Security update for dracut
Announcement ID: | SUSE-SU-2017:0951-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves one vulnerability and has 10 security fixes can now be installed.
Description:
This update for dracut fixes the following issues:
Security issues fixed:
- CVE-2016-8637: When the early microcode loading was enabled during initrd creation, the initrd would be read-only available for all users, allowing local users to retrieve secrets stored in the initial ramdisk. (bsc#1008340)
Non security issues fixed:
- Remove zlib module as requirement. (bsc#1020063)
- Unlimit TaskMax for xfs_repair in emergency shell. (bsc#1019938)
- Resolve symbolic links for -i and -k parameters. (bsc#902375)
- Enhance purge-kernels script to handle kgraft patches. (bsc#1017141)
- Allow booting from degraded MD arrays with systemd. (bsc#1017695)
- Allow booting on s390x with fips=1 on the kernel command line. (bnc#1021687)
- Start multipath services before local-fs-pre.target. (bsc#1005410, bsc#1006118, bsc#1007925)
- Fix /sbin/installkernel to handle kernel packages built with 'make bin-rpmpkg'. (bsc#1008648)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Magnum Orchestration 7
zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-547=1
-
SUSE Linux Enterprise Desktop 12 SP2
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-547=1
-
SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2
zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-547=1
-
SUSE Linux Enterprise High Performance Computing 12 SP2
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-547=1
-
SUSE Linux Enterprise Server 12 SP2
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-547=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP2
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-547=1
Package List:
-
Magnum Orchestration 7 (x86_64)
- dracut-044-108.1
- dracut-debuginfo-044-108.1
- dracut-debugsource-044-108.1
-
SUSE Linux Enterprise Desktop 12 SP2 (x86_64)
- dracut-044-108.1
- dracut-debuginfo-044-108.1
- dracut-debugsource-044-108.1
-
SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 (aarch64)
- dracut-fips-044-108.1
- dracut-044-108.1
- dracut-debuginfo-044-108.1
- dracut-debugsource-044-108.1
-
SUSE Linux Enterprise High Performance Computing 12 SP2 (aarch64 x86_64)
- dracut-fips-044-108.1
- dracut-044-108.1
- dracut-debuginfo-044-108.1
- dracut-debugsource-044-108.1
-
SUSE Linux Enterprise Server 12 SP2 (aarch64 ppc64le s390x x86_64)
- dracut-fips-044-108.1
- dracut-044-108.1
- dracut-debuginfo-044-108.1
- dracut-debugsource-044-108.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP2 (ppc64le x86_64)
- dracut-fips-044-108.1
- dracut-044-108.1
- dracut-debuginfo-044-108.1
- dracut-debugsource-044-108.1
References:
- https://www.suse.com/security/cve/CVE-2016-8637.html
- https://bugzilla.suse.com/show_bug.cgi?id=1005410
- https://bugzilla.suse.com/show_bug.cgi?id=1006118
- https://bugzilla.suse.com/show_bug.cgi?id=1007925
- https://bugzilla.suse.com/show_bug.cgi?id=1008340
- https://bugzilla.suse.com/show_bug.cgi?id=1008648
- https://bugzilla.suse.com/show_bug.cgi?id=1017141
- https://bugzilla.suse.com/show_bug.cgi?id=1017695
- https://bugzilla.suse.com/show_bug.cgi?id=1019938
- https://bugzilla.suse.com/show_bug.cgi?id=1020063
- https://bugzilla.suse.com/show_bug.cgi?id=1021687
- https://bugzilla.suse.com/show_bug.cgi?id=902375