SUSE SLED12 / SLES12 Security Update : dracut (SUSE-SU-2017:0951-1)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote SUSE host is missing one or more security updates.

Description :

This update for dracut fixes the following issues: Security issues
fixed :

- CVE-2016-8637: When the early microcode loading was
enabled during initrd creation, the initrd would be
read-only available for all users, allowing local users
to retrieve secrets stored in the initial ramdisk.
(bsc#1008340) Non security issues fixed :

- Remove zlib module as requirement. (bsc#1020063)

- Unlimit TaskMax for xfs_repair in emergency shell.
(bsc#1019938)

- Resolve symbolic links for -i and -k parameters.
(bsc#902375)

- Enhance purge-kernels script to handle kgraft patches.
(bsc#1017141)

- Allow booting from degraded MD arrays with systemd.
(bsc#1017695)

- Allow booting on s390x with fips=1 on the kernel command
line. (bnc#1021687)

- Start multipath services before local-fs-pre.target.
(bsc#1005410, bsc#1006118, bsc#1007925)

- Fix /sbin/installkernel to handle kernel packages built
with 'make bin-rpmpkg'. (bsc#1008648)

Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

https://bugzilla.suse.com/1005410
https://bugzilla.suse.com/1006118
https://bugzilla.suse.com/1007925
https://bugzilla.suse.com/1008340
https://bugzilla.suse.com/1008648
https://bugzilla.suse.com/1017141
https://bugzilla.suse.com/1017695
https://bugzilla.suse.com/1019938
https://bugzilla.suse.com/1020063
https://bugzilla.suse.com/1021687
https://bugzilla.suse.com/902375
https://www.suse.com/security/cve/CVE-2016-8637.html
http://www.nessus.org/u?eb353e43

Solution :

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:zypper in -t
patch SUSE-SLE-RPI-12-SP2-2017-547=1

SUSE Linux Enterprise Server 12-SP2:zypper in -t patch
SUSE-SLE-SERVER-12-SP2-2017-547=1

SUSE Linux Enterprise Desktop 12-SP2:zypper in -t patch
SUSE-SLE-DESKTOP-12-SP2-2017-547=1

OpenStack Cloud Magnum Orchestration 7:zypper in -t patch
SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-547=1

To bring your system up-to-date, use 'zypper patch'.

Risk factor :

Low / CVSS Base Score : 1.9
(CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 1.6
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: SuSE Local Security Checks

Nessus Plugin ID: 99244 ()

Bugtraq ID:

CVE ID: CVE-2016-8637

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now