Jump to content
Compatible Support Forums
Sign in to follow this  
news

[security-announce] openSUSE-SU-2017:0907-1: important: Security update for the Linux Kernel

Recommended Posts

openSUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

 

Announcement ID: openSUSE-SU-2017:0907-1

Rating: important

References: #1007959 #1007962 #1008842 #1011913 #1012910

#1013994 #1015609 #1017461 #1017641 #1018263

#1018419 #1019163 #1019618 #1020048 #1022785

#1023866 #1024015 #1025235 #1025683 #1026405

#1026462 #1026505 #1026509 #1026692 #1026722

#1027054 #1027066 #1027179 #1027189 #1027190

#1027195 #1027273 #1027565 #1027575 #1028017

#1028041 #1028158 #1028217 #1028325 #1028372

#1028415 #1028819 #1028895 #1029220 #1029986

#1030573 #1030575 #951844 #968697 #969755

#982783 #998106

Cross-References: CVE-2016-10200 CVE-2016-2117 CVE-2016-9191

CVE-2017-2596 CVE-2017-2636 CVE-2017-6214

CVE-2017-6345 CVE-2017-6346 CVE-2017-6347

CVE-2017-6353 CVE-2017-7184

Affected Products:

openSUSE Leap 42.2

______________________________________________________________________________

 

An update that solves 11 vulnerabilities and has 41 fixes

is now available.

 

Description:

 

 

 

The openSUSE Leap 42.2 kernel was updated to 4.4.56 fix various security

issues and bugs.

 

The following security bugs were fixed:

 

- CVE-2017-7184: The xfrm_replay_verify_len function in

net/xfrm/xfrm_user.c in the Linux kernel did not validate certain size

data after an XFRM_MSG_NEWAE update, which allowed local users to obtain

root privileges or cause a denial of service (heap-based out-of-bounds

access) by leveraging the CAP_NET_ADMIN capability, as demonstrated

during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10

linux-image-* package 4.8.0.41.52 (bnc#1030573).

- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in

the Linux kernel allowed local users to gain privileges or cause a

denial of service (use-after-free) by making multiple bind system calls

without properly ascertaining whether a socket has the SOCK_ZAPPED

status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c

(bnc#1028415).

- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux

kernel allowed local users to gain privileges or cause a denial of

service (double free) by setting the HDLC line discipline (bnc#1027565).

- CVE-2017-6345: The LLC subsystem in the Linux kernel did not ensure that

a certain destructor exists in required circumstances, which allowed

local users to cause a denial of service (BUG_ON) or possibly have

unspecified other impact via crafted system calls (bnc#1027190).

- CVE-2017-6346: Race condition in net/packet/af_packet.c in the Linux

kernel allowed local users to cause a denial of service (use-after-free)

or possibly have unspecified other impact via a multithreaded

application that made PACKET_FANOUT setsockopt system calls

(bnc#1027189).

- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly

restrict association peel-off operations during certain wait states,

which allowed local users to cause a denial of service (invalid unlock

and double free) via a multithreaded application. NOTE: this

vulnerability exists because of an incorrect fix for CVE-2017-5986

(bnc#1025235).

- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the

Linux kernel allowed remote attackers to cause a denial of service

(infinite loop and soft lockup) via vectors involving a TCP packet with

the URG flag (bnc#1026722).

- CVE-2016-2117: The atl2_probe function in

drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel incorrectly

enables scatter/gather I/O, which allowed remote attackers to obtain

sensitive information from kernel memory by reading packet data

(bnc#968697).

- CVE-2017-6347: The ip_cmsg_recv_checksum function in

net/ipv4/ip_sockglue.c in the Linux kernel has incorrect expectations

about skb data layout, which allowed local users to cause a denial of

service (buffer over-read) or possibly have unspecified other impact via

crafted system calls, as demonstrated by use of the MSG_MORE flag in

conjunction with loopback UDP transmission (bnc#1027179).

- CVE-2016-9191: The cgroup offline implementation in the Linux kernel

mishandled certain drain operations, which allowed local users to cause

a denial of service (system hang) by leveraging access to a container

environment for executing a crafted application, as demonstrated by

trinity (bnc#1008842).

- CVE-2017-2596: The nested_vmx_check_vmptr function in arch/x86/kvm/vmx.c

in the Linux kernel improperly emulates the VMXON instruction, which

allowed KVM L1 guest OS users to cause a denial of service (host OS

memory consumption) by leveraging the mishandling of page references

(bnc#1022785).

 

The following non-security bugs were fixed:

 

- ACPI: Do not create a platform_device for IOAPIC/IOxAPIC (bsc#1028819).

- ACPI, ioapic: Clear on-stack resource before using it (bsc#1028819).

- ACPI: Remove platform devices from a bus on removal (bsc#1028819).

- add mainline tag to one hyperv patch

- bnx2x: allow adding VLANs while interface is down (bsc#1027273).

- btrfs: backref: Fix soft lockup in __merge_refs function (bsc#1017641).

- btrfs: incremental send, do not delay rename when parent inode is new

(bsc#1028325).

- btrfs: incremental send, do not issue invalid rmdir operations

(bsc#1028325).

- btrfs: qgroup: Move half of the qgroup accounting time out of commit

trans (bsc#1017461).

- btrfs: send, fix failure to rename top level inode due to name collision

(bsc#1028325).

- btrfs: serialize subvolume mounts with potentially mismatching rw flags

(bsc#951844 bsc#1024015)

- crypto: algif_hash - avoid zero-sized array (bnc#1007962).

- cxgb4vf: do not offload Rx checksums for IPv6 fragments (bsc#1026692).

- drivers: hv: vmbus: Prevent sending data on a rescinded channel

(fate#320485, bug#1028217).

- drm/i915: Add intel_uncore_suspend / resume functions (bsc#1011913).

- drm/i915: Listen for PMIC bus access notifications (bsc#1011913).

- drm/mgag200: Added support for the new device G200eH3 (bsc#1007959,

fate#322780)

- ext4: fix fencepost in s_first_meta_bg validation (bsc#1029986).

- Fix kABI breakage of dccp in 4.4.56 (stable-4.4.56).

- futex: Add missing error handling to FUTEX_REQUEUE_PI (bsc#969755).

- futex: Fix potential use-after-free in FUTEX_REQUEUE_PI (bsc#969755).

- i2c: designware-baytrail: Acquire P-Unit access on bus acquire

(bsc#1011913).

- i2c: designware-baytrail: Call pmic_bus_access_notifier_chain

(bsc#1011913).

- i2c: designware-baytrail: Fix race when resetting the semaphore

(bsc#1011913).

- i2c: designware-baytrail: Only check iosf_mbi_available() for shared

hosts (bsc#1011913).

- i2c: designware: Disable pm for PMIC i2c-bus even if there is no _SEM

method (bsc#1011913).

- i2c-designware: increase timeout (bsc#1011913).

- i2c: designware: Never suspend i2c-busses used for accessing the system

PMIC (bsc#1011913).

- i2c: designware: Rename accessor_flags to flags (bsc#1011913).

- kABI: protect struct iscsi_conn (kabi).

- kABI: protect struct se_node_acl (kabi).

- kABI: restore can_rx_register parameters (kabi).

- kgr/module: make a taint flag module-specific (fate#313296).

- kgr: remove all arch-specific kgraft header files (fate#313296).

- l2tp: fix address test in __l2tp_ip6_bind_lookup() (bsc#1028415).

- l2tp: fix lookup for sockets not bound to a device in l2tp_ip

(bsc#1028415).

- l2tp: fix racy socket lookup in l2tp_ip and l2tp_ip6 bind()

(bsc#1028415).

- l2tp: hold socket before dropping lock in l2tp_ip{, 6}_recv()

(bsc#1028415).

- l2tp: lock socket before checking flags in connect() (bsc#1028415).

- md/raid1: add rcu protection to rdev in fix_read_error (References:

bsc#998106,bsc#1020048,bsc#982783).

- md/raid1: fix a use-after-free bug (bsc#998106,bsc#1020048,bsc#982783).

- md/raid1: handle flush request correctly

(bsc#998106,bsc#1020048,bsc#982783).

- md/raid1: Refactor raid1_make_request

(bsc#998106,bsc#1020048,bsc#982783).

- mm: fix set pageblock migratetype in deferred struct page init

(bnc#1027195).

- mm/page_alloc: Remove useless parameter of __free_pages_boot_core

(bnc#1027195).

- module: move add_taint_module() to a header file (fate#313296).

- net/ena: change condition for host attribute configuration (bsc#1026509).

- net/ena: change driver's default timeouts (bsc#1026509).

- net: ena: change the return type of ena_set_push_mode() to be void

(bsc#1026509).

- net: ena: Fix error return code in ena_device_init() (bsc#1026509).

- net/ena: fix ethtool RSS flow configuration (bsc#1026509).

- net/ena: fix NULL dereference when removing the driver after device

reset failed (bsc#1026509).

- net/ena: fix potential access to freed memory during device reset

(bsc#1026509).

- net/ena: fix queues number calculation (bsc#1026509).

- net/ena: fix RSS default hash configuration (bsc#1026509).

- net/ena: reduce the severity of ena printouts (bsc#1026509).

- net/ena: refactor ena_get_stats64 to be atomic context safe

(bsc#1026509).

- net/ena: remove ntuple filter support from device feature list

(bsc#1026509).

- net: ena: remove superfluous check in ena_remove() (bsc#1026509).

- net: ena: Remove unnecessary pci_set_drvdata() (bsc#1026509).

- net/ena: update driver version to 1.1.2 (bsc#1026509).

- net/ena: use READ_ONCE to access completion descriptors (bsc#1026509).

- net: ena: use setup_timer() and mod_timer() (bsc#1026509).

- net/mlx4_core: Avoid command timeouts during VF driver device shutdown

(bsc#1028017).

- net/mlx4_core: Avoid delays during VF driver device shutdown

(bsc#1028017).

- net/mlx4_core: Fix racy CQ (Completion Queue) free (bsc#1028017).

- net/mlx4_core: Fix when to save some qp context flags for dynamic VST to

VGT transitions (bsc#1028017).

- net/mlx4_core: Use cq quota in SRIOV when creating completion EQs

(bsc#1028017).

- net/mlx4_en: Fix bad WQE issue (bsc#1028017).

- NFS: do not try to cross a mountpount when there isn't one there

(bsc#1028041).

- nvme: Do not suspend admin queue that wasn't created (bsc#1026505).

- nvme: Suspend all queues before deletion (bsc#1026505).

- PCI: hv: Fix wslot_to_devfn() to fix warnings on device removal

(fate#320485, bug#1028217).

- PCI: hv: Use device serial number as PCI domain (fate#320485,

bug#1028217).

- powerpc: Blacklist GCC 5.4 6.1 and 6.2 (boo#1028895).

- RAID1: a new I/O barrier implementation to remove resync window

(bsc#998106,bsc#1020048,bsc#982783).

- RAID1: avoid unnecessary spin locks in I/O barrier code

(bsc#998106,bsc#1020048,bsc#982783).

- Revert "give up on gcc ilog2() constant optimizations" (kabi).

- Revert "net: introduce device min_header_len" (kabi).

- Revert "net/mlx4_en: Avoid unregister_netdev at shutdown flow"

(bsc#1028017).

- Revert "nfit, libnvdimm: fix interleave set cookie calculation" (kabi).

- Revert "RDMA/core: Fix incorrect structure packing for booleans" (kabi).

- Revert "target: Fix NULL dereference during LUN lookup + active I/O

shutdown" (kabi).

- rtlwifi: rtl_usb: Fix missing entry in USB driver's private data

(bsc#1026462).

- s390/kmsg: add missing kmsg descriptions (bnc#1025683, LTC#151573).

- s390/mm: fix zone calculation in arch_add_memory() (bnc#1025683,

LTC#152318).

- sched/loadavg: Avoid loadavg spikes caused by delayed NO_HZ accounting

(bsc#1018419).

- scsi_dh_alua: Do not modify the interval value for retries (bsc#1012910).

- scsi: do not print 'reservation conflict' for TEST UNIT READY

(bsc#1027054).

- softirq: Let ksoftirqd do its job (bsc#1019618).

- supported.conf: Add tcp_westwood as supported module (fate#322432)

- taint/module: Clean up global and module taint flags handling

(fate#313296).

- Update mainline reference in

patches.drivers/drm-ast-Fix-memleaks-in-error-path-in-ast_fb_create.patch S

ee (bsc#1028158) for the context in which this was discovered upstream.

- x86/apic/uv: Silence a shift wrapping warning (bsc#1023866).

- x86/mce: Do not print MCEs when mcelog is active (bsc#1013994).

- x86, mm: fix gup_pte_range() vs DAX mappings (bsc#1026405).

- x86/mm/gup: Simplify get_user_pages() PTE bit handling (bsc#1026405).

- x86/platform/intel/iosf_mbi: Add a mutex for P-Unit access (bsc#1011913).

- x86/platform/intel/iosf_mbi: Add a PMIC bus access notifier

(bsc#1011913).

- x86/platform: Remove warning message for duplicate NMI handlers

(bsc#1029220).

- x86/platform/UV: Add basic CPU NMI health check (bsc#1023866).

- x86/platform/UV: Add Support for UV4 Hubless NMIs (bsc#1023866).

- x86/platform/UV: Add Support for UV4 Hubless systems (bsc#1023866).

- x86/platform/UV: Clean up the NMI code to match current coding style

(bsc#1023866).

- x86/platform/UV: Clean up the UV APIC code (bsc#1023866).

- x86/platform/UV: Ensure uv_system_init is called when necessary

(bsc#1023866).

- x86/platform/UV: Fix 2 socket config problem (bsc#1023866).

- x86/platform/UV: Fix panic with missing UVsystab support (bsc#1023866).

- x86/platform/UV: Initialize PCH GPP_D_0 NMI Pin to be NMI source

(bsc#1023866).

- x86/platform/UV: Verify NMI action is valid, default is standard

(bsc#1023866).

- xen-blkfront: correct maximum segment accounting (bsc#1018263).

- xen-blkfront: do not call talk_to_blkback when already connected to

blkback.

- xen/blkfront: Fix crash if backend does not follow the right states.

- xen-blkfront: free resources if xlvbd_alloc_gendisk fails.

- xen/netback: set default upper limit of tx/rx queues to 8 (bnc#1019163).

- xen/netfront: set default upper limit of tx/rx queues to 8 (bnc#1019163).

- xfs: do not take the IOLOCK exclusive for direct I/O page invalidation

(bsc#1015609).

 

 

Patch Instructions:

 

To install this openSUSE Security Update use YaST online_update.

Alternatively you can run the command listed for your product:

 

- openSUSE Leap 42.2:

 

zypper in -t patch openSUSE-2017-418=1

 

To bring your system up-to-date, use "zypper patch".

 

 

Package List:

 

- openSUSE Leap 42.2 (noarch):

 

kernel-devel-4.4.57-18.3.1

kernel-docs-4.4.57-18.3.2

kernel-docs-html-4.4.57-18.3.2

kernel-docs-pdf-4.4.57-18.3.2

kernel-macros-4.4.57-18.3.1

kernel-source-4.4.57-18.3.1

kernel-source-vanilla-4.4.57-18.3.1

 

- openSUSE Leap 42.2 (x86_64):

 

kernel-debug-4.4.57-18.3.1

kernel-debug-base-4.4.57-18.3.1

kernel-debug-base-debuginfo-4.4.57-18.3.1

kernel-debug-debuginfo-4.4.57-18.3.1

kernel-debug-debugsource-4.4.57-18.3.1

kernel-debug-devel-4.4.57-18.3.1

kernel-debug-devel-debuginfo-4.4.57-18.3.1

kernel-default-4.4.57-18.3.1

kernel-default-base-4.4.57-18.3.1

kernel-default-base-debuginfo-4.4.57-18.3.1

kernel-default-debuginfo-4.4.57-18.3.1

kernel-default-debugsource-4.4.57-18.3.1

kernel-default-devel-4.4.57-18.3.1

kernel-obs-build-4.4.57-18.3.1

kernel-obs-build-debugsource-4.4.57-18.3.1

kernel-obs-qa-4.4.57-18.3.1

kernel-syms-4.4.57-18.3.1

kernel-vanilla-4.4.57-18.3.1

kernel-vanilla-base-4.4.57-18.3.1

kernel-vanilla-base-debuginfo-4.4.57-18.3.1

kernel-vanilla-debuginfo-4.4.57-18.3.1

kernel-vanilla-debugsource-4.4.57-18.3.1

kernel-vanilla-devel-4.4.57-18.3.1

 

 

References:

 

https://www.suse.com/security/cve/CVE-2016-10200.html

https://www.suse.com/security/cve/CVE-2016-2117.html

https://www.suse.com/security/cve/CVE-2016-9191.html

https://www.suse.com/security/cve/CVE-2017-2596.html

https://www.suse.com/security/cve/CVE-2017-2636.html

https://www.suse.com/security/cve/CVE-2017-6214.html

https://www.suse.com/security/cve/CVE-2017-6345.html

https://www.suse.com/security/cve/CVE-2017-6346.html

https://www.suse.com/security/cve/CVE-2017-6347.html

https://www.suse.com/security/cve/CVE-2017-6353.html

https://www.suse.com/security/cve/CVE-2017-7184.html

https://bugzilla.suse.com/1007959

https://bugzilla.suse.com/1007962

https://bugzilla.suse.com/1008842

https://bugzilla.suse.com/1011913

https://bugzilla.suse.com/1012910

https://bugzilla.suse.com/1013994

https://bugzilla.suse.com/1015609

https://bugzilla.suse.com/1017461

https://bugzilla.suse.com/1017641

https://bugzilla.suse.com/1018263

https://bugzilla.suse.com/1018419

https://bugzilla.suse.com/1019163

https://bugzilla.suse.com/1019618

https://bugzilla.suse.com/1020048

https://bugzilla.suse.com/1022785

https://bugzilla.suse.com/1023866

https://bugzilla.suse.com/1024015

https://bugzilla.suse.com/1025235

https://bugzilla.suse.com/1025683

https://bugzilla.suse.com/1026405

https://bugzilla.suse.com/1026462

https://bugzilla.suse.com/1026505

https://bugzilla.suse.com/1026509

https://bugzilla.suse.com/1026692

https://bugzilla.suse.com/1026722

https://bugzilla.suse.com/1027054

https://bugzilla.suse.com/1027066

https://bugzilla.suse.com/1027179

https://bugzilla.suse.com/1027189

https://bugzilla.suse.com/1027190

https://bugzilla.suse.com/1027195

https://bugzilla.suse.com/1027273

https://bugzilla.suse.com/1027565

https://bugzilla.suse.com/1027575

https://bugzilla.suse.com/1028017

https://bugzilla.suse.com/1028041

https://bugzilla.suse.com/1028158

https://bugzilla.suse.com/1028217

https://bugzilla.suse.com/1028325

https://bugzilla.suse.com/1028372

https://bugzilla.suse.com/1028415

https://bugzilla.suse.com/1028819

https://bugzilla.suse.com/1028895

https://bugzilla.suse.com/1029220

https://bugzilla.suse.com/1029986

https://bugzilla.suse.com/1030573

https://bugzilla.suse.com/1030575

https://bugzilla.suse.com/951844

https://bugzilla.suse.com/968697

https://bugzilla.suse.com/969755

https://bugzilla.suse.com/982783

https://bugzilla.suse.com/998106

 

--

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org

For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×