SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:0517-1
Rating:             important
References:         #1020048 #1024938 
Cross-References:   CVE-2017-5970
Affected Products:
                    SUSE Linux Enterprise Workstation Extension 12-SP1
                    SUSE Linux Enterprise Software Development Kit 12-SP1
                    SUSE Linux Enterprise Server 12-SP1
                    SUSE Linux Enterprise Module for Public Cloud 12
                    SUSE Linux Enterprise Live Patching 12
                    SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________

   An update that solves one vulnerability and has one errata
   is now available.

Description:



   The SUSE Linux Enterprise 12 SP1 kernel was updated to fix the following
   two issues:

   - CVE-2017-5970: Remote attackers could have potentially caused a denial
     of service by sending bad IP options on a socket (bsc#1024938)
   - Fix a regression in MD RAID1 which could have caused wrong data to be
     read (bsc#1020048)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 12-SP1:

      zypper in -t patch SUSE-SLE-WE-12-SP1-2017-267=1

   - SUSE Linux Enterprise Software Development Kit 12-SP1:

      zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-267=1

   - SUSE Linux Enterprise Server 12-SP1:

      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-267=1

   - SUSE Linux Enterprise Module for Public Cloud 12:

      zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2017-267=1

   - SUSE Linux Enterprise Live Patching 12:

      zypper in -t patch SUSE-SLE-Live-Patching-12-2017-267=1

   - SUSE Linux Enterprise Desktop 12-SP1:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-267=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):

      kernel-default-debuginfo-3.12.69-60.64.32.1
      kernel-default-debugsource-3.12.69-60.64.32.1
      kernel-default-extra-3.12.69-60.64.32.1
      kernel-default-extra-debuginfo-3.12.69-60.64.32.1

   - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):

      kernel-obs-build-3.12.69-60.64.32.1
      kernel-obs-build-debugsource-3.12.69-60.64.32.1

   - SUSE Linux Enterprise Software Development Kit 12-SP1 (noarch):

      kernel-docs-3.12.69-60.64.32.3

   - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):

      kernel-default-3.12.69-60.64.32.1
      kernel-default-base-3.12.69-60.64.32.1
      kernel-default-base-debuginfo-3.12.69-60.64.32.1
      kernel-default-debuginfo-3.12.69-60.64.32.1
      kernel-default-debugsource-3.12.69-60.64.32.1
      kernel-default-devel-3.12.69-60.64.32.1
      kernel-syms-3.12.69-60.64.32.1

   - SUSE Linux Enterprise Server 12-SP1 (noarch):

      kernel-devel-3.12.69-60.64.32.1
      kernel-macros-3.12.69-60.64.32.1
      kernel-source-3.12.69-60.64.32.1

   - SUSE Linux Enterprise Server 12-SP1 (x86_64):

      kernel-xen-3.12.69-60.64.32.1
      kernel-xen-base-3.12.69-60.64.32.1
      kernel-xen-base-debuginfo-3.12.69-60.64.32.1
      kernel-xen-debuginfo-3.12.69-60.64.32.1
      kernel-xen-debugsource-3.12.69-60.64.32.1
      kernel-xen-devel-3.12.69-60.64.32.1

   - SUSE Linux Enterprise Server 12-SP1 (s390x):

      kernel-default-man-3.12.69-60.64.32.1

   - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64):

      kernel-ec2-3.12.69-60.64.32.1
      kernel-ec2-debuginfo-3.12.69-60.64.32.1
      kernel-ec2-debugsource-3.12.69-60.64.32.1
      kernel-ec2-devel-3.12.69-60.64.32.1
      kernel-ec2-extra-3.12.69-60.64.32.1
      kernel-ec2-extra-debuginfo-3.12.69-60.64.32.1

   - SUSE Linux Enterprise Live Patching 12 (x86_64):

      kgraft-patch-3_12_69-60_64_32-default-1-2.1
      kgraft-patch-3_12_69-60_64_32-xen-1-2.1

   - SUSE Linux Enterprise Desktop 12-SP1 (noarch):

      kernel-devel-3.12.69-60.64.32.1
      kernel-macros-3.12.69-60.64.32.1
      kernel-source-3.12.69-60.64.32.1

   - SUSE Linux Enterprise Desktop 12-SP1 (x86_64):

      kernel-default-3.12.69-60.64.32.1
      kernel-default-debuginfo-3.12.69-60.64.32.1
      kernel-default-debugsource-3.12.69-60.64.32.1
      kernel-default-devel-3.12.69-60.64.32.1
      kernel-default-extra-3.12.69-60.64.32.1
      kernel-default-extra-debuginfo-3.12.69-60.64.32.1
      kernel-syms-3.12.69-60.64.32.1
      kernel-xen-3.12.69-60.64.32.1
      kernel-xen-debuginfo-3.12.69-60.64.32.1
      kernel-xen-debugsource-3.12.69-60.64.32.1
      kernel-xen-devel-3.12.69-60.64.32.1


References:

   https://www.suse.com/security/cve/CVE-2017-5970.html
   https://bugzilla.suse.com/1020048
   https://bugzilla.suse.com/1024938

SuSE: 2017:0517-1: important: the Linux Kernel

February 20, 2017
An update that solves one vulnerability and has one errata An update that solves one vulnerability and has one errata An update that solves one vulnerability and has one errata is ...

Summary

The SUSE Linux Enterprise 12 SP1 kernel was updated to fix the following two issues: - CVE-2017-5970: Remote attackers could have potentially caused a denial of service by sending bad IP options on a socket (bsc#1024938) - Fix a regression in MD RAID1 which could have caused wrong data to be read (bsc#1020048) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP1: zypper in -t patch SUSE-SLE-WE-12-SP1-2017-267=1 - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-267=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-267=1 - SUSE Linux Enterprise Module for Public Cloud 12: zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2017-267=1 - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-267=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-267=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64): kernel-default-debuginfo-3.12.69-60.64.32.1 kernel-default-debugsource-3.12.69-60.64.32.1 kernel-default-extra-3.12.69-60.64.32.1 kernel-default-extra-debuginfo-3.12.69-60.64.32.1 - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): kernel-obs-build-3.12.69-60.64.32.1 kernel-obs-build-debugsource-3.12.69-60.64.32.1 - SUSE Linux Enterprise Software Development Kit 12-SP1 (noarch): kernel-docs-3.12.69-60.64.32.3 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): kernel-default-3.12.69-60.64.32.1 kernel-default-base-3.12.69-60.64.32.1 kernel-default-base-debuginfo-3.12.69-60.64.32.1 kernel-default-debuginfo-3.12.69-60.64.32.1 kernel-default-debugsource-3.12.69-60.64.32.1 kernel-default-devel-3.12.69-60.64.32.1 kernel-syms-3.12.69-60.64.32.1 - SUSE Linux Enterprise Server 12-SP1 (noarch): kernel-devel-3.12.69-60.64.32.1 kernel-macros-3.12.69-60.64.32.1 kernel-source-3.12.69-60.64.32.1 - SUSE Linux Enterprise Server 12-SP1 (x86_64): kernel-xen-3.12.69-60.64.32.1 kernel-xen-base-3.12.69-60.64.32.1 kernel-xen-base-debuginfo-3.12.69-60.64.32.1 kernel-xen-debuginfo-3.12.69-60.64.32.1 kernel-xen-debugsource-3.12.69-60.64.32.1 kernel-xen-devel-3.12.69-60.64.32.1 - SUSE Linux Enterprise Server 12-SP1 (s390x): kernel-default-man-3.12.69-60.64.32.1 - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64): kernel-ec2-3.12.69-60.64.32.1 kernel-ec2-debuginfo-3.12.69-60.64.32.1 kernel-ec2-debugsource-3.12.69-60.64.32.1 kernel-ec2-devel-3.12.69-60.64.32.1 kernel-ec2-extra-3.12.69-60.64.32.1 kernel-ec2-extra-debuginfo-3.12.69-60.64.32.1 - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_69-60_64_32-default-1-2.1 kgraft-patch-3_12_69-60_64_32-xen-1-2.1 - SUSE Linux Enterprise Desktop 12-SP1 (noarch): kernel-devel-3.12.69-60.64.32.1 kernel-macros-3.12.69-60.64.32.1 kernel-source-3.12.69-60.64.32.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): kernel-default-3.12.69-60.64.32.1 kernel-default-debuginfo-3.12.69-60.64.32.1 kernel-default-debugsource-3.12.69-60.64.32.1 kernel-default-devel-3.12.69-60.64.32.1 kernel-default-extra-3.12.69-60.64.32.1 kernel-default-extra-debuginfo-3.12.69-60.64.32.1 kernel-syms-3.12.69-60.64.32.1 kernel-xen-3.12.69-60.64.32.1 kernel-xen-debuginfo-3.12.69-60.64.32.1 kernel-xen-debugsource-3.12.69-60.64.32.1 kernel-xen-devel-3.12.69-60.64.32.1

References

#1020048 #1024938

Cross- CVE-2017-5970

Affected Products:

SUSE Linux Enterprise Workstation Extension 12-SP1

SUSE Linux Enterprise Software Development Kit 12-SP1

SUSE Linux Enterprise Server 12-SP1

SUSE Linux Enterprise Module for Public Cloud 12

SUSE Linux Enterprise Live Patching 12

SUSE Linux Enterprise Desktop 12-SP1

https://www.suse.com/security/cve/CVE-2017-5970.html

https://bugzilla.suse.com/1020048

https://bugzilla.suse.com/1024938

Severity
Announcement ID: SUSE-SU-2017:0517-1
Rating: important

Related News