove ‘save_scat_len’ (bnc#1012382).
– scsi: sg: use standard lists for sg_requests (bnc#1012382).
– scsi: storvsc: fix memory leak on ring buffer busy (bnc#1012382).
– scsi: zfcp: add handling for FCP_RESID_OVER to the fcp ingress path
(bnc#1012382).
– scsi: zfcp: fix capping of unsuccessful GPN_FT SAN response trace
records (bnc#1012382).
– scsi: zfcp: fix missing trace records for early returns in TMF eh
handlers (bnc#1012382).
– scsi: zfcp: fix passing fsf_req to SCSI trace on TMF to correlate with
HBA (bnc#1012382).
– scsi: zfcp: fix payload with full FCP_RSP IU in SCSI trace records
(bnc#1012382).
– scsi: zfcp: fix queuecommand for scsi_eh commands when DIX enabled
(bnc#1012382).
– scsi: zfcp: trace HBA FSF response by default on dismiss or timedout
late response (bnc#1012382).
– scsi: zfcp: trace high part of “new” 64 bit SCSI LUN (bnc#1012382).
– seccomp: fix the usage of get/put_seccomp_filter() in
seccomp_get_filter() (bnc#1012382).
– skd: Avoid that module unloading triggers a use-after-free (bnc#1012382).
– skd: Submit requests to firmware before triggering the doorbell
(bnc#1012382).
– smb3: Do not ignore O_SYNC/O_DSYNC and O_DIRECT flags (bnc#1012382).
– smb: Validate negotiate (to protect against downgrade) even if signing
off (bnc#1012382).
– swiotlb-xen: implement xen_swiotlb_dma_mmap callback (bnc#1012382).
– timer/sysclt: Restrict timer migration sysctl values to 0 and 1
(bnc#1012382).
– tracing: Apply trace_clock changes to instance max buffer (bnc#1012382).
– tracing: Erase irqsoff trace with empty write (bnc#1012382).
– tracing: Fix trace_pipe behavior for instance traces (bnc#1012382).
– tty: fix __tty_insert_flip_char regression (bnc#1012382).
– tty: improve tty_insert_flip_char() fast path (bnc#1012382).
– tty: improve tty_insert_flip_char() slow path (bnc#1012382).
– vfs: Return -ENXIO for negative SEEK_HOLE / SEEK_DATA offsets
(bnc#1012382).
– video: fbdev: aty: do not leak uninitialized padding in clk to userspace
(bnc#1012382).
– Workaround for kABI compatibility with DP-MST patches (bsc#1055493).
– x86/fpu: Do not let userspace set bogus xcomp_bv (bnc#1012382).
– x86/fsgsbase/64: Report FSBASE and GSBASE correctly in core dumps
(bnc#1012382).
– x86/ldt: Fix off by one in get_segment_base() (bsc#1061872).
– xfs/dmapi: fix incorrect file->f_path.dentry->d_inode usage
(bsc#1055896).

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE Leap 42.2:

zypper in -t patch openSUSE-2017-1159=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE Leap 42.2 (x86_64):

kernel-debug-4.4.90-18.32.1
kernel-debug-base-4.4.90-18.32.1
kernel-debug-base-debuginfo-4.4.90-18.32.1
kernel-debug-debuginfo-4.4.90-18.32.1
kernel-debug-debugsource-4.4.90-18.32.1
kernel-debug-devel-4.4.90-18.32.1
kernel-debug-devel-debuginfo-4.4.90-18.32.1
kernel-default-4.4.90-18.32.1
kernel-default-base-4.4.90-18.32.1
kernel-default-base-debuginfo-4.4.90-18.32.1
kernel-default-debuginfo-4.4.90-18.32.1
kernel-default-debugsource-4.4.90-18.32.1
kernel-default-devel-4.4.90-18.32.1
kernel-obs-build-4.4.90-18.32.1
kernel-obs-build-debugsource-4.4.90-18.32.1
kernel-obs-qa-4.4.90-18.32.1
kernel-syms-4.4.90-18.32.1
kernel-vanilla-4.4.90-18.32.1
kernel-vanilla-base-4.4.90-18.32.1
kernel-vanilla-base-debuginfo-4.4.90-18.32.1
kernel-vanilla-debuginfo-4.4.90-18.32.1
kernel-vanilla-debugsource-4.4.90-18.32.1
kernel-vanilla-devel-4.4.90-18.32.1

– openSUSE Leap 42.2 (noarch):

kernel-devel-4.4.90-18.32.1
kernel-docs-4.4.90-18.32.2
kernel-docs-html-4.4.90-18.32.2
kernel-docs-pdf-4.4.90-18.32.2
kernel-macros-4.4.90-18.32.1
kernel-source-4.4.90-18.32.1
kernel-source-vanilla-4.4.90-18.32.1

References:

https://www.suse.com/security/cve/CVE-2017-1000252.html
https://www.suse.com/security/cve/CVE-2017-12153.html
https://www.suse.com/security/cve/CVE-2017-12154.html
https://www.suse.com/security/cve/CVE-2017-14489.html
https://bugzilla.suse.com/1012382
https://bugzilla.suse.com/1022967
https://bugzilla.suse.com/1052593
https://bugzilla.suse.com/1055493
https://bugzilla.suse.com/1055755
https://bugzilla.suse.com/1055896
https://bugzilla.suse.com/1058038
https://bugzilla.suse.com/1058410
https://bugzilla.suse.com/1058507
https://bugzilla.suse.com/1059051
https://bugzilla.suse.com/1059465
https://bugzilla.suse.com/1060197
https://bugzilla.suse.com/1061017
https://bugzilla.suse.com/1061046
https://bugzilla.suse.com/1061064
https://bugzilla.suse.com/1061067
https://bugzilla.suse.com/1061172
https://bugzilla.suse.com/1061831
https://bugzilla.suse.com/1061872


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE-SU-2017:2741-1: important: Security update for the Linux Kernel

openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID: openSUSE-SU-2017:2741-1
Rating: important
References: #1005778 #1005780 #1005781 #1012382 #1022967
#1036215 #1036737 #1037579 #1037890 #1043598
#1044503 #1047238 #1051987 #1052593 #1053043
#1055493 #1055755 #1056686 #1057383 #1057498
#1058038 #1058410 #1058507 #1058512 #1058550
#1059051 #1059465 #1059500 #1060197 #1060229
#1061017 #1061046 #1061064 #1061067 #1061172
#1061831 #1061872
Cross-References: CVE-2017-1000252 CVE-2017-12153 CVE-2017-12154
CVE-2017-14489
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that solves four vulnerabilities and has 33 fixes
is now available.

Description:

The openSUSE Leap 42.3 kernel was updated to 4.4.90 to receive various
security and bugfixes.

The following security bugs were fixed:

– CVE-2017-1000252: The KVM subsystem in the Linux kernel allowed guest OS
users to cause a denial of service (assertion failure, and hypervisor
hang or crash) via an out-of bounds guest_irq value, related to
arch/x86/kvm/vmx.c and virt/kvm/eventfd.c (bnc#1058038).
– CVE-2017-14489: The iscsi_if_rx function in
drivers/scsi/scsi_transport_iscsi.c in the Linux kernel allowed local
users to cause a denial of service (panic) by leveraging incorrect
length validation (bnc#1059051).
– CVE-2017-12153: A security flaw was discovered in the
nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux
kernel This function did not check whether the required attributes are
present in a Netlink request. This request can be issued by a user with
the CAP_NET_ADMIN capability and may result in a NULL pointer
dereference and system crash (bnc#1058410).
– CVE-2017-12154: The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the
Linux kernel did not ensure that the “CR8-load exiting” and “CR8-store
exiting” L0 vmcs02 controls exist in cases where L1 omits the “use TPR
shadow” vmcs12 control, which allowed KVM L2 guest OS users to obtain
read and write access to the hardware CR8 register (bnc#1058507).

The following non-security bugs were fixed:

– arc: Re-enable MMU upon Machine Check exception (bnc#1012382).
– arm64: fault: Route pte translation faults via do_translation_fault
(bnc#1012382).
– arm64: Make sure SPsel is always set (bnc#1012382).
– arm: pxa: add the number of DMA requestor lines (bnc#1012382).
– arm: pxa: fix the number of DMA requestor lines (bnc#1012382).
– bcache: correct cache_dirty_target in __update_writeback_rate()
(bnc#1012382).
– bcache: Correct return value for sysfs attach errors (bnc#1012382).
– bcache: do not subtract sectors_to_gc for bypassed IO (bnc#1012382).
– bcache: fix bch_hprint crash and improve output (bnc#1012382).
– bcache: fix for gc and write-back race (bnc#1012382).
– bcache: Fix leak of bdev reference (bnc#1012382).
– bcache: initialize dirty stripes in flash_dev_run() (bnc#1012382).
– block: Relax a check in blk_start_queue() (bnc#1012382).
– bsg-lib: do not free job in bsg_prepare_job (bnc#1012382).
– btrfs: change how we decide to commit transactions during flushing
(bsc#1060197).
– btrfs: fix NULL pointer dereference from free_reloc_roots()
(bnc#1012382).
– btrfs: prevent to set invalid default subvolid (bnc#1012382).
– btrfs: propagate error to btrfs_cmp_data_prepare caller (bnc#1012382).
– btrfs: qgroup: move noisy underflow warning to debugging build
(bsc#1055755).
– cifs: Fix SMB3.1.1 guest authentication to Samba (bnc#1012382).
– cifs: release auth_key.response for reconnect (bnc#1012382).
– crypto: AF_ALG – remove SGL terminator indicator when chaining
(bnc#1012382).
– crypto: talitos – Do not provide setkey for non hmac hashing algs
(bnc#1012382).
– crypto: talitos – fix sha224 (bnc#1012382).
– cxl: Fix driver use count (bnc#1012382).
– dmaengine: mmp-pdma: add number of requestors (bnc#1012382).
– drivers: net: phy: xgene: Fix mdio write (bsc#1057383).
– drm: Add driver-private objects to atomic state (bsc#1055493).
– drm/dp: Introduce MST topology state to track available link bandwidth
(bsc#1055493).
– efi/fb: Avoid reconfiguration of BAR that covers the framebuffer
(bsc#1051987).
– efi/fb: Correct PCI_STD_RESOURCE_END usage (bsc#1051987).
– ext4: fix incorrect quotaoff if the quota feature is enabled
(bnc#1012382).
– ext4: fix quota inconsistency during orphan cleanup for read-only mounts
(bnc#1012382).
– f2fs: check hot_data for roll-forward recovery (bnc#1012382).
– fix xen_swiotlb_dma_mmap prototype (bnc#1012382).
– ftrace: Fix memleak when unregistering dynamic ops when tracing disabled
(bnc#1012382).
– ftrace: Fix selftest goto location on error (bnc#1012382).
– genirq: Fix for_each_action_of_desc() macro (bsc#1061064).
– getcwd: Close race with d_move called by lustre (bsc#1052593).
– gfs2: Fix debugfs glocks dump (bnc#1012382).
– gianfar: Fix Tx flow control deactivation (bnc#1012382).
– hid: usbhid: Add HID_QUIRK_NOGET for Aten CS-1758 KVM switch
(bnc#1022967).
– input: i8042 – add Gigabyte P57 to the keyboard reset table
(bnc#1012382).
– iommu/vt-d: Avoid calling virt_to_phys() on null pointer (bsc#1061067).
– ipv6: accept 64k – 1 packet length in ip6_find_1stfragopt()
(bnc#1012382).
– ipv6: add rcu grace period before freeing fib6_node (bnc#1012382).
– ipv6: fix memory leak with multiple tables during netns destruction
(bnc#1012382).
– ipv6: fix sparse warning on rt6i_node (bnc#1012382).
– ipv6: fix typo in fib6_net_exit() (bnc#1012382).
– iw_cxgb4: put ep reference in pass_accept_req() (fate#321658 bsc#1005778
fate#321660 bsc#1005780 fate#321661 bsc#1005781).
– KABI fix drivers/nvme/target/nvmet.h (bsc#1058550).
– kabi/severities: ignore nfs_pgio_data_destroy
– kABI: Workaround kABI breakage of AMD-AVIC fixes (bsc#1044503).
– keys: fix writing past end of user-supplied buffer in keyring_read()
(bnc#1012382).
– keys: prevent creating a different user’s keyrings (bnc#1012382).
– keys: prevent KEYCTL_READ on negative key (bnc#1012382).
– kvm: Add struct kvm_vcpu pointer parameter to get_enable_apicv()
(bsc#1044503).
– kvm: async_pf: Fix #DF due to inject “Page not Present” and “Page Ready”
exceptions simultaneously (bsc#1061017).
– kvm: PPC: Book3S: Fix race and leak in kvm_vm_ioctl_create_spapr_tce()
(bnc#1012382).
– kvm: SVM: Add a missing ‘break’ statement (bsc#1061017).
– kvm: SVM: Add irqchip_split() checks before enabling AVIC (bsc#1044503).
– kvm: SVM: delete avic_vm_id_bitmap (2 megabyte static array)
(bsc#1059500).
– kvm: SVM: Refactor AVIC vcpu initialization into avic_init_vcpu()
(bsc#1044503).
– kvm: VMX: do not change SN bit in vmx_update_pi_irte() (bsc#1061017).
– kvm: VMX: remove WARN_ON_ONCE in kvm_vcpu_trigger_posted_interrupt
(bsc#1061017).
– kvm: VMX: use cmpxchg64 (bnc#1012382).
– mac80211: flush hw_roc_start work before cancelling the ROC
(bnc#1012382).
– md/bitmap: disable bitmap_resize for file-backed bitmaps (bsc#1061172).
– md/raid5: preserve STRIPE_ON_UNPLUG_LIST in break_stripe_batch_list
(bnc#1012382).
– md/raid5: release/flush io in raid5_do_work() (bnc#1012382).
– media: uvcvideo: Prevent heap overflow when accessing mapped controls
(bnc#1012382).
– media: v4l2-compat-ioctl32: Fix timespec conversion (bnc#1012382).
– mips: math-emu: .: Fix cases of both infinite inputs
(bnc#1012382).
– mips: math-emu: .: Fix cases of input values with
opposite signs (bnc#1012382).
– mips: math-emu: .: Fix cases of both inputs zero
(bnc#1012382).
– mips: math-emu: .: Fix quiet NaN propagation
(bnc#1012382).
– mips: math-emu: .: Fix cases of both inputs negative
(bnc#1012382).
– mips: math-emu: MINA.: Fix some cases of infinity and zero inputs
(bnc#1012382).
– mm: prevent double decrease of nr_reserved_highatomic (bnc#1012382).
– nfsd: Fix general protection fault in release_lock_stateid()
(bnc#1012382).
– nvme-fabrics: generate spec-compliant UUID NQNs (bsc#1057498).
– nvmet: Move serial number from controller to subsystem (bsc#1058550).
– nvmet: preserve controller serial number between reboots (bsc#1058550).
– pci: Allow PCI express root ports to find themselves (bsc#1061046).
– pci: fix oops when try to find Root Port for a PCI device (bsc#1061046).
– pci: Fix race condition with driver_override (bnc#1012382).
– pci: Mark AMD Stoney GPU ATS as broken (bsc#1061046).
– pci: shpchp: Enable bridge bus mastering if MSI is enabled (bnc#1012382).
– perf/x86: Fix RDPMC vs. mm_struct tracking (bsc#1061831).
– perf/x86: kABI Workaround for ‘perf/x86: Fix RDPMC vs. mm_struct
tracking’ (bsc#1061831).
– perf: xgene: Add APM X-Gene SoC Performance Monitoring Unit driver
(bsc#1036737).
– perf: xgene: Include module.h (bsc#1036737).
– perf: xgene: Move PMU leaf functions into function pointer structure
(bsc#1036737).
– perf: xgene: Parse PMU subnode from the match table (bsc#1036737).
– powerpc: Fix DAR reporting when alignment handler faults (bnc#1012382).
– powerpc/perf: Cleanup of PM_BR_CMPL vs. PM_BRU_CMPL in Power9 event list
(bsc#1056686, fate#321438, bsc#1047238, git-fixes 34922527a2bc).
– powerpc/perf: Factor out PPMU_ONLY_COUNT_RUN check code from power8
(fate#321438, bsc#1053043, git-fixes efe881afdd999).
– powerpc/pseries: Fix parent_dn reference leak in add_dt_node()
(bnc#1012382).
– qlge: avoid memcpy buffer overflow (bnc#1012382).
– rdma/bnxt_re: Allocate multiple notification queues (bsc#1037579).
– rdma/bnxt_re: Implement the alloc/get_hw_stats callback (bsc#1037579).
– Revert “net: fix percpu memory leaks” (bnc#1012382).
– Revert “net: phy: Correctly process PHY_HALTED in phy_stop_machine()”
(bnc#1012382).
– Revert “net: use lib/percpu_counter API for fragmentation mem
accounting” (bnc#1012382).
– Revert “Update
patches.fixes/xfs-refactor-log-record-unpack-and-data-processing.patch
(bsc#1043598, bsc#1036215).”
– Revert “xfs: detect and handle invalid iclog size set by mkfs
(bsc#1043598).”
– Revert “xfs: detect and trim torn writes during log recovery
(bsc#1036215).”
– Revert “xfs: refactor and open code log record crc check (bsc#1036215).”
– Revert “xfs: refactor log record start detection into a new helper
(bsc#1036215).”
– Revert “xfs: return start block of first bad log record during recovery
(bsc#1036215).”
– Revert “xfs: support a crc verification only log record pass
(bsc#1036215).”
– scsi: ILLEGAL REQUEST + ASC==27 => target failure (bsc#1059465).
– scsi: megaraid_sas: Check valid aen class range to avoid kernel panic
(bnc#1012382).
– scsi: megaraid_sas: Return pended IOCTLs with cmd_status
MFI_STAT_WRONG_STATE in case adapter is dead (bnc#1012382).
– scsi: sg: factor out sg_fill_request_table() (bnc#1012382).
– scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE (bnc#1012382).
– scsi: sg: off by one in sg_ioctl() (bnc#1012382).
– scsi: sg: remove ‘save_scat_len’ (bnc#1012382).
– scsi: sg: use standard lists for sg_requests (bnc#1012382).
– scsi: storvsc: fix memory leak on ring buffer busy (bnc#1012382).
– scsi_transport_fc: Also check for NOTPRESENT in fc_remote_port_add()
(bsc#1037890).
– scsi: zfcp: add handling for FCP_RESID_OVER to the fcp ingress path
(bnc#1012382).
– scsi: zfcp: fix capping of unsuccessful GPN_FT SAN response trace
records (bnc#1012382).
– scsi: zfcp: fix missing trace records for early returns in TMF eh
handlers (bnc#1012382).
– scsi: zfcp: fix passing fsf_req to SCSI trace on TMF to correlate with
HBA (bnc#1012382).
– scsi: zfcp: fix payload with full FCP_RSP IU in SCSI trace records
(bnc#1012382).
– scsi: zfcp: fix queuecommand for scsi_eh commands when DIX enabled
(bnc#1012382).
– scsi: zfcp: trace HBA FSF response by default on dismiss or timedout
late response (bnc#1012382).
– scsi: zfcp: trace high part of “new” 64 bit SCSI LUN (bnc#1012382).
– seccomp: fix the usage of get/put_seccomp_filter() in
seccomp_get_filter() (bnc#1012382).
– skd: Avoid that module unloading triggers a use-after-free (bnc#1012382).
– skd: Submit requests to firmware before triggering the doorbell
(bnc#1012382).
– smb3: Do not ignore O_SYNC/O_DSYNC and O_DIRECT flags (bnc#1012382).
– smb: Validate negotiate (to protect against downgrade) even if signing
off (bnc#1012382).
– swiotlb-xen: implement xen_swiotlb_dma_mmap callback (bnc#1012382).
– timer/sysclt: Restrict timer migration sysctl values to 0 and 1
(bnc#1012382).
– tracing: Apply trace_clock changes to instance max buffer (bnc#1012382).
– tracing: Erase irqsoff trace with empty write (bnc#1012382).
– tracing: Fix trace_pipe behavior for instance traces (bnc#1012382).
– tty: fix __tty_insert_flip_char regression (bnc#1012382).
– tty: improve tty_insert_flip_char() fast path (bnc#1012382).
– tty: improve tty_insert_flip_char() slow path (bnc#1012382).
– Update patches.drivers/0029-perf-xgene-Remove-bogus-IS_ERR-check.patch
(bsc#1036737).
– vfs: Return -ENXIO for negative SEEK_HOLE / SEEK_DATA offsets
(bnc#1012382).
– video: fbdev: aty: do not leak uninitialized padding in clk to userspace
(bnc#1012382).
– Workaround for kABI compatibility with DP-MST patches (bsc#1055493).
– x86/cpu/amd: Hide unused legacy_fixup_core_id() function (bsc#1060229).
– x86/cpu/amd: Limit cpu_core_id fixup to families older than F17h
(bsc#1060229).
– x86/fpu: Do not let userspace set bogus xcomp_bv (bnc#1012382).
– x86/fsgsbase/64: Report FSBASE and GSBASE correctly in core dumps
(bnc#1012382).
– x86/ldt: Fix off by one in get_segment_base() (bsc#1061872).
– x86/mm: Fix boot crash caused by incorrect loop count calculation in
sync_global_pgds() (bsc#1058512).
– x86/mm: Fix fault error path using unsafe vma pointer (fate#321300).

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE Leap 42.3:

zypper in -t patch openSUSE-2017-1160=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE Leap 42.3 (noarch):

kernel-devel-4.4.90-28.1
kernel-docs-4.4.90-28.2
kernel-docs-html-4.4.90-28.2
kernel-docs-pdf-4.4.90-28.2
kernel-macros-4.4.90-28.1
kernel-source-4.4.90-28.1
kernel-source-vanilla-4.4.90-28.1

– openSUSE Leap 42.3 (x86_64):

kernel-debug-4.4.90-28.1
kernel-debug-base-4.4.90-28.1
kernel-debug-base-debuginfo-4.4.90-28.1
kernel-debug-debuginfo-4.4.90-28.1
kernel-debug-debugsource-4.4.90-28.1
kernel-debug-devel-4.4.90-28.1
kernel-debug-devel-debuginfo-4.4.90-28.1
kernel-default-4.4.90-28.1
kernel-default-base-4.4.90-28.1
kernel-default-base-debuginfo-4.4.90-28.1
kernel-default-debuginfo-4.4.90-28.1
kernel-default-debugsource-4.4.90-28.1
kernel-default-devel-4.4.90-28.1
kernel-obs-build-4.4.90-28.1
kernel-obs-build-debugsource-4.4.90-28.1
kernel-obs-qa-4.4.90-28.1
kernel-syms-4.4.90-28.1
kernel-vanilla-4.4.90-28.1
kernel-vanilla-base-4.4.90-28.1
kernel-vanilla-base-debuginfo-4.4.90-28.1
kernel-vanilla-debuginfo-4.4.90-28.1
kernel-vanilla-debugsource-4.4.90-28.1
kernel-vanilla-devel-4.4.90-28.1

References:

https://www.suse.com/security/cve/CVE-2017-1000252.html
https://www.suse.com/security/cve/CVE-2017-12153.html
https://www.suse.com/security/cve/CVE-2017-12154.html
https://www.suse.com/security/cve/CVE-2017-14489.html
https://bugzilla.suse.com/1005778
https://bugzilla.suse.com/1005780
https://bugzilla.suse.com/1005781
https://bugzilla.suse.com/1012382
https://bugzilla.suse.com/1022967
https://bugzilla.suse.com/1036215
https://bugzilla.suse.com/1036737
https://bugzilla.suse.com/1037579
https://bugzilla.suse.com/1037890
https://bugzilla.suse.com/1043598
https://bugzilla.suse.com/1044503
https://bugzilla.suse.com/1047238
https://bugzilla.suse.com/1051987
https://bugzilla.suse.com/1052593
https://bugzilla.suse.com/1053043
https://bugzilla.suse.com/1055493
https://bugzilla.suse.com/1055755
https://bugzilla.suse.com/1056686
https://bugzilla.suse.com/1057383
https://bugzilla.suse.com/1057498
https://bugzilla.suse.com/1058038
https://bugzilla.suse.com/1058410
https://bugzilla.suse.com/1058507
https://bugzilla.suse.com/1058512
https://bugzilla.suse.com/1058550
https://bugzilla.suse.com/1059051
https://bugzilla.suse.com/1059465
https://bugzilla.suse.com/1059500
https://bugzilla.suse.com/1060197
https://bugzilla.suse.com/1060229
https://bugzilla.suse.com/1061017
https://bugzilla.suse.com/1061046
https://bugzilla.suse.com/1061064
https://bugzilla.suse.com/1061067
https://bugzilla.suse.com/1061172
https://bugzilla.suse.com/1061831
https://bugzilla.suse.com/1061872


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

Zabbix 3.4.3rc1, 3.2.9rc1 and 3.0.12rc1 released

Greetings!

Zabbix Team is pleased to announce the availability of Zabbix 3.4.3rc1, 3.2.9rc1 and 3.0.12rc1.

Complete Release Notes:

Zabbix 3.4.3rc1: https://www.zabbix.com/rn3.4.3rc1
Zabbix 3.2.9rc1: https://www.zabbix.com/rn3.2.9rc1
Zabbix 3.0.12rc1: https://www.zabbix.com/rn3.0.12rc1

Download: https://www.zabbix.com/download

Kind regards,
Alexei Vladishev,
Zabbix Product Manager, CEO
——————————————————————————
Check out the vibrant tech community on one of the world’s most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Zabbix-announce mailing list
Zabbix-announce@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/zabbix-announce