SUSE Security Update: Security update for Linux Kernel Live Patch 20 for SLE 12
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:2769-1
Rating: important
References: #1045327 #1057950
Cross-References: CVE-2017-1000251 CVE-2017-15274
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for the Linux Kernel 3.12.61-52_69 fixes one issue.
The following security bugs were fixed:
- CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not
consider the case of a NULL payload in conjunction with a nonzero length
value, which allowed local users to cause a denial of service (NULL
pointer dereference and OOPS) via a crafted add_key or keyctl system
call (bsc#1045327).
- CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ)
was vulnerable to a stack overflow vulnerability in the processing of
L2CAP configuration responses resulting in Remote code execution in
kernel space (bsc#1057950).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-1714=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 12-LTSS (x86_64):
kgraft-patch-3_12_61-52_69-default-6-4.1
kgraft-patch-3_12_61-52_69-xen-6-4.1
References:
https://www.suse.com/security/cve/CVE-2017-1000251.htmlhttps://www.suse.com/security/cve/CVE-2017-15274.htmlhttps://bugzilla.suse.com/1045327https://bugzilla.suse.com/1057950
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for git
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:2757-1
Rating: important
References: #1061041
Cross-References: CVE-2017-14867
Affected Products:
openSUSE Leap 42.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for git fixes the following issues:
This security issue was fixed:
- CVE-2017-14867: Git used unsafe Perl scripts to support subcommands such
as cvsserver, which allowed attackers to execute arbitrary OS commands
via shell metacharacters in a module name (bsc#1061041).
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-1167=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.2 (noarch):
git-doc-2.12.3-5.14.1
- openSUSE Leap 42.2 (x86_64):
git-2.12.3-5.14.1
git-arch-2.12.3-5.14.1
git-core-2.12.3-5.14.1
git-core-debuginfo-2.12.3-5.14.1
git-credential-gnome-keyring-2.12.3-5.14.1
git-credential-gnome-keyring-debuginfo-2.12.3-5.14.1
git-cvs-2.12.3-5.14.1
git-daemon-2.12.3-5.14.1
git-daemon-debuginfo-2.12.3-5.14.1
git-debugsource-2.12.3-5.14.1
git-email-2.12.3-5.14.1
git-gui-2.12.3-5.14.1
git-svn-2.12.3-5.14.1
git-svn-debuginfo-2.12.3-5.14.1
git-web-2.12.3-5.14.1
gitk-2.12.3-5.14.1
References:
https://www.suse.com/security/cve/CVE-2017-14867.htmlhttps://bugzilla.suse.com/1061041
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for wpa_supplicant
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:2755-1
Rating: important
References: #1056061
Cross-References: CVE-2017-13078 CVE-2017-13079 CVE-2017-13080
CVE-2017-13081 CVE-2017-13087 CVE-2017-13088
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________
An update that fixes 6 vulnerabilities is now available.
Description:
This update for wpa_supplicant fixes the security issues:
- Several vulnerabilities in standard conforming implementations of the
WPA2 protocol have been discovered and published under the code name
KRACK. This update remedies those issues in a backwards compatible
manner, i.e. the updated wpa_supplicant can interface properly with both
vulnerable and patched implementations of WPA2, but an attacker won't be
able to exploit the KRACK weaknesses in those connections anymore even
if the other party is still vulnerable. [bsc#1056061, CVE-2017-13078,
CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13087,
CVE-2017-13088]
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2017-1163=1
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-1163=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (i586 x86_64):
wpa_supplicant-2.2-13.1
wpa_supplicant-debuginfo-2.2-13.1
wpa_supplicant-debugsource-2.2-13.1
wpa_supplicant-gui-2.2-13.1
wpa_supplicant-gui-debuginfo-2.2-13.1
- openSUSE Leap 42.2 (i586 x86_64):
wpa_supplicant-2.2-9.3.1
wpa_supplicant-debuginfo-2.2-9.3.1
wpa_supplicant-debugsource-2.2-9.3.1
wpa_supplicant-gui-2.2-9.3.1
wpa_supplicant-gui-debuginfo-2.2-9.3.1
References:
https://www.suse.com/security/cve/CVE-2017-13078.htmlhttps://www.suse.com/security/cve/CVE-2017-13079.htmlhttps://www.suse.com/security/cve/CVE-2017-13080.htmlhttps://www.suse.com/security/cve/CVE-2017-13081.htmlhttps://www.suse.com/security/cve/CVE-2017-13087.htmlhttps://www.suse.com/security/cve/CVE-2017-13088.htmlhttps://bugzilla.suse.com/1056061
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for wpa_supplicant
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:2752-1
Rating: important
References: #1056061
Cross-References: CVE-2017-13078 CVE-2017-13079 CVE-2017-13080
CVE-2017-13081 CVE-2017-13087 CVE-2017-13088
Affected Products:
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Server 11-SP3-LTSS
SUSE Linux Enterprise Point of Sale 11-SP3
______________________________________________________________________________
An update that fixes 6 vulnerabilities is now available.
Description:
This update for wpa_supplicant fixes the following issues:
- Several vulnerabilities in standard conforming implementations of the
WPA2 protocol have been discovered and published under the code name
KRACK. This update remedies those issues in a backwards compatible
manner, i.e. the updated wpa_supplicant can interface properly with both
vulnerable and patched implementations of WPA2, but an attacker won't be
able to exploit the KRACK weaknesses in those connections anymore even
if the other party is still vulnerable. [bsc#1056061, CVE-2017-13078,
CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13087,
CVE-2017-13088]
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-wpa_supplicant-13318=1
- SUSE Linux Enterprise Server 11-SP3-LTSS:
zypper in -t patch slessp3-wpa_supplicant-13318=1
- SUSE Linux Enterprise Point of Sale 11-SP3:
zypper in -t patch sleposp3-wpa_supplicant-13318=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
wpa_supplicant-0.7.1-6.18.3.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):
wpa_supplicant-0.7.1-6.18.3.1
- SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
wpa_supplicant-0.7.1-6.18.3.1
References:
https://www.suse.com/security/cve/CVE-2017-13078.htmlhttps://www.suse.com/security/cve/CVE-2017-13079.htmlhttps://www.suse.com/security/cve/CVE-2017-13080.htmlhttps://www.suse.com/security/cve/CVE-2017-13081.htmlhttps://www.suse.com/security/cve/CVE-2017-13087.htmlhttps://www.suse.com/security/cve/CVE-2017-13088.htmlhttps://bugzilla.suse.com/1056061
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for xen
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:2751-1
Rating: important
References: #1027519 #1055321 #1059777 #1061076 #1061077
#1061080 #1061081 #1061082 #1061084 #1061086
#1061087
Cross-References: CVE-2017-5526
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Desktop 12-SP3
______________________________________________________________________________
An update that solves one vulnerability and has 10 fixes is
now available.
Description:
This update for xen fixes several issues:
These security issues were fixed:
- CVE-2017-5526: The ES1370 audio device emulation support was vulnerable
to a memory leakage issue allowing a privileged user inside the guest to
cause a DoS and/or potentially crash the Qemu process on the host
(bsc#1059777)
- bsc#1061084: Missing cleanup in the page type system allowed a malicious
or buggy PV guest to cause DoS (XSA-242)
- bsc#1061086: A problem in the shadow pagetable code allowed a malicious
or buggy HVM guest to cause DoS or cause hypervisor memory corruption
potentially allowing the guest to escalate its privilege (XSA-243)
- bsc#1061087: Problematic handling of the selector fields in the
Interrupt Descriptor Table (IDT) allowed a malicious or buggy x86 PV
guest to escalate its privileges or cause DoS (XSA-244)
- bsc#1061077 Missing checks in the handling of DMOPs allowed malicious or
buggy stub domain kernels or tool stacks otherwise living outside of
Domain0 to cause a DoS (XSA-238)
- bsc#1061080: Intercepted I/O write operations with less than a full
machine word's worth of data were not properly handled, which allowed a
malicious unprivileged x86 HVM guest to obtain sensitive information
from the host or
other guests (XSA-239)
- bsc#1061081: In certain configurations of linear page tables a stack
overflow might have occured that allowed a malicious or buggy PV guest
to cause DoS and potentially privilege escalation and information leaks
(XSA-240)
- bsc#1061082: Under certain conditions x86 PV guests could have caused
the hypervisor to miss a necessary TLB flush for a page. This allowed a
malicious x86 PV guest to access all of system memory, allowing for
privilege escalation, DoS, and information leaks (XSA-241)
- bsc#1061076: Multiple issues existed with the setup of PCI MSI
interrupts that allowed a malicious or buggy guest to cause DoS and
potentially privilege escalation and information leaks (XSA-237)
- bsc#1055321: When dealing with the grant map space of add-to-physmap
operations, ARM specific code failed to release a lock. This allowed a
malicious guest administrator to cause DoS (XSA-235)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP3:
zypper in -t patch SUSE-SLE-SDK-12-SP3-2017-1702=1
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1702=1
- SUSE Linux Enterprise Desktop 12-SP3:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2017-1702=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 x86_64):
xen-debugsource-4.9.0_14-3.18.1
xen-devel-4.9.0_14-3.18.1
- SUSE Linux Enterprise Server 12-SP3 (x86_64):
xen-4.9.0_14-3.18.1
xen-debugsource-4.9.0_14-3.18.1
xen-doc-html-4.9.0_14-3.18.1
xen-libs-32bit-4.9.0_14-3.18.1
xen-libs-4.9.0_14-3.18.1
xen-libs-debuginfo-32bit-4.9.0_14-3.18.1
xen-libs-debuginfo-4.9.0_14-3.18.1
xen-tools-4.9.0_14-3.18.1
xen-tools-debuginfo-4.9.0_14-3.18.1
xen-tools-domU-4.9.0_14-3.18.1
xen-tools-domU-debuginfo-4.9.0_14-3.18.1
- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):
xen-4.9.0_14-3.18.1
xen-debugsource-4.9.0_14-3.18.1
xen-libs-32bit-4.9.0_14-3.18.1
xen-libs-4.9.0_14-3.18.1
xen-libs-debuginfo-32bit-4.9.0_14-3.18.1
xen-libs-debuginfo-4.9.0_14-3.18.1
References:
https://www.suse.com/security/cve/CVE-2017-5526.htmlhttps://bugzilla.suse.com/1027519https://bugzilla.suse.com/1055321https://bugzilla.suse.com/1059777https://bugzilla.suse.com/1061076https://bugzilla.suse.com/1061077https://bugzilla.suse.com/1061080https://bugzilla.suse.com/1061081https://bugzilla.suse.com/1061082https://bugzilla.suse.com/1061084https://bugzilla.suse.com/1061086https://bugzilla.suse.com/1061087
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for git
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:2747-1
Rating: important
References: #1061041
Cross-References: CVE-2017-14867
Affected Products:
SUSE OpenStack Cloud 6
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1-LTSS
SUSE Container as a Service Platform ALL
OpenStack Cloud Magnum Orchestration 7
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for git fixes the following issues:
This security issue was fixed:
- CVE-2017-14867: Git used unsafe Perl scripts to support subcommands such
as cvsserver, which allowed attackers to execute arbitrary OS commands
via shell metacharacters in a module name (bsc#1061041).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 6:
zypper in -t patch SUSE-OpenStack-Cloud-6-2017-1704=1
- SUSE Linux Enterprise Software Development Kit 12-SP3:
zypper in -t patch SUSE-SLE-SDK-12-SP3-2017-1704=1
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-1704=1
- SUSE Linux Enterprise Server for SAP 12-SP1:
zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1704=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1704=1
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1704=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1704=1
- SUSE Linux Enterprise Server 12-SP1-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1704=1
- SUSE Container as a Service Platform ALL:
zypper in -t patch SUSE-CAASP-ALL-2017-1704=1
- OpenStack Cloud Magnum Orchestration 7:
zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1704=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE OpenStack Cloud 6 (noarch):
git-doc-2.12.3-27.9.1
- SUSE OpenStack Cloud 6 (x86_64):
git-core-2.12.3-27.9.1
git-core-debuginfo-2.12.3-27.9.1
git-debugsource-2.12.3-27.9.1
- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):
git-2.12.3-27.9.1
git-arch-2.12.3-27.9.1
git-core-2.12.3-27.9.1
git-core-debuginfo-2.12.3-27.9.1
git-cvs-2.12.3-27.9.1
git-daemon-2.12.3-27.9.1
git-daemon-debuginfo-2.12.3-27.9.1
git-debugsource-2.12.3-27.9.1
git-email-2.12.3-27.9.1
git-gui-2.12.3-27.9.1
git-svn-2.12.3-27.9.1
git-svn-debuginfo-2.12.3-27.9.1
git-web-2.12.3-27.9.1
gitk-2.12.3-27.9.1
- SUSE Linux Enterprise Software Development Kit 12-SP3 (noarch):
git-doc-2.12.3-27.9.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
git-2.12.3-27.9.1
git-arch-2.12.3-27.9.1
git-core-2.12.3-27.9.1
git-core-debuginfo-2.12.3-27.9.1
git-cvs-2.12.3-27.9.1
git-daemon-2.12.3-27.9.1
git-daemon-debuginfo-2.12.3-27.9.1
git-debugsource-2.12.3-27.9.1
git-email-2.12.3-27.9.1
git-gui-2.12.3-27.9.1
git-svn-2.12.3-27.9.1
git-svn-debuginfo-2.12.3-27.9.1
git-web-2.12.3-27.9.1
gitk-2.12.3-27.9.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (noarch):
git-doc-2.12.3-27.9.1
- SUSE Linux Enterprise Server for SAP 12-SP1 (ppc64le x86_64):
git-core-2.12.3-27.9.1
git-core-debuginfo-2.12.3-27.9.1
git-debugsource-2.12.3-27.9.1
- SUSE Linux Enterprise Server for SAP 12-SP1 (noarch):
git-doc-2.12.3-27.9.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
git-core-2.12.3-27.9.1
git-core-debuginfo-2.12.3-27.9.1
git-debugsource-2.12.3-27.9.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch):
git-doc-2.12.3-27.9.1
- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):
git-core-2.12.3-27.9.1
git-core-debuginfo-2.12.3-27.9.1
git-debugsource-2.12.3-27.9.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):
git-core-2.12.3-27.9.1
git-core-debuginfo-2.12.3-27.9.1
git-debugsource-2.12.3-27.9.1
- SUSE Linux Enterprise Server 12-SP2 (noarch):
git-doc-2.12.3-27.9.1
- SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):
git-core-2.12.3-27.9.1
git-core-debuginfo-2.12.3-27.9.1
git-debugsource-2.12.3-27.9.1
- SUSE Linux Enterprise Server 12-SP1-LTSS (noarch):
git-doc-2.12.3-27.9.1
- SUSE Container as a Service Platform ALL (x86_64):
git-core-2.12.3-27.9.1
git-core-debuginfo-2.12.3-27.9.1
git-debugsource-2.12.3-27.9.1
- OpenStack Cloud Magnum Orchestration 7 (x86_64):
git-core-2.12.3-27.9.1
git-core-debuginfo-2.12.3-27.9.1
git-debugsource-2.12.3-27.9.1
References:
https://www.suse.com/security/cve/CVE-2017-14867.htmlhttps://bugzilla.suse.com/1061041
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for wpa_supplicant
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:2745-1
Rating: important
References: #1056061
Cross-References: CVE-2017-13078 CVE-2017-13079 CVE-2017-13080
CVE-2017-13081 CVE-2017-13087 CVE-2017-13088
Affected Products:
SUSE OpenStack Cloud 6
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1-LTSS
SUSE Linux Enterprise Server 12-LTSS
SUSE Linux Enterprise Desktop 12-SP3
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________
An update that fixes 6 vulnerabilities is now available.
Description:
This update for wpa_supplicant fixes the security issues:
- Several vulnerabilities in standard conforming implementations of the
WPA2 protocol have been discovered and published under the code name
KRACK. This update remedies those issues in a backwards compatible
manner, i.e. the updated wpa_supplicant can interface properly with both
vulnerable and patched implementations of WPA2, but an attacker won't be
able to exploit the KRACK weaknesses in those connections anymore even
if the other party is still vulnerable. [bsc#1056061, CVE-2017-13078,
CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13087,
CVE-2017-13088]
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 6:
zypper in -t patch SUSE-OpenStack-Cloud-6-2017-1705=1
- SUSE Linux Enterprise Server for SAP 12-SP1:
zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1705=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1705=1
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1705=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1705=1
- SUSE Linux Enterprise Server 12-SP1-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1705=1
- SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-1705=1
- SUSE Linux Enterprise Desktop 12-SP3:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2017-1705=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1705=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE OpenStack Cloud 6 (x86_64):
wpa_supplicant-2.2-15.3.1
wpa_supplicant-debuginfo-2.2-15.3.1
wpa_supplicant-debugsource-2.2-15.3.1
- SUSE Linux Enterprise Server for SAP 12-SP1 (ppc64le x86_64):
wpa_supplicant-2.2-15.3.1
wpa_supplicant-debuginfo-2.2-15.3.1
wpa_supplicant-debugsource-2.2-15.3.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
wpa_supplicant-2.2-15.3.1
wpa_supplicant-debuginfo-2.2-15.3.1
wpa_supplicant-debugsource-2.2-15.3.1
- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):
wpa_supplicant-2.2-15.3.1
wpa_supplicant-debuginfo-2.2-15.3.1
wpa_supplicant-debugsource-2.2-15.3.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):
wpa_supplicant-2.2-15.3.1
wpa_supplicant-debuginfo-2.2-15.3.1
wpa_supplicant-debugsource-2.2-15.3.1
- SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):
wpa_supplicant-2.2-15.3.1
wpa_supplicant-debuginfo-2.2-15.3.1
wpa_supplicant-debugsource-2.2-15.3.1
- SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):
wpa_supplicant-2.2-15.3.1
wpa_supplicant-debuginfo-2.2-15.3.1
wpa_supplicant-debugsource-2.2-15.3.1
- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):
wpa_supplicant-2.2-15.3.1
wpa_supplicant-debuginfo-2.2-15.3.1
wpa_supplicant-debugsource-2.2-15.3.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
wpa_supplicant-2.2-15.3.1
wpa_supplicant-debuginfo-2.2-15.3.1
wpa_supplicant-debugsource-2.2-15.3.1
References:
https://www.suse.com/security/cve/CVE-2017-13078.htmlhttps://www.suse.com/security/cve/CVE-2017-13079.htmlhttps://www.suse.com/security/cve/CVE-2017-13080.htmlhttps://www.suse.com/security/cve/CVE-2017-13081.htmlhttps://www.suse.com/security/cve/CVE-2017-13087.htmlhttps://www.suse.com/security/cve/CVE-2017-13088.htmlhttps://bugzilla.suse.com/1056061
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:2741-1
Rating: important
References: #1005778 #1005780 #1005781 #1012382 #1022967
#1036215 #1036737 #1037579 #1037890 #1043598
#1044503 #1047238 #1051987 #1052593 #1053043
#1055493 #1055755 #1056686 #1057383 #1057498
#1058038 #1058410 #1058507 #1058512 #1058550
#1059051 #1059465 #1059500 #1060197 #1060229
#1061017 #1061046 #1061064 #1061067 #1061172
#1061831 #1061872
Cross-References: CVE-2017-1000252 CVE-2017-12153 CVE-2017-12154
CVE-2017-14489
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________
An update that solves four vulnerabilities and has 33 fixes
is now available.
Description:
The openSUSE Leap 42.3 kernel was updated to 4.4.90 to receive various
security and bugfixes.
The following security bugs were fixed:
- CVE-2017-1000252: The KVM subsystem in the Linux kernel allowed guest OS
users to cause a denial of service (assertion failure, and hypervisor
hang or crash) via an out-of bounds guest_irq value, related to
arch/x86/kvm/vmx.c and virt/kvm/eventfd.c (bnc#1058038).
- CVE-2017-14489: The iscsi_if_rx function in
drivers/scsi/scsi_transport_iscsi.c in the Linux kernel allowed local
users to cause a denial of service (panic) by leveraging incorrect
length validation (bnc#1059051).
- CVE-2017-12153: A security flaw was discovered in the
nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux
kernel This function did not check whether the required attributes are
present in a Netlink request. This request can be issued by a user with
the CAP_NET_ADMIN capability and may result in a NULL pointer
dereference and system crash (bnc#1058410).
- CVE-2017-12154: The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the
Linux kernel did not ensure that the "CR8-load exiting" and "CR8-store
exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR
shadow" vmcs12 control, which allowed KVM L2 guest OS users to obtain
read and write access to the hardware CR8 register (bnc#1058507).
The following non-security bugs were fixed:
- arc: Re-enable MMU upon Machine Check exception (bnc#1012382).
- arm64: fault: Route pte translation faults via do_translation_fault
(bnc#1012382).
- arm64: Make sure SPsel is always set (bnc#1012382).
- arm: pxa: add the number of DMA requestor lines (bnc#1012382).
- arm: pxa: fix the number of DMA requestor lines (bnc#1012382).
- bcache: correct cache_dirty_target in __update_writeback_rate()
(bnc#1012382).
- bcache: Correct return value for sysfs attach errors (bnc#1012382).
- bcache: do not subtract sectors_to_gc for bypassed IO (bnc#1012382).
- bcache: fix bch_hprint crash and improve output (bnc#1012382).
- bcache: fix for gc and write-back race (bnc#1012382).
- bcache: Fix leak of bdev reference (bnc#1012382).
- bcache: initialize dirty stripes in flash_dev_run() (bnc#1012382).
- block: Relax a check in blk_start_queue() (bnc#1012382).
- bsg-lib: do not free job in bsg_prepare_job (bnc#1012382).
- btrfs: change how we decide to commit transactions during flushing
(bsc#1060197).
- btrfs: fix NULL pointer dereference from free_reloc_roots()
(bnc#1012382).
- btrfs: prevent to set invalid default subvolid (bnc#1012382).
- btrfs: propagate error to btrfs_cmp_data_prepare caller (bnc#1012382).
- btrfs: qgroup: move noisy underflow warning to debugging build
(bsc#1055755).
- cifs: Fix SMB3.1.1 guest authentication to Samba (bnc#1012382).
- cifs: release auth_key.response for reconnect (bnc#1012382).
- crypto: AF_ALG - remove SGL terminator indicator when chaining
(bnc#1012382).
- crypto: talitos - Do not provide setkey for non hmac hashing algs
(bnc#1012382).
- crypto: talitos - fix sha224 (bnc#1012382).
- cxl: Fix driver use count (bnc#1012382).
- dmaengine: mmp-pdma: add number of requestors (bnc#1012382).
- drivers: net: phy: xgene: Fix mdio write (bsc#1057383).
- drm: Add driver-private objects to atomic state (bsc#1055493).
- drm/dp: Introduce MST topology state to track available link bandwidth
(bsc#1055493).
- efi/fb: Avoid reconfiguration of BAR that covers the framebuffer
(bsc#1051987).
- efi/fb: Correct PCI_STD_RESOURCE_END usage (bsc#1051987).
- ext4: fix incorrect quotaoff if the quota feature is enabled
(bnc#1012382).
- ext4: fix quota inconsistency during orphan cleanup for read-only mounts
(bnc#1012382).
- f2fs: check hot_data for roll-forward recovery (bnc#1012382).
- fix xen_swiotlb_dma_mmap prototype (bnc#1012382).
- ftrace: Fix memleak when unregistering dynamic ops when tracing disabled
(bnc#1012382).
- ftrace: Fix selftest goto location on error (bnc#1012382).
- genirq: Fix for_each_action_of_desc() macro (bsc#1061064).
- getcwd: Close race with d_move called by lustre (bsc#1052593).
- gfs2: Fix debugfs glocks dump (bnc#1012382).
- gianfar: Fix Tx flow control deactivation (bnc#1012382).
- hid: usbhid: Add HID_QUIRK_NOGET for Aten CS-1758 KVM switch
(bnc#1022967).
- input: i8042 - add Gigabyte P57 to the keyboard reset table
(bnc#1012382).
- iommu/vt-d: Avoid calling virt_to_phys() on null pointer (bsc#1061067).
- ipv6: accept 64k - 1 packet length in ip6_find_1stfragopt()
(bnc#1012382).
- ipv6: add rcu grace period before freeing fib6_node (bnc#1012382).
- ipv6: fix memory leak with multiple tables during netns destruction
(bnc#1012382).
- ipv6: fix sparse warning on rt6i_node (bnc#1012382).
- ipv6: fix typo in fib6_net_exit() (bnc#1012382).
- iw_cxgb4: put ep reference in pass_accept_req() (fate#321658 bsc#1005778
fate#321660 bsc#1005780 fate#321661 bsc#1005781).
- KABI fix drivers/nvme/target/nvmet.h (bsc#1058550).
- kabi/severities: ignore nfs_pgio_data_destroy
- kABI: Workaround kABI breakage of AMD-AVIC fixes (bsc#1044503).
- keys: fix writing past end of user-supplied buffer in keyring_read()
(bnc#1012382).
- keys: prevent creating a different user's keyrings (bnc#1012382).
- keys: prevent KEYCTL_READ on negative key (bnc#1012382).
- kvm: Add struct kvm_vcpu pointer parameter to get_enable_apicv()
(bsc#1044503).
- kvm: async_pf: Fix #DF due to inject "Page not Present" and "Page Ready"
exceptions simultaneously (bsc#1061017).
- kvm: PPC: Book3S: Fix race and leak in kvm_vm_ioctl_create_spapr_tce()
(bnc#1012382).
- kvm: SVM: Add a missing 'break' statement (bsc#1061017).
- kvm: SVM: Add irqchip_split() checks before enabling AVIC (bsc#1044503).
- kvm: SVM: delete avic_vm_id_bitmap (2 megabyte static array)
(bsc#1059500).
- kvm: SVM: Refactor AVIC vcpu initialization into avic_init_vcpu()
(bsc#1044503).
- kvm: VMX: do not change SN bit in vmx_update_pi_irte() (bsc#1061017).
- kvm: VMX: remove WARN_ON_ONCE in kvm_vcpu_trigger_posted_interrupt
(bsc#1061017).
- kvm: VMX: use cmpxchg64 (bnc#1012382).
- mac80211: flush hw_roc_start work before cancelling the ROC
(bnc#1012382).
- md/bitmap: disable bitmap_resize for file-backed bitmaps (bsc#1061172).
- md/raid5: preserve STRIPE_ON_UNPLUG_LIST in break_stripe_batch_list
(bnc#1012382).
- md/raid5: release/flush io in raid5_do_work() (bnc#1012382).
- media: uvcvideo: Prevent heap overflow when accessing mapped controls
(bnc#1012382).
- media: v4l2-compat-ioctl32: Fix timespec conversion (bnc#1012382).
- mips: math-emu: <MAXA|MINA>.<D|S>: Fix cases of both infinite inputs
(bnc#1012382).
- mips: math-emu: <MAXA|MINA>.<D|S>: Fix cases of input values with
opposite signs (bnc#1012382).
- mips: math-emu: <MAX|MAXA|MIN|MINA>.<D|S>: Fix cases of both inputs zero
(bnc#1012382).
- mips: math-emu: <MAX|MAXA|MIN|MINA>.<D|S>: Fix quiet NaN propagation
(bnc#1012382).
- mips: math-emu: <MAX|MIN>.<D|S>: Fix cases of both inputs negative
(bnc#1012382).
- mips: math-emu: MINA.<D|S>: Fix some cases of infinity and zero inputs
(bnc#1012382).
- mm: prevent double decrease of nr_reserved_highatomic (bnc#1012382).
- nfsd: Fix general protection fault in release_lock_stateid()
(bnc#1012382).
- nvme-fabrics: generate spec-compliant UUID NQNs (bsc#1057498).
- nvmet: Move serial number from controller to subsystem (bsc#1058550).
- nvmet: preserve controller serial number between reboots (bsc#1058550).
- pci: Allow PCI express root ports to find themselves (bsc#1061046).
- pci: fix oops when try to find Root Port for a PCI device (bsc#1061046).
- pci: Fix race condition with driver_override (bnc#1012382).
- pci: Mark AMD Stoney GPU ATS as broken (bsc#1061046).
- pci: shpchp: Enable bridge bus mastering if MSI is enabled (bnc#1012382).
- perf/x86: Fix RDPMC vs. mm_struct tracking (bsc#1061831).
- perf/x86: kABI Workaround for 'perf/x86: Fix RDPMC vs. mm_struct
tracking' (bsc#1061831).
- perf: xgene: Add APM X-Gene SoC Performance Monitoring Unit driver
(bsc#1036737).
- perf: xgene: Include module.h (bsc#1036737).
- perf: xgene: Move PMU leaf functions into function pointer structure
(bsc#1036737).
- perf: xgene: Parse PMU subnode from the match table (bsc#1036737).
- powerpc: Fix DAR reporting when alignment handler faults (bnc#1012382).
- powerpc/perf: Cleanup of PM_BR_CMPL vs. PM_BRU_CMPL in Power9 event list
(bsc#1056686, fate#321438, bsc#1047238, git-fixes 34922527a2bc).
- powerpc/perf: Factor out PPMU_ONLY_COUNT_RUN check code from power8
(fate#321438, bsc#1053043, git-fixes efe881afdd999).
- powerpc/pseries: Fix parent_dn reference leak in add_dt_node()
(bnc#1012382).
- qlge: avoid memcpy buffer overflow (bnc#1012382).
- rdma/bnxt_re: Allocate multiple notification queues (bsc#1037579).
- rdma/bnxt_re: Implement the alloc/get_hw_stats callback (bsc#1037579).
- Revert "net: fix percpu memory leaks" (bnc#1012382).
- Revert "net: phy: Correctly process PHY_HALTED in phy_stop_machine()"
(bnc#1012382).
- Revert "net: use lib/percpu_counter API for fragmentation mem
accounting" (bnc#1012382).
- Revert "Update
patches.fixes/xfs-refactor-log-record-unpack-and-data-processing.patch
(bsc#1043598, bsc#1036215)."
- Revert "xfs: detect and handle invalid iclog size set by mkfs
(bsc#1043598)."
- Revert "xfs: detect and trim torn writes during log recovery
(bsc#1036215)."
- Revert "xfs: refactor and open code log record crc check (bsc#1036215)."
- Revert "xfs: refactor log record start detection into a new helper
(bsc#1036215)."
- Revert "xfs: return start block of first bad log record during recovery
(bsc#1036215)."
- Revert "xfs: support a crc verification only log record pass
(bsc#1036215)."
- scsi: ILLEGAL REQUEST + ASC==27 => target failure (bsc#1059465).
- scsi: megaraid_sas: Check valid aen class range to avoid kernel panic
(bnc#1012382).
- scsi: megaraid_sas: Return pended IOCTLs with cmd_status
MFI_STAT_WRONG_STATE in case adapter is dead (bnc#1012382).
- scsi: sg: factor out sg_fill_request_table() (bnc#1012382).
- scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE (bnc#1012382).
- scsi: sg: off by one in sg_ioctl() (bnc#1012382).
- scsi: sg: remove 'save_scat_len' (bnc#1012382).
- scsi: sg: use standard lists for sg_requests (bnc#1012382).
- scsi: storvsc: fix memory leak on ring buffer busy (bnc#1012382).
- scsi_transport_fc: Also check for NOTPRESENT in fc_remote_port_add()
(bsc#1037890).
- scsi: zfcp: add handling for FCP_RESID_OVER to the fcp ingress path
(bnc#1012382).
- scsi: zfcp: fix capping of unsuccessful GPN_FT SAN response trace
records (bnc#1012382).
- scsi: zfcp: fix missing trace records for early returns in TMF eh
handlers (bnc#1012382).
- scsi: zfcp: fix passing fsf_req to SCSI trace on TMF to correlate with
HBA (bnc#1012382).
- scsi: zfcp: fix payload with full FCP_RSP IU in SCSI trace records
(bnc#1012382).
- scsi: zfcp: fix queuecommand for scsi_eh commands when DIX enabled
(bnc#1012382).
- scsi: zfcp: trace HBA FSF response by default on dismiss or timedout
late response (bnc#1012382).
- scsi: zfcp: trace high part of "new" 64 bit SCSI LUN (bnc#1012382).
- seccomp: fix the usage of get/put_seccomp_filter() in
seccomp_get_filter() (bnc#1012382).
- skd: Avoid that module unloading triggers a use-after-free (bnc#1012382).
- skd: Submit requests to firmware before triggering the doorbell
(bnc#1012382).
- smb3: Do not ignore O_SYNC/O_DSYNC and O_DIRECT flags (bnc#1012382).
- smb: Validate negotiate (to protect against downgrade) even if signing
off (bnc#1012382).
- swiotlb-xen: implement xen_swiotlb_dma_mmap callback (bnc#1012382).
- timer/sysclt: Restrict timer migration sysctl values to 0 and 1
(bnc#1012382).
- tracing: Apply trace_clock changes to instance max buffer (bnc#1012382).
- tracing: Erase irqsoff trace with empty write (bnc#1012382).
- tracing: Fix trace_pipe behavior for instance traces (bnc#1012382).
- tty: fix __tty_insert_flip_char regression (bnc#1012382).
- tty: improve tty_insert_flip_char() fast path (bnc#1012382).
- tty: improve tty_insert_flip_char() slow path (bnc#1012382).
- Update patches.drivers/0029-perf-xgene-Remove-bogus-IS_ERR-check.patch
(bsc#1036737).
- vfs: Return -ENXIO for negative SEEK_HOLE / SEEK_DATA offsets
(bnc#1012382).
- video: fbdev: aty: do not leak uninitialized padding in clk to userspace
(bnc#1012382).
- Workaround for kABI compatibility with DP-MST patches (bsc#1055493).
- x86/cpu/amd: Hide unused legacy_fixup_core_id() function (bsc#1060229).
- x86/cpu/amd: Limit cpu_core_id fixup to families older than F17h
(bsc#1060229).
- x86/fpu: Do not let userspace set bogus xcomp_bv (bnc#1012382).
- x86/fsgsbase/64: Report FSBASE and GSBASE correctly in core dumps
(bnc#1012382).
- x86/ldt: Fix off by one in get_segment_base() (bsc#1061872).
- x86/mm: Fix boot crash caused by incorrect loop count calculation in
sync_global_pgds() (bsc#1058512).
- x86/mm: Fix fault error path using unsafe vma pointer (fate#321300).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2017-1160=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (noarch):
kernel-devel-4.4.90-28.1
kernel-docs-4.4.90-28.2
kernel-docs-html-4.4.90-28.2
kernel-docs-pdf-4.4.90-28.2
kernel-macros-4.4.90-28.1
kernel-source-4.4.90-28.1
kernel-source-vanilla-4.4.90-28.1
- openSUSE Leap 42.3 (x86_64):
kernel-debug-4.4.90-28.1
kernel-debug-base-4.4.90-28.1
kernel-debug-base-debuginfo-4.4.90-28.1
kernel-debug-debuginfo-4.4.90-28.1
kernel-debug-debugsource-4.4.90-28.1
kernel-debug-devel-4.4.90-28.1
kernel-debug-devel-debuginfo-4.4.90-28.1
kernel-default-4.4.90-28.1
kernel-default-base-4.4.90-28.1
kernel-default-base-debuginfo-4.4.90-28.1
kernel-default-debuginfo-4.4.90-28.1
kernel-default-debugsource-4.4.90-28.1
kernel-default-devel-4.4.90-28.1
kernel-obs-build-4.4.90-28.1
kernel-obs-build-debugsource-4.4.90-28.1
kernel-obs-qa-4.4.90-28.1
kernel-syms-4.4.90-28.1
kernel-vanilla-4.4.90-28.1
kernel-vanilla-base-4.4.90-28.1
kernel-vanilla-base-debuginfo-4.4.90-28.1
kernel-vanilla-debuginfo-4.4.90-28.1
kernel-vanilla-debugsource-4.4.90-28.1
kernel-vanilla-devel-4.4.90-28.1
References:
https://www.suse.com/security/cve/CVE-2017-1000252.htmlhttps://www.suse.com/security/cve/CVE-2017-12153.htmlhttps://www.suse.com/security/cve/CVE-2017-12154.htmlhttps://www.suse.com/security/cve/CVE-2017-14489.htmlhttps://bugzilla.suse.com/1005778https://bugzilla.suse.com/1005780https://bugzilla.suse.com/1005781https://bugzilla.suse.com/1012382https://bugzilla.suse.com/1022967https://bugzilla.suse.com/1036215https://bugzilla.suse.com/1036737https://bugzilla.suse.com/1037579https://bugzilla.suse.com/1037890https://bugzilla.suse.com/1043598https://bugzilla.suse.com/1044503https://bugzilla.suse.com/1047238https://bugzilla.suse.com/1051987https://bugzilla.suse.com/1052593https://bugzilla.suse.com/1053043https://bugzilla.suse.com/1055493https://bugzilla.suse.com/1055755https://bugzilla.suse.com/1056686https://bugzilla.suse.com/1057383https://bugzilla.suse.com/1057498https://bugzilla.suse.com/1058038https://bugzilla.suse.com/1058410https://bugzilla.suse.com/1058507https://bugzilla.suse.com/1058512https://bugzilla.suse.com/1058550https://bugzilla.suse.com/1059051https://bugzilla.suse.com/1059465https://bugzilla.suse.com/1059500https://bugzilla.suse.com/1060197https://bugzilla.suse.com/1060229https://bugzilla.suse.com/1061017https://bugzilla.suse.com/1061046https://bugzilla.suse.com/1061064https://bugzilla.suse.com/1061067https://bugzilla.suse.com/1061172https://bugzilla.suse.com/1061831https://bugzilla.suse.com/1061872
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:2739-1
Rating: important
References: #1012382 #1022967 #1052593 #1055493 #1055755
#1055896 #1058038 #1058410 #1058507 #1059051
#1059465 #1060197 #1061017 #1061046 #1061064
#1061067 #1061172 #1061831 #1061872
Cross-References: CVE-2017-1000252 CVE-2017-12153 CVE-2017-12154
CVE-2017-14489
Affected Products:
openSUSE Leap 42.2
______________________________________________________________________________
An update that solves four vulnerabilities and has 15 fixes
is now available.
Description:
The openSUSE Leap 42.2 Kernel was updated to 4.4.90 to receive various
security and bugfixes.
The following security bugs were fixed:
- CVE-2017-1000252: The KVM subsystem in the Linux kernel allowed guest OS
users to cause a denial of service (assertion failure, and hypervisor
hang or crash) via an out-of bounds guest_irq value, related to
arch/x86/kvm/vmx.c and virt/kvm/eventfd.c (bnc#1058038).
- CVE-2017-14489: The iscsi_if_rx function in
drivers/scsi/scsi_transport_iscsi.c in the Linux kernel allowed local
users to cause a denial of service (panic) by leveraging incorrect
length validation (bnc#1059051).
- CVE-2017-12153: A security flaw was discovered in the
nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux
kernel This function did not check whether the required attributes are
present in a Netlink request. This request can be issued by a user with
the CAP_NET_ADMIN capability and may result in a NULL pointer
dereference and system crash (bnc#1058410).
- CVE-2017-12154: The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the
Linux kernel did not ensure that the "CR8-load exiting" and "CR8-store
exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR
shadow" vmcs12 control, which allowed KVM L2 guest OS users to obtain
read and write access to the hardware CR8 register (bnc#1058507).
The following non-security bugs were fixed:
- arc: Re-enable MMU upon Machine Check exception (bnc#1012382).
- arm64: fault: Route pte translation faults via do_translation_fault
(bnc#1012382).
- arm64: Make sure SPsel is always set (bnc#1012382).
- arm: pxa: add the number of DMA requestor lines (bnc#1012382).
- arm: pxa: fix the number of DMA requestor lines (bnc#1012382).
- bcache: correct cache_dirty_target in __update_writeback_rate()
(bnc#1012382).
- bcache: Correct return value for sysfs attach errors (bnc#1012382).
- bcache: do not subtract sectors_to_gc for bypassed IO (bnc#1012382).
- bcache: fix bch_hprint crash and improve output (bnc#1012382).
- bcache: fix for gc and write-back race (bnc#1012382).
- bcache: Fix leak of bdev reference (bnc#1012382).
- bcache: initialize dirty stripes in flash_dev_run() (bnc#1012382).
- blacklist.conf: Add commit b5accbb0dfae
- blacklist.conf: add one more
- block: Relax a check in blk_start_queue() (bnc#1012382).
- bsg-lib: do not free job in bsg_prepare_job (bnc#1012382).
- btrfs: change how we decide to commit transactions during flushing
(bsc#1060197).
- btrfs: fix NULL pointer dereference from free_reloc_roots()
(bnc#1012382).
- btrfs: prevent to set invalid default subvolid (bnc#1012382).
- btrfs: propagate error to btrfs_cmp_data_prepare caller (bnc#1012382).
- btrfs: qgroup: move noisy underflow warning to debugging build
(bsc#1055755).
- cifs: Fix SMB3.1.1 guest authentication to Samba (bnc#1012382).
- cifs: release auth_key.response for reconnect (bnc#1012382).
- crypto: AF_ALG - remove SGL terminator indicator when chaining
(bnc#1012382).
- crypto: talitos - Do not provide setkey for non hmac hashing algs
(bnc#1012382).
- crypto: talitos - fix sha224 (bnc#1012382).
- cxl: Fix driver use count (bnc#1012382).
- dmaengine: mmp-pdma: add number of requestors (bnc#1012382).
- drm: Add driver-private objects to atomic state (bsc#1055493).
- drm/dp: Introduce MST topology state to track available link bandwidth
(bsc#1055493).
- ext4: fix incorrect quotaoff if the quota feature is enabled
(bnc#1012382).
- ext4: fix quota inconsistency during orphan cleanup for read-only mounts
(bnc#1012382).
- f2fs: check hot_data for roll-forward recovery (bnc#1012382).
- fix xen_swiotlb_dma_mmap prototype (bnc#1012382).
- ftrace: Fix memleak when unregistering dynamic ops when tracing disabled
(bnc#1012382).
- ftrace: Fix selftest goto location on error (bnc#1012382).
- genirq: Fix for_each_action_of_desc() macro (bsc#1061064).
- getcwd: Close race with d_move called by lustre (bsc#1052593).
- gfs2: Fix debugfs glocks dump (bnc#1012382).
- gianfar: Fix Tx flow control deactivation (bnc#1012382).
- hid: usbhid: Add HID_QUIRK_NOGET for Aten CS-1758 KVM switch
(bnc#1022967).
- input: i8042 - add Gigabyte P57 to the keyboard reset table
(bnc#1012382).
- iommu/vt-d: Avoid calling virt_to_phys() on null pointer (bsc#1061067).
- ipv6: accept 64k - 1 packet length in ip6_find_1stfragopt()
(bnc#1012382).
- ipv6: add rcu grace period before freeing fib6_node (bnc#1012382).
- ipv6: fix memory leak with multiple tables during netns destruction
(bnc#1012382).
- ipv6: fix sparse warning on rt6i_node (bnc#1012382).
- ipv6: fix typo in fib6_net_exit() (bnc#1012382).
- kabi/severities: ignore nfs_pgio_data_destroy
- keys: fix writing past end of user-supplied buffer in keyring_read()
(bnc#1012382).
- keys: prevent creating a different user's keyrings (bnc#1012382).
- keys: prevent KEYCTL_READ on negative key (bnc#1012382).
- kvm: async_pf: Fix #DF due to inject "Page not Present" and "Page Ready"
exceptions simultaneously (bsc#1061017).
- kvm: PPC: Book3S: Fix race and leak in kvm_vm_ioctl_create_spapr_tce()
(bnc#1012382).
- kvm: SVM: Add a missing 'break' statement (bsc#1061017).
- kvm: VMX: do not change SN bit in vmx_update_pi_irte() (bsc#1061017).
- kvm: VMX: remove WARN_ON_ONCE in kvm_vcpu_trigger_posted_interrupt
(bsc#1061017).
- kvm: VMX: use cmpxchg64 (bnc#1012382).
- mac80211: flush hw_roc_start work before cancelling the ROC
(bnc#1012382).
- md/bitmap: disable bitmap_resize for file-backed bitmaps (bsc#1061172).
- md/raid5: preserve STRIPE_ON_UNPLUG_LIST in break_stripe_batch_list
(bnc#1012382).
- md/raid5: release/flush io in raid5_do_work() (bnc#1012382).
- media: uvcvideo: Prevent heap overflow when accessing mapped controls
(bnc#1012382).
- media: v4l2-compat-ioctl32: Fix timespec conversion (bnc#1012382).
- mips: math-emu: <MAXA|MINA>.<D|S>: Fix cases of both
infinite inputs (bnc#1012382).
- mips: math-emu: <MAXA|MINA>.<D|S>: Fix cases of input values
with opposite signs (bnc#1012382).
- mips: math-emu: <MAX|MAXA|MIN|MINA>.<D|S>: Fix cases of both
inputs zero (bnc#1012382).
- mips: math-emu: <MAX|MAXA|MIN|MINA>.<D|S>: Fix quiet NaN
propagation (bnc#1012382).
- mips: math-emu: <MAX|MIN>.<D|S>: Fix cases of both inputs
negative (bnc#1012382).
- mips: math-emu: MINA.<D|S>: Fix some cases of infinity and zero
inputs (bnc#1012382).
- mm: prevent double decrease of nr_reserved_highatomic (bnc#1012382).
- nfsd: Fix general protection fault in release_lock_stateid()
(bnc#1012382).
- pci: Allow PCI express root ports to find themselves (bsc#1061046).
- pci: fix oops when try to find Root Port for a PCI device (bsc#1061046).
- pci: Fix race condition with driver_override (bnc#1012382).
- pci: shpchp: Enable bridge bus mastering if MSI is enabled (bnc#1012382).
- perf/x86: Fix RDPMC vs. mm_struct tracking (bsc#1061831).
- perf/x86: kABI Workaround for 'perf/x86: Fix RDPMC vs. mm_struct
tracking' (bsc#1061831).
- powerpc: Fix DAR reporting when alignment handler faults (bnc#1012382).
- powerpc/pseries: Fix parent_dn reference leak in add_dt_node()
(bnc#1012382).
- qlge: avoid memcpy buffer overflow (bnc#1012382).
- Revert "net: fix percpu memory leaks" (bnc#1012382).
- Revert "net: phy: Correctly process PHY_HALTED in phy_stop_machine()"
(bnc#1012382).
- Revert "net: use lib/percpu_counter API for fragmentation mem
accounting" (bnc#1012382).
- scsi: ILLEGAL REQUEST + ASC==27 => target failure (bsc#1059465).
- scsi: megaraid_sas: Check valid aen class range to avoid kernel panic
(bnc#1012382).
- scsi: megaraid_sas: Return pended IOCTLs with cmd_status
MFI_STAT_WRONG_STATE in case adapter is dead (bnc#1012382).
- scsi: sg: factor out sg_fill_request_table() (bnc#1012382).
- scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE (bnc#1012382).
- scsi: sg: off by one in sg_ioctl() (bnc#1012382).
- scsi: sg: remove 'save_scat_len' (bnc#1012382).
- scsi: sg: use standard lists for sg_requests (bnc#1012382).
- scsi: storvsc: fix memory leak on ring buffer busy (bnc#1012382).
- scsi: zfcp: add handling for FCP_RESID_OVER to the fcp ingress path
(bnc#1012382).
- scsi: zfcp: fix capping of unsuccessful GPN_FT SAN response trace
records (bnc#1012382).
- scsi: zfcp: fix missing trace records for early returns in TMF eh
handlers (bnc#1012382).
- scsi: zfcp: fix passing fsf_req to SCSI trace on TMF to correlate with
HBA (bnc#1012382).
- scsi: zfcp: fix payload with full FCP_RSP IU in SCSI trace records
(bnc#1012382).
- scsi: zfcp: fix queuecommand for scsi_eh commands when DIX enabled
(bnc#1012382).
- scsi: zfcp: trace HBA FSF response by default on dismiss or timedout
late response (bnc#1012382).
- scsi: zfcp: trace high part of "new" 64 bit SCSI LUN (bnc#1012382).
- seccomp: fix the usage of get/put_seccomp_filter() in
seccomp_get_filter() (bnc#1012382).
- skd: Avoid that module unloading triggers a use-after-free (bnc#1012382).
- skd: Submit requests to firmware before triggering the doorbell
(bnc#1012382).
- smb3: Do not ignore O_SYNC/O_DSYNC and O_DIRECT flags (bnc#1012382).
- smb: Validate negotiate (to protect against downgrade) even if signing
off (bnc#1012382).
- swiotlb-xen: implement xen_swiotlb_dma_mmap callback (bnc#1012382).
- timer/sysclt: Restrict timer migration sysctl values to 0 and 1
(bnc#1012382).
- tracing: Apply trace_clock changes to instance max buffer (bnc#1012382).
- tracing: Erase irqsoff trace with empty write (bnc#1012382).
- tracing: Fix trace_pipe behavior for instance traces (bnc#1012382).
- tty: fix __tty_insert_flip_char regression (bnc#1012382).
- tty: improve tty_insert_flip_char() fast path (bnc#1012382).
- tty: improve tty_insert_flip_char() slow path (bnc#1012382).
- vfs: Return -ENXIO for negative SEEK_HOLE / SEEK_DATA offsets
(bnc#1012382).
- video: fbdev: aty: do not leak uninitialized padding in clk to userspace
(bnc#1012382).
- Workaround for kABI compatibility with DP-MST patches (bsc#1055493).
- x86/fpu: Do not let userspace set bogus xcomp_bv (bnc#1012382).
- x86/fsgsbase/64: Report FSBASE and GSBASE correctly in core dumps
(bnc#1012382).
- x86/ldt: Fix off by one in get_segment_base() (bsc#1061872).
- xfs/dmapi: fix incorrect file->f_path.dentry->d_inode usage
(bsc#1055896).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-1159=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.2 (x86_64):
kernel-debug-4.4.90-18.32.1
kernel-debug-base-4.4.90-18.32.1
kernel-debug-base-debuginfo-4.4.90-18.32.1
kernel-debug-debuginfo-4.4.90-18.32.1
kernel-debug-debugsource-4.4.90-18.32.1
kernel-debug-devel-4.4.90-18.32.1
kernel-debug-devel-debuginfo-4.4.90-18.32.1
kernel-default-4.4.90-18.32.1
kernel-default-base-4.4.90-18.32.1
kernel-default-base-debuginfo-4.4.90-18.32.1
kernel-default-debuginfo-4.4.90-18.32.1
kernel-default-debugsource-4.4.90-18.32.1
kernel-default-devel-4.4.90-18.32.1
kernel-obs-build-4.4.90-18.32.1
kernel-obs-build-debugsource-4.4.90-18.32.1
kernel-obs-qa-4.4.90-18.32.1
kernel-syms-4.4.90-18.32.1
kernel-vanilla-4.4.90-18.32.1
kernel-vanilla-base-4.4.90-18.32.1
kernel-vanilla-base-debuginfo-4.4.90-18.32.1
kernel-vanilla-debuginfo-4.4.90-18.32.1
kernel-vanilla-debugsource-4.4.90-18.32.1
kernel-vanilla-devel-4.4.90-18.32.1
- openSUSE Leap 42.2 (noarch):
kernel-devel-4.4.90-18.32.1
kernel-docs-4.4.90-18.32.2
kernel-docs-html-4.4.90-18.32.2
kernel-docs-pdf-4.4.90-18.32.2
kernel-macros-4.4.90-18.32.1
kernel-source-4.4.90-18.32.1
kernel-source-vanilla-4.4.90-18.32.1
References:
https://www.suse.com/security/cve/CVE-2017-1000252.htmlhttps://www.suse.com/security/cve/CVE-2017-12153.htmlhttps://www.suse.com/security/cve/CVE-2017-12154.htmlhttps://www.suse.com/security/cve/CVE-2017-14489.htmlhttps://bugzilla.suse.com/1012382https://bugzilla.suse.com/1022967https://bugzilla.suse.com/1052593https://bugzilla.suse.com/1055493https://bugzilla.suse.com/1055755https://bugzilla.suse.com/1055896https://bugzilla.suse.com/1058038https://bugzilla.suse.com/1058410https://bugzilla.suse.com/1058507https://bugzilla.suse.com/1059051https://bugzilla.suse.com/1059465https://bugzilla.suse.com/1060197https://bugzilla.suse.com/1061017https://bugzilla.suse.com/1061046https://bugzilla.suse.com/1061064https://bugzilla.suse.com/1061067https://bugzilla.suse.com/1061172https://bugzilla.suse.com/1061831https://bugzilla.suse.com/1061872
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:2725-1
Rating: important
References: #1059525
Cross-References: CVE-2017-1000253
Affected Products:
SUSE Linux Enterprise Server 11-SP3-LTSS
SUSE Linux Enterprise Server 11-EXTRA
SUSE Linux Enterprise Point of Sale 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
The SUSE Linux Enterprise 11 SP3 kernel was updated to fix the following
issues:
- Stack corruption could have lead to local privilege escalation
(bsc#1059525, CVE-2017-1000253).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11-SP3-LTSS:
zypper in -t patch slessp3-kernel-13314=1
- SUSE Linux Enterprise Server 11-EXTRA:
zypper in -t patch slexsp3-kernel-13314=1
- SUSE Linux Enterprise Point of Sale 11-SP3:
zypper in -t patch sleposp3-kernel-13314=1
- SUSE Linux Enterprise Debuginfo 11-SP3:
zypper in -t patch dbgsp3-kernel-13314=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):
kernel-default-3.0.101-0.47.106.8.1
kernel-default-base-3.0.101-0.47.106.8.1
kernel-default-devel-3.0.101-0.47.106.8.1
kernel-source-3.0.101-0.47.106.8.1
kernel-syms-3.0.101-0.47.106.8.1
kernel-trace-3.0.101-0.47.106.8.1
kernel-trace-base-3.0.101-0.47.106.8.1
kernel-trace-devel-3.0.101-0.47.106.8.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 x86_64):
kernel-ec2-3.0.101-0.47.106.8.1
kernel-ec2-base-3.0.101-0.47.106.8.1
kernel-ec2-devel-3.0.101-0.47.106.8.1
kernel-xen-3.0.101-0.47.106.8.1
kernel-xen-base-3.0.101-0.47.106.8.1
kernel-xen-devel-3.0.101-0.47.106.8.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (x86_64):
kernel-bigsmp-3.0.101-0.47.106.8.1
kernel-bigsmp-base-3.0.101-0.47.106.8.1
kernel-bigsmp-devel-3.0.101-0.47.106.8.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (s390x):
kernel-default-man-3.0.101-0.47.106.8.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586):
kernel-pae-3.0.101-0.47.106.8.1
kernel-pae-base-3.0.101-0.47.106.8.1
kernel-pae-devel-3.0.101-0.47.106.8.1
- SUSE Linux Enterprise Server 11-EXTRA (i586 ppc64 s390x x86_64):
kernel-default-extra-3.0.101-0.47.106.8.1
- SUSE Linux Enterprise Server 11-EXTRA (i586 x86_64):
kernel-xen-extra-3.0.101-0.47.106.8.1
- SUSE Linux Enterprise Server 11-EXTRA (x86_64):
kernel-bigsmp-extra-3.0.101-0.47.106.8.1
kernel-trace-extra-3.0.101-0.47.106.8.1
- SUSE Linux Enterprise Server 11-EXTRA (ppc64):
kernel-ppc64-extra-3.0.101-0.47.106.8.1
- SUSE Linux Enterprise Server 11-EXTRA (i586):
kernel-pae-extra-3.0.101-0.47.106.8.1
- SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
kernel-default-3.0.101-0.47.106.8.1
kernel-default-base-3.0.101-0.47.106.8.1
kernel-default-devel-3.0.101-0.47.106.8.1
kernel-ec2-3.0.101-0.47.106.8.1
kernel-ec2-base-3.0.101-0.47.106.8.1
kernel-ec2-devel-3.0.101-0.47.106.8.1
kernel-pae-3.0.101-0.47.106.8.1
kernel-pae-base-3.0.101-0.47.106.8.1
kernel-pae-devel-3.0.101-0.47.106.8.1
kernel-source-3.0.101-0.47.106.8.1
kernel-syms-3.0.101-0.47.106.8.1
kernel-trace-3.0.101-0.47.106.8.1
kernel-trace-base-3.0.101-0.47.106.8.1
kernel-trace-devel-3.0.101-0.47.106.8.1
kernel-xen-3.0.101-0.47.106.8.1
kernel-xen-base-3.0.101-0.47.106.8.1
kernel-xen-devel-3.0.101-0.47.106.8.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):
kernel-default-debuginfo-3.0.101-0.47.106.8.1
kernel-default-debugsource-3.0.101-0.47.106.8.1
kernel-trace-debuginfo-3.0.101-0.47.106.8.1
kernel-trace-debugsource-3.0.101-0.47.106.8.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 x86_64):
kernel-ec2-debuginfo-3.0.101-0.47.106.8.1
kernel-ec2-debugsource-3.0.101-0.47.106.8.1
kernel-xen-debuginfo-3.0.101-0.47.106.8.1
kernel-xen-debugsource-3.0.101-0.47.106.8.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (x86_64):
kernel-bigsmp-debuginfo-3.0.101-0.47.106.8.1
kernel-bigsmp-debugsource-3.0.101-0.47.106.8.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586):
kernel-pae-debuginfo-3.0.101-0.47.106.8.1
kernel-pae-debugsource-3.0.101-0.47.106.8.1
References:
https://www.suse.com/security/cve/CVE-2017-1000253.htmlhttps://bugzilla.suse.com/1059525
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org