Security update for dracut

Announcement ID: SUSE-SU-2017:2696-1
Rating: moderate
References:
Cross-References:
CVSS scores:
  • CVE-2016-8637 ( NVD ): 5.0 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Affected Products:
  • SUSE Linux Enterprise Server 12
  • SUSE Linux Enterprise Server 12 LTSS 12
  • SUSE Linux Enterprise Server for SAP Applications 12

An update that solves one vulnerability and has 11 security fixes can now be installed.

Description:

This update for dracut fixes the following issues:

Security issues fixed:

  • CVE-2016-8637: When the early microcode loading was enabled during initrd creation, the initrd would be read-only available for all users, allowing local users to retrieve secrets stored in the initial ramdisk. (bsc#1008340)

Non-security issues fixed:

  • Skip iBFT discovery for qla4xxx flashnode session. (bsc#935320)
  • Set MTU and LLADDR for DHCP if specified. (bsc#959803)
  • Allow booting from degraded MD arrays with systemd. (bsc#1017695)
  • Start multipath services before local-fs-pre.target. (bsc#1005410, bsc#1006118, bsc#1007925, bsc#986734, bsc#986838)
  • Fixed /sbin/installkernel to handle kernel packages built with 'make bin-rpmpkg'. (bsc#1008648)
  • Fixed typo in installkernel script. (bsc#1032576)
  • Fixed subnet calculation in mkinitrd. (bsc#1035743)

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Server 12 LTSS 12
    zypper in -t patch SUSE-SLE-SERVER-12-2017-1669=1

Package List:

  • SUSE Linux Enterprise Server 12 LTSS 12 (ppc64le s390x x86_64)
    • dracut-debuginfo-037-51.31.1
    • dracut-debugsource-037-51.31.1
    • dracut-037-51.31.1
    • dracut-fips-037-51.31.1

References: