SUSE-SU-2017:3210-1: important: Security update for the Linux Kernel

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Mon Dec 4 07:07:05 MST 2017


   SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:3210-1
Rating:             important
References:         #1047626 #1059465 #1066471 #1066472 #1069496 
                    #860993 #975788 
Cross-References:   CVE-2014-0038 CVE-2017-1000405 CVE-2017-12193
                    CVE-2017-15102 CVE-2017-16525 CVE-2017-16527
                    CVE-2017-16529 CVE-2017-16531 CVE-2017-16535
                    CVE-2017-16536 CVE-2017-16537 CVE-2017-16649
                    CVE-2017-16650 CVE-2017-16939
Affected Products:
                    SUSE OpenStack Cloud 6
                    SUSE Linux Enterprise Server for SAP 12-SP1
                    SUSE Linux Enterprise Server 12-SP1-LTSS
                    SUSE Linux Enterprise Module for Public Cloud 12
______________________________________________________________________________

   An update that fixes 14 vulnerabilities is now available.

Description:



   The SUSE Linux Enterprise 12 SP1 kernel was updated to receive various
   security and bugfixes.

   The following security bugs were fixed:

   - CVE-2017-16939: The XFRM dump policy implementation in
     net/xfrm/xfrm_user.c in the Linux kernel allowed local users to gain
     privileges or cause a denial of service (use-after-free) via a crafted
     SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY
     Netlink messages. (bnc#1069702)
   - CVE-2017-1000405: mm, thp: do not dirty huge pages on read fault
     (bnc#1069496).
   - CVE-2017-16649: The usbnet_generic_cdc_bind function in
     drivers/net/usb/cdc_ether.c in the Linux kernel allowed local users to
     cause a denial of service (divide-by-zero error and system crash) or
     possibly have unspecified other impact via a crafted USB device.
     (bnc#1067085)
   - CVE-2014-0038: The compat_sys_recvmmsg function in net/compat.c, when
     CONFIG_X86_X32 is enabled, allowed local users to gain privileges via a
     recvmmsg system call with a crafted timeout pointer parameter
     (bnc#860993).
   - CVE-2017-16650: The qmi_wwan_bind function in drivers/net/usb/qmi_wwan.c
     in the Linux kernel allowed local users to cause a denial of service
     (divide-by-zero error and system crash) or possibly have unspecified
     other impact via a crafted USB device. (bnc#1067086)
   - CVE-2017-16535: The usb_get_bos_descriptor function in
     drivers/usb/core/config.c in the Linux kernel allowed local users to
     cause a denial of service (out-of-bounds read and system crash) or
     possibly have unspecified other impact via a crafted USB device.
     (bnc#1066700)
   - CVE-2017-15102: The tower_probe function in
     drivers/usb/misc/legousbtower.c in the Linux kernel allowed local users
     (who are physically proximate for inserting a crafted USB device) to
     gain privileges by leveraging a write-what-where condition that occurs
     after a race condition and a NULL pointer dereference. (bnc#1066705)
   - CVE-2017-16531: drivers/usb/core/config.c in the Linux kernel allowed
     local users to cause a denial of service (out-of-bounds read and system
     crash) or possibly have unspecified other impact via a crafted USB
     device, related to the USB_DT_INTERFACE_ASSOCIATION descriptor.
     (bnc#1066671)
   - CVE-2017-12193: The assoc_array_insert_into_terminal_node function in
     lib/assoc_array.c in the Linux kernel mishandled node splitting, which
     allowed local users to cause a denial of service (NULL pointer
     dereference and panic) via a crafted application, as demonstrated by the
     keyring key type, and key addition and link creation operations.
     (bnc#1066192)
   - CVE-2017-16529: The snd_usb_create_streams function in sound/usb/card.c
     in the Linux kernel allowed local users to cause a denial of service
     (out-of-bounds read and system crash) or possibly have unspecified other
     impact via a crafted USB device. (bnc#1066650)
   - CVE-2017-16525: The usb_serial_console_disconnect function in
     drivers/usb/serial/console.c in the Linux kernel allowed local users to
     cause a denial of service (use-after-free and system crash) or possibly
     have unspecified other impact via a crafted USB device, related to
     disconnection and failed setup. (bnc#1066618)
   - CVE-2017-16537: The imon_probe function in drivers/media/rc/imon.c in
     the Linux kernel allowed local users to cause a denial of service (NULL
     pointer dereference and system crash) or possibly have unspecified other
     impact via a crafted USB device. (bnc#1066573)
   - CVE-2017-16536: The cx231xx_usb_probe function in
     drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel allowed
     local users to cause a denial of service (NULL pointer dereference and
     system crash) or possibly have unspecified other impact via a crafted
     USB device. (bnc#1066606)
   - CVE-2017-16527: sound/usb/mixer.c in the Linux kernel allowed local
     users to cause a denial of service (snd_usb_mixer_interrupt
     use-after-free and system crash) or possibly have unspecified other
     impact via a crafted USB device. (bnc#1066625)

   The following non-security bugs were fixed:

   - NVMe: No lock while DMA mapping data (bsc#975788).
   - bcache: Add bch_keylist_init_single() (bsc#1047626).
   - bcache: Add btree_map() functions (bsc#1047626).
   - bcache: Add on error panic/unregister setting (bsc#1047626).
   - bcache: Convert gc to a kthread (bsc#1047626).
   - bcache: Delete some slower inline asm (bsc#1047626).
   - bcache: Drop unneeded blk_sync_queue() calls (bsc#1047626).
   - bcache: Fix a bug recovering from unclean shutdown (bsc#1047626).
   - bcache: Fix a journalling reclaim after recovery bug (bsc#1047626).
   - bcache: Fix a null ptr deref in journal replay (bsc#1047626).
   - bcache: Fix an infinite loop in journal replay (bsc#1047626).
   - bcache: Fix bch_ptr_bad() (bsc#1047626).
   - bcache: Fix discard granularity (bsc#1047626).
   - bcache: Fix for can_attach_cache() (bsc#1047626).
   - bcache: Fix heap_peek() macro (bsc#1047626).
   - bcache: Fix moving_pred() (bsc#1047626).
   - bcache: Fix to remove the rcu_sched stalls (bsc#1047626).
   - bcache: Improve bucket_prio() calculation (bsc#1047626).
   - bcache: Improve priority_stats (bsc#1047626).
   - bcache: Minor btree cache fix (bsc#1047626).
   - bcache: Move keylist out of btree_op (bsc#1047626).
   - bcache: New writeback PD controller (bsc#1047626).
   - bcache: PRECEDING_KEY() (bsc#1047626).
   - bcache: Performance fix for when journal entry is full (bsc#1047626).
   - bcache: Remove redundant block_size assignment (bsc#1047626).
   - bcache: Remove redundant parameter for cache_alloc() (bsc#1047626).
   - bcache: Remove/fix some header dependencies (bsc#1047626).
   - bcache: Trivial error handling fix (bsc#1047626).
   - bcache: Use ida for bcache block dev minor (bsc#1047626).
   - bcache: allows use of register in udev to avoid "device_busy" error
     (bsc#1047626).
   - bcache: bch_allocator_thread() is not freezable (bsc#1047626).
   - bcache: bch_gc_thread() is not freezable (bsc#1047626).
   - bcache: bugfix - gc thread now gets woken when cache is full
     (bsc#1047626).
   - bcache: bugfix - moving_gc now moves only correct buckets (bsc#1047626).
   - bcache: cleaned up error handling around register_cache() (bsc#1047626).
   - bcache: clear BCACHE_DEV_UNLINK_DONE flag when attaching a backing
     device (bsc#1047626).
   - bcache: defensively handle format strings (bsc#1047626).
   - bcache: fix BUG_ON due to integer overflow with GC_SECTORS_USED
     (bsc#1047626).
   - bcache: fix a livelock when we cause a huge number of cache misses
     (bsc#1047626).
   - bcache: fix crash in bcache_btree_node_alloc_fail tracepoint
     (bsc#1047626).
   - bcache: fix for gc and writeback race (bsc#1047626).
   - bcache: fix for gc crashing when no sectors are used (bsc#1047626).
   - bcache: kill index() (bsc#1047626).
   - bcache: register_bcache(): call blkdev_put() when cache_alloc() fails
     (bsc#1047626).
   - bcache: stop moving_gc marking buckets that can't be moved (bsc#1047626).
   - mac80211: do not compare TKIP TX MIC key in reinstall prevention
     (bsc#1066472).
   - mac80211: use constant time comparison with keys (bsc#1066471).
   - packet: fix use-after-free in fanout_add()
   - scsi: ILLEGAL REQUEST + ASC==27 produces target failure (bsc#1059465).


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE OpenStack Cloud 6:

      zypper in -t patch SUSE-OpenStack-Cloud-6-2017-1995=1

   - SUSE Linux Enterprise Server for SAP 12-SP1:

      zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1995=1

   - SUSE Linux Enterprise Server 12-SP1-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1995=1

   - SUSE Linux Enterprise Module for Public Cloud 12:

      zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2017-1995=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE OpenStack Cloud 6 (noarch):

      kernel-devel-3.12.74-60.64.66.1
      kernel-macros-3.12.74-60.64.66.1
      kernel-source-3.12.74-60.64.66.1

   - SUSE OpenStack Cloud 6 (x86_64):

      kernel-default-3.12.74-60.64.66.1
      kernel-default-base-3.12.74-60.64.66.1
      kernel-default-base-debuginfo-3.12.74-60.64.66.1
      kernel-default-debuginfo-3.12.74-60.64.66.1
      kernel-default-debugsource-3.12.74-60.64.66.1
      kernel-default-devel-3.12.74-60.64.66.1
      kernel-syms-3.12.74-60.64.66.1
      kernel-xen-3.12.74-60.64.66.1
      kernel-xen-base-3.12.74-60.64.66.1
      kernel-xen-base-debuginfo-3.12.74-60.64.66.1
      kernel-xen-debuginfo-3.12.74-60.64.66.1
      kernel-xen-debugsource-3.12.74-60.64.66.1
      kernel-xen-devel-3.12.74-60.64.66.1
      kgraft-patch-3_12_74-60_64_66-default-1-2.1
      kgraft-patch-3_12_74-60_64_66-xen-1-2.1

   - SUSE Linux Enterprise Server for SAP 12-SP1 (ppc64le x86_64):

      kernel-default-3.12.74-60.64.66.1
      kernel-default-base-3.12.74-60.64.66.1
      kernel-default-base-debuginfo-3.12.74-60.64.66.1
      kernel-default-debuginfo-3.12.74-60.64.66.1
      kernel-default-debugsource-3.12.74-60.64.66.1
      kernel-default-devel-3.12.74-60.64.66.1
      kernel-syms-3.12.74-60.64.66.1

   - SUSE Linux Enterprise Server for SAP 12-SP1 (noarch):

      kernel-devel-3.12.74-60.64.66.1
      kernel-macros-3.12.74-60.64.66.1
      kernel-source-3.12.74-60.64.66.1

   - SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64):

      kernel-xen-3.12.74-60.64.66.1
      kernel-xen-base-3.12.74-60.64.66.1
      kernel-xen-base-debuginfo-3.12.74-60.64.66.1
      kernel-xen-debuginfo-3.12.74-60.64.66.1
      kernel-xen-debugsource-3.12.74-60.64.66.1
      kernel-xen-devel-3.12.74-60.64.66.1
      kgraft-patch-3_12_74-60_64_66-default-1-2.1
      kgraft-patch-3_12_74-60_64_66-xen-1-2.1

   - SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64):

      kernel-default-3.12.74-60.64.66.1
      kernel-default-base-3.12.74-60.64.66.1
      kernel-default-base-debuginfo-3.12.74-60.64.66.1
      kernel-default-debuginfo-3.12.74-60.64.66.1
      kernel-default-debugsource-3.12.74-60.64.66.1
      kernel-default-devel-3.12.74-60.64.66.1
      kernel-syms-3.12.74-60.64.66.1

   - SUSE Linux Enterprise Server 12-SP1-LTSS (noarch):

      kernel-devel-3.12.74-60.64.66.1
      kernel-macros-3.12.74-60.64.66.1
      kernel-source-3.12.74-60.64.66.1

   - SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64):

      kernel-xen-3.12.74-60.64.66.1
      kernel-xen-base-3.12.74-60.64.66.1
      kernel-xen-base-debuginfo-3.12.74-60.64.66.1
      kernel-xen-debuginfo-3.12.74-60.64.66.1
      kernel-xen-debugsource-3.12.74-60.64.66.1
      kernel-xen-devel-3.12.74-60.64.66.1
      kgraft-patch-3_12_74-60_64_66-default-1-2.1
      kgraft-patch-3_12_74-60_64_66-xen-1-2.1

   - SUSE Linux Enterprise Server 12-SP1-LTSS (s390x):

      kernel-default-man-3.12.74-60.64.66.1

   - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64):

      kernel-ec2-3.12.74-60.64.66.1
      kernel-ec2-debuginfo-3.12.74-60.64.66.1
      kernel-ec2-debugsource-3.12.74-60.64.66.1
      kernel-ec2-devel-3.12.74-60.64.66.1
      kernel-ec2-extra-3.12.74-60.64.66.1
      kernel-ec2-extra-debuginfo-3.12.74-60.64.66.1


References:

   https://www.suse.com/security/cve/CVE-2014-0038.html
   https://www.suse.com/security/cve/CVE-2017-1000405.html
   https://www.suse.com/security/cve/CVE-2017-12193.html
   https://www.suse.com/security/cve/CVE-2017-15102.html
   https://www.suse.com/security/cve/CVE-2017-16525.html
   https://www.suse.com/security/cve/CVE-2017-16527.html
   https://www.suse.com/security/cve/CVE-2017-16529.html
   https://www.suse.com/security/cve/CVE-2017-16531.html
   https://www.suse.com/security/cve/CVE-2017-16535.html
   https://www.suse.com/security/cve/CVE-2017-16536.html
   https://www.suse.com/security/cve/CVE-2017-16537.html
   https://www.suse.com/security/cve/CVE-2017-16649.html
   https://www.suse.com/security/cve/CVE-2017-16650.html
   https://www.suse.com/security/cve/CVE-2017-16939.html
   https://bugzilla.suse.com/1047626
   https://bugzilla.suse.com/1059465
   https://bugzilla.suse.com/1066471
   https://bugzilla.suse.com/1066472
   https://bugzilla.suse.com/1069496
   https://bugzilla.suse.com/860993
   https://bugzilla.suse.com/975788



More information about the sle-security-updates mailing list