Recommended update for tboot

SUSE Security Update: Recommended update for tboot
Announcement ID: SUSE-SU-2017:3090-1
Rating: moderate
References: #1057555 #1068390
Affected Products:
  • SUSE Linux Enterprise Server 12-SP3
  • SUSE Linux Enterprise Server 12-SP2

  • An update that solves one vulnerability and has one errata is now available.


    This update for tboot fixes the following issues:

    Security issue fixed:

    - CVE-2017-16837: Certain function pointers in Trusted Boot (tboot)
    through 1.9.6 are notvalidated and can cause arbitrary code execution,
    which allows local users tooverwrite dynamic PCRs of Trusted Platform
    Module (TPM) by h (bsc#1068390)

    Bug fixes:

    - Fixed failed trusted boot on some systems like Intel Xeon "Purley 8s"
    processors. The following error message showed: "TBOOT: wait-for-sipi
    loop timed-out". Booting continued but "TXT measured launch" was wrongly
    reported as FALSE. (bsc#1057555)

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Server 12-SP3:
      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1901=1
    • SUSE Linux Enterprise Server 12-SP2:
      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1901=1

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Server 12-SP3 (x86_64):
      • tboot-20160518_1.9.4-7.5.1
      • tboot-debuginfo-20160518_1.9.4-7.5.1
      • tboot-debugsource-20160518_1.9.4-7.5.1
    • SUSE Linux Enterprise Server 12-SP2 (x86_64):
      • tboot-20160518_1.9.4-7.5.1
      • tboot-debuginfo-20160518_1.9.4-7.5.1
      • tboot-debugsource-20160518_1.9.4-7.5.1