SUSE Security Update: Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP1)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3150-1
Rating: important
References: #1063671 #1064392 #1066471 #1066472
Cross-References: CVE-2017-13080 CVE-2017-15649
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________
An update that solves two vulnerabilities and has two fixes
is now available.
Description:
This update for the Linux Kernel 3.12.74-60_64_48 fixes several issues.
The following security issues were fixed:
- CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local
users to gain privileges via crafted system calls that trigger
mishandling of packet_fanout data structures, because of a race
condition (involving fanout_add and packet_do_bind) that leads to a
use-after-free, a different vulnerability than CVE-2017-6346
(bsc#1064392)
- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed
reinstallation of the Group Temporal Key (GTK) during the group key
handshake, allowing an attacker within radio range to replay frames from
access points to clients (bsc#1063671, bsc#1066472, bsc#1066471)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for SAP 12-SP1:
zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1954=1
- SUSE Linux Enterprise Server 12-SP1-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1954=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):
kgraft-patch-3_12_74-60_64_48-default-5-2.1
kgraft-patch-3_12_74-60_64_48-xen-5-2.1
- SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):
kgraft-patch-3_12_74-60_64_48-default-5-2.1
kgraft-patch-3_12_74-60_64_48-xen-5-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13080.htmlhttps://www.suse.com/security/cve/CVE-2017-15649.htmlhttps://bugzilla.suse.com/1063671https://bugzilla.suse.com/1064392https://bugzilla.suse.com/1066471https://bugzilla.suse.com/1066472
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 21 for SLE 12)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3149-1
Rating: important
References: #1063671 #1064392 #1066471 #1066472
Cross-References: CVE-2017-13080 CVE-2017-15649
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that solves two vulnerabilities and has two fixes
is now available.
Description:
This update for the Linux Kernel 3.12.61-52_72 fixes several issues.
The following security issues were fixed:
- CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local
users to gain privileges via crafted system calls that trigger
mishandling of packet_fanout data structures, because of a race
condition (involving fanout_add and packet_do_bind) that leads to a
use-after-free, a different vulnerability than CVE-2017-6346
(bsc#1064392)
- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed
reinstallation of the Group Temporal Key (GTK) during the group key
handshake, allowing an attacker within radio range to replay frames from
access points to clients (bsc#1063671, bsc#1066472, bsc#1066471)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-1959=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 12-LTSS (x86_64):
kgraft-patch-3_12_61-52_72-default-6-2.1
kgraft-patch-3_12_61-52_72-xen-6-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13080.htmlhttps://www.suse.com/security/cve/CVE-2017-15649.htmlhttps://bugzilla.suse.com/1063671https://bugzilla.suse.com/1064392https://bugzilla.suse.com/1066471https://bugzilla.suse.com/1066472
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP1)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3148-1
Rating: important
References: #1063671 #1064392 #1066471 #1066472
Cross-References: CVE-2017-13080 CVE-2017-15649
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________
An update that solves two vulnerabilities and has two fixes
is now available.
Description:
This update for the Linux Kernel 3.12.74-60_64_57 fixes several issues.
The following security issues were fixed:
- CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local
users to gain privileges via crafted system calls that trigger
mishandling of packet_fanout data structures, because of a race
condition (involving fanout_add and packet_do_bind) that leads to a
use-after-free, a different vulnerability than CVE-2017-6346
(bsc#1064392)
- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed
reinstallation of the Group Temporal Key (GTK) during the group key
handshake, allowing an attacker within radio range to replay frames from
access points to clients (bsc#1063671, bsc#1066472, bsc#1066471)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for SAP 12-SP1:
zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1951=1
- SUSE Linux Enterprise Server 12-SP1-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1951=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):
kgraft-patch-3_12_74-60_64_57-default-4-2.1
kgraft-patch-3_12_74-60_64_57-xen-4-2.1
- SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):
kgraft-patch-3_12_74-60_64_57-default-4-2.1
kgraft-patch-3_12_74-60_64_57-xen-4-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13080.htmlhttps://www.suse.com/security/cve/CVE-2017-15649.htmlhttps://bugzilla.suse.com/1063671https://bugzilla.suse.com/1064392https://bugzilla.suse.com/1066471https://bugzilla.suse.com/1066472
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP1)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3147-1
Rating: important
References: #1063671 #1064392 #1066471 #1066472
Cross-References: CVE-2017-13080 CVE-2017-15649
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________
An update that solves two vulnerabilities and has two fixes
is now available.
Description:
This update for the Linux Kernel 3.12.67-60_64_24 fixes several issues.
The following security issues were fixed:
- CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local
users to gain privileges via crafted system calls that trigger
mishandling of packet_fanout data structures, because of a race
condition (involving fanout_add and packet_do_bind) that leads to a
use-after-free, a different vulnerability than CVE-2017-6346
(bsc#1064392)
- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed
reinstallation of the Group Temporal Key (GTK) during the group key
handshake, allowing an attacker within radio range to replay frames from
access points to clients (bsc#1063671, bsc#1066472, bsc#1066471)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for SAP 12-SP1:
zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1957=1
- SUSE Linux Enterprise Server 12-SP1-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1957=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):
kgraft-patch-3_12_67-60_64_24-default-10-2.1
kgraft-patch-3_12_67-60_64_24-xen-10-2.1
- SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):
kgraft-patch-3_12_67-60_64_24-default-10-2.1
kgraft-patch-3_12_67-60_64_24-xen-10-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13080.htmlhttps://www.suse.com/security/cve/CVE-2017-15649.htmlhttps://bugzilla.suse.com/1063671https://bugzilla.suse.com/1064392https://bugzilla.suse.com/1066471https://bugzilla.suse.com/1066472
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 22 for SLE 12)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3146-1
Rating: important
References: #1063671 #1064392 #1066471 #1066472
Cross-References: CVE-2017-13080 CVE-2017-15649
Affected Products:
SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________
An update that solves two vulnerabilities and has two fixes
is now available.
Description:
This update for the Linux Kernel 3.12.61-52_77 fixes several issues.
The following security issues were fixed:
- CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local
users to gain privileges via crafted system calls that trigger
mishandling of packet_fanout data structures, because of a race
condition (involving fanout_add and packet_do_bind) that leads to a
use-after-free, a different vulnerability than CVE-2017-6346
(bsc#1064392)
- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed
reinstallation of the Group Temporal Key (GTK) during the group key
handshake, allowing an attacker within radio range to replay frames from
access points to clients (bsc#1063671, bsc#1066472, bsc#1066471)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-1958=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 12-LTSS (x86_64):
kgraft-patch-3_12_61-52_77-default-6-2.1
kgraft-patch-3_12_61-52_77-xen-6-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13080.htmlhttps://www.suse.com/security/cve/CVE-2017-15649.htmlhttps://bugzilla.suse.com/1063671https://bugzilla.suse.com/1064392https://bugzilla.suse.com/1066471https://bugzilla.suse.com/1066472
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP1)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3145-1
Rating: important
References: #1063671 #1064392 #1066471 #1066472
Cross-References: CVE-2017-13080 CVE-2017-15649
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________
An update that solves two vulnerabilities and has two fixes
is now available.
Description:
This update for the Linux Kernel 3.12.74-60_64_40 fixes several issues.
The following security issues were fixed:
- CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local
users to gain privileges via crafted system calls that trigger
mishandling of packet_fanout data structures, because of a race
condition (involving fanout_add and packet_do_bind) that leads to a
use-after-free, a different vulnerability than CVE-2017-6346
(bsc#1064392)
- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed
reinstallation of the Group Temporal Key (GTK) during the group key
handshake, allowing an attacker within radio range to replay frames from
access points to clients (bsc#1063671, bsc#1066472, bsc#1066471)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for SAP 12-SP1:
zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1956=1
- SUSE Linux Enterprise Server 12-SP1-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1956=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):
kgraft-patch-3_12_74-60_64_40-default-6-2.1
kgraft-patch-3_12_74-60_64_40-xen-6-2.1
- SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):
kgraft-patch-3_12_74-60_64_40-default-6-2.1
kgraft-patch-3_12_74-60_64_40-xen-6-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13080.htmlhttps://www.suse.com/security/cve/CVE-2017-15649.htmlhttps://bugzilla.suse.com/1063671https://bugzilla.suse.com/1064392https://bugzilla.suse.com/1066471https://bugzilla.suse.com/1066472
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
Hi folks,
In around 2 months, at the end of January 2018, the SUSE support of openSUSE Leap 42.2 will
end.
This heads-up gives you time to migrate to openSUSE Leap 42.3, which continues to be
supported until begin of 2019 at least.
Please check https://en.opensuse.org/Lifetime for openSUSE lifetime information.
Ciao, Marcus
openSUSE Security Update: Security update for kernel-firmware
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:3144-1
Rating: important
References: #1066295
Cross-References: CVE-2017-13080 CVE-2017-13081
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for kernel-firmware fixes the following issues:
- Update Intel WiFi firmwares for the 3160, 7260 and 7265 adapters.
Security issues fixed are part of the "KRACK" attacks affecting the
firmware:
- CVE-2017-13080: The reinstallation of the Group Temporal key could be
used for replay attacks (bsc#1066295):
- CVE-2017-13081: The reinstallation of the Integrity Group Temporal key
could be used for replay attacks (bsc#1066295):
This update was imported from the SUSE:SLE-12-SP2:Update update project.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2017-1317=1
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-1317=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.3 (noarch):
kernel-firmware-20170530-11.1
ucode-amd-20170530-11.1
- openSUSE Leap 42.2 (noarch):
kernel-firmware-20170530-7.9.1
ucode-amd-20170530-7.9.1
References:
https://www.suse.com/security/cve/CVE-2017-13080.htmlhttps://www.suse.com/security/cve/CVE-2017-13081.htmlhttps://bugzilla.suse.com/1066295
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP2)
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:3139-1
Rating: important
References: #1063671 #1064392 #1066471 #1066472
Cross-References: CVE-2017-13080 CVE-2017-15649
Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________
An update that solves two vulnerabilities and has two fixes
is now available.
Description:
This update for the Linux Kernel 4.4.49-92_14 fixes several issues.
The following security issues were fixed:
- CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local
users to gain privileges via crafted system calls that trigger
mishandling of packet_fanout data structures, because of a race
condition (involving fanout_add and packet_do_bind) that leads to a
use-after-free, a different vulnerability than CVE-2017-6346
(bsc#1064392)
- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed
reinstallation of the Group Temporal Key (GTK) during the group key
handshake, allowing an attacker within radio range to replay frames from
access points to clients (bsc#1063671, bsc#1066472, bsc#1066471)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1945=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-4_4_49-92_14-default-7-2.1
References:
https://www.suse.com/security/cve/CVE-2017-13080.htmlhttps://www.suse.com/security/cve/CVE-2017-15649.htmlhttps://bugzilla.suse.com/1063671https://bugzilla.suse.com/1064392https://bugzilla.suse.com/1066471https://bugzilla.suse.com/1066472
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org