SUSE-SU-2021:0127-1: important: Security update for open-iscsi
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Thu Jan 14 07:21:29 MST 2021
SUSE Security Update: Security update for open-iscsi
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0127-1
Rating: important
References: #1179440 #1179908
Affected Products:
SUSE Linux Enterprise Module for Basesystem 15-SP2
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
This update for open-iscsi fixes the following issues:
- Updated to upstream version 2.1.3 as 2.1.3-suse, for bsc#1179908,
including:
* uip: check for TCP urgent pointer past end of frame
* uip: check for u8 overflow when processing TCP options
* uip: check for header length underflow during checksum calculation
* fwparam_ppc: Fix memory leak in fwparam_ppc.c
* iscsiuio: Remove unused macro IFNAMSIZ defined in iscsid_ipc.c
* fwparam_ppc: Fix illegal memory access in fwparam_ppc.c
* sysfs: Verify parameter of sysfs_device_get()
* fwparam_ppc: Fix NULL pointer dereference in find_devtree()
* open-iscsi: Clean user_param list when process exit
* iscsi_net_util: Fix NULL pointer dereference in find_vlan_dev()
* open-iscsi: Fix NULL pointer dereference in mgmt_ipc_read_req()
* open-iscsi: Fix invalid pointer deference in find_initiator()
* iscsiuio: Fix invalid parameter when call fstat()
* iscsi-iname: Verify open() return value before calling read()
* iscsi_sysfs: Fix NULL pointer deference in iscsi_sysfs_read_iface
- Updatged to latest upstream, including:
* iscsiadm: Optimize the the verification of mode paramters
* iscsid: Poll timeout value to 1 minute for iscsid
* iscsiadm: fix host stats mode coredump
* iscsid: fix logging level when starting and shutting down daemon
* Updated iscsiadm man page.
* Fix memory leak in sysfs_get_str
* libopeniscsiusr: Compare with max int instead of max long
- Systemd unit files should not depend on network.target (bsc#1179440).
- Updated to latest upstream, including async login ability:
* Implement login "no_wait" for iscsiadm NODE mode
* iscsiadm buffer overflow regression when discovering many targets at
once
* iscsid: Check Invalid Session id for stop connection
* Add ability to attempt target logins asynchronously
- %service_del_postun_without_restart is now available on SLE More
accurately it's been introduced in SLE12-SP2+ and SLE15+
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Module for Basesystem 15-SP2:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-127=1
Package List:
- SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x x86_64):
iscsiuio-0.7.8.6-22.6.1
iscsiuio-debuginfo-0.7.8.6-22.6.1
libopeniscsiusr0_2_0-2.1.3-22.6.1
libopeniscsiusr0_2_0-debuginfo-2.1.3-22.6.1
open-iscsi-2.1.3-22.6.1
open-iscsi-debuginfo-2.1.3-22.6.1
open-iscsi-debugsource-2.1.3-22.6.1
open-iscsi-devel-2.1.3-22.6.1
References:
https://bugzilla.suse.com/1179440
https://bugzilla.suse.com/1179908
More information about the sle-security-updates
mailing list