<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for dracut</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2017:0951-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-04-06T07:31:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-04-06T07:31:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-04-06T07:31:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for dracut</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for dracut fixes the following issues:

Security issues fixed:

- CVE-2016-8637: When the early microcode loading was enabled during initrd creation, the initrd
  would be read-only available for all users, allowing local users to retrieve secrets stored in
  the initial ramdisk. (bsc#1008340)

Non security issues fixed:

- Remove zlib module as requirement. (bsc#1020063)
- Unlimit TaskMax for xfs_repair in emergency shell. (bsc#1019938)
- Resolve symbolic links for -i and -k parameters. (bsc#902375)
- Enhance purge-kernels script to handle kgraft patches. (bsc#1017141)
- Allow booting from degraded MD arrays with systemd. (bsc#1017695)
- Allow booting on s390x with fips=1 on the kernel command line. (bnc#1021687)
- Start multipath services before local-fs-pre.target. (bsc#1005410, bsc#1006118, bsc#1007925)
- Fix /sbin/installkernel to handle kernel packages built with 'make bin-rpmpkg'. (bsc#1008648)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-547,SUSE-SLE-DESKTOP-12-SP2-2017-547,SUSE-SLE-RPI-12-SP2-2017-547,SUSE-SLE-SERVER-12-SP2-2017-547</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170951-1/</URL>
      <Description>Link for SUSE-SU-2017:0951-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2017-April/002788.html</URL>
      <Description>E-Mail link for SUSE-SU-2017:0951-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1005410</URL>
      <Description>SUSE Bug 1005410</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1006118</URL>
      <Description>SUSE Bug 1006118</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1007925</URL>
      <Description>SUSE Bug 1007925</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1008340</URL>
      <Description>SUSE Bug 1008340</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1008648</URL>
      <Description>SUSE Bug 1008648</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1017141</URL>
      <Description>SUSE Bug 1017141</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1017695</URL>
      <Description>SUSE Bug 1017695</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1019938</URL>
      <Description>SUSE Bug 1019938</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1020063</URL>
      <Description>SUSE Bug 1020063</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021687</URL>
      <Description>SUSE Bug 1021687</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/902375</URL>
      <Description>SUSE Bug 902375</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8637/</URL>
      <Description>SUSE CVE CVE-2016-8637 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 12 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 12 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP2" CPE="cpe:/o:suse:sled:12:sp2">SUSE Linux Enterprise Desktop 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2" CPE="cpe:/o:suse:sles:12:sp2">SUSE Linux Enterprise Server 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" CPE="cpe:/o:suse:sles:12:sp2">SUSE Linux Enterprise Server for Raspberry Pi 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP2" CPE="cpe:/o:suse:sles_sap:12:sp2">SUSE Linux Enterprise Server for SAP Applications 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="dracut-044-108.1">
      <FullProductName ProductID="dracut-044-108.1">dracut-044-108.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dracut-fips-044-108.1">
      <FullProductName ProductID="dracut-fips-044-108.1">dracut-fips-044-108.1</FullProductName>
    </Branch>
    <Relationship ProductReference="dracut-044-108.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP2:dracut-044-108.1">dracut-044-108.1 as a component of SUSE Linux Enterprise Desktop 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="dracut-044-108.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2:dracut-044-108.1">dracut-044-108.1 as a component of SUSE Linux Enterprise Server 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="dracut-fips-044-108.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2:dracut-fips-044-108.1">dracut-fips-044-108.1 as a component of SUSE Linux Enterprise Server 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="dracut-044-108.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dracut-044-108.1">dracut-044-108.1 as a component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="dracut-fips-044-108.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dracut-fips-044-108.1">dracut-fips-044-108.1 as a component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="dracut-044-108.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP2:dracut-044-108.1">dracut-044-108.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="dracut-fips-044-108.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP2:dracut-fips-044-108.1">dracut-fips-044-108.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A local information disclosure issue was found in dracut before 045 when generating initramfs images with world-readable permissions when 'early cpio' is used, such as when including microcode updates. Local attacker can use this to obtain sensitive information from these files, such as encryption keys or credentials.</Note>
    </Notes>
    <CVE>CVE-2016-8637</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:dracut-044-108.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:dracut-044-108.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:dracut-fips-044-108.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dracut-044-108.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:dracut-fips-044-108.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:dracut-044-108.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:dracut-fips-044-108.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170951-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8637.html</URL>
        <Description>CVE-2016-8637</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1008340</URL>
        <Description>SUSE Bug 1008340</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
