SUSE-SU-2017:1898-1: important: Security update for systemd, dracut

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Wed Jul 19 07:09:57 MDT 2017


   SUSE Security Update: Security update for systemd, dracut
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:1898-1
Rating:             important
References:         #1032029 #1033238 #1037120 #1040153 #1040968 
                    #1043900 #1045290 #1046750 #986216 
Cross-References:   CVE-2017-9445
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12-SP2
                    SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
                    SUSE Linux Enterprise Server 12-SP2
                    SUSE Linux Enterprise Desktop 12-SP2
                    OpenStack Cloud Magnum Orchestration 7
______________________________________________________________________________

   An update that solves one vulnerability and has 8 fixes is
   now available.

Description:

   This update for systemd and dracut fixes the following issues:

   Security issues fixed:

   - CVE-2017-9445: Possible out-of-bounds write triggered by a specially
     crafted TCP payload from a DNS server. (bsc#1045290)

   Non-security issues fixed in systemd:

   - Automounter issue in combination with NFS volumes (bsc#1040968)
   - Missing symbolic link for SAS device in /dev/disk/by-path (bsc#1040153)
   - Add minimal support for boot.d/* scripts in systemd-sysv-convert
     (bsc#1046750)

   Non-security issues fixed in dracut:

   - Bail out if module directory does not exist. (bsc#1043900)
   - Suppress bogus error message. (bsc#1032029)
   - Fix module force loading with systemd. (bsc#986216)
   - Ship udev files required by systemd. (bsc#1040153)
   - Ignore module resolution errors (e.g. with kgraft). (bsc#1037120)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP2:

      zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-1174=1

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

      zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1174=1

   - SUSE Linux Enterprise Server 12-SP2:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1174=1

   - SUSE Linux Enterprise Desktop 12-SP2:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1174=1

   - OpenStack Cloud Magnum Orchestration 7:

      zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1174=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):

      libudev-devel-228-150.7.1
      systemd-debuginfo-228-150.7.1
      systemd-debugsource-228-150.7.1
      systemd-devel-228-150.7.1

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

      dracut-044.1-109.8.3
      dracut-debuginfo-044.1-109.8.3
      dracut-debugsource-044.1-109.8.3
      dracut-fips-044.1-109.8.3
      libsystemd0-228-150.7.1
      libsystemd0-debuginfo-228-150.7.1
      libudev1-228-150.7.1
      libudev1-debuginfo-228-150.7.1
      systemd-228-150.7.1
      systemd-debuginfo-228-150.7.1
      systemd-debugsource-228-150.7.1
      systemd-sysvinit-228-150.7.1
      udev-228-150.7.1
      udev-debuginfo-228-150.7.1

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch):

      systemd-bash-completion-228-150.7.1

   - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):

      dracut-044.1-109.8.3
      dracut-debuginfo-044.1-109.8.3
      dracut-debugsource-044.1-109.8.3
      dracut-fips-044.1-109.8.3
      libsystemd0-228-150.7.1
      libsystemd0-debuginfo-228-150.7.1
      libudev1-228-150.7.1
      libudev1-debuginfo-228-150.7.1
      systemd-228-150.7.1
      systemd-debuginfo-228-150.7.1
      systemd-debugsource-228-150.7.1
      systemd-sysvinit-228-150.7.1
      udev-228-150.7.1
      udev-debuginfo-228-150.7.1

   - SUSE Linux Enterprise Server 12-SP2 (x86_64):

      libsystemd0-32bit-228-150.7.1
      libsystemd0-debuginfo-32bit-228-150.7.1
      libudev1-32bit-228-150.7.1
      libudev1-debuginfo-32bit-228-150.7.1
      systemd-32bit-228-150.7.1
      systemd-debuginfo-32bit-228-150.7.1

   - SUSE Linux Enterprise Server 12-SP2 (noarch):

      systemd-bash-completion-228-150.7.1

   - SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

      dracut-044.1-109.8.3
      dracut-debuginfo-044.1-109.8.3
      dracut-debugsource-044.1-109.8.3
      libsystemd0-228-150.7.1
      libsystemd0-32bit-228-150.7.1
      libsystemd0-debuginfo-228-150.7.1
      libsystemd0-debuginfo-32bit-228-150.7.1
      libudev1-228-150.7.1
      libudev1-32bit-228-150.7.1
      libudev1-debuginfo-228-150.7.1
      libudev1-debuginfo-32bit-228-150.7.1
      systemd-228-150.7.1
      systemd-32bit-228-150.7.1
      systemd-debuginfo-228-150.7.1
      systemd-debuginfo-32bit-228-150.7.1
      systemd-debugsource-228-150.7.1
      systemd-sysvinit-228-150.7.1
      udev-228-150.7.1
      udev-debuginfo-228-150.7.1

   - SUSE Linux Enterprise Desktop 12-SP2 (noarch):

      systemd-bash-completion-228-150.7.1

   - OpenStack Cloud Magnum Orchestration 7 (x86_64):

      dracut-044.1-109.8.3
      dracut-debuginfo-044.1-109.8.3
      dracut-debugsource-044.1-109.8.3
      libsystemd0-228-150.7.1
      libsystemd0-debuginfo-228-150.7.1
      libudev1-228-150.7.1
      libudev1-debuginfo-228-150.7.1
      systemd-228-150.7.1
      systemd-debuginfo-228-150.7.1
      systemd-debugsource-228-150.7.1
      systemd-sysvinit-228-150.7.1
      udev-228-150.7.1
      udev-debuginfo-228-150.7.1


References:

   https://www.suse.com/security/cve/CVE-2017-9445.html
   https://bugzilla.suse.com/1032029
   https://bugzilla.suse.com/1033238
   https://bugzilla.suse.com/1037120
   https://bugzilla.suse.com/1040153
   https://bugzilla.suse.com/1040968
   https://bugzilla.suse.com/1043900
   https://bugzilla.suse.com/1045290
   https://bugzilla.suse.com/1046750
   https://bugzilla.suse.com/986216



More information about the sle-security-updates mailing list