openSUSE Security Announce
Threads by month
- ----- 2024 -----
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
October 2017
- 1 participants
- 87 discussions
[security-announce] SUSE-SU-2017:2908-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 30 Oct '17
by opensuse-security@opensuse.org 30 Oct '17
30 Oct '17
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:2908-1
Rating: important
References: #1001459 #1012985 #1023287 #1027149 #1028217
#1030531 #1030552 #1031515 #1033960 #1034405
#1035531 #1035738 #1037182 #1037183 #1037994
#1038544 #1038564 #1038879 #1038883 #1038981
#1038982 #1039348 #1039354 #1039456 #1039721
#1039864 #1039882 #1039883 #1039885 #1040069
#1041160 #1041429 #1041431 #1042696 #1042832
#1042863 #1044125 #1045327 #1045487 #1045922
#1046107 #1048275 #1048788 #1049645 #1049882
#1053148 #1053152 #1053317 #1056588 #1056982
#1057179 #1058410 #1058507 #1058524 #1059863
#1062471 #1062520 #1063667 #1064388 #856774
#860250 #863764 #878240 #922855 #922871 #986924
#993099 #994364
Cross-References: CVE-2017-1000363 CVE-2017-1000365 CVE-2017-1000380
CVE-2017-10661 CVE-2017-11176 CVE-2017-12153
CVE-2017-12154 CVE-2017-12762 CVE-2017-13080
CVE-2017-14051 CVE-2017-14106 CVE-2017-14140
CVE-2017-15265 CVE-2017-15274 CVE-2017-15649
CVE-2017-7482 CVE-2017-7487 CVE-2017-7518
CVE-2017-7541 CVE-2017-7542 CVE-2017-7889
CVE-2017-8831 CVE-2017-8890 CVE-2017-8924
CVE-2017-8925 CVE-2017-9074 CVE-2017-9075
CVE-2017-9076 CVE-2017-9077 CVE-2017-9242
Affected Products:
SUSE OpenStack Cloud 6
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
SUSE Linux Enterprise Module for Public Cloud 12
______________________________________________________________________________
An update that solves 30 vulnerabilities and has 38 fixes
is now available.
Description:
The SUSE Linux Enterprise 12 SP1 LTS kernel was updated to receive various
security and bugfixes.
The following security bugs were fixed:
- CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local
users to gain privileges via crafted system calls that trigger
mishandling of packet_fanout data structures, because of a race
condition (involving fanout_add and packet_do_bind) that leads to a
use-after-free, a different vulnerability than CVE-2017-6346
(bnc#1064388).
- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed
reinstallation of the Group Temporal Key (GTK) during the group key
handshake, allowing an attacker within radio range to replay frames from
access points to clients (bnc#1063667).
- CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call, a different vulnerability than CVE-2017-12192 (bnc#1045327).
- CVE-2017-15265: Use-after-free vulnerability in the Linux kernel allowed
local users to have unspecified impact via vectors related to
/dev/snd/seq (bnc#1062520).
- CVE-2017-1000365: The Linux Kernel imposes a size restriction on the
arguments and environmental strings passed through
RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but did not take the
argument and environment pointers into account, which allowed attackers
to bypass this limitation. (bnc#1039354).
- CVE-2017-12153: A security flaw was discovered in the
nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux
kernel This function did not check whether the required attributes are
present in a Netlink request. This request can be issued by a user with
the CAP_NET_ADMIN capability and may result in a NULL pointer
dereference and system crash (bnc#1058410).
- CVE-2017-12154: The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the
Linux kernel did not ensure that the "CR8-load exiting" and "CR8-store
exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR
shadow" vmcs12 control, which allowed KVM L2 guest OS users to obtain
read and write access to the hardware CR8 register (bnc#1058507).
- CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the
Linux kernel allowed local users to cause a denial of service
(__tcp_select_window divide-by-zero error and system crash) by
triggering a disconnect within a certain tcp_recvmsg code path
(bnc#1056982).
- CVE-2017-14140: The move_pages system call in mm/migrate.c in the Linux
kernel doesn't check the effective uid of the target process, enabling a
local attacker to learn the memory layout of a setuid executable despite
ASLR (bnc#1057179).
- CVE-2017-14051: An integer overflow in the
qla2x00_sysfs_write_optrom_ctl function in
drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel allowed local users
to cause a denial of service (memory corruption and system crash) by
leveraging root access (bnc#1056588).
- CVE-2017-10661: Race condition in fs/timerfd.c in the Linux kernel
allowed local users to gain privileges or cause a denial of service
(list corruption or use-after-free) via simultaneous file-descriptor
operations that leverage improper might_cancel queueing (bnc#1053152).
- CVE-2017-12762: In /drivers/isdn/i4l/isdn_net.c: A user-controlled
buffer is copied into a local buffer of constant size using strcpy
without a length check which can cause a buffer overflow. (bnc#1053148).
- CVE-2017-8831: The saa7164_bus_get function in
drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed
local users to cause a denial of service (out-of-bounds array access) or
possibly have unspecified other impact by changing a certain
sequence-number value, aka a "double fetch" vulnerability (bnc#1037994).
- CVE-2017-7482: A potential memory corruption was fixed in decoding of
krb5 principals in the kernels kerberos handling. (bnc#1046107).
- CVE-2017-7542: The ip6_find_1stfragopt function in
net/ipv6/output_core.c in the Linux kernel allowed local users to cause
a denial of service (integer overflow and infinite loop) by leveraging
the ability to open a raw socket (bnc#1049882).
- CVE-2017-11176: The mq_notify function in the Linux kernel did not set
the sock pointer to NULL upon entry into the retry logic. During a
user-space close of a Netlink socket, it allowed attackers to cause a
denial of service (use-after-free) or possibly have unspecified other
impact (bnc#1048275).
- CVE-2017-7541: The brcmf_cfg80211_mgmt_tx function in
drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux
kernel allowed local users to cause a denial of service (buffer overflow
and system crash) or possibly gain privileges via a crafted
NL80211_CMD_FRAME Netlink packet (bnc#1049645).
- CVE-2017-7518: The Linux kernel was vulnerable to an incorrect debug
exception(#DB) error. It could occur while emulating a syscall
instruction and potentially lead to guest privilege escalation.
(bsc#1045922).
- CVE-2017-8924: The edge_bulk_in_callback function in
drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to
obtain sensitive information (in the dmesg ringbuffer and syslog) from
uninitialized kernel memory by using a crafted USB device (posing as an
io_ti USB serial device) to trigger an integer underflow (bnc#1037182
bsc#1038982).
- CVE-2017-8925: The omninet_open function in drivers/usb/serial/omninet.c
in the Linux kernel allowed local users to cause a denial of service
(tty exhaustion) by leveraging reference count mishandling (bnc#1037183
bsc#1038981).
- CVE-2017-1000380: sound/core/timer.c in the Linux kernel was vulnerable
to a data race in the ALSA /dev/snd/timer driver resulting in local
users being able to read information belonging to other users, i.e.,
uninitialized memory contents might have been disclosed when a read and
an ioctl happen at the same time (bnc#1044125).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c
in the Linux kernel is too late in checking whether an overwrite of an
skb data structure may occur, which allowed local users to cause a
denial of service (system crash) via crafted system calls (bnc#1041431).
- CVE-2017-1000363: Linux drivers/char/lp.c Out-of-Bounds Write. Due to a
missing bounds check, and the fact that parport_ptr integer is static, a
'secure boot' kernel command line adversary (could happen due to
bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a
vulnerability the adversary has partial control over the command line)
could overflow the parport_nr array in the following code, by appending
many (>LP_NO) 'lp=none' arguments to the command line (bnc#1039456).
- CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c
in the Linux kernel mishandled inheritance, which allowed local users to
cause a denial of service or possibly have unspecified other impact via
crafted system calls, a related issue to CVE-2017-8890 (bnc#1039885).
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c
in the Linux kernel mishandled inheritance, which allowed local users to
cause a denial of service or possibly have unspecified other impact via
crafted system calls, a related issue to CVE-2017-8890 (bnc#1040069).
- CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c
in the Linux kernel mishandled inheritance, which allowed local users to
cause a denial of service or possibly have unspecified other impact via
crafted system calls, a related issue to CVE-2017-8890 (bnc#1039883).
- CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel
did not consider that the nexthdr field may be associated with an
invalid option, which allowed local users to cause a denial of service
(out-of-bounds read and BUG) or possibly have unspecified other impact
via crafted socket and send system calls (bnc#1039882).
- CVE-2017-7487: The ipxitf_ioctl function in net/ipx/af_ipx.c in the
Linux kernel mishandled reference counts, which allowed local users to
cause a denial of service (use-after-free) or possibly have unspecified
other impact via a failed SIOCGIFADDR ioctl call for an IPX interface
(bnc#1038879).
- CVE-2017-8890: The inet_csk_clone_lock function in
net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to
cause a denial of service (double free) or possibly have unspecified
other impact by leveraging use of the accept system call (bnc#1038544).
- CVE-2017-7889: The mm subsystem in the Linux kernel did not properly
enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allowed
local users to read or write to kernel memory locations in the first
megabyte (and bypass slab-allocation access restrictions) via an
application that opens the /dev/mem file, related to arch/x86/mm/init.c
and drivers/char/mem.c (bnc#1034405).
The following new features were implemented:
- the r8152 network driver was updated to support Realtek RTL8152/RTL8153
Based USB Ethernet Adapters (fate#321482)
The following non-security bugs were fixed:
- blkback/blktap: do not leak stack data via response ring (bsc#1042863
XSA-216).
- btrfs: Add WARN_ON for qgroup reserved underflow (bsc#1031515).
- btrfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- btrfs: Check qgroup level in kernel qgroup assign (bsc#1001459).
- btrfs: qgroup: allow to remove qgroup which has parent but no child
(bsc#1001459).
- btrfs: quota: Automatically update related qgroups or mark INCONSISTENT
flags when assigning/deleting a qgroup relations (bsc#1001459).
- ceph: Correctly return NXIO errors from ceph_llseek (git-fixes).
- ceph: fix file open flags on ppc64 (git-fixes).
- ceph: check i_nlink while converting a file handle to dentry
(bsc#1039864).
- drivers/net: delete non-required instances of include
<linux/init.h> (bsc#993099).
- drivers/net/usb: add device id for NVIDIA Tegra USB 3.0 Ethernet
(bsc#993099).
- drivers/net/usb: Add support for 'Lenovo OneLink Pro Dock' (bsc#993099).
- enic: set skb->hash type properly (bsc#922871).
- ext2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: Do not clear SGID when inheriting ACLs (bsc#1030552).
- firmware: dmi_scan: Fix ordering of product_uuid (bsc#1030531).
- fm10k: correctly check if interface is removed (bsc#922855).
- fs/block_dev: always invalidate cleancache in invalidate_bdev()
(git-fixes).
- fs: fix data invalidation in the cleancache during direct IO (git-fixes).
- fs/xattr.c: zero out memory copied to userspace in getxattr (git-fixes).
- hv: vmbus: Raise retry/wait limits in vmbus_post_msg() (bsc#1023287,
bsc#1028217, bsc#1048788).
- jhash: Update jhash_[321]words functions to use correct initval
(git-fixes).
- kABI: mask an include (bsc#994364).
- md: ensure md devices are freed before module is unloaded (git-fixes).
- md/raid0: apply base queue limits *before* disk_stack_limits (git-fixes).
- md/raid0: update queue parameter in a safer location (git-fixes).
- md/raid1: do not clear bitmap bit when bad-block-list write fails
(git-fixes).
- md/raid10: do not clear bitmap bit when bad-block-list write fails
(git-fixes).
- md/raid10: ensure device failure recorded before write request returns
(git-fixes).
- mlock: fix mlock count can not decrease in race condition (VM
Functionality, bsc#1042696).
- mlx: Revert the mlx5e_tx_notify_hw() changes.(bsc#1033960)
- mm/huge_memory: replace VM_NO_THP VM_BUG_ON with actual VMA check (VM
Functionality, bsc#1042832).
- mm: hugetlb: call huge_pte_alloc() only if ptep is null (VM
Functionality, bsc#1042832).
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack
(bnc#1039348).
- netfilter: bridge: Fix the build when IPV6 is disabled (bsc#1027149).
- net: get rid of SET_ETHTOOL_OPS (bsc#993099).
- net/usb/r8152: add device id for Lenovo TP USB 3.0 Ethernet (bsc#993099).
- netvsc: get rid of completion timeouts (bsc#1048788).
- nfs v4.1: Fix Oopsable condition in server callback races (git-fixes).
- ocfs2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- pid_ns: Sleep in TASK_INTERRUPTIBLE in zap_pid_ns_processes
(bnc#1012985).
- powerpc: Add missing error check to prom_find_boot_cpu() (bnc#856774).
- powerpc/book3s: Fix MCE console messages for unrecoverable MCE
(bnc#878240).
- powerpc/bpf/jit: Disable classic BPF JIT on ppc64le (bsc#1041429,
[2017-05-29] Pending SUSE Kernel Fixes).
- powerpc: Fix bad inline asm constraint in create_zero_mask()
(bnc#856774).
- powerpc/64: Fix flush_(d|i)cache_range() called from modules
(bnc#863764).
- printk: prevent userland from spoofing kernel messages (bsc#1039721).
- reiserfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- rtl8152: correct speed testing (bsc#993099).
- r8152: add functions to set EEE (bsc#993099).
- r8152: add MODULE_VERSION (bsc#993099).
- r8152: add mutex for hw settings (bsc#993099).
- r8152: add pre_reset and post_reset (bsc#993099).
- r8152: add reset_resume function (bsc#993099).
- r8152: add rtl_ops (bsc#993099).
- r8152: add skb_cow_head (bsc#993099).
- r8152: add three functions (bsc#993099).
- r8152: adjust ALDPS function (bsc#993099).
- r8152: adjust lpm timer (bsc#993099).
- r8152: adjust rtl_start_rx (bsc#993099).
- r8152: adjust rx_bottom (bsc#993099).
- r8152: adjust r8152_submit_rx (bsc#993099).
- r8152: adjust the line feed for hw_features (bsc#993099).
- r8152: adjust usb_autopm_xxx (bsc#993099).
- r8152: autoresume before setting feature (bsc#993099).
- r8152: autoresume before setting MAC address (bsc#993099).
- r8152: calculate the dropped packets for rx (bsc#993099).
- r8152: call rtl_start_rx after netif_carrier_on (bsc#993099).
- r8152: clear BMCR_PDOWN (bsc#993099).
- r8152: clear LINK_OFF_WAKE_EN after autoresume (bsc#993099).
- r8152: clear SELECTIVE_SUSPEND when autoresuming (bsc#993099).
- r8152: clear the flag of SCHEDULE_TASKLET in tasklet (bsc#993099).
- r8152: combine PHY reset with set_speed (bsc#993099).
- r8152: constify ethtool_ops structures (bsc#993099).
- r8152: correct some messages (bsc#993099).
- r8152: correct the rx early size (bsc#993099).
- r8152: deal with the empty line and space (bsc#993099).
- r8152: disable ALDPS and EEE before setting PHY (bsc#993099).
- r8152: disable ALDPS (bsc#993099).
- r8152: disable MAC clock speed down (bsc#993099).
- r8152: disable power cut for RTL8153 (bsc#993099).
- r8152: disable teredo for RTL8152 (bsc#993099).
- r8152: disable the capability of zero length (bsc#993099).
- r8152: disable the ECM mode (bsc#993099).
- r8152: disable the tasklet by default (bsc#993099).
- r8152: do not enable napi before rx ready (bsc#993099).
- r8152: ecm and vendor modes coexist (bsc#993099).
- r8152: fix incorrect type in assignment (bsc#993099).
- r8152: fix lockup when runtime PM is enabled (bsc#993099).
- r8152: fix runtime function for RTL8152 (bsc#993099).
- r8152: fix r8152_csum_workaround function (bsc#993099).
- r8152: fix setting RTL8152_UNPLUG (bsc#993099).
- r8152: fix the carrier off when autoresuming (bsc#993099).
- r8152: fix the checking of the usb speed (bsc#993099).
- r8152: fix the issue about U1/U2 (bsc#993099).
- r8152: fix the runtime suspend issues (bsc#993099).
- r8152: fix the submission of the interrupt transfer (bsc#993099).
- r8152: fix the wake event (bsc#993099).
- r8152: fix the warnings and a error from checkpatch.pl (bsc#993099).
- r8152: fix the wrong return value (bsc#993099).
- r8152: fix tx/rx memory overflow (bsc#993099).
- r8152: fix wakeup settings (bsc#993099).
- r8152: change rx early size when the mtu is changed (bsc#993099).
- r8152: change some definitions (bsc#993099).
- r8152: change the descriptor (bsc#993099).
- r8152: change the EEE definition (bsc#993099).
- r8152: change the location of rtl8152_set_mac_address (bsc#993099).
- r8152: check code with checkpatch.pl (bsc#993099).
- r8152: check linking status with netif_carrier_ok (bsc#993099).
- r8152: check RTL8152_UNPLUG and netif_running before autoresume
(bsc#993099).
- r8152: check RTL8152_UNPLUG (bsc#993099).
- r8152: check RTL8152_UNPLUG for rtl8152_close (bsc#993099).
- r8152: check the status before submitting rx (bsc#993099).
- r8152: check tx agg list before spin lock (bsc#993099).
- r8152: check WORK_ENABLE in suspend function (bsc#993099).
- r8152: increase the tx timeout (bsc#993099).
- r8152: load the default MAC address (bsc#993099).
- r8152: modify rtl_ops_init (bsc#993099).
- r8152: modify the check of the flag of PHY_RESET in set_speed function
(bsc#993099).
- r8152: modify the method of accessing PHY (bsc#993099).
- r8152: modify the tx flow (bsc#993099).
- r8152: move enabling PHY (bsc#993099).
- r8152: move PHY settings to hw_phy_cfg (bsc#993099).
- r8152: move rtl8152_unload and ocp_reg_write (bsc#993099).
- r8152: move r8152b_get_version (bsc#993099).
- r8152: move some functions (bsc#993099).
- r8152: move some functions (bsc#993099).
- r8152: move some functions from probe to open (bsc#993099).
- r8152: move the actions of saving the information of the device
(bsc#993099).
- r8152: move the setting for the default speed (bsc#993099).
- r8152: move the settings of PHY to a work queue (bsc#993099).
- r8152: nway reset after setting eee (bsc#993099).
- r8152: redefine REALTEK_USB_DEVICE (bsc#993099).
- r8152: reduce the frequency of spin_lock (bsc#993099).
- r8152: reduce the number of Tx (bsc#993099).
- r8152: remove a netif_carrier_off in rtl8152_open function (bsc#993099).
- r8152: remove cancel_delayed_work_sync in rtl8152_set_speed (bsc#993099).
- r8152: remove clearing bp (bsc#993099).
- r8152: remove generic_ocp_read before writing (bsc#993099).
- r8152: remove rtl_phy_reset function (bsc#993099).
- r8152: remove rtl8152_get_stats (bsc#993099).
- r8152: remove r8153_enable_eee (bsc#993099).
- r8152: remove sram_read (bsc#993099).
- r8152: remove the definitions of the PID (bsc#993099).
- r8152: remove the duplicate init for the list of rx_done (bsc#993099).
- r8152: remove the setting of LAN_WAKE_EN (bsc#993099).
- r8152: rename rx_buf_sz (bsc#993099).
- r8152: rename tx_underun (bsc#993099).
- r8152: replace get_protocol with vlan_get_protocol (bsc#993099).
- r8152: replace netdev_alloc_skb_ip_align with napi_alloc_skb
(bsc#993099).
- r8152: replace netif_rx with netif_receive_skb (bsc#993099).
- r8152: replace some tabs with spaces (bsc#993099).
- r8152: replace some types from int to bool (bsc#993099).
- r8152: replace spin_lock_irqsave and spin_unlock_irqrestore (bsc#993099).
- r8152: replace strncpy with strlcpy (bsc#993099).
- r8152: replace tasklet with NAPI (bsc#993099).
- r8152: replace the return value of rtl_ops_init (bsc#993099).
- r8152: replace tp->netdev with netdev (bsc#993099).
- r8152: reset device when tx timeout (bsc#993099).
- r8152: reset the bmu (bsc#993099).
- r8152: reset tp->speed before autoresuming in open function
(bsc#993099).
- r8152: restore hw settings (bsc#993099).
- r8152: return -EBUSY for runtime suspend (bsc#993099).
- r8152: save the speed (bsc#993099).
- r8152: separate USB_RX_EARLY_AGG (bsc#993099).
- r8152: set disable_hub_initiated_lpm (bsc#993099).
- r8152: set RTL8152_UNPLUG when finding -ENODEV (bsc#993099).
- r8152: split DRIVER_VERSION (bsc#993099).
- r8152: split rtl8152_enable (bsc#993099).
- r8152: stop submitting intr for -EPROTO (bsc#993099).
- r8152: support dumping the hw counters (bsc#993099).
- r8152: support ethtool eee (bsc#993099).
- r8152: support get_msglevel and set_msglevel (bsc#993099).
- r8152: support IPv6 (bsc#993099).
- r8152: support jumbo frame for RTL8153 (bsc#993099).
- r8152: support nway_reset of ethtool (bsc#993099).
- r8152: support RTL8153 (bsc#993099).
- r8152: support runtime suspend (bsc#993099).
- r8152: support rx checksum (bsc#993099).
- r8152: support setting rx coalesce (bsc#993099).
- r8152: support stopping/waking tx queue (bsc#993099).
- r8152: support the new RTL8153 chip (bsc#993099).
- r8152: support TSO (bsc#993099).
- r8152: support VLAN (bsc#993099).
- r8152: support WOL (bsc#993099).
- r8152: up the priority of the transmission (bsc#993099).
- r8152: use BIT macro (bsc#993099).
- r8152: use eth_hw_addr_random (bsc#993099).
- r8152: Use kmemdup instead of kmalloc + memcpy (bsc#993099).
- r8152: use test_and_clear_bit (bsc#993099).
- r8152: use usleep_range (bsc#993099).
- r8152: wake up the device before dumping the hw counter (bsc#993099).
- scsi: qla2xxx: Get mutex lock before checking optrom_state (bsc#1053317).
- sched/fair: Fix min_vruntime tracking (bnc#1012985).
- sched/loadavg: Fix loadavg artifacts on fully idle and on fully loaded
systems (bnc#1012985).
- sched/rt: Fix PI handling vs. sched_setscheduler() (bnc#1012985).
- sunrpc: Update RPCBIND_MAXNETIDLEN (git-fixes).
- syscall: fix dereferencing NULL payload with nonzero length
(bsc#1045327, bsc#1062471).
- tcp: do not inherit fastopen_req from parent (bsc#1038544).
- timekeeping: Ignore the bogus sleep time if pm_trace is enabled
(bsc#994364).
- tracing/kprobes: Enforce kprobes teardown after testing (bnc#1012985).
- usb: wusbcore: fix NULL-deref at probe (bsc#1045487).
- xen: Linux 3.12.74.
- xen/PCI-MSI: fix sysfs teardown in DomU (bsc#986924).
- xfs: fix a couple error sequence jumps in xfs_mountfs() (bsc#1035531).
- xfs: fix coccinelle warnings (bsc#1035531).
- xfs: handle error if xfs_btree_get_bufs fails (bsc#1059863).
- xfs: use ->b_state to fix buffer I/O accounting release race
(bsc#1041160) (bsc#1041160).
- xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present
(bsc#1058524).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 6:
zypper in -t patch SUSE-OpenStack-Cloud-6-2017-1799=1
- SUSE Linux Enterprise Server for SAP 12-SP1:
zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1799=1
- SUSE Linux Enterprise Server 12-SP1-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1799=1
- SUSE Linux Enterprise Module for Public Cloud 12:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2017-1799=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE OpenStack Cloud 6 (noarch):
kernel-devel-3.12.74-60.64.63.1
kernel-macros-3.12.74-60.64.63.1
kernel-source-3.12.74-60.64.63.1
- SUSE OpenStack Cloud 6 (x86_64):
kernel-default-3.12.74-60.64.63.1
kernel-default-base-3.12.74-60.64.63.1
kernel-default-base-debuginfo-3.12.74-60.64.63.1
kernel-default-debuginfo-3.12.74-60.64.63.1
kernel-default-debugsource-3.12.74-60.64.63.1
kernel-default-devel-3.12.74-60.64.63.1
kernel-syms-3.12.74-60.64.63.1
kernel-xen-3.12.74-60.64.63.1
kernel-xen-base-3.12.74-60.64.63.1
kernel-xen-base-debuginfo-3.12.74-60.64.63.1
kernel-xen-debuginfo-3.12.74-60.64.63.1
kernel-xen-debugsource-3.12.74-60.64.63.1
kernel-xen-devel-3.12.74-60.64.63.1
kgraft-patch-3_12_74-60_64_63-default-1-2.1
kgraft-patch-3_12_74-60_64_63-xen-1-2.1
- SUSE Linux Enterprise Server for SAP 12-SP1 (ppc64le x86_64):
kernel-default-3.12.74-60.64.63.1
kernel-default-base-3.12.74-60.64.63.1
kernel-default-base-debuginfo-3.12.74-60.64.63.1
kernel-default-debuginfo-3.12.74-60.64.63.1
kernel-default-debugsource-3.12.74-60.64.63.1
kernel-default-devel-3.12.74-60.64.63.1
kernel-syms-3.12.74-60.64.63.1
- SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):
kernel-xen-3.12.74-60.64.63.1
kernel-xen-base-3.12.74-60.64.63.1
kernel-xen-base-debuginfo-3.12.74-60.64.63.1
kernel-xen-debuginfo-3.12.74-60.64.63.1
kernel-xen-debugsource-3.12.74-60.64.63.1
kernel-xen-devel-3.12.74-60.64.63.1
kgraft-patch-3_12_74-60_64_63-default-1-2.1
kgraft-patch-3_12_74-60_64_63-xen-1-2.1
- SUSE Linux Enterprise Server for SAP 12-SP1 (noarch):
kernel-devel-3.12.74-60.64.63.1
kernel-macros-3.12.74-60.64.63.1
kernel-source-3.12.74-60.64.63.1
- SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):
kernel-default-3.12.74-60.64.63.1
kernel-default-base-3.12.74-60.64.63.1
kernel-default-base-debuginfo-3.12.74-60.64.63.1
kernel-default-debuginfo-3.12.74-60.64.63.1
kernel-default-debugsource-3.12.74-60.64.63.1
kernel-default-devel-3.12.74-60.64.63.1
kernel-syms-3.12.74-60.64.63.1
- SUSE Linux Enterprise Server 12-SP1-LTSS (noarch):
kernel-devel-3.12.74-60.64.63.1
kernel-macros-3.12.74-60.64.63.1
kernel-source-3.12.74-60.64.63.1
- SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):
kernel-xen-3.12.74-60.64.63.1
kernel-xen-base-3.12.74-60.64.63.1
kernel-xen-base-debuginfo-3.12.74-60.64.63.1
kernel-xen-debuginfo-3.12.74-60.64.63.1
kernel-xen-debugsource-3.12.74-60.64.63.1
kernel-xen-devel-3.12.74-60.64.63.1
kgraft-patch-3_12_74-60_64_63-default-1-2.1
kgraft-patch-3_12_74-60_64_63-xen-1-2.1
- SUSE Linux Enterprise Server 12-SP1-LTSS (s390x):
kernel-default-man-3.12.74-60.64.63.1
- SUSE Linux Enterprise Module for Public Cloud 12 (x86_64):
kernel-ec2-3.12.74-60.64.63.1
kernel-ec2-debuginfo-3.12.74-60.64.63.1
kernel-ec2-debugsource-3.12.74-60.64.63.1
kernel-ec2-devel-3.12.74-60.64.63.1
kernel-ec2-extra-3.12.74-60.64.63.1
kernel-ec2-extra-debuginfo-3.12.74-60.64.63.1
References:
https://www.suse.com/security/cve/CVE-2017-1000363.html
https://www.suse.com/security/cve/CVE-2017-1000365.html
https://www.suse.com/security/cve/CVE-2017-1000380.html
https://www.suse.com/security/cve/CVE-2017-10661.html
https://www.suse.com/security/cve/CVE-2017-11176.html
https://www.suse.com/security/cve/CVE-2017-12153.html
https://www.suse.com/security/cve/CVE-2017-12154.html
https://www.suse.com/security/cve/CVE-2017-12762.html
https://www.suse.com/security/cve/CVE-2017-13080.html
https://www.suse.com/security/cve/CVE-2017-14051.html
https://www.suse.com/security/cve/CVE-2017-14106.html
https://www.suse.com/security/cve/CVE-2017-14140.html
https://www.suse.com/security/cve/CVE-2017-15265.html
https://www.suse.com/security/cve/CVE-2017-15274.html
https://www.suse.com/security/cve/CVE-2017-15649.html
https://www.suse.com/security/cve/CVE-2017-7482.html
https://www.suse.com/security/cve/CVE-2017-7487.html
https://www.suse.com/security/cve/CVE-2017-7518.html
https://www.suse.com/security/cve/CVE-2017-7541.html
https://www.suse.com/security/cve/CVE-2017-7542.html
https://www.suse.com/security/cve/CVE-2017-7889.html
https://www.suse.com/security/cve/CVE-2017-8831.html
https://www.suse.com/security/cve/CVE-2017-8890.html
https://www.suse.com/security/cve/CVE-2017-8924.html
https://www.suse.com/security/cve/CVE-2017-8925.html
https://www.suse.com/security/cve/CVE-2017-9074.html
https://www.suse.com/security/cve/CVE-2017-9075.html
https://www.suse.com/security/cve/CVE-2017-9076.html
https://www.suse.com/security/cve/CVE-2017-9077.html
https://www.suse.com/security/cve/CVE-2017-9242.html
https://bugzilla.suse.com/1001459
https://bugzilla.suse.com/1012985
https://bugzilla.suse.com/1023287
https://bugzilla.suse.com/1027149
https://bugzilla.suse.com/1028217
https://bugzilla.suse.com/1030531
https://bugzilla.suse.com/1030552
https://bugzilla.suse.com/1031515
https://bugzilla.suse.com/1033960
https://bugzilla.suse.com/1034405
https://bugzilla.suse.com/1035531
https://bugzilla.suse.com/1035738
https://bugzilla.suse.com/1037182
https://bugzilla.suse.com/1037183
https://bugzilla.suse.com/1037994
https://bugzilla.suse.com/1038544
https://bugzilla.suse.com/1038564
https://bugzilla.suse.com/1038879
https://bugzilla.suse.com/1038883
https://bugzilla.suse.com/1038981
https://bugzilla.suse.com/1038982
https://bugzilla.suse.com/1039348
https://bugzilla.suse.com/1039354
https://bugzilla.suse.com/1039456
https://bugzilla.suse.com/1039721
https://bugzilla.suse.com/1039864
https://bugzilla.suse.com/1039882
https://bugzilla.suse.com/1039883
https://bugzilla.suse.com/1039885
https://bugzilla.suse.com/1040069
https://bugzilla.suse.com/1041160
https://bugzilla.suse.com/1041429
https://bugzilla.suse.com/1041431
https://bugzilla.suse.com/1042696
https://bugzilla.suse.com/1042832
https://bugzilla.suse.com/1042863
https://bugzilla.suse.com/1044125
https://bugzilla.suse.com/1045327
https://bugzilla.suse.com/1045487
https://bugzilla.suse.com/1045922
https://bugzilla.suse.com/1046107
https://bugzilla.suse.com/1048275
https://bugzilla.suse.com/1048788
https://bugzilla.suse.com/1049645
https://bugzilla.suse.com/1049882
https://bugzilla.suse.com/1053148
https://bugzilla.suse.com/1053152
https://bugzilla.suse.com/1053317
https://bugzilla.suse.com/1056588
https://bugzilla.suse.com/1056982
https://bugzilla.suse.com/1057179
https://bugzilla.suse.com/1058410
https://bugzilla.suse.com/1058507
https://bugzilla.suse.com/1058524
https://bugzilla.suse.com/1059863
https://bugzilla.suse.com/1062471
https://bugzilla.suse.com/1062520
https://bugzilla.suse.com/1063667
https://bugzilla.suse.com/1064388
https://bugzilla.suse.com/856774
https://bugzilla.suse.com/860250
https://bugzilla.suse.com/863764
https://bugzilla.suse.com/878240
https://bugzilla.suse.com/922855
https://bugzilla.suse.com/922871
https://bugzilla.suse.com/986924
https://bugzilla.suse.com/993099
https://bugzilla.suse.com/994364
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:2905-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 29 Oct '17
by opensuse-security@opensuse.org 29 Oct '17
29 Oct '17
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:2905-1
Rating: important
References: #1012382 #1020645 #1022595 #1022600 #1025461
#1028971 #1034048 #1055567 #1056427 #1059863
#1060985 #1061451 #1062520 #1062962 #1063460
#1063475 #1063501 #1063509 #1063520 #1063667
#1063695 #1064206 #1064388 #964944 #966170
#966172 #966186 #966191 #966316 #966318 #969474
#969475 #969476 #969477 #971975
Cross-References: CVE-2017-13080 CVE-2017-15265 CVE-2017-15649
Affected Products:
openSUSE Leap 42.2
______________________________________________________________________________
An update that solves three vulnerabilities and has 32
fixes is now available.
Description:
The openSUSE Leap 42.2 kernel was updated to 4.4.92 to receive various
security and bugfixes.
The following security bugs were fixed:
- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed
reinstallation of the Group Temporal Key (GTK) during the group key
handshake, allowing an attacker within radio range to replay frames from
access points to clients (bnc#1063667).
- CVE-2017-15265: Race condition in the ALSA subsystem in the Linux kernel
allowed local users to cause a denial of service (use-after-free) or
possibly have unspecified other impact via crafted /dev/snd/seq ioctl
calls, related to sound/core/seq/seq_clientmgr.c and
sound/core/seq/seq_ports.c (bnc#1062520).
- CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local
users to gain privileges via crafted system calls that trigger
mishandling of packet_fanout data structures, because of a race
condition (involving fanout_add and packet_do_bind) that leads to a
use-after-free, a different vulnerability than CVE-2017-6346
(bnc#1064388).
The following non-security bugs were fixed:
- alsa: au88x0: avoid theoretical uninitialized access (bnc#1012382).
- alsa: compress: Remove unused variable (bnc#1012382).
- alsa: usb-audio: Check out-of-bounds access by corrupted buffer
descriptor (bnc#1012382).
- alsa: usx2y: Suppress kernel warning at page allocation failures
(bnc#1012382).
- arm: 8635/1: nommu: allow enabling REMAP_VECTORS_TO_RAM (bnc#1012382).
- arm: dts: r8a7790: Use R-Car Gen 2 fallback binding for msiof nodes
(bnc#1012382).
- arm: remove duplicate 'const' annotations' (bnc#1012382).
- asoc: dapm: fix some pointer error handling (bnc#1012382).
- asoc: dapm: handle probe deferrals (bnc#1012382).
- audit: log 32-bit socketcalls (bnc#1012382).
- blacklist 0e7736c6b806 powerpc/powernv: Fix data type for @r in
pnv_ioda_parse_m64_window()
- blacklist.conf: not fitting cleanup patch
- brcmfmac: setup passive scan if requested by user-space (bnc#1012382).
- bridge: netlink: register netdevice before executing changelink
(bnc#1012382).
- ceph: avoid panic in create_session_open_msg() if utsname() returns NULL
(bsc#1061451).
- ceph: check negative offsets in ceph_llseek() (bsc#1061451).
- driver core: platform: Do not read past the end of "driver_override"
buffer (bnc#1012382).
- drivers: firmware: psci: drop duplicate const from psci_of_match
(bnc#1012382).
- drivers: hv: fcopy: restore correct transfer length (bnc#1012382).
- drm/amdkfd: fix improper return value on error (bnc#1012382).
- drm: bridge: add DT bindings for TI ths8135 (bnc#1012382).
- drm_fourcc: Fix DRM_FORMAT_MOD_LINEAR #define (bnc#1012382).
- drm/i915/bios: ignore HDMI on port A (bnc#1012382).
- ext4: do not allow encrypted operations without keys (bnc#1012382).
- extcon: axp288: Use vbus-valid instead of -present to determine cable
presence (bnc#1012382).
- exynos-gsc: Do not swap cb/cr for semi planar formats (bnc#1012382).
- fix whitespace according to upstream commit
- fs/epoll: cache leftmost node (bsc#1056427).
- ftrace: Fix kmemleak in unregister_ftrace_graph (bnc#1012382).
- gfs2: Fix reference to ERR_PTR in gfs2_glock_iter_next (bnc#1012382).
- hid: i2c-hid: allocate hid buffers for real worst case (bnc#1012382).
- hpsa: correct lun data caching bitmap definition (bsc#1028971).
- hwmon: (gl520sm) Fix overflows and crash seen when writing into limit
attributes (bnc#1012382).
- i2c: meson: fix wrong variable usage in meson_i2c_put_data (bnc#1012382).
- i40e: Initialize 64-bit statistics TX ring seqcount (bsc#969476
FATE#319648 bsc#969477 FATE#319816).
- i40iw: Add missing memory barriers (bsc#969476 FATE#319648 bsc#969477
FATE#319816).
- i40iw: Fix port number for query QP (bsc#969476 FATE#319648 bsc#969477
FATE#319816).
- ib/core: Fix for core panic (bsc#1022595 FATE#322350).
- ib/core: Fix the validations of a multicast LID in attach or detach
operations (bsc#1022595 FATE#322350).
- ib/i40iw: Fix error code in i40iw_create_cq() (bsc#969476 FATE#319648
bsc#969477 FATE#319816).
- ib/ipoib: Fix deadlock over vlan_mutex (bnc#1012382).
- ib/ipoib: Replace list_del of the neigh->list with list_del_init
(bnc#1012382).
- ib/ipoib: rtnl_unlock can not come after free_netdev (bnc#1012382).
- ib/mlx5: Fix Raw Packet QP event handler assignment (bsc#966170
FATE#320225 bsc#966172 FATE#320226).
- ibmvnic: Set state UP (bsc#1062962).
- ib/qib: fix false-postive maybe-uninitialized warning (bnc#1012382).
- igb: re-assign hw address pointer on reset after PCI error (bnc#1012382).
- iio: ad7793: Fix the serial interface reset (bnc#1012382).
- iio: adc: axp288: Drop bogus AXP288_ADC_TS_PIN_CTRL register
modifications (bnc#1012382).
- iio: adc: hx711: Add DT binding for avia,hx711 (bnc#1012382).
- iio: adc: mcp320x: Fix oops on module unload (bnc#1012382).
- iio: adc: mcp320x: Fix readout of negative voltages (bnc#1012382).
- iio: adc: twl4030: Disable the vusb3v1 rugulator in the error handling
path of 'twl4030_madc_probe()' (bnc#1012382).
- iio: adc: twl4030: Fix an error handling path in 'twl4030_madc_probe()'
(bnc#1012382).
- iio: ad_sigma_delta: Implement a dedicated reset function (bnc#1012382).
- iio: core: Return error for failed read_reg (bnc#1012382).
- iommu/io-pgtable-arm: Check for leaf entry before dereferencing it
(bnc#1012382).
- iwlwifi: add workaround to disable wide channels in 5GHz (bnc#1012382).
- ixgbe: Fix incorrect bitwise operations of PTP Rx timestamp flags
(bsc#969474 FATE#319812 bsc#969475 FATE#319814).
- kABI: protect struct rm_data_op (kabi).
- kABI: protect struct sdio_func (kabi).
- libata: transport: Remove circular dependency at free time (bnc#1012382).
- lsm: fix smack_inode_removexattr and xattr_getsecurity memleak
(bnc#1012382).
- md/raid10: submit bio directly to replacement disk (bnc#1012382).
- mips: Ensure bss section ends on a long-aligned address (bnc#1012382).
- mips: Fix minimum alignment requirement of IRQ stack (git-fixes).
- mips: IRQ Stack: Unwind IRQ stack onto task stack (bnc#1012382).
- mips: Lantiq: Fix another request_mem_region() return code check
(bnc#1012382).
- mips: ralink: Fix incorrect assignment on ralink_soc (bnc#1012382).
- mlx5: Avoid that mlx5_ib_sg_to_klms() overflows the klms array
(bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- mm/backing-dev.c: fix an error handling path in 'cgwb_create()'
(bnc#1063475).
- mm,compaction: serialize waitqueue_active() checks (for real)
(bsc#971975).
- mmc: sdio: fix alignment issue in struct sdio_func (bnc#1012382).
- mm: discard memblock data later (bnc#1063460).
- mm/memblock.c: reversed logic in memblock_discard() (bnc#1063460).
- mm: meminit: mark init_reserved_page as __meminit (bnc#1063509).
- mm/memory_hotplug: change pfn_to_section_nr/section_nr_to_pfn macro to
inline function (bnc#1063501).
- mm/memory_hotplug: define find_{smallest|biggest}_section_pfn as
unsigned long (bnc#1063520).
- net: core: Prevent from dereferencing null pointer when releasing SKB
(bnc#1012382).
- netfilter: invoke synchronize_rcu after set the _hook_ to NULL
(bnc#1012382).
- netfilter: nfnl_cthelper: fix incorrect helper->expect_class_max
(bnc#1012382).
- net/mlx4_core: Enable 4K UAR if SRIOV module parameter is not enabled
(bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- net/mlx5e: Fix wrong delay calculation for overflow check scheduling
(bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: Schedule overflow check work to mlx5e workqueue (bsc#966170
FATE#320225 bsc#966172 FATE#320226).
- net/mlx5: Skip mlx5_unload_one if mlx5_load_one fails (bsc#966170
FATE#320225 bsc#966172 FATE#320226).
- net/packet: check length in getsockopt() called with PACKET_HDRLEN
(bnc#1012382).
- nvme: protect against simultaneous shutdown invocations (FATE#319965
bnc#1012382 bsc#964944).
- parisc: perf: Fix potential NULL pointer dereference (bnc#1012382).
- partitions/efi: Fix integer overflow in GPT size calculation
(bnc#1012382).
- qed: Fix stack corruption on probe (bsc#966318 FATE#320158 bsc#966316
FATE#320159).
- rds: ib: add error handle (bnc#1012382).
- rds: RDMA: Fix the composite message user notification (bnc#1012382).
- README.BRANCH: Add Michal and Johannes as co-maintainers.
- sched/cpuset/pm: Fix cpuset vs. suspend-resume bugs (bnc#1012382).
- scsi: hpsa: add 'ctlr_num' sysfs attribute (bsc#1028971).
- scsi: hpsa: bump driver version (bsc#1022600 fate#321928).
- scsi: hpsa: change driver version (bsc#1022600 bsc#1028971 fate#321928).
- scsi: hpsa: Check for null device pointers (bsc#1028971).
- scsi: hpsa: Check for null devices in ioaccel (bsc#1028971).
- scsi: hpsa: Check for vpd support before sending (bsc#1028971).
- scsi: hpsa: cleanup reset handler (bsc#1022600 fate#321928).
- scsi: hpsa: correct call to hpsa_do_reset (bsc#1028971).
- scsi: hpsa: correct logical resets (bsc#1028971).
- scsi: hpsa: correct queue depth for externals (bsc#1022600 fate#321928).
- scsi: hpsa: correct resets on retried commands (bsc#1022600 fate#321928).
- scsi: hpsa: correct scsi 6byte lba calculation (bsc#1028971).
- scsi: hpsa: Determine device external status earlier (bsc#1028971).
- scsi: hpsa: do not get enclosure info for external devices (bsc#1022600
fate#321928).
- scsi: hpsa: do not reset enclosures (bsc#1022600 fate#321928).
- scsi: hpsa: do not timeout reset operations (bsc#1022600 bsc#1028971
fate#321928).
- scsi: hpsa: fallback to use legacy REPORT PHYS command (bsc#1028971).
- scsi: hpsa: fix volume offline state (bsc#1022600 bsc#1028971
fate#321928).
- scsi: hpsa: limit outstanding rescans (bsc#1022600 bsc#1028971
fate#321928).
- scsi: hpsa: Prevent sending bmic commands to externals (bsc#1028971).
- scsi: hpsa: remove abort handler (bsc#1022600 fate#321928).
- scsi: hpsa: remove coalescing settings for ioaccel2 (bsc#1028971).
- scsi: hpsa: remove memory allocate failure message (bsc#1028971).
- scsi: hpsa: Remove unneeded void pointer cast (bsc#1028971).
- scsi: hpsa: rescan later if reset in progress (bsc#1022600 fate#321928).
- scsi: hpsa: send ioaccel requests with 0 length down raid path
(bsc#1022600 fate#321928).
- scsi: hpsa: separate monitor events from rescan worker (bsc#1022600
fate#321928).
- scsi: hpsa: update check for logical volume status (bsc#1022600
bsc#1028971 fate#321928).
- scsi: hpsa: update identify physical device structure (bsc#1022600
fate#321928).
- scsi: hpsa: update pci ids (bsc#1022600 bsc#1028971 fate#321928).
- scsi: hpsa: update reset handler (bsc#1022600 fate#321928).
- scsi: hpsa: use designated initializers (bsc#1028971).
- scsi: hpsa: use %phN for short hex dumps (bsc#1028971).
- scsi: libfc: fix a deadlock in fc_rport_work (bsc#1063695).
- scsi: sd: Do not override max_sectors_kb sysfs setting (bsc#1025461).
- scsi: sd: Remove LBPRZ dependency for discards (bsc#1060985). This patch
is originally part of a larger series which can't be easily backported
to SLE-12. For a reasoning why we think it's safe to apply, see
bsc#1060985, comment 20.
- scsi: sg: close race condition in sg_remove_sfp_usercontext()
(bsc#1064206).
- sh_eth: use correct name for ECMR_MPDE bit (bnc#1012382).
- staging: iio: ad7192: Fix - use the dedicated reset function avoiding
dma from stack (bnc#1012382).
- stm class: Fix a use-after-free (bnc#1012382).
- supported.conf: mark hid-multitouch as supported (FATE#323670)
- team: call netdev_change_features out of team lock (bsc#1055567).
- team: fix memory leaks (bnc#1012382).
- tpm_tis: Do not fall back to a hardcoded address for TPM2 (bsc#1020645,
fate#321435, fate#321507, fate#321600, bsc#1034048).
- ttpci: address stringop overflow warning (bnc#1012382).
- tty: goldfish: Fix a parameter of a call to free_irq (bnc#1012382).
- usb: chipidea: vbus event may exist before starting gadget (bnc#1012382).
- usb: core: harden cdc_parse_cdc_header (bnc#1012382).
- usb: devio: Do not corrupt user memory (bnc#1012382).
- usb: dummy-hcd: fix connection failures (wrong speed) (bnc#1012382).
- usb: dummy-hcd: Fix erroneous synchronization change (bnc#1012382).
- usb: dummy-hcd: fix infinite-loop resubmission bug (bnc#1012382).
- usb: fix out-of-bounds in usb_set_configuration (bnc#1012382).
- usb: gadgetfs: fix copy_to_user while holding spinlock (bnc#1012382).
- usb: gadgetfs: Fix crash caused by inadequate synchronization
(bnc#1012382).
- usb: gadget: inode.c: fix unbalanced spin_lock in ep0_write
(bnc#1012382).
- usb: gadget: mass_storage: set msg_registered after msg registered
(bnc#1012382).
- usb: gadget: udc: atmel: set vbus irqflags explicitly (bnc#1012382).
- usb: g_mass_storage: Fix deadlock when driver is unbound (bnc#1012382).
- usb: Increase quirk delay for USB devices (bnc#1012382).
- usb: pci-quirks.c: Corrected timeout values used in handshake
(bnc#1012382).
- usb: plusb: Add support for PL-27A1 (bnc#1012382).
- usb: renesas_usbhs: fix the BCLR setting condition for non-DCP pipe
(bnc#1012382).
- usb: renesas_usbhs: fix usbhsf_fifo_clear() for RX direction
(bnc#1012382).
- usb: serial: mos7720: fix control-message error handling (bnc#1012382).
- usb: serial: mos7840: fix control-message error handling (bnc#1012382).
- usb-storage: unusual_devs entry to fix write-access regression for
Seagate external drives (bnc#1012382).
- usb: uas: fix bug in handling of alternate settings (bnc#1012382).
- uwb: ensure that endpoint is interrupt (bnc#1012382).
- uwb: properly check kthread_run return value (bnc#1012382).
- xfs: handle error if xfs_btree_get_bufs fails (bsc#1059863).
- xfs: remove kmem_zalloc_greedy (bnc#1012382).
- xhci: fix finding correct bus_state structure for USB 3.1 hosts
(bnc#1012382).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-1224=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.2 (noarch):
kernel-devel-4.4.92-18.36.1
kernel-docs-4.4.92-18.36.2
kernel-docs-html-4.4.92-18.36.2
kernel-docs-pdf-4.4.92-18.36.2
kernel-macros-4.4.92-18.36.1
kernel-source-4.4.92-18.36.1
kernel-source-vanilla-4.4.92-18.36.1
- openSUSE Leap 42.2 (x86_64):
kernel-debug-4.4.92-18.36.1
kernel-debug-base-4.4.92-18.36.1
kernel-debug-base-debuginfo-4.4.92-18.36.1
kernel-debug-debuginfo-4.4.92-18.36.1
kernel-debug-debugsource-4.4.92-18.36.1
kernel-debug-devel-4.4.92-18.36.1
kernel-debug-devel-debuginfo-4.4.92-18.36.1
kernel-default-4.4.92-18.36.1
kernel-default-base-4.4.92-18.36.1
kernel-default-base-debuginfo-4.4.92-18.36.1
kernel-default-debuginfo-4.4.92-18.36.1
kernel-default-debugsource-4.4.92-18.36.1
kernel-default-devel-4.4.92-18.36.1
kernel-obs-build-4.4.92-18.36.1
kernel-obs-build-debugsource-4.4.92-18.36.1
kernel-obs-qa-4.4.92-18.36.1
kernel-syms-4.4.92-18.36.1
kernel-vanilla-4.4.92-18.36.1
kernel-vanilla-base-4.4.92-18.36.1
kernel-vanilla-base-debuginfo-4.4.92-18.36.1
kernel-vanilla-debuginfo-4.4.92-18.36.1
kernel-vanilla-debugsource-4.4.92-18.36.1
kernel-vanilla-devel-4.4.92-18.36.1
References:
https://www.suse.com/security/cve/CVE-2017-13080.html
https://www.suse.com/security/cve/CVE-2017-15265.html
https://www.suse.com/security/cve/CVE-2017-15649.html
https://bugzilla.suse.com/1012382
https://bugzilla.suse.com/1020645
https://bugzilla.suse.com/1022595
https://bugzilla.suse.com/1022600
https://bugzilla.suse.com/1025461
https://bugzilla.suse.com/1028971
https://bugzilla.suse.com/1034048
https://bugzilla.suse.com/1055567
https://bugzilla.suse.com/1056427
https://bugzilla.suse.com/1059863
https://bugzilla.suse.com/1060985
https://bugzilla.suse.com/1061451
https://bugzilla.suse.com/1062520
https://bugzilla.suse.com/1062962
https://bugzilla.suse.com/1063460
https://bugzilla.suse.com/1063475
https://bugzilla.suse.com/1063501
https://bugzilla.suse.com/1063509
https://bugzilla.suse.com/1063520
https://bugzilla.suse.com/1063667
https://bugzilla.suse.com/1063695
https://bugzilla.suse.com/1064206
https://bugzilla.suse.com/1064388
https://bugzilla.suse.com/964944
https://bugzilla.suse.com/966170
https://bugzilla.suse.com/966172
https://bugzilla.suse.com/966186
https://bugzilla.suse.com/966191
https://bugzilla.suse.com/966316
https://bugzilla.suse.com/966318
https://bugzilla.suse.com/969474
https://bugzilla.suse.com/969475
https://bugzilla.suse.com/969476
https://bugzilla.suse.com/969477
https://bugzilla.suse.com/971975
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:2902-1: important: Security update for chromium
by opensuse-security@opensuse.org 28 Oct '17
by opensuse-security@opensuse.org 28 Oct '17
28 Oct '17
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:2902-1
Rating: important
References: #1064066 #1065405
Cross-References: CVE-2017-15386 CVE-2017-15387 CVE-2017-15388
CVE-2017-15389 CVE-2017-15390 CVE-2017-15391
CVE-2017-15392 CVE-2017-15393 CVE-2017-15394
CVE-2017-15395 CVE-2017-15396 CVE-2017-5124
CVE-2017-5125 CVE-2017-5126 CVE-2017-5127
CVE-2017-5128 CVE-2017-5129 CVE-2017-5130
CVE-2017-5131 CVE-2017-5132 CVE-2017-5133
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________
An update that fixes 21 vulnerabilities is now available.
Description:
This update to Chromium 62.0.3202.75 fixes the following security issues:
- CVE-2017-5124: UXSS with MHTML
- CVE-2017-5125: Heap overflow in Skia
- CVE-2017-5126: Use after free in PDFium
- CVE-2017-5127: Use after free in PDFium
- CVE-2017-5128: Heap overflow in WebGL
- CVE-2017-5129: Use after free in WebAudio
- CVE-2017-5132: Incorrect stack manipulation in WebAssembly.
- CVE-2017-5130: Heap overflow in libxml2
- CVE-2017-5131: Out of bounds write in Skia
- CVE-2017-5133: Out of bounds write in Skia
- CVE-2017-15386: UI spoofing in Blink
- CVE-2017-15387: Content security bypass
- CVE-2017-15388: Out of bounds read in Skia
- CVE-2017-15389: URL spoofing in OmniBox
- CVE-2017-15390: URL spoofing in OmniBox
- CVE-2017-15391: Extension limitation bypass in Extensions.
- CVE-2017-15392: Incorrect registry key handling in PlatformIntegration
- CVE-2017-15393: Referrer leak in Devtools
- CVE-2017-15394: URL spoofing in extensions UI
- CVE-2017-15395: Null pointer dereference in ImageCapture
- CVE-2017-15396: Stack overflow in V8
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2017-1221=1
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-1221=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (x86_64):
chromedriver-62.0.3202.75-118.1
chromedriver-debuginfo-62.0.3202.75-118.1
chromium-62.0.3202.75-118.1
chromium-debuginfo-62.0.3202.75-118.1
chromium-debugsource-62.0.3202.75-118.1
- openSUSE Leap 42.2 (x86_64):
chromedriver-62.0.3202.75-104.32.1
chromedriver-debuginfo-62.0.3202.75-104.32.1
chromium-62.0.3202.75-104.32.1
chromium-debuginfo-62.0.3202.75-104.32.1
chromium-debugsource-62.0.3202.75-104.32.1
References:
https://www.suse.com/security/cve/CVE-2017-15386.html
https://www.suse.com/security/cve/CVE-2017-15387.html
https://www.suse.com/security/cve/CVE-2017-15388.html
https://www.suse.com/security/cve/CVE-2017-15389.html
https://www.suse.com/security/cve/CVE-2017-15390.html
https://www.suse.com/security/cve/CVE-2017-15391.html
https://www.suse.com/security/cve/CVE-2017-15392.html
https://www.suse.com/security/cve/CVE-2017-15393.html
https://www.suse.com/security/cve/CVE-2017-15394.html
https://www.suse.com/security/cve/CVE-2017-15395.html
https://www.suse.com/security/cve/CVE-2017-15396.html
https://www.suse.com/security/cve/CVE-2017-5124.html
https://www.suse.com/security/cve/CVE-2017-5125.html
https://www.suse.com/security/cve/CVE-2017-5126.html
https://www.suse.com/security/cve/CVE-2017-5127.html
https://www.suse.com/security/cve/CVE-2017-5128.html
https://www.suse.com/security/cve/CVE-2017-5129.html
https://www.suse.com/security/cve/CVE-2017-5130.html
https://www.suse.com/security/cve/CVE-2017-5131.html
https://www.suse.com/security/cve/CVE-2017-5132.html
https://www.suse.com/security/cve/CVE-2017-5133.html
https://bugzilla.suse.com/1064066
https://bugzilla.suse.com/1065405
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:2896-1: important: Security update for hostapd
by opensuse-security@opensuse.org 27 Oct '17
by opensuse-security@opensuse.org 27 Oct '17
27 Oct '17
openSUSE Security Update: Security update for hostapd
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:2896-1
Rating: important
References: #1063479 #930077 #930078 #930079
Cross-References: CVE-2015-1863 CVE-2015-4141 CVE-2015-4142
CVE-2015-4143 CVE-2015-4144 CVE-2015-4145
CVE-2015-5314 CVE-2016-4476 CVE-2017-13078
CVE-2017-13079 CVE-2017-13080 CVE-2017-13081
CVE-2017-13087 CVE-2017-13088
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________
An update that fixes 14 vulnerabilities is now available.
Description:
This update for hostapd fixes the following issues:
- Fix KRACK attacks on the AP side (boo#1063479, CVE-2017-13078,
CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13087,
CVE-2017-13088):
Hostap was updated to upstream release 2.6
* fixed EAP-pwd last fragment validation [http://w1.fi/security/2015-7/]
(CVE-2015-5314)
* fixed WPS configuration update vulnerability with malformed passphrase
[http://w1.fi/security/2016-1/] (CVE-2016-4476)
* extended channel switch support for VHT bandwidth changes
* added support for configuring new ANQP-elements with
anqp_elem=<InfoID>:<hexdump of payload>
* fixed Suite B 192-bit AKM to use proper PMK length (note: this makes old
releases incompatible with the fixed behavior)
* added no_probe_resp_if_max_sta=1 parameter to disable Probe Response
frame sending for not-associated STAs if max_num_sta limit has been
reached
* added option (-S as command line argument) to request all interfaces to
be started at the same time
* modified rts_threshold and fragm_threshold configuration parameters to
allow -1 to be used to disable RTS/fragmentation
* EAP-pwd: added support for Brainpool Elliptic Curves (with OpenSSL 1.0.2
and newer)
* fixed EAPOL reauthentication after FT protocol run
* fixed FTIE generation for 4-way handshake after FT protocol run
* fixed and improved various FST operations
* TLS server
- support SHA384 and SHA512 hashes
- support TLS v1.2 signature algorithm with SHA384 and SHA512
- support PKCS #5 v2.0 PBES2
- support PKCS #5 with PKCS #12 style key decryption
- minimal support for PKCS #12
- support OCSP stapling (including ocsp_multi)
* added support for OpenSSL 1.1 API changes
- drop support for OpenSSL 0.9.8
- drop support for OpenSSL 1.0.0
* EAP-PEAP: support fast-connect crypto binding
* RADIUS
- fix Called-Station-Id to not escape SSID
- add Event-Timestamp to all Accounting-Request packets
- add Acct-Session-Id to Accounting-On/Off
- add Acct-Multi-Session-Id ton Access-Request packets
- add Service-Type (= Frames)
- allow server to provide PSK instead of passphrase for WPA-PSK
Tunnel_password case
- update full message for interim accounting updates
- add Acct-Delay-Time into Accounting messages
- add require_message_authenticator configuration option to require
CoA/Disconnect-Request packets to be authenticated
* started to postpone WNM-Notification frame sending by 100 ms so that the
STA has some more time to configure the key before this frame is
received after the 4-way handshake
* VHT: added interoperability workaround for 80+80 and 160 MHz channels
* extended VLAN support (per-STA vif, etc.)
* fixed PMKID derivation with SAE
* nl80211
- added support for full station state operations
- fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use
unencrypted EAPOL frames
* added initial MBO support; number of extensions to WNM BSS Transition
Management
* added initial functionality for location related operations
* added assocresp_elements parameter to allow vendor specific elements to
be added into (Re)Association Response frames
* improved Public Action frame addressing
- use Address 3 = wildcard BSSID in GAS response if a query from an
unassociated STA used that address
- fix TX status processing for Address 3 = wildcard BSSID
- add gas_address3 configuration parameter to control Address 3 behavior
* added command line parameter -i to override interface parameter in
hostapd.conf
* added command completion support to hostapd_cli
* added passive client taxonomy determination (CONFIG_TAXONOMY=y compile
option and "SIGNATURE <addr>" control interface command)
* number of small fixes
hostapd was updated to upstream release 2.5
* (CVE-2015-1863) is fixed in upstream release 2.5
* fixed WPS UPnP vulnerability with HTTP chunked transfer encoding
[http://w1.fi/security/2015-2/] (CVE-2015-4141 boo#930077)
* fixed WMM Action frame parser [http://w1.fi/security/2015-3/]
(CVE-2015-4142 boo#930078)
* fixed EAP-pwd server missing payload length validation
[http://w1.fi/security/2015-4/] (CVE-2015-4143, CVE-2015-4144,
CVE-2015-4145, boo#930079)
* fixed validation of WPS and P2P NFC NDEF record payload length
[http://w1.fi/security/2015-5/]
* nl80211:
- fixed vendor command handling to check OUI properly
* fixed hlr_auc_gw build with OpenSSL
* hlr_auc_gw: allow Milenage RES length to be reduced
* disable HT for a station that does not support WMM/QoS
* added support for hashed password (NtHash) in EAP-pwd server
* fixed and extended dynamic VLAN cases
* added EAP-EKE server support for deriving Session-Id
* set Acct-Session-Id to a random value to make it more likely to be
unique even if the device does not have a proper clock
* added more 2.4 GHz channels for 20/40 MHz HT co-ex scan
* modified SAE routines to be more robust and PWE generation to be
stronger against timing attacks
* added support for Brainpool Elliptic Curves with SAE
* increases maximum value accepted for cwmin/cwmax
* added support for CCMP-256 and GCMP-256 as group ciphers with FT
* added Fast Session Transfer (FST) module
* removed optional fields from RSNE when using FT with PMF (workaround for
interoperability issues with iOS 8.4)
* added EAP server support for TLS session resumption
* fixed key derivation for Suite B 192-bit AKM (this breaks compatibility
with the earlier version)
* added mechanism to track unconnected stations and do minimal band
steering
* number of small fixes
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2017-1201=1
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-1201=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
hostapd-2.6-8.1
hostapd-debuginfo-2.6-8.1
hostapd-debugsource-2.6-8.1
- openSUSE Leap 42.2 (i586 x86_64):
hostapd-2.6-5.3.1
hostapd-debuginfo-2.6-5.3.1
hostapd-debugsource-2.6-5.3.1
References:
https://www.suse.com/security/cve/CVE-2015-1863.html
https://www.suse.com/security/cve/CVE-2015-4141.html
https://www.suse.com/security/cve/CVE-2015-4142.html
https://www.suse.com/security/cve/CVE-2015-4143.html
https://www.suse.com/security/cve/CVE-2015-4144.html
https://www.suse.com/security/cve/CVE-2015-4145.html
https://www.suse.com/security/cve/CVE-2015-5314.html
https://www.suse.com/security/cve/CVE-2016-4476.html
https://www.suse.com/security/cve/CVE-2017-13078.html
https://www.suse.com/security/cve/CVE-2017-13079.html
https://www.suse.com/security/cve/CVE-2017-13080.html
https://www.suse.com/security/cve/CVE-2017-13081.html
https://www.suse.com/security/cve/CVE-2017-13087.html
https://www.suse.com/security/cve/CVE-2017-13088.html
https://bugzilla.suse.com/1063479
https://bugzilla.suse.com/930077
https://bugzilla.suse.com/930078
https://bugzilla.suse.com/930079
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:2892-1: important: Security update for openvpn
by opensuse-security@opensuse.org 27 Oct '17
by opensuse-security@opensuse.org 27 Oct '17
27 Oct '17
openSUSE Security Update: Security update for openvpn
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:2892-1
Rating: important
References: #1060877
Cross-References: CVE-2017-12166
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for openvpn fixes the following issues:
- CVE-2017-12166: Lack of bound check in read_key in old legacy key
handling before using values could be used for a remote buffer overflow
(bsc#1060877).
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2017-1202=1
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-1202=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
openvpn-2.3.8-14.1
openvpn-auth-pam-plugin-2.3.8-14.1
openvpn-auth-pam-plugin-debuginfo-2.3.8-14.1
openvpn-debuginfo-2.3.8-14.1
openvpn-debugsource-2.3.8-14.1
openvpn-devel-2.3.8-14.1
openvpn-down-root-plugin-2.3.8-14.1
openvpn-down-root-plugin-debuginfo-2.3.8-14.1
- openSUSE Leap 42.2 (i586 x86_64):
openvpn-2.3.8-8.13.1
openvpn-auth-pam-plugin-2.3.8-8.13.1
openvpn-auth-pam-plugin-debuginfo-2.3.8-8.13.1
openvpn-debuginfo-2.3.8-8.13.1
openvpn-debugsource-2.3.8-8.13.1
openvpn-devel-2.3.8-8.13.1
openvpn-down-root-plugin-2.3.8-8.13.1
openvpn-down-root-plugin-debuginfo-2.3.8-8.13.1
References:
https://www.suse.com/security/cve/CVE-2017-12166.html
https://bugzilla.suse.com/1060877
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2017:2884-1: important: Security update for wget
by opensuse-security@opensuse.org 27 Oct '17
by opensuse-security@opensuse.org 27 Oct '17
27 Oct '17
openSUSE Security Update: Security update for wget
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:2884-1
Rating: important
References: #1064715 #1064716
Cross-References: CVE-2017-13089 CVE-2017-13090
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for wget fixes the following security issues:
- CVE-2017-13089,CVE-2017-13090: Missing checks for negative
remaining_chunk_size in skip_short_body and fd_read_body could cause
stack buffer overflows, which could have been exploited by malicious
servers. (bsc#1064715,bsc#1064716)
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2017-1210=1
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-1210=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
wget-1.14-12.1
wget-debuginfo-1.14-12.1
wget-debugsource-1.14-12.1
- openSUSE Leap 42.2 (i586 x86_64):
wget-1.14-8.6.1
wget-debuginfo-1.14-8.6.1
wget-debugsource-1.14-8.6.1
References:
https://www.suse.com/security/cve/CVE-2017-13089.html
https://www.suse.com/security/cve/CVE-2017-13090.html
https://bugzilla.suse.com/1064715
https://bugzilla.suse.com/1064716
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:2873-1: important: Security update for xen
by opensuse-security@opensuse.org 27 Oct '17
by opensuse-security@opensuse.org 27 Oct '17
27 Oct '17
SUSE Security Update: Security update for xen
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:2873-1
Rating: important
References: #1059777 #1061076 #1061077 #1061080 #1061081
#1061082 #1061084 #1061086 #1061087
Cross-References: CVE-2017-15588 CVE-2017-15589 CVE-2017-15590
CVE-2017-15591 CVE-2017-15592 CVE-2017-15593
CVE-2017-15594 CVE-2017-15595 CVE-2017-5526
Affected Products:
SUSE OpenStack Cloud 6
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________
An update that fixes 9 vulnerabilities is now available.
Description:
This update for xen fixes several issues:
These security issues were fixed:
- CVE-2017-5526: The ES1370 audio device emulation support was vulnerable
to a memory leakage issue allowing a privileged user inside the guest to
cause a DoS and/or potentially crash the Qemu process on the host
(bsc#1059777)
- CVE-2017-15593: Missing cleanup in the page type system allowed a
malicious or buggy PV guest to cause DoS (XSA-242 bsc#1061084)
- CVE-2017-15592: A problem in the shadow pagetable code allowed a
malicious or buggy HVM guest to cause DoS or cause hypervisor memory
corruption potentially allowing the guest to escalate its privilege
(XSA-243 bsc#1061086)
- CVE-2017-15594: Problematic handling of the selector fields in the
Interrupt Descriptor Table (IDT) allowed a malicious or buggy x86 PV
guest to escalate its privileges or cause DoS (XSA-244 bsc#1061087)
- CVE-2017-15591: Missing checks in the handling of DMOPs allowed
malicious or buggy stub domain kernels or tool stacks otherwise living
outside of Domain0 to cause a DoS (XSA-238 bsc#1061077)
- CVE-2017-15589: Intercepted I/O write operations with less than a full
machine word's worth of data were not properly handled, which allowed a
malicious unprivileged x86 HVM guest to obtain sensitive information
from the host or
other guests (XSA-239 bsc#1061080)
- CVE-2017-15595: In certain configurations of linear page tables a stack
overflow might have occured that allowed a malicious or buggy PV guest
to cause DoS and potentially privilege escalation and information leaks
(XSA-240 bsc#1061081)
- CVE-2017-15588: Under certain conditions x86 PV guests could have caused
the hypervisor to miss a necessary TLB flush for a page. This allowed a
malicious x86 PV guest to access all of system memory, allowing for
privilege escalation, DoS, and information leaks (XSA-241 bsc#1061082)
- CVE-2017-15590: Multiple issues existed with the setup of PCI MSI
interrupts that allowed a malicious or buggy guest to cause DoS and
potentially privilege escalation and information leaks (XSA-237
bsc#1061076)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 6:
zypper in -t patch SUSE-OpenStack-Cloud-6-2017-1795=1
- SUSE Linux Enterprise Server for SAP 12-SP1:
zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1795=1
- SUSE Linux Enterprise Server 12-SP1-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1795=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE OpenStack Cloud 6 (x86_64):
xen-4.5.5_18-22.31.1
xen-debugsource-4.5.5_18-22.31.1
xen-doc-html-4.5.5_18-22.31.1
xen-kmp-default-4.5.5_18_k3.12.74_60.64.60-22.31.1
xen-kmp-default-debuginfo-4.5.5_18_k3.12.74_60.64.60-22.31.1
xen-libs-32bit-4.5.5_18-22.31.1
xen-libs-4.5.5_18-22.31.1
xen-libs-debuginfo-32bit-4.5.5_18-22.31.1
xen-libs-debuginfo-4.5.5_18-22.31.1
xen-tools-4.5.5_18-22.31.1
xen-tools-debuginfo-4.5.5_18-22.31.1
xen-tools-domU-4.5.5_18-22.31.1
xen-tools-domU-debuginfo-4.5.5_18-22.31.1
- SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):
xen-4.5.5_18-22.31.1
xen-debugsource-4.5.5_18-22.31.1
xen-doc-html-4.5.5_18-22.31.1
xen-kmp-default-4.5.5_18_k3.12.74_60.64.60-22.31.1
xen-kmp-default-debuginfo-4.5.5_18_k3.12.74_60.64.60-22.31.1
xen-libs-32bit-4.5.5_18-22.31.1
xen-libs-4.5.5_18-22.31.1
xen-libs-debuginfo-32bit-4.5.5_18-22.31.1
xen-libs-debuginfo-4.5.5_18-22.31.1
xen-tools-4.5.5_18-22.31.1
xen-tools-debuginfo-4.5.5_18-22.31.1
xen-tools-domU-4.5.5_18-22.31.1
xen-tools-domU-debuginfo-4.5.5_18-22.31.1
- SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):
xen-4.5.5_18-22.31.1
xen-debugsource-4.5.5_18-22.31.1
xen-doc-html-4.5.5_18-22.31.1
xen-kmp-default-4.5.5_18_k3.12.74_60.64.60-22.31.1
xen-kmp-default-debuginfo-4.5.5_18_k3.12.74_60.64.60-22.31.1
xen-libs-32bit-4.5.5_18-22.31.1
xen-libs-4.5.5_18-22.31.1
xen-libs-debuginfo-32bit-4.5.5_18-22.31.1
xen-libs-debuginfo-4.5.5_18-22.31.1
xen-tools-4.5.5_18-22.31.1
xen-tools-debuginfo-4.5.5_18-22.31.1
xen-tools-domU-4.5.5_18-22.31.1
xen-tools-domU-debuginfo-4.5.5_18-22.31.1
References:
https://www.suse.com/security/cve/CVE-2017-15588.html
https://www.suse.com/security/cve/CVE-2017-15589.html
https://www.suse.com/security/cve/CVE-2017-15590.html
https://www.suse.com/security/cve/CVE-2017-15591.html
https://www.suse.com/security/cve/CVE-2017-15592.html
https://www.suse.com/security/cve/CVE-2017-15593.html
https://www.suse.com/security/cve/CVE-2017-15594.html
https://www.suse.com/security/cve/CVE-2017-15595.html
https://www.suse.com/security/cve/CVE-2017-5526.html
https://bugzilla.suse.com/1059777
https://bugzilla.suse.com/1061076
https://bugzilla.suse.com/1061077
https://bugzilla.suse.com/1061080
https://bugzilla.suse.com/1061081
https://bugzilla.suse.com/1061082
https://bugzilla.suse.com/1061084
https://bugzilla.suse.com/1061086
https://bugzilla.suse.com/1061087
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:2872-1: important: Security update for MozillaFirefox, mozilla-nss
by opensuse-security@opensuse.org 27 Oct '17
by opensuse-security@opensuse.org 27 Oct '17
27 Oct '17
SUSE Security Update: Security update for MozillaFirefox, mozilla-nss
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:2872-1
Rating: important
References: #1060445 #1061005
Cross-References: CVE-2017-7793 CVE-2017-7805 CVE-2017-7810
CVE-2017-7814 CVE-2017-7818 CVE-2017-7819
CVE-2017-7823 CVE-2017-7824 CVE-2017-7825
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Server 11-SP3-LTSS
SUSE Linux Enterprise Point of Sale 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________
An update that fixes 9 vulnerabilities is now available.
Description:
This update for MozillaFirefox and mozilla-nss fixes the following issues:
Mozilla Firefox was updated to ESR 52.4 (bsc#1060445)
* MFSA 2017-22/CVE-2017-7825: OS X fonts render some Tibetan and Arabic
unicode characters as spaces
* MFSA 2017-22/CVE-2017-7805: Use-after-free in TLS 1.2 generating
handshake hashes
* MFSA 2017-22/CVE-2017-7819: Use-after-free while resizing images in
design mode
* MFSA 2017-22/CVE-2017-7818: Use-after-free during ARIA array manipulation
* MFSA 2017-22/CVE-2017-7793: Use-after-free with Fetch API
* MFSA 2017-22/CVE-2017-7824: Buffer overflow when drawing and validating
elements with ANGLE
* MFSA 2017-22/CVE-2017-7810: Memory safety bugs fixed in Firefox 56 and
Firefox ESR 52.4
* MFSA 2017-22/CVE-2017-7823: CSP sandbox directive did not create a
unique origin
* MFSA 2017-22/CVE-2017-7814: Blob and data URLs bypass phishing and
malware protection warnings
Mozilla Network Security Services (Mozilla NSS) received a security fix:
* MFSA 2017-22/CVE-2017-7805: Use-after-free in TLS 1.2 generating
handshake hashes (bsc#1061005, bsc#1060445)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-firefox-201710-13330=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-firefox-201710-13330=1
- SUSE Linux Enterprise Server 11-SP3-LTSS:
zypper in -t patch slessp3-firefox-201710-13330=1
- SUSE Linux Enterprise Point of Sale 11-SP3:
zypper in -t patch sleposp3-firefox-201710-13330=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-firefox-201710-13330=1
- SUSE Linux Enterprise Debuginfo 11-SP3:
zypper in -t patch dbgsp3-firefox-201710-13330=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x):
MozillaFirefox-devel-52.4.0esr-72.13.2
mozilla-nss-devel-3.29.5-47.6.1
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 x86_64):
MozillaFirefox-52.4.0esr-72.13.2
MozillaFirefox-translations-52.4.0esr-72.13.2
libfreebl3-3.29.5-47.6.1
libsoftokn3-3.29.5-47.6.1
mozilla-nss-3.29.5-47.6.1
mozilla-nss-tools-3.29.5-47.6.1
- SUSE Linux Enterprise Server 11-SP4 (ppc64 x86_64):
libfreebl3-32bit-3.29.5-47.6.1
libsoftokn3-32bit-3.29.5-47.6.1
mozilla-nss-32bit-3.29.5-47.6.1
- SUSE Linux Enterprise Server 11-SP4 (ia64):
libfreebl3-x86-3.29.5-47.6.1
libsoftokn3-x86-3.29.5-47.6.1
mozilla-nss-x86-3.29.5-47.6.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x):
MozillaFirefox-52.4.0esr-72.13.2
MozillaFirefox-translations-52.4.0esr-72.13.2
libfreebl3-3.29.5-47.6.1
libsoftokn3-3.29.5-47.6.1
mozilla-nss-3.29.5-47.6.1
mozilla-nss-tools-3.29.5-47.6.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (s390x):
libfreebl3-32bit-3.29.5-47.6.1
libsoftokn3-32bit-3.29.5-47.6.1
mozilla-nss-32bit-3.29.5-47.6.1
- SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
MozillaFirefox-52.4.0esr-72.13.2
MozillaFirefox-translations-52.4.0esr-72.13.2
libfreebl3-3.29.5-47.6.1
libsoftokn3-3.29.5-47.6.1
mozilla-nss-3.29.5-47.6.1
mozilla-nss-tools-3.29.5-47.6.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
MozillaFirefox-debuginfo-52.4.0esr-72.13.2
mozilla-nss-debuginfo-3.29.5-47.6.1
mozilla-nss-debugsource-3.29.5-47.6.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):
MozillaFirefox-debuginfo-52.4.0esr-72.13.2
mozilla-nss-debuginfo-3.29.5-47.6.1
mozilla-nss-debugsource-3.29.5-47.6.1
References:
https://www.suse.com/security/cve/CVE-2017-7793.html
https://www.suse.com/security/cve/CVE-2017-7805.html
https://www.suse.com/security/cve/CVE-2017-7810.html
https://www.suse.com/security/cve/CVE-2017-7814.html
https://www.suse.com/security/cve/CVE-2017-7818.html
https://www.suse.com/security/cve/CVE-2017-7819.html
https://www.suse.com/security/cve/CVE-2017-7823.html
https://www.suse.com/security/cve/CVE-2017-7824.html
https://www.suse.com/security/cve/CVE-2017-7825.html
https://bugzilla.suse.com/1060445
https://bugzilla.suse.com/1061005
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:2871-1: important: Security update for wget
by opensuse-security@opensuse.org 27 Oct '17
by opensuse-security@opensuse.org 27 Oct '17
27 Oct '17
SUSE Security Update: Security update for wget
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:2871-1
Rating: important
References: #1064715 #1064716
Cross-References: CVE-2017-13089 CVE-2017-13090
Affected Products:
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for wget fixes the following security issues:
- CVE-2017-13089,CVE-2017-13090: Missing checks for negative
remaining_chunk_size in skip_short_body and fd_read_body could cause
stack buffer overflows, which could have been exploited by malicious
servers. (bsc#1064715,bsc#1064716)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1794=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
wget-1.14-21.3.1
wget-debuginfo-1.14-21.3.1
wget-debugsource-1.14-21.3.1
References:
https://www.suse.com/security/cve/CVE-2017-13089.html
https://www.suse.com/security/cve/CVE-2017-13090.html
https://bugzilla.suse.com/1064715
https://bugzilla.suse.com/1064716
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2017:2869-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 27 Oct '17
by opensuse-security@opensuse.org 27 Oct '17
27 Oct '17
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:2869-1
Rating: important
References: #1006180 #1011913 #1012382 #1012829 #1013887
#1019151 #1020645 #1020657 #1021424 #1022476
#1022743 #1022967 #1023175 #1024405 #1028173
#1028286 #1029693 #1030552 #1030850 #1031515
#1031717 #1031784 #1033587 #1034048 #1034075
#1034762 #1036303 #1036632 #1037344 #1037404
#1037994 #1038078 #1038583 #1038616 #1038792
#1039915 #1040307 #1040351 #1041958 #1042286
#1042314 #1042422 #1042778 #1043652 #1044112
#1044636 #1045154 #1045563 #1045922 #1046682
#1046821 #1046985 #1047027 #1047048 #1047096
#1047118 #1047121 #1047152 #1047277 #1047343
#1047354 #1047487 #1047651 #1047653 #1047670
#1048155 #1048221 #1048317 #1048891 #1048893
#1048914 #1048934 #1049226 #1049483 #1049486
#1049580 #1049603 #1049645 #1049882 #1050061
#1050188 #1051022 #1051059 #1051239 #1051399
#1051478 #1051479 #1051556 #1051663 #1051790
#1052049 #1052223 #1052533 #1052580 #1052593
#1052709 #1052773 #1052794 #1052888 #1053117
#1053802 #1053915 #1053919 #1054084 #1055013
#1055096 #1055359 #1055493 #1055755 #1055896
#1056261 #1056588 #1056827 #1056982 #1057015
#1058038 #1058116 #1058410 #1058507 #1059051
#1059465 #1060197 #1061017 #1061046 #1061064
#1061067 #1061172 #1061831 #1061872 #1063667
#1064206 #1064388 #964063 #971975 #974215
#981309
Cross-References: CVE-2017-1000252 CVE-2017-10810 CVE-2017-11472
CVE-2017-11473 CVE-2017-12134 CVE-2017-12153
CVE-2017-12154 CVE-2017-13080 CVE-2017-14051
CVE-2017-14106 CVE-2017-14489 CVE-2017-15649
CVE-2017-7518 CVE-2017-7541 CVE-2017-7542
CVE-2017-8831
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Live Patching 12
SUSE Linux Enterprise High Availability 12-SP2
SUSE Linux Enterprise Desktop 12-SP2
SUSE Container as a Service Platform ALL
OpenStack Cloud Magnum Orchestration 7
______________________________________________________________________________
An update that solves 16 vulnerabilities and has 120 fixes
is now available.
Description:
The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.90 to receive
various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-1000252: The KVM subsystem in the Linux kernel allowed guest OS
users to cause a denial of service (assertion failure, and hypervisor
hang or crash) via an out-of bounds guest_irq value, related to
arch/x86/kvm/vmx.c and virt/kvm/eventfd.c (bnc#1058038).
- CVE-2017-10810: Memory leak in the virtio_gpu_object_create function in
drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel allowed
attackers to cause a denial of service (memory consumption) by
triggering object-initialization failures (bnc#1047277).
- CVE-2017-11472: The acpi_ns_terminate() function in
drivers/acpi/acpica/nsutils.c in the Linux kernel did not flush the
operand cache and causes a kernel stack dump, which allowed local users
to obtain sensitive information from kernel memory and bypass the KASLR
protection mechanism (in the kernel through 4.9) via a crafted ACPI
table (bnc#1049580).
- CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function
in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users
to gain privileges via a crafted ACPI table (bnc#1049603).
- CVE-2017-12134: The xen_biovec_phys_mergeable function in
drivers/xen/biomerge.c in Xen might allow local OS guest users to
corrupt block device data streams and consequently obtain sensitive
memory information, cause a denial of service, or gain host OS
privileges by leveraging incorrect block IO merge-ability calculation
(bnc#1051790 bnc#1053919).
- CVE-2017-12153: A security flaw was discovered in the
nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux
kernel This function did not check whether the required attributes are
present in a Netlink request. This request can be issued by a user with
the CAP_NET_ADMIN capability and may result in a NULL pointer
dereference and system crash (bnc#1058410).
- CVE-2017-12154: The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the
Linux kernel did not ensure that the "CR8-load exiting" and "CR8-store
exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR
shadow" vmcs12 control, which allowed KVM L2 guest OS users to obtain
read and write access to the hardware CR8 register (bnc#1058507).
- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed
reinstallation of the Group Temporal Key (GTK) during the group key
handshake, allowing an attacker within radio range to replay frames from
access points to clients (bnc#1063667).
- CVE-2017-14051: An integer overflow in the
qla2x00_sysfs_write_optrom_ctl function in
drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel allowed local users
to cause a denial of service (memory corruption and system crash) by
leveraging root access (bnc#1056588).
- CVE-2017-14106: The tcp_disconnect function in net/ipv4/tcp.c in the
Linux kernel allowed local users to cause a denial of service
(__tcp_select_window divide-by-zero error and system crash) by
triggering a disconnect within a certain tcp_recvmsg code path
(bnc#1056982).
- CVE-2017-14489: The iscsi_if_rx function in
drivers/scsi/scsi_transport_iscsi.c in the Linux kernel allowed local
users to cause a denial of service (panic) by leveraging incorrect
length validation (bnc#1059051).
- CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local
users to gain privileges via crafted system calls that trigger
mishandling of packet_fanout data structures, because of a race
condition (involving fanout_add and packet_do_bind) that leads to a
use-after-free, a different vulnerability than CVE-2017-6346
(bnc#1064388).
- CVE-2017-7518: The Linux kernel was vulnerable to an incorrect debug
exception(#DB) error. It could occur while emulating a syscall
instruction and potentially lead to guest privilege escalation.
(bsc#1045922).
- CVE-2017-7541: The brcmf_cfg80211_mgmt_tx function in
drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux
kernel allowed local users to cause a denial of service (buffer overflow
and system crash) or possibly gain privileges via a crafted
NL80211_CMD_FRAME Netlink packet (bnc#1049645).
- CVE-2017-7542: The ip6_find_1stfragopt function in
net/ipv6/output_core.c in the Linux kernel allowed local users to cause
a denial of service (integer overflow and infinite loop) by leveraging
the ability to open a raw socket (bnc#1049882).
- CVE-2017-8831: The saa7164_bus_get function in
drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed
local users to cause a denial of service (out-of-bounds array access) or
possibly have unspecified other impact by changing a certain
sequence-number value, aka a "double fetch" vulnerability (bnc#1037994).
The following non-security bugs were fixed:
- acpi / processor: Avoid reserving IO regions too early (bsc#1051478).
- acpi / scan: Prefer devices without _HID for _ADR matching (git-fixes).
- af_key: Add lock to key dump (bsc#1047653).
- af_key: Fix slab-out-of-bounds in pfkey_compile_policy (bsc#1047354).
- alsa: fm801: Initialize chip after IRQ handler is registered
(bsc#1031717).
- alsa: hda - Add stereo mic quirk for Lenovo G50-70 (17aa:3978)
(bsc#1020657).
- alsa: hda - Fix endless loop of codec configure (bsc#1031717).
- alsa: hda - Implement mic-mute LED mode enum (bsc#1055013).
- alsa: hda/realtek - Add support headphone Mic for ALC221 of HP platform
(bsc#1024405).
- alsa: hda - set input_path bitmap to zero after moving it to new place
(bsc#1031717).
- alsa: ice1712: Add support for STAudio ADCIII (bsc#1048934).
- alsa: usb-audio: Apply sample rate quirk to Sennheiser headset
(bsc#1052580).
- arc: Re-enable MMU upon Machine Check exception (bnc#1012382).
- arm64: fault: Route pte translation faults via do_translation_fault
(bnc#1012382).
- arm64: Make sure SPsel is always set (bnc#1012382).
- arm: pxa: add the number of DMA requestor lines (bnc#1012382).
- arm: pxa: fix the number of DMA requestor lines (bnc#1012382).
- b43: Add missing MODULE_FIRMWARE() (bsc#1037344).
- bcache: correct cache_dirty_target in __update_writeback_rate()
(bnc#1012382).
- bcache: Correct return value for sysfs attach errors (bnc#1012382).
- bcache: do not subtract sectors_to_gc for bypassed IO (bnc#1012382).
- bcache: fix bch_hprint crash and improve output (bnc#1012382).
- bcache: fix for gc and write-back race (bnc#1012382).
- bcache: Fix leak of bdev reference (bnc#1012382).
- bcache: force trigger gc (bsc#1038078).
- bcache: initialize dirty stripes in flash_dev_run() (bnc#1012382).
- bcache: only recovery I/O error for writethrough mode (bsc#1043652).
- bdi: Fix use-after-free in wb_congested_put() (bsc#1040307).
- blacklist 2400fd822f46 powerpc/asm: Mark cr0 as clobbered in mftb()
- blacklist.conf: 9eeacd3a2f17 not a bug fix (bnc#1050061)
- blacklist.conf: add unapplicable/cosmetic iwlwifi fixes (bsc#1031717).
- blacklist.conf: add unapplicable drm fixes (bsc#1031717).
- blacklist.conf: Blacklist 4e201566402c ('genirq/msi: Drop artificial PCI
dependency') (bsc#1051478) This commit just removes an include and does
not fix a real issue.
- blacklist.conf: Blacklist aa2369f11ff7 ('mm/gup.c: fix access_ok()
argument type') (bsc#1051478) Fixes only a compile-warning.
- blacklist.conf: Blacklist c133c7615751 ('x86/nmi: Fix timeout test in
test_nmi_ipi()') It only fixes a self-test (bsc#1051478).
- blacklist.conf: Blacklist c9525a3fab63 ('x86/watchdog: Fix Kconfig help
text file path reference to lockup watchdog documentation') Updates only
kconfig help-text (bsc#1051478).
- blacklist.conf: Blacklist e80e7edc55ba ('PCI/MSI: Initialize MSI
capability for all architectures') This only fixes machines not
supported by our kernels.
- blkfront: add uevent for size change (bnc#1036632).
- block: Allow bdi re-registration (bsc#1040307).
- block: do not allow updates through sysfs until registration completes
(bsc#1047027).
- block: Fix front merge check (bsc#1051239).
- block: Make del_gendisk() safer for disks without queues (bsc#1040307).
- block: Move bdi_unregister() to del_gendisk() (bsc#1040307).
- block: Relax a check in blk_start_queue() (bnc#1012382).
- bluetooth: bnep: fix possible might sleep error in bnep_session
(bsc#1031784).
- bluetooth: cmtp: fix possible might sleep error in cmtp_session
(bsc#1031784).
- bluetooth: hidp: fix possible might sleep error in hidp_session_thread
(bsc#1031784).
- bnxt: add a missing rcu synchronization (bnc#1038583).
- bnxt: do not busy-poll when link is down (bnc#1038583).
- bnxt_en: Enable MRU enables bit when configuring VNIC MRU (bnc#1038583).
- bnxt_en: Fix and clarify link_info->advertising (bnc#1038583).
- bnxt_en: Fix a VXLAN vs GENEVE issue (bnc#1038583).
- bnxt_en: Fix NULL pointer dereference in a failure path during open
(bnc#1038583).
- bnxt_en: Fix NULL pointer dereference in reopen failure path
(bnc#1038583).
- bnxt_en: fix pci cleanup in bnxt_init_one() failure path (bnc#1038583).
- bnxt_en: Fix ring arithmetic in bnxt_setup_tc() (bnc#1038583).
- bnxt_en: Fix TX push operation on ARM64 (bnc#1038583).
- bnxt_en: Fix "uninitialized variable" bug in TPA code path (bnc#1038583).
- bnxt_en: Fix VF virtual link state (bnc#1038583).
- bnxt_en: initialize rc to zero to avoid returning garbage (bnc#1038583).
- bnxt_en: Pad TX packets below 52 bytes (bnc#1038583).
- bnxt_en: Refactor TPA code path (bnc#1038583).
- brcmfmac: Fix glom_skb leak in brcmf_sdiod_recv_chain (bsc#1031717).
- bsg-lib: do not free job in bsg_prepare_job (bnc#1012382).
- btrfs: add cond_resched to btrfs_qgroup_trace_leaf_items (bsc#1028286).
- btrfs: Add WARN_ON for qgroup reserved underflow (bsc#1031515).
- btrfs: change how we decide to commit transactions during flushing
(bsc#1060197).
- btrfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- btrfs: fix early ENOSPC due to delalloc (bsc#1049226).
- btrfs: fix lockup in find_free_extent with read-only block groups
(bsc#1046682).
- btrfs: fix NULL pointer dereference from free_reloc_roots()
(bnc#1012382).
- btrfs: incremental send, fix invalid path for link commands
(bsc#1051479).
- btrfs: incremental send, fix invalid path for unlink commands
(bsc#1051479).
- btrfs: prevent to set invalid default subvolid (bnc#1012382).
- btrfs: propagate error to btrfs_cmp_data_prepare caller (bnc#1012382).
- btrfs: qgroup: move noisy underflow warning to debugging build
(bsc#1055755).
- btrfs: resume qgroup rescan on rw remount (bsc#1047152).
- btrfs: send, fix invalid path after renaming and linking file
(bsc#1051479).
- ceph: fix readpage from fscache (bsc#1057015).
- cifs: Fix SMB3.1.1 guest authentication to Samba (bnc#1012382).
- cifs: release auth_key.response for reconnect (bnc#1012382).
- class: Add "shutdown" to "struct class" (bsc#1053117).
- cpuidle: dt: Add missing 'of_node_put()' (bnc#1022476).
- crypto: AF_ALG - remove SGL terminator indicator when chaining
(bnc#1012382).
- crypto: s5p-sss - fix incorrect usage of scatterlists api (bsc#1048317).
- crypto: talitos - Do not provide setkey for non hmac hashing algs
(bnc#1012382).
- crypto: talitos - fix sha224 (bnc#1012382).
- cx82310_eth: use skb_cow_head() to deal with cloned skbs (bsc# 1045154).
- cxgb4: Fix stack out-of-bounds read due to wrong size to
t4_record_mbox() (bsc#1021424 bsc#1022743).
- cxl: Fix driver use count (bnc#1012382).
- cxl: Unlock on error in probe (bsc#1034762, Pending SUSE Kernel Fixes).
- dentry name snapshots (bsc#1049483).
- dmaengine: mmp-pdma: add number of requestors (bnc#1012382).
- dm: fix second blk_delay_queue() parameter to be in msec units not
(bsc#1047670).
- drivers: hv: Fix the bug in generating the guest ID (fate#320485).
- drivers: hv: util: Fix a typo (fate#320485).
- drivers: hv: vmbus: Get the current time from the current clocksource
(fate#320485, bnc#1044112, bnc#1042778, bnc#1029693).
- drivers: hv: vmbus: Increase the time between retries in
vmbus_post_msg() (fate#320485, bnc#1044112).
- drivers: hv: vmbus: Move the code to signal end of message (fate#320485).
- drivers: hv: vmbus: Move the definition of generate_guest_id()
(fate#320485).
- drivers: hv: vmbus: Move the definition of hv_x64_msr_hypercall_contents
(fate#320485).
- drivers: hv: vmbus: Restructure the clockevents code (fate#320485).
- drivers: net: xgene: Fix wrong logical operation (bsc#1056827).
- drm: Add driver-private objects to atomic state (bsc#1055493).
- drm/amdgpu: Fix overflow of watermark calcs at > 4k resolutions
(bsc#1031717).
- drm/bochs: Implement nomodeset (bsc#1047096).
- drm/dp: Introduce MST topology state to track available link bandwidth
(bsc#1055493).
- drm/i915/fbdev: Stop repeating tile configuration on stagnation
(bsc#1031717).
- drm/i915: Fix scaler init during CRTC HW state readout (bsc#1031717).
- drm/i915: Serialize GTT/Aperture accesses on BXT (bsc#1046821).
- drm/virtio: do not leak bo on drm_gem_object_init failure (bsc#1047277).
- drm/vmwgfx: Fix large topology crash (bsc#1048155).
- drm/vmwgfx: Limit max desktop dimensions to 8Kx8K (bsc#1048155).
- drm/vmwgfx: Support topology greater than texture size (bsc#1048155).
- efi/libstub: Skip GOP with PIXEL_BLT_ONLY format (bnc#974215).
- ext2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: avoid unnecessary stalls in ext4_evict_inode() (bsc#1049486).
- ext4: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ext4: fix incorrect quotaoff if the quota feature is enabled
(bnc#1012382).
- ext4: fix quota inconsistency during orphan cleanup for read-only mounts
(bnc#1012382).
- ext4: handle the rest of ext4_mb_load_buddy() ENOMEM errors
(bsc#1012829).
- f2fs: check hot_data for roll-forward recovery (bnc#1012382).
- fix xen_swiotlb_dma_mmap prototype (bnc#1012382).
- fs/fcntl: f_setown, avoid undefined behaviour (bnc#1006180).
- ftrace: Fix memleak when unregistering dynamic ops when tracing disabled
(bnc#1012382).
- ftrace: Fix selftest goto location on error (bnc#1012382).
- fuse: initialize the flock flag in fuse_file on allocation (git-fixes).
- gcov: add support for gcc version >= 6 (bsc#1051663).
- gcov: support GCC 7.1 (bsc#1051663).
- genirq: Fix for_each_action_of_desc() macro (bsc#1061064).
- getcwd: Close race with d_move called by lustre (bsc#1052593).
- gfs2: Do not clear SGID when inheriting ACLs (bsc#1012829).
- gfs2: Fix debugfs glocks dump (bnc#1012382).
- gfs2: fix flock panic issue (bsc#1012829).
- gianfar: Fix Tx flow control deactivation (bnc#1012382).
- hid: usbhid: Add HID_QUIRK_NOGET for Aten CS-1758 KVM switch
(bnc#1022967).
- hrtimer: Catch invalid clockids again (bsc#1047651).
- hrtimer: Revert CLOCK_MONOTONIC_RAW support (bsc#1047651).
- hv_utils: drop .getcrosststamp() support from PTP driver (fate#320485,
bnc#1044112, bnc#1042778, bnc#1029693).
- hv_utils: fix TimeSync work on pre-TimeSync-v4 hosts (fate#320485,
bnc#1044112, bnc#1042778, bnc#1029693).
- hv_util: switch to using timespec64 (fate#320485).
- i2c: designware-baytrail: fix potential null pointer dereference on dev
(bsc#1011913).
- i40e: add hw struct local variable (bsc#1039915).
- i40e: add private flag to control source pruning (bsc#1034075).
- i40e: add VSI info to macaddr messages (bsc#1039915).
- i40e: avoid looping to check whether we're in VLAN mode (bsc#1039915).
- i40e: avoid O(n^2) loop when deleting all filters (bsc#1039915).
- i40e: delete filter after adding its replacement when converting
(bsc#1039915).
- i40e: do not add broadcast filter for VFs (bsc#1039915).
- i40e: do not allow i40e_vsi_(add|kill)_vlan to operate when VID<1
(bsc#1039915).
- i40e: drop is_vf and is_netdev fields in struct i40e_mac_filter
(bsc#1039915).
- i40e: enable VSI broadcast promiscuous mode instead of adding broadcast
filter (bsc#1039915).
- i40e: factor out addition/deletion of VLAN per each MAC address
(bsc#1039915).
- i40e: fix MAC filters when removing VLANs (bsc#1039915).
- i40e: fold the i40e_is_vsi_in_vlan check into i40e_put_mac_in_vlan
(bsc#1039915).
- i40e: implement __i40e_del_filter and use where applicable (bsc#1039915).
- i40e: make use of __dev_uc_sync and __dev_mc_sync (bsc#1039915).
- i40e: move all updates for VLAN mode into i40e_sync_vsi_filters
(bsc#1039915).
- i40e: move i40e_put_mac_in_vlan and i40e_del_mac_all_vlan (bsc#1039915).
- i40e: no need to check is_vsi_in_vlan before calling
i40e_del_mac_all_vlan (bsc#1039915).
- i40e: properly cleanup on allocation failure in i40e_sync_vsi_filters
(bsc#1039915).
- i40e: recalculate vsi->active_filters from hash contents (bsc#1039915).
- i40e: refactor i40e_put_mac_in_vlan to avoid changing f->vlan
(bsc#1039915).
- i40e: refactor i40e_update_filter_state to avoid passing aq_err
(bsc#1039915).
- i40e: refactor Rx filter handling (bsc#1039915).
- i40e: Removal of workaround for simple MAC address filter deletion
(bsc#1039915).
- i40e: remove code to handle dev_addr specially (bsc#1039915).
- i40e: removed unreachable code (bsc#1039915).
- i40e: remove duplicate add/delete adminq command code for filters
(bsc#1039915).
- i40e: remove second check of VLAN_N_VID in i40e_vlan_rx_add_vid
(bsc#1039915).
- i40e: rename i40e_put_mac_in_vlan and i40e_del_mac_all_vlan
(bsc#1039915).
- i40e: restore workaround for removing default MAC filter (bsc#1039915).
- i40e: set broadcast promiscuous mode for each active VLAN (bsc#1039915).
- i40e: store MAC/VLAN filters in a hash with the MAC Address as key
(bsc#1039915).
- i40e: use (add|rm)_vlan_all_mac helper functions when changing PVID
(bsc#1039915).
- i40e: when adding or removing MAC filters, correctly handle VLANs
(bsc#1039915).
- i40e: When searching all MAC/VLAN filters, ignore removed filters
(bsc#1039915).
- i40e: write HENA for VFs (bsc#1039915).
- ib/hfi1: Wait for QSFP modules to initialize (bsc#1019151).
- ibmvnic: Check for transport event on driver resume (bsc#1051556,
bsc#1052709).
- ibmvnic: Clean up resources on probe failure (fate#323285, bsc#1058116).
- ibmvnic: Initialize SCRQ's during login renegotiation (bsc#1052223).
- ibmvnic: Report rx buffer return codes as netdev_dbg (bsc#1052794).
- iio: hid-sensor: fix return of -EINVAL on invalid values in ret or value
(bsc#1031717).
- input: gpio-keys - fix check for disabling unsupported keys
(bsc#1031717).
- input: i8042 - add Gigabyte P57 to the keyboard reset table
(bnc#1012382).
- introduce the walk_process_tree() helper (bnc#1022476).
- iommu/amd: Fix schedule-while-atomic BUG in initialization code
(bsc1052533).
- iommu/vt-d: Avoid calling virt_to_phys() on null pointer (bsc#1061067).
- ipv4: Should use consistent conditional judgement for ip fragment in
__ip_append_data and ip_finish_output (bsc#1041958).
- ipv6: accept 64k - 1 packet length in ip6_find_1stfragopt()
(bnc#1012382).
- ipv6: add rcu grace period before freeing fib6_node (bnc#1012382).
- ipv6: fix memory leak with multiple tables during netns destruction
(bnc#1012382).
- ipv6: fix sparse warning on rt6i_node (bnc#1012382).
- ipv6: fix typo in fib6_net_exit() (bnc#1012382).
- ipv6: Should use consistent conditional judgement for ip6 fragment
between __ip6_append_data and ip6_finish_output (bsc#1041958).
- iwlwifi: missing error code in iwl_trans_pcie_alloc() (bsc#1031717).
- iwlwifi: mvm: compare full command ID (FATE#321353, FATE#323335).
- iwlwifi: mvm: do not send CTDP commands via debugfs if not supported
(bsc#1031717).
- iwlwifi: mvm: reset the fw_dump_desc pointer after ASSERT (bsc#1031717).
- iwlwifi: mvm: synchronize firmware DMA paging memory (FATE#321353,
FATE#323335).
- iwlwifi: mvm: unconditionally stop device after init (bsc#1031717).
- iwlwifi: mvm: unmap the paging memory before freeing it (FATE#321353,
FATE#323335).
- iwlwifi: pcie: fix command completion name debug (bsc#1031717).
- kABI-fix for "x86/panic: replace smp_send_stop() with kdump friendly
version in panic path" (bsc#1051478).
- kABI: protect enum pid_type (kabi).
- kABI: protect lwtunnel include in ip6_route.h (kabi).
- kABI: protect struct iscsi_np (kabi).
- kABI: protect struct iscsi_tpg_attrib (kabi).
- kABI: protect struct se_lun (kabi).
- kABI: protect struct tpm_chip (kabi).
- kABI: protect struct xfrm_dst (kabi).
- kABI: protect struct xfrm_dst (kabi).
- kabi/severities: ignore nfs_pgio_data_destroy
- kABI: uninline task_tgid_nr_nr (kabi).
- kernel/*: switch to memdup_user_nul() (bsc#1048893).
- keys: fix writing past end of user-supplied buffer in keyring_read()
(bnc#1012382).
- keys: prevent creating a different user's keyrings (bnc#1012382).
- keys: prevent KEYCTL_READ on negative key (bnc#1012382).
- kvm: async_pf: Fix #DF due to inject "Page not Present" and "Page Ready"
exceptions simultaneously (bsc#1061017).
- kvm: nVMX: fix msr bitmaps to prevent L2 from accessing L0 x2APIC
(bsc#1051478).
- kvm: nVMX: Fix nested_vmx_check_msr_bitmap_controls (bsc#1051478).
- kvm: nVMX: Fix nested VPID vmx exec control (bsc#1051478).
- kvm: PPC: Book3S: Fix race and leak in kvm_vm_ioctl_create_spapr_tce()
(bnc#1012382).
- kvm: SVM: Add a missing 'break' statement (bsc#1061017).
- kvm: VMX: do not change SN bit in vmx_update_pi_irte() (bsc#1061017).
- kvm: VMX: remove WARN_ON_ONCE in kvm_vcpu_trigger_posted_interrupt
(bsc#1061017).
- kvm: VMX: use cmpxchg64 (bnc#1012382).
- kvm: x86: avoid simultaneous queueing of both IRQ and SMI (bsc#1051478).
- libnvdimm: fix badblock range handling of ARS range (bsc#1023175).
- libnvdimm, pmem: fix a NULL pointer BUG in nd_pmem_notify (bsc#1023175).
- lib: test_rhashtable: fix for large entry counts (bsc#1055359).
- lib: test_rhashtable: Fix KASAN warning (bsc#1055359).
- lightnvm: remove unused rq parameter of nvme_nvm_rqtocmd() to kill
warning (FATE#319466).
- mac80211: flush hw_roc_start work before cancelling the ROC
(bnc#1012382).
- mac80211_hwsim: Replace bogus hrtimer clockid (bsc#1047651).
- md/bitmap: disable bitmap_resize for file-backed bitmaps (bsc#1061172).
- md: fix sleep in atomic (bsc#1040351).
- md/raid5: fix a race condition in stripe batch (linux-stable).
- md/raid5: preserve STRIPE_ON_UNPLUG_LIST in break_stripe_batch_list
(bnc#1012382).
- md/raid5: release/flush io in raid5_do_work() (bnc#1012382).
- media: uvcvideo: Prevent heap overflow when accessing mapped controls
(bnc#1012382).
- media: v4l2-compat-ioctl32: Fix timespec conversion (bnc#1012382).
- mips: math-emu: <MAXA|MINA>.<D|S>: Fix cases of both infinite inputs
(bnc#1012382).
- mips: math-emu: <MAXA|MINA>.<D|S>: Fix cases of input values with
opposite signs (bnc#1012382).
- mips: math-emu: <MAX|MAXA|MIN|MINA>.<D|S>: Fix cases of both inputs zero
(bnc#1012382).
- mips: math-emu: <MAX|MAXA|MIN|MINA>.<D|S>: Fix quiet NaN propagation
(bnc#1012382).
- mips: math-emu: <MAX|MIN>.<D|S>: Fix cases of both inputs negative
(bnc#1012382).
- mips: math-emu: MINA.<D|S>: Fix some cases of infinity and zero inputs
(bnc#1012382).
- mm: adaptive hash table scaling (bnc#1036303).
- mm: call page_ext_init() after all struct pages are initialized (VM
Debugging Functionality, bsc#1047048).
- mm: drop HASH_ADAPT (bnc#1036303).
- mm: fix classzone_idx underflow in shrink_zones() (VM Functionality,
bsc#1042314).
- mm, madvise: ensure poisoned pages are removed from per-cpu lists (VM hw
poison -- git fixes).
- mm: make PR_SET_THP_DISABLE immediately active (bnc#1048891).
- mm/page_alloc.c: apply gfp_allowed_mask before the first allocation
attempt (bnc#971975 VM -- git fixes).
- mm: prevent double decrease of nr_reserved_highatomic (bnc#1012382).
- mptsas: Fixup device hotplug for VMWare ESXi (bsc#1030850).
- mwifiex: do not update MCS set from hostapd (bsc#1031717).
- net: account for current skb length when deciding about UFO
(bsc#1041958).
- net: ena: add hardware hints capability to the driver (bsc#1047121).
- net: ena: add missing return when ena_com_get_io_handlers() fails
(bsc#1047121).
- net: ena: add missing unmap bars on device removal (bsc#1047121).
- net: ena: add reset reason for each device FLR (bsc#1047121).
- net: ena: add support for out of order rx buffers refill (bsc#1047121).
- net: ena: allow the driver to work with small number of msix vectors
(bsc#1047121).
- net: ena: bug fix in lost tx packets detection mechanism (bsc#1047121).
- net: ena: change return value for unsupported features unsupported
return value (bsc#1047121).
- net: ena: change sizeof() argument to be the type pointer (bsc#1047121).
- net: ena: disable admin msix while working in polling mode (bsc#1047121).
- net: ena: fix bug that might cause hang after consecutive open/close
interface (bsc#1047121).
- net: ena: fix race condition between submit and completion admin command
(bsc#1047121).
- net: ena: fix rare uncompleted admin command false alarm (bsc#1047121).
- net: ena: fix theoretical Rx hang on low memory systems (bsc#1047121).
- net: ena: separate skb allocation to dedicated function (bsc#1047121).
- net: ena: update driver's rx drop statistics (bsc#1047121).
- net: ena: update ena driver to version 1.1.7 (bsc#1047121).
- net: ena: update ena driver to version 1.2.0 (bsc#1047121).
- net: ena: use lower_32_bits()/upper_32_bits() to split dma address
(bsc#1047121).
- net: ena: use napi_schedule_irqoff when possible (bsc#1047121).
- netfilter: fix IS_ERR_VALUE usage (bsc#1052888).
- netfilter: x_tables: pack percpu counter allocations (bsc#1052888).
- netfilter: x_tables: pass xt_counters struct instead of packet counter
(bsc#1052888).
- netfilter: x_tables: pass xt_counters struct to counter allocator
(bsc#1052888).
- net: handle NAPI_GRO_FREE_STOLEN_HEAD case also in napi_frags_finish()
(bsc#1042286).
- net/mlx5: Fix driver load error flow when firmware is stuck (git-fixes).
- net: phy: Do not perform software reset for Generic PHY (bsc#1042286).
- new helper: memdup_user_nul() (bsc#1048893).
- nfs: Cache aggressively when file is open for writing (bsc#1033587).
- nfsd: Fix general protection fault in release_lock_stateid()
(bnc#1012382).
- nfs: Do not flush caches for a getattr that races with writeback
(bsc#1033587).
- nfs: flush data when locking a file to ensure cache coherence for mmap
(bsc#981309).
- nfs: invalidate file size when taking a lock (git-fixes).
- nfs: only invalidate dentrys that are clearly invalid (bsc#1047118).
- ocfs2: Do not clear SGID when inheriting ACLs (bsc#1030552).
- ocfs2: fix deadlock caused by recursive locking in xattr (bsc#1012829).
- ocfs2: Make ocfs2_set_acl() static (bsc#1030552).
- of: fix "/cpus" reference leak in of_numa_parse_cpu_nodes()
(bsc#1056827).
- ovl: fix dentry leak for default_permissions (bsc#1054084).
- pci: Add Mellanox device IDs (bsc#1051478).
- pci: Allow PCI express root ports to find themselves (bsc#1061046).
- pci: Convert Mellanox broken INTx quirks to be for listed devices only
(bsc#1051478).
- pci: Correct PCI_STD_RESOURCE_END usage (bsc#1051478).
- pci: dwc: dra7xx: Use RW1C for IRQSTATUS_MSI and IRQSTATUS_MAIN
(bsc#1051478).
- pci: dwc: Fix uninitialized variable in dw_handle_msi_irq()
(bsc#1051478).
- pci: Enable ECRC only if device supports it (bsc#1051478).
- pci: fix oops when try to find Root Port for a PCI device (bsc#1061046).
- pci: Fix race condition with driver_override (bnc#1012382).
- pci / pm: Fix native PME handling during system suspend/resume
(bsc#1051478).
- pci: shpchp: Enable bridge bus mastering if MSI is enabled (bnc#1012382).
- pci: Support INTx masking on ConnectX-4 with firmware x.14.1100+
(bsc#1051478).
- percpu_ref: allow operation mode switching operations to be called
concurrently (bsc#1055096).
- percpu_ref: remove unnecessary RCU grace period for staggered atomic
switching confirmation (bsc#1055096).
- percpu_ref: reorganize __percpu_ref_switch_to_atomic() and relocate
percpu_ref_switch_to_atomic() (bsc#1055096).
- percpu_ref: restructure operation mode switching (bsc#1055096).
- percpu_ref: unify staggered atomic switching wait behavior (bsc#1055096).
- perf/x86: Fix RDPMC vs. mm_struct tracking (bsc#1061831).
- perf/x86: Fix spurious NMI with PEBS Load Latency event (bsc#1051478).
- perf/x86/intel: Cure bogus unwind from PEBS entries (bsc#1051478).
- perf/x86/intel: Fix PEBSv3 record drain (bsc#1051478).
- perf/x86: kABI Workaround for 'perf/x86: Fix RDPMC vs. mm_struct
tracking' (bsc#1061831).
- platform/x86: ideapad-laptop: Add IdeaPad 310-15IKB to no_hw_rfkill
(bsc#1051022).
- platform/x86: ideapad-laptop: Add IdeaPad V310-15ISK to no_hw_rfkill
(bsc#1051022).
- platform/x86: ideapad-laptop: Add IdeaPad V510-15IKB to no_hw_rfkill
(bsc#1051022).
- platform/x86: ideapad-laptop: Add Lenovo Yoga 910-13IKB to no_hw_rfkill
dmi list (bsc#1051022).
- platform/x86: ideapad-laptop: Add several models to no_hw_rfkill
(bsc#1051022).
- platform/x86: ideapad-laptop: Add Y520-15IKBN to no_hw_rfkill
(bsc#1051022).
- platform/x86: ideapad-laptop: Add Y700 15-ACZ to no_hw_rfkill DMI list
(bsc#1051022).
- platform/x86: ideapad-laptop: Add Y720-15IKBN to no_hw_rfkill
(bsc#1051022).
- pm / Hibernate: Fix scheduling while atomic during hibernation
(bsc#1051059).
- powerpc: Fix DAR reporting when alignment handler faults (bnc#1012382).
- powerpc/pseries: Fix parent_dn reference leak in add_dt_node()
(bnc#1012382).
- prctl: propagate has_child_subreaper flag to every descendant
(bnc#1022476).
- qeth: fix L3 next-hop im xmit qeth hdr (bnc#1052773, LTC#157374).
- qlge: avoid memcpy buffer overflow (bnc#1012382).
- reiserfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- Revert "ACPI / video: Add force_native quirk for HP Pavilion dv6"
(bsc#1031717).
- Revert "net: fix percpu memory leaks" (bnc#1012382).
- Revert "net: phy: Correctly process PHY_HALTED in phy_stop_machine()"
(bnc#1012382).
- Revert "net: use lib/percpu_counter API for fragmentation mem
accounting" (bnc#1012382).
- Revert "powerpc/numa: Fix percpu allocations to be NUMA aware"
(bsc#1048914).
- Revert "tpm: Issue a TPM2_Shutdown for TPM2 devices." (kabi).
- rpm/kernel-binary.spec.in: find-debuginfo.sh should not touch build-id
This needs rpm-4.14+ (bsc#964063).
- rtnetlink: fix rtnl_vfinfo_size (bsc#1056261).
- s390: export symbols for crash-kmp (bsc#1053915).
- sched/core: Allow __sched_setscheduler() in interrupts when PI is not
used (bnc#1022476).
- sched/debug: Print the scheduler topology group mask (bnc#1022476).
- sched/fair, cpumask: Export for_each_cpu_wrap() (bnc#1022476).
- sched/fair: Fix O(nr_cgroups) in load balance path (bnc#1022476).
- sched/fair: Use task_groups instead of leaf_cfs_rq_list to walk all
cfs_rqs (bnc#1022476).
- sched/topology: Add sched_group_capacity debugging (bnc#1022476).
- sched/topology: Fix building of overlapping sched-groups (bnc#1022476).
- sched/topology: Fix overlapping sched_group_capacity (bnc#1022476).
- sched/topology: Move comment about asymmetric node setups (bnc#1022476).
- sched/topology: Refactor function build_overlap_sched_groups()
(bnc#1022476).
- sched/topology: Remove FORCE_SD_OVERLAP (bnc#1022476).
- sched/topology: Simplify build_overlap_sched_groups() (bnc#1022476).
- sched/topology: Small cleanup (bnc#1022476).
- sched/topology: Verify the first group matches the child domain
(bnc#1022476).
- scsi: Add STARGET_CREATE_REMOVE state to scsi_target_state (bsc#1013887).
- scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).
- scsi_devinfo: fixup string compare (bsc#1037404).
- scsi_dh_alua: suppress errors from unsupported devices (bsc#1038792).
- scsi: ILLEGAL REQUEST + ASC==27 => target failure (bsc#1059465).
- scsi: kABI fix for new state STARGET_CREATED_REMOVE (bsc#1013887).
- scsi: megaraid_sas: Check valid aen class range to avoid kernel panic
(bnc#1012382).
- scsi: megaraid_sas: Return pended IOCTLs with cmd_status
MFI_STAT_WRONG_STATE in case adapter is dead (bnc#1012382).
- scsi: sg: close race condition in sg_remove_sfp_usercontext()
(bsc#1064206).
- scsi: sg: factor out sg_fill_request_table() (bnc#1012382).
- scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE (bnc#1012382).
- scsi: sg: off by one in sg_ioctl() (bnc#1012382).
- scsi: sg: remove 'save_scat_len' (bnc#1012382).
- scsi: sg: use standard lists for sg_requests (bnc#1012382).
- scsi: storvsc: fix memory leak on ring buffer busy (bnc#1012382).
- scsi: storvsc: Workaround for virtual DVD SCSI version (fate#320485,
bnc#1044636).
- scsi: zfcp: add handling for FCP_RESID_OVER to the fcp ingress path
(bnc#1012382).
- scsi: zfcp: fix capping of unsuccessful GPN_FT SAN response trace
records (bnc#1012382).
- scsi: zfcp: fix missing trace records for early returns in TMF eh
handlers (bnc#1012382).
- scsi: zfcp: fix passing fsf_req to SCSI trace on TMF to correlate with
HBA (bnc#1012382).
- scsi: zfcp: fix payload with full FCP_RSP IU in SCSI trace records
(bnc#1012382).
- scsi: zfcp: fix queuecommand for scsi_eh commands when DIX enabled
(bnc#1012382).
- scsi: zfcp: trace HBA FSF response by default on dismiss or timedout
late response (bnc#1012382).
- scsi: zfcp: trace high part of "new" 64 bit SCSI LUN (bnc#1012382).
- seccomp: fix the usage of get/put_seccomp_filter() in
seccomp_get_filter() (bnc#1012382).
- skd: Avoid that module unloading triggers a use-after-free (bnc#1012382).
- skd: Submit requests to firmware before triggering the doorbell
(bnc#1012382).
- smb3: Do not ignore O_SYNC/O_DSYNC and O_DIRECT flags (bnc#1012382).
- smb: Validate negotiate (to protect against downgrade) even if signing
off (bnc#1012382).
- smsc75xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- sr9700: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- supported.conf: clear mistaken external support flag for cifs.ko
(bsc#1053802).
- swiotlb-xen: implement xen_swiotlb_dma_mmap callback (bnc#1012382).
- sysctl: do not print negative flag for proc_douintvec (bnc#1046985).
- sysctl: fix lax sysctl_check_table() sanity check (bsc#1048893).
- sysctl: fold sysctl_writes_strict checks into helper (bsc#1048893).
- sysctl: kdoc'ify sysctl_writes_strict (bsc#1048893).
- sysctl: simplify unsigned int support (bsc#1048893).
- timers: Plug locking race vs. timer migration (bnc#1022476).
- timer/sysclt: Restrict timer migration sysctl values to 0 and 1
(bnc#1012382).
- tpm: fix: return rc when devm_add_action() fails (bsc#1020645,
fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes
8e0ee3c9faed).
- tpm: Issue a TPM2_Shutdown for TPM2 devices (bsc#1053117).
- tpm: KABI fix (bsc#1053117).
- tpm: read burstcount from TPM_STS in one 32-bit transaction
(bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048,
git-fixes 27084efee0c3).
- tpm_tis_core: Choose appropriate timeout for reading burstcount
(bsc#1020645, fate#321435, fate#321507, fate#321600, bsc#1034048,
git-fixes aec04cbdf723).
- tpm_tis_core: convert max timeouts from msec to jiffies (bsc#1020645,
fate#321435, fate#321507, fate#321600, bsc#1034048, git-fixes
aec04cbdf723).
- tracing: Apply trace_clock changes to instance max buffer (bnc#1012382).
- tracing: Erase irqsoff trace with empty write (bnc#1012382).
- tracing: Fix trace_pipe behavior for instance traces (bnc#1012382).
- tty: fix __tty_insert_flip_char regression (bnc#1012382).
- tty: improve tty_insert_flip_char() fast path (bnc#1012382).
- tty: improve tty_insert_flip_char() slow path (bnc#1012382).
- tty: serial: msm: Support more bauds (git-fixes).
- ubifs: Correctly evict xattr inodes (bsc#1012829).
- ubifs: Do not leak kernel memory to the MTD (bsc#1012829).
- udf: Fix deadlock between writeback and udf_setsize() (bsc#1012829).
- udf: Fix races with i_size changes during readpage (bsc#1012829).
- usb: core: fix device node leak (bsc#1047487).
- vfs: fix missing inode_get_dev sites (bsc#1052049).
- vfs: Return -ENXIO for negative SEEK_HOLE / SEEK_DATA offsets
(bnc#1012382).
- video: fbdev: aty: do not leak uninitialized padding in clk to userspace
(bnc#1012382).
- Workaround for kABI compatibility with DP-MST patches (bsc#1055493).
- x86/dmi: Switch dmi_remap() from ioremap() to ioremap_cache()
(bsc#1051399).
- x86/fpu: Do not let userspace set bogus xcomp_bv (bnc#1012382).
- x86/fsgsbase/64: Report FSBASE and GSBASE correctly in core dumps
(bnc#1012382).
- x86/ldt: Fix off by one in get_segment_base() (bsc#1061872).
- x86/LDT: Print the real LDT base address (bsc#1051478).
- x86/mce: Make timer handling more robust (bsc#1042422).
- x86/panic: replace smp_send_stop() with kdump friendly version in panic
path (bsc#1051478).
- xen: allocate page for shared info page from low memory (bnc#1038616).
- xen/balloon: do not online new memory initially (bnc#1028173).
- xen: hold lock_device_hotplug throughout vcpu hotplug operations
(bsc#1042422).
- xen-netfront: Rework the fix for Rx stall during OOM and network stress
(git-fixes).
- xen/pvh*: Support > 32 VCPUs at domain restore (bnc#1045563).
- xfrm: NULL dereference on allocation failure (bsc#1047343).
- xfrm: Oops on error in pfkey_msg2xfrm_state() (bsc#1047653).
- xfs/dmapi: fix incorrect file->f_path.dentry->d_inode usage
(bsc#1055896).
- xfs: do not BUG() on mixed direct and mapped I/O (bsc#1050188).
- xfs: Do not clear SGID when inheriting ACLs (bsc#1030552).
- xfs: fix inobt inode allocation search optimization (bsc#1012829).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP2:
zypper in -t patch SUSE-SLE-WE-12-SP2-2017-1786=1
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-1786=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1786=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1786=1
- SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1786=1
- SUSE Linux Enterprise High Availability 12-SP2:
zypper in -t patch SUSE-SLE-HA-12-SP2-2017-1786=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1786=1
- SUSE Container as a Service Platform ALL:
zypper in -t patch SUSE-CAASP-ALL-2017-1786=1
- OpenStack Cloud Magnum Orchestration 7:
zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1786=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64):
kernel-default-debuginfo-4.4.90-92.45.1
kernel-default-debugsource-4.4.90-92.45.1
kernel-default-extra-4.4.90-92.45.1
kernel-default-extra-debuginfo-4.4.90-92.45.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
kernel-obs-build-4.4.90-92.45.1
kernel-obs-build-debugsource-4.4.90-92.45.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (noarch):
kernel-docs-4.4.90-92.45.3
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
kernel-default-4.4.90-92.45.1
kernel-default-base-4.4.90-92.45.1
kernel-default-base-debuginfo-4.4.90-92.45.1
kernel-default-debuginfo-4.4.90-92.45.1
kernel-default-debugsource-4.4.90-92.45.1
kernel-default-devel-4.4.90-92.45.1
kernel-syms-4.4.90-92.45.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch):
kernel-devel-4.4.90-92.45.1
kernel-macros-4.4.90-92.45.1
kernel-source-4.4.90-92.45.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):
kernel-default-4.4.90-92.45.1
kernel-default-base-4.4.90-92.45.1
kernel-default-base-debuginfo-4.4.90-92.45.1
kernel-default-debuginfo-4.4.90-92.45.1
kernel-default-debugsource-4.4.90-92.45.1
kernel-default-devel-4.4.90-92.45.1
kernel-syms-4.4.90-92.45.1
- SUSE Linux Enterprise Server 12-SP2 (noarch):
kernel-devel-4.4.90-92.45.1
kernel-macros-4.4.90-92.45.1
kernel-source-4.4.90-92.45.1
- SUSE Linux Enterprise Server 12-SP2 (s390x):
kernel-default-man-4.4.90-92.45.1
- SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-4_4_90-92_45-default-1-2.4
- SUSE Linux Enterprise High Availability 12-SP2 (ppc64le s390x x86_64):
cluster-md-kmp-default-4.4.90-92.45.1
cluster-md-kmp-default-debuginfo-4.4.90-92.45.1
cluster-network-kmp-default-4.4.90-92.45.1
cluster-network-kmp-default-debuginfo-4.4.90-92.45.1
dlm-kmp-default-4.4.90-92.45.1
dlm-kmp-default-debuginfo-4.4.90-92.45.1
gfs2-kmp-default-4.4.90-92.45.1
gfs2-kmp-default-debuginfo-4.4.90-92.45.1
kernel-default-debuginfo-4.4.90-92.45.1
kernel-default-debugsource-4.4.90-92.45.1
ocfs2-kmp-default-4.4.90-92.45.1
ocfs2-kmp-default-debuginfo-4.4.90-92.45.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
kernel-default-4.4.90-92.45.1
kernel-default-debuginfo-4.4.90-92.45.1
kernel-default-debugsource-4.4.90-92.45.1
kernel-default-devel-4.4.90-92.45.1
kernel-default-extra-4.4.90-92.45.1
kernel-default-extra-debuginfo-4.4.90-92.45.1
kernel-syms-4.4.90-92.45.1
- SUSE Linux Enterprise Desktop 12-SP2 (noarch):
kernel-devel-4.4.90-92.45.1
kernel-macros-4.4.90-92.45.1
kernel-source-4.4.90-92.45.1
- SUSE Container as a Service Platform ALL (x86_64):
kernel-default-4.4.90-92.45.1
kernel-default-debuginfo-4.4.90-92.45.1
kernel-default-debugsource-4.4.90-92.45.1
- OpenStack Cloud Magnum Orchestration 7 (x86_64):
kernel-default-4.4.90-92.45.1
kernel-default-debuginfo-4.4.90-92.45.1
kernel-default-debugsource-4.4.90-92.45.1
References:
https://www.suse.com/security/cve/CVE-2017-1000252.html
https://www.suse.com/security/cve/CVE-2017-10810.html
https://www.suse.com/security/cve/CVE-2017-11472.html
https://www.suse.com/security/cve/CVE-2017-11473.html
https://www.suse.com/security/cve/CVE-2017-12134.html
https://www.suse.com/security/cve/CVE-2017-12153.html
https://www.suse.com/security/cve/CVE-2017-12154.html
https://www.suse.com/security/cve/CVE-2017-13080.html
https://www.suse.com/security/cve/CVE-2017-14051.html
https://www.suse.com/security/cve/CVE-2017-14106.html
https://www.suse.com/security/cve/CVE-2017-14489.html
https://www.suse.com/security/cve/CVE-2017-15649.html
https://www.suse.com/security/cve/CVE-2017-7518.html
https://www.suse.com/security/cve/CVE-2017-7541.html
https://www.suse.com/security/cve/CVE-2017-7542.html
https://www.suse.com/security/cve/CVE-2017-8831.html
https://bugzilla.suse.com/1006180
https://bugzilla.suse.com/1011913
https://bugzilla.suse.com/1012382
https://bugzilla.suse.com/1012829
https://bugzilla.suse.com/1013887
https://bugzilla.suse.com/1019151
https://bugzilla.suse.com/1020645
https://bugzilla.suse.com/1020657
https://bugzilla.suse.com/1021424
https://bugzilla.suse.com/1022476
https://bugzilla.suse.com/1022743
https://bugzilla.suse.com/1022967
https://bugzilla.suse.com/1023175
https://bugzilla.suse.com/1024405
https://bugzilla.suse.com/1028173
https://bugzilla.suse.com/1028286
https://bugzilla.suse.com/1029693
https://bugzilla.suse.com/1030552
https://bugzilla.suse.com/1030850
https://bugzilla.suse.com/1031515
https://bugzilla.suse.com/1031717
https://bugzilla.suse.com/1031784
https://bugzilla.suse.com/1033587
https://bugzilla.suse.com/1034048
https://bugzilla.suse.com/1034075
https://bugzilla.suse.com/1034762
https://bugzilla.suse.com/1036303
https://bugzilla.suse.com/1036632
https://bugzilla.suse.com/1037344
https://bugzilla.suse.com/1037404
https://bugzilla.suse.com/1037994
https://bugzilla.suse.com/1038078
https://bugzilla.suse.com/1038583
https://bugzilla.suse.com/1038616
https://bugzilla.suse.com/1038792
https://bugzilla.suse.com/1039915
https://bugzilla.suse.com/1040307
https://bugzilla.suse.com/1040351
https://bugzilla.suse.com/1041958
https://bugzilla.suse.com/1042286
https://bugzilla.suse.com/1042314
https://bugzilla.suse.com/1042422
https://bugzilla.suse.com/1042778
https://bugzilla.suse.com/1043652
https://bugzilla.suse.com/1044112
https://bugzilla.suse.com/1044636
https://bugzilla.suse.com/1045154
https://bugzilla.suse.com/1045563
https://bugzilla.suse.com/1045922
https://bugzilla.suse.com/1046682
https://bugzilla.suse.com/1046821
https://bugzilla.suse.com/1046985
https://bugzilla.suse.com/1047027
https://bugzilla.suse.com/1047048
https://bugzilla.suse.com/1047096
https://bugzilla.suse.com/1047118
https://bugzilla.suse.com/1047121
https://bugzilla.suse.com/1047152
https://bugzilla.suse.com/1047277
https://bugzilla.suse.com/1047343
https://bugzilla.suse.com/1047354
https://bugzilla.suse.com/1047487
https://bugzilla.suse.com/1047651
https://bugzilla.suse.com/1047653
https://bugzilla.suse.com/1047670
https://bugzilla.suse.com/1048155
https://bugzilla.suse.com/1048221
https://bugzilla.suse.com/1048317
https://bugzilla.suse.com/1048891
https://bugzilla.suse.com/1048893
https://bugzilla.suse.com/1048914
https://bugzilla.suse.com/1048934
https://bugzilla.suse.com/1049226
https://bugzilla.suse.com/1049483
https://bugzilla.suse.com/1049486
https://bugzilla.suse.com/1049580
https://bugzilla.suse.com/1049603
https://bugzilla.suse.com/1049645
https://bugzilla.suse.com/1049882
https://bugzilla.suse.com/1050061
https://bugzilla.suse.com/1050188
https://bugzilla.suse.com/1051022
https://bugzilla.suse.com/1051059
https://bugzilla.suse.com/1051239
https://bugzilla.suse.com/1051399
https://bugzilla.suse.com/1051478
https://bugzilla.suse.com/1051479
https://bugzilla.suse.com/1051556
https://bugzilla.suse.com/1051663
https://bugzilla.suse.com/1051790
https://bugzilla.suse.com/1052049
https://bugzilla.suse.com/1052223
https://bugzilla.suse.com/1052533
https://bugzilla.suse.com/1052580
https://bugzilla.suse.com/1052593
https://bugzilla.suse.com/1052709
https://bugzilla.suse.com/1052773
https://bugzilla.suse.com/1052794
https://bugzilla.suse.com/1052888
https://bugzilla.suse.com/1053117
https://bugzilla.suse.com/1053802
https://bugzilla.suse.com/1053915
https://bugzilla.suse.com/1053919
https://bugzilla.suse.com/1054084
https://bugzilla.suse.com/1055013
https://bugzilla.suse.com/1055096
https://bugzilla.suse.com/1055359
https://bugzilla.suse.com/1055493
https://bugzilla.suse.com/1055755
https://bugzilla.suse.com/1055896
https://bugzilla.suse.com/1056261
https://bugzilla.suse.com/1056588
https://bugzilla.suse.com/1056827
https://bugzilla.suse.com/1056982
https://bugzilla.suse.com/1057015
https://bugzilla.suse.com/1058038
https://bugzilla.suse.com/1058116
https://bugzilla.suse.com/1058410
https://bugzilla.suse.com/1058507
https://bugzilla.suse.com/1059051
https://bugzilla.suse.com/1059465
https://bugzilla.suse.com/1060197
https://bugzilla.suse.com/1061017
https://bugzilla.suse.com/1061046
https://bugzilla.suse.com/1061064
https://bugzilla.suse.com/1061067
https://bugzilla.suse.com/1061172
https://bugzilla.suse.com/1061831
https://bugzilla.suse.com/1061872
https://bugzilla.suse.com/1063667
https://bugzilla.suse.com/1064206
https://bugzilla.suse.com/1064388
https://bugzilla.suse.com/964063
https://bugzilla.suse.com/971975
https://bugzilla.suse.com/974215
https://bugzilla.suse.com/981309
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0