openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2017:2169-1
Rating:             important
References:         #1019151 #1023175 #1037404 #1037994 #1038078 
                    #1038792 #1043652 #1047027 #1051399 #1051556 
                    #1052049 #1052223 #1052311 #1052365 #1052533 
                    #1052709 #1052773 #1052794 
Cross-References:   CVE-2017-1000111 CVE-2017-1000112 CVE-2017-8831
                   
Affected Products:
                    openSUSE Leap 42.2
______________________________________________________________________________

   An update that solves three vulnerabilities and has 15
   fixes is now available.

Description:


   The openSUSE Leap 42.2 kernel was updated to receive various security and
   bugfixes.

   The following security bugs were fixed:

   - CVE-2017-1000111: Fixed a race condition in net-packet code that could
     be exploited to cause out-of-bounds memory access (bsc#1052365).
   - CVE-2017-1000112: Fixed a race condition in net-packet code that could
     have been exploited by unprivileged users to gain root access.
     (bsc#1052311).
   - CVE-2017-8831: The saa7164_bus_get function in
     drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed
     local users to cause a denial of service (out-of-bounds array access) or
     possibly have unspecified other impact by changing a certain
     sequence-number value, aka a "double fetch" vulnerability (bnc#1037994).

   The following non-security bugs were fixed:

   - IB/hfi1: Wait for QSFP modules to initialize (bsc#1019151).
   - bcache: force trigger gc (bsc#1038078).
   - bcache: only recovery I/O error for writethrough mode (bsc#1043652).
   - block: do not allow updates through sysfs until registration completes
     (bsc#1047027).
   - ibmvnic: Check for transport event on driver resume (bsc#1051556,
     bsc#1052709).
   - ibmvnic: Initialize SCRQ's during login renegotiation (bsc#1052223).
   - ibmvnic: Report rx buffer return codes as netdev_dbg (bsc#1052794).
   - iommu/amd: Fix schedule-while-atomic BUG in initialization code
     (bsc1052533).
   - libnvdimm, pmem: fix a NULL pointer BUG in nd_pmem_notify (bsc#1023175).
   - libnvdimm: fix badblock range handling of ARS range (bsc#1023175).
   - qeth: fix L3 next-hop im xmit qeth hdr (bnc#1052773, LTC#157374).
   - scsi_devinfo: fixup string compare (bsc#1037404).
   - scsi_dh_alua: suppress errors from unsupported devices (bsc#1038792).
   - vfs: fix missing inode_get_dev sites (bsc#1052049).
   - x86/dmi: Switch dmi_remap() from ioremap() to ioremap_cache()
     (bsc#1051399).


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE Leap 42.2:

      zypper in -t patch openSUSE-2017-929=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE Leap 42.2 (x86_64):

      kernel-debug-4.4.79-18.26.2
      kernel-debug-base-4.4.79-18.26.2
      kernel-debug-base-debuginfo-4.4.79-18.26.2
      kernel-debug-debuginfo-4.4.79-18.26.2
      kernel-debug-debugsource-4.4.79-18.26.2
      kernel-debug-devel-4.4.79-18.26.2
      kernel-debug-devel-debuginfo-4.4.79-18.26.2
      kernel-default-4.4.79-18.26.2
      kernel-default-base-4.4.79-18.26.2
      kernel-default-base-debuginfo-4.4.79-18.26.2
      kernel-default-debuginfo-4.4.79-18.26.2
      kernel-default-debugsource-4.4.79-18.26.2
      kernel-default-devel-4.4.79-18.26.2
      kernel-obs-build-4.4.79-18.26.2
      kernel-obs-build-debugsource-4.4.79-18.26.2
      kernel-obs-qa-4.4.79-18.26.1
      kernel-syms-4.4.79-18.26.1
      kernel-vanilla-4.4.79-18.26.2
      kernel-vanilla-base-4.4.79-18.26.2
      kernel-vanilla-base-debuginfo-4.4.79-18.26.2
      kernel-vanilla-debuginfo-4.4.79-18.26.2
      kernel-vanilla-debugsource-4.4.79-18.26.2
      kernel-vanilla-devel-4.4.79-18.26.2

   - openSUSE Leap 42.2 (noarch):

      kernel-devel-4.4.79-18.26.1
      kernel-docs-4.4.79-18.26.3
      kernel-docs-html-4.4.79-18.26.3
      kernel-docs-pdf-4.4.79-18.26.3
      kernel-macros-4.4.79-18.26.1
      kernel-source-4.4.79-18.26.1
      kernel-source-vanilla-4.4.79-18.26.1


References:

   https://www.suse.com/security/cve/CVE-2017-1000111.html
   https://www.suse.com/security/cve/CVE-2017-1000112.html
   https://www.suse.com/security/cve/CVE-2017-8831.html
   https://bugzilla.suse.com/1019151
   https://bugzilla.suse.com/1023175
   https://bugzilla.suse.com/1037404
   https://bugzilla.suse.com/1037994
   https://bugzilla.suse.com/1038078
   https://bugzilla.suse.com/1038792
   https://bugzilla.suse.com/1043652
   https://bugzilla.suse.com/1047027
   https://bugzilla.suse.com/1051399
   https://bugzilla.suse.com/1051556
   https://bugzilla.suse.com/1052049
   https://bugzilla.suse.com/1052223
   https://bugzilla.suse.com/1052311
   https://bugzilla.suse.com/1052365
   https://bugzilla.suse.com/1052533
   https://bugzilla.suse.com/1052709
   https://bugzilla.suse.com/1052773
   https://bugzilla.suse.com/1052794

-- 

openSUSE: 2017:2169-1: important: the Linux Kernel

August 15, 2017
An update that solves three vulnerabilities and has 15 fixes is now available.

Description

The openSUSE Leap 42.2 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2017-1000111: Fixed a race condition in net-packet code that could be exploited to cause out-of-bounds memory access (bsc#1052365). - CVE-2017-1000112: Fixed a race condition in net-packet code that could have been exploited by unprivileged users to gain root access. (bsc#1052311). - CVE-2017-8831: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a "double fetch" vulnerability (bnc#1037994). The following non-security bugs were fixed: - IB/hfi1: Wait for QSFP modules to initialize (bsc#1019151). - bcache: force trigger gc (bsc#1038078). - bcache: only recovery I/O error for writethrough mode (bsc#1043652). - block: do not allow updates through sysfs until registration completes (bsc#1047027). - ibmvnic: Check for transport event on driver resume (bsc#1051556, bsc#1052709). - ibmvnic: Initialize SCRQ's during login renegotiation (bsc#1052223). - ibmvnic: Report rx buffer return codes as netdev_dbg (bsc#1052794). - iommu/amd: Fix schedule-while-atomic BUG in initialization code (bsc1052533). - libnvdimm, pmem: fix a NULL pointer BUG in nd_pmem_notify (bsc#1023175). - libnvdimm: fix badblock range handling of ARS range (bsc#1023175). - qeth: fix L3 next-hop im xmit qeth hdr (bnc#1052773, LTC#157374). - scsi_devinfo: fixup string compare (bsc#1037404). - scsi_dh_alua: suppress errors from unsupported devices (bsc#1038792). - vfs: fix missing inode_get_dev sites (bsc#1052049). - x86/dmi: Switch dmi_remap() from ioremap() to ioremap_cache() (bsc#1051399).

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-929=1 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE Leap 42.2 (x86_64): kernel-debug-4.4.79-18.26.2 kernel-debug-base-4.4.79-18.26.2 kernel-debug-base-debuginfo-4.4.79-18.26.2 kernel-debug-debuginfo-4.4.79-18.26.2 kernel-debug-debugsource-4.4.79-18.26.2 kernel-debug-devel-4.4.79-18.26.2 kernel-debug-devel-debuginfo-4.4.79-18.26.2 kernel-default-4.4.79-18.26.2 kernel-default-base-4.4.79-18.26.2 kernel-default-base-debuginfo-4.4.79-18.26.2 kernel-default-debuginfo-4.4.79-18.26.2 kernel-default-debugsource-4.4.79-18.26.2 kernel-default-devel-4.4.79-18.26.2 kernel-obs-build-4.4.79-18.26.2 kernel-obs-build-debugsource-4.4.79-18.26.2 kernel-obs-qa-4.4.79-18.26.1 kernel-syms-4.4.79-18.26.1 kernel-vanilla-4.4.79-18.26.2 kernel-vanilla-base-4.4.79-18.26.2 kernel-vanilla-base-debuginfo-4.4.79-18.26.2 kernel-vanilla-debuginfo-4.4.79-18.26.2 kernel-vanilla-debugsource-4.4.79-18.26.2 kernel-vanilla-devel-4.4.79-18.26.2 - openSUSE Leap 42.2 (noarch): kernel-devel-4.4.79-18.26.1 kernel-docs-4.4.79-18.26.3 kernel-docs-html-4.4.79-18.26.3 kernel-docs-pdf-4.4.79-18.26.3 kernel-macros-4.4.79-18.26.1 kernel-source-4.4.79-18.26.1 kernel-source-vanilla-4.4.79-18.26.1


References

https://www.suse.com/security/cve/CVE-2017-1000111.html https://www.suse.com/security/cve/CVE-2017-1000112.html https://www.suse.com/security/cve/CVE-2017-8831.html https://bugzilla.suse.com/1019151 https://bugzilla.suse.com/1023175 https://bugzilla.suse.com/1037404 https://bugzilla.suse.com/1037994 https://bugzilla.suse.com/1038078 https://bugzilla.suse.com/1038792 https://bugzilla.suse.com/1043652 https://bugzilla.suse.com/1047027 https://bugzilla.suse.com/1051399 https://bugzilla.suse.com/1051556 https://bugzilla.suse.com/1052049 https://bugzilla.suse.com/1052223 https://bugzilla.suse.com/1052311 https://bugzilla.suse.com/1052365 https://bugzilla.suse.com/1052533 https://bugzilla.suse.com/1052709 https://bugzilla.suse.com/1052773 https://bugzilla.suse.com/1052794--


Severity
Announcement ID: openSUSE-SU-2017:2169-1
Rating: important
Affected Products: openSUSE Leap 42.2 le.

Related News