Jump to content
Compatible Support Forums
Sign in to follow this  
news

[security-announce] SUSE-SU-2017:1360-1: important: Security update for the Linux Kernel

Recommended Posts

SUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

 

Announcement ID: SUSE-SU-2017:1360-1

Rating: important

References: #1003077 #1008842 #1009682 #1012620 #1012985

#1015703 #1015787 #1015821 #1017512 #1018100

#1018263 #1018419 #1018446 #1019168 #1019514

#1020048 #1020795 #1021256 #1021374 #1021762

#1021913 #1022559 #1022971 #1023164 #1023207

#1023377 #1023762 #1023824 #1023888 #1023992

#1024081 #1024234 #1024309 #1024508 #1024788

#1025039 #1025235 #1025354 #1025802 #1026024

#1026722 #1026914 #1027066 #1027178 #1027189

#1027190 #1027974 #1028041 #1028415 #1028595

#1028648 #1028895 #1029470 #1029850 #1029986

#1030118 #1030213 #1030593 #1030901 #1031003

#1031052 #1031080 #1031440 #1031567 #1031579

#1031662 #1031842 #1032125 #1032141 #1032344

#1032345 #1033336 #1034670 #103470 #1034700

#1035576 #1035699 #1035738 #1035877 #1036752

#1038261 #799133 #857926 #914939 #917630

#922853 #930399 #931620 #937444 #940946 #954763

#968697 #970083 #971933 #979215 #982783 #983212

#984530 #985561 #988065 #989056 #993832

Cross-References: CVE-2015-1350 CVE-2016-10044 CVE-2016-10200

CVE-2016-10208 CVE-2016-2117 CVE-2016-3070

CVE-2016-5243 CVE-2016-7117 CVE-2016-9191

CVE-2016-9588 CVE-2016-9604 CVE-2017-2647

CVE-2017-2671 CVE-2017-5669 CVE-2017-5897

CVE-2017-5986 CVE-2017-6074 CVE-2017-6214

CVE-2017-6345 CVE-2017-6346 CVE-2017-6348

CVE-2017-6353 CVE-2017-6951 CVE-2017-7187

CVE-2017-7261 CVE-2017-7294 CVE-2017-7308

CVE-2017-7616 CVE-2017-7645 CVE-2017-8106

 

Affected Products:

SUSE Linux Enterprise Workstation Extension 12-SP1

SUSE Linux Enterprise Software Development Kit 12-SP1

SUSE Linux Enterprise Server 12-SP1

SUSE Linux Enterprise Module for Public Cloud 12

SUSE Linux Enterprise Live Patching 12

SUSE Linux Enterprise Desktop 12-SP1

______________________________________________________________________________

 

An update that solves 30 vulnerabilities and has 72 fixes

is now available.

 

Description:

 

 

The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.74 to receive

various security and bugfixes.

 

Notable new/improved features:

- Improved support for Hyper-V

- Support for the tcp_westwood TCP scheduling algorithm

 

The following security bugs were fixed:

 

- CVE-2017-8106: The handle_invept function in arch/x86/kvm/vmx.c in the

Linux kernel allowed privileged KVM guest OS users to cause a denial of

service (NULL pointer dereference and host OS crash) via a

single-context INVEPT instruction with a NULL EPT pointer (bsc#1035877).

- CVE-2017-6951: The keyring_search_aux function in

security/keys/keyring.c in the Linux kernel allowed local users to cause

a denial of service (NULL pointer dereference and OOPS) via a

request_key system call for the "dead" type. (bsc#1029850).

- CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local

users to gain privileges or cause a denial of service (NULL pointer

dereference and system crash) via vectors involving a NULL value for a

certain match field, related to the keyring_search_iterator function in

keyring.c. (bsc#1030593)

- CVE-2016-9604: This fixes handling of keyrings starting with '.' in

KEYCTL_JOIN_SESSION_KEYRING, which could have allowed local users to

manipulate privileged keyrings (bsc#1035576)

- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind

compat syscalls in mm/mempolicy.c in the Linux kernel allowed local

users to obtain sensitive information from uninitialized stack data by

triggering failure of a certain bitmap operation. (bnc#1033336).

- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux

kernel allowed remote attackers to cause a denial of service (system

crash) via a long RPC reply, related to net/sunrpc/svc.c,

fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c. (bsc#1034670).

- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in

the Linux kernel did not properly validate certain block-size data,

which allowed local users to cause a denial of service (overflow) or

possibly have unspecified other impact via crafted system calls

(bnc#1031579)

- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux

kernel was too late in obtaining a certain lock and consequently could

not ensure that disconnect function calls are safe, which allowed local

users to cause a denial of service (panic) by leveraging access to the

protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003)

- CVE-2017-7294: The vmw_surface_define_ioctl function in

drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not

validate addition of certain levels data, which allowed local users to

trigger an integer overflow and out-of-bounds write, and cause a denial

of service (system hang or crash) or possibly gain privileges, via a

crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440)

- CVE-2017-7261: The vmw_surface_define_ioctl function in

drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not

check for a zero value of certain levels data, which allowed local users

to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and

possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device

(bnc#1031052)

- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux

kernel allowed local users to cause a denial of service (stack-based

buffer overflow) or possibly have unspecified other impact via a large

command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds

write access in the sg_write function (bnc#1030213)

- CVE-2016-9588: arch/x86/kvm/vmx.c in the Linux kernel mismanaged the #BP

and #OF exceptions, which allowed guest OS users to cause a denial of

service (guest OS crash) by declining to handle an exception thrown by

an L2 guest (bsc#1015703).

- CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel

did not restrict the address calculated by a certain rounding operation,

which allowed local users to map page zero, and consequently bypass a

protection mechanism that exists for the mmap system call, by making

crafted shmget and shmat system calls in a privileged context

(bnc#1026914).

- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in

the Linux kernel allowed local users to gain privileges or cause a

denial of service (use-after-free) by making multiple bind system calls

without properly ascertaining whether a socket has the SOCK_ZAPPED

status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c

(bnc#1028415)

- CVE-2016-10208: The ext4_fill_super function in fs/ext4/super.c in the

Linux kernel did not properly validate meta block groups, which allowed

physically proximate attackers to cause a denial of service

(out-of-bounds read and system crash) via a crafted ext4 image

(bnc#1023377).

- CVE-2017-5897: The ip6gre_err function in net/ipv6/ip6_gre.c in the

Linux kernel allowed remote attackers to have unspecified impact via

vectors involving GRE flags in an IPv6 packet, which trigger an

out-of-bounds access (bsc#1023762).

- CVE-2017-5986: A race condition in the sctp_wait_for_sndbuf function in

net/sctp/socket.c in the Linux kernel allowed local users to cause a

denial of service (assertion failure and panic) via a multithreaded

application that peels off an association in a certain buffer-full state

(bsc#1025235).

- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c

in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures

in the LISTEN state, which allowed local users to obtain root privileges

or cause a denial of service (double free) via an application that made

an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024)

- CVE-2016-9191: The cgroup offline implementation in the Linux kernel

mishandled certain drain operations, which allowed local users to cause

a denial of service (system hang) by leveraging access to a container

environment for executing a crafted application (bnc#1008842)

- CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the

Linux kernel improperly managed lock dropping, which allowed local users

to cause a denial of service (deadlock) via crafted operations on IrDA

devices (bnc#1027178).

- CVE-2016-10044: The aio_mount function in fs/aio.c in the Linux kernel

did not properly restrict execute access, which made it easier for local

users to bypass intended SELinux W^X policy restrictions, and

consequently gain privileges, via an io_setup system call (bnc#1023992).

- CVE-2016-3070: The trace_writeback_dirty_page implementation in

include/trace/events/writeback.h in the Linux kernel improperly

interacts with mm/migrate.c, which allowed local users to cause a denial

of service (NULL pointer dereference and system crash) or possibly have

unspecified other impact by triggering a certain page move (bnc#979215).

- CVE-2016-5243: The tipc_nl_compat_link_dump function in

net/tipc/netlink_compat.c in the Linux kernel did not properly copy a

certain string, which allowed local users to obtain sensitive

information from kernel stack memory by reading a Netlink message

(bnc#983212).

- CVE-2017-6345: The LLC subsystem in the Linux kernel did not ensure that

a certain destructor exists in required circumstances, which allowed

local users to cause a denial of service (BUG_ON) or possibly have

unspecified other impact via crafted system calls (bnc#1027190)

- CVE-2017-6346: Race condition in net/packet/af_packet.c in the Linux

kernel allowed local users to cause a denial of service (use-after-free)

or possibly have unspecified other impact via a multithreaded

application that made PACKET_FANOUT setsockopt system calls (bnc#1027189)

- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly

restrict association peel-off operations during certain wait states,

which allowed local users to cause a denial of service (invalid unlock

and double free) via a multithreaded application. NOTE: this

vulnerability exists because of an incorrect fix for CVE-2017-5986

(bnc#1027066)

- CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in

net/sctp/socket.c in the Linux kernel allowed local users to cause a

denial of service (assertion failure and panic) via a multithreaded

application that peels off an association in a certain buffer-full state

(bsc#1025235).

- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the

Linux kernel allowed remote attackers to cause a denial of service

(infinite loop and soft lockup) via vectors involving a TCP packet with

the URG flag (bnc#1026722)

- CVE-2016-2117: The atl2_probe function in

drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel incorrectly

enables scatter/gather I/O, which allowed remote attackers to obtain

sensitive information from kernel memory by reading packet data

(bnc#968697)

- CVE-2015-1350: The VFS subsystem in the Linux kernel provided an

incomplete set of requirements for setattr operations that

underspecifies removing extended privilege attributes, which allowed

local users to cause a denial of service (capability stripping) via a

failed invocation of a system call, as demonstrated by using chown to

remove a capability from the ping or Wireshark dumpcap program

(bsc#914939).

- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg

function in net/socket.c in the Linux kernel allowed remote attackers to

execute arbitrary code via vectors involving a recvmmsg system call that

is mishandled during error processing (bsc#1003077).

 

The following non-security bugs were fixed:

 

- ACPI / APEI: Fix NMI notification handling (bsc#917630).

- arch: Mass conversion of smp_mb__*() (bsc#1020795).

- asm-generic: add __smp_xxx wrappers (bsc#1020795).

- block: remove struct request buffer member (bsc#1020795).

- block: submit_bio_wait() conversions (bsc#1020795).

- bonding: Advertize vxlan offload features when supported (bsc#1009682).

- bonding: handle more gso types (bsc#1009682).

- bonding: use the correct ether type for alb (bsc#1028595).

- btrfs: allow unlink to exceed subvolume quota (bsc#1015821).

- btrfs: Change qgroup_meta_rsv to 64bit (bsc#1015821).

- btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls

(bsc#1018100).

- btrfs: make file clone aware of fatal signals (bsc#1015787).

- btrfs: qgroups: Retry after commit on getting EDQUOT (bsc#1015821).

- cancel the setfilesize transation when io error happen (bsc#1028648).

- cgroup: remove stray references to css_id (bsc#1020795).

- cpuidle: powernv/pseries: Auto-promotion of snooze to deeper idle state

(bnc#1023164).

- dm: add era target (bsc#1020795).

- dm: allow remove to be deferred (bsc#1020795).

- dm bitset: only flush the current word if it has been dirtied

(bsc#1020795).

- dm btree: add dm_btree_find_lowest_key (bsc#1020795).

- dm cache: actually resize cache (bsc#1020795).

- dm cache: add block sizes and total cache blocks to status output

(bsc#1020795).

- dm cache: add cache block invalidation support (bsc#1020795).

- dm cache: add passthrough mode (bsc#1020795).

- dm cache: add policy name to status output (bsc#1020795).

- dm cache: add remove_cblock method to policy interface (bsc#1020795).

- dm cache: be much more aggressive about promoting writes to discarded

blocks (bsc#1020795).

- dm cache: cache shrinking support (bsc#1020795).

- dm cache: do not add migration to completed list before unhooking bio

(bsc#1020795).

- dm cache: fix a lock-inversion (bsc#1020795).

- dm cache: fix truncation bug when mapping I/O to more than 2TB fast

device (bsc#1020795).

- dm cache: fix writethrough mode quiescing in cache_map (bsc#1020795).

- dm cache: improve efficiency of quiescing flag management (bsc#1020795).

- dm cache: io destined for the cache device can now serve as tick bios

(bsc#1020795).

- dm cache: log error message if dm_kcopyd_copy() fails (bsc#1020795).

- dm cache metadata: check the metadata version when reading the

superblock (bsc#1020795).

- dm cache metadata: return bool from __superblock_all_zeroes

(bsc#1020795).

- dm cache: move hook_info into common portion of per_bio_data structure

(bsc#1020795).

- dm cache: optimize commit_if_needed (bsc#1020795).

- dm cache policy mq: a few small fixes (bsc#1020795).

- dm cache policy mq: fix promotions to occur as expected (bsc#1020795).

- dm cache policy mq: implement writeback_work() and

mq_{set,clear}_dirty() (bsc#1020795).

- dm cache policy mq: introduce three promotion threshold tunables

(bsc#1020795).

- dm cache policy mq: protect residency method with existing mutex

(bsc#1020795).

- dm cache policy mq: reduce memory requirements (bsc#1020795).

- dm cache policy mq: use list_del_init instead of list_del +

INIT_LIST_HEAD (bsc#1020795).

- dm cache policy: remove return from void policy_remove_mapping

(bsc#1020795).

- dm cache: promotion optimisation for writes (bsc#1020795).

- dm cache: resolve small nits and improve Documentation (bsc#1020795).

- dm cache: return -EINVAL if the user specifies unknown cache policy

(bsc#1020795).

- dm cache: use cell_defer() boolean argument consistently (bsc#1020795).

- dm: change sector_count member in clone_info from sector_t to unsigned

(bsc#1020795).

- dm crypt: add TCW IV mode for old CBC TCRYPT containers (bsc#1020795).

- dm crypt: properly handle extra key string in initialization

(bsc#1020795).

- dm delay: use per-bio data instead of a mempool and slab cache

(bsc#1020795).

- dm: fix Kconfig indentation (bsc#1020795).

- dm: fix Kconfig menu indentation (bsc#1020795).

- dm: make dm_table_alloc_md_mempools static (bsc#1020795).

- dm mpath: do not call pg_init when it is already running (bsc#1020795).

- dm mpath: fix lock order inconsistency in multipath_ioctl (bsc#1020795).

- dm mpath: print more useful warnings in multipath_message()

(bsc#1020795).

- dm mpath: push back requests instead of queueing (bsc#1020795).

- dm mpath: really fix lockdep warning (bsc#1020795).

- dm mpath: reduce memory pressure when requeuing (bsc#1020795).

- dm mpath: remove extra nesting in map function (bsc#1020795).

- dm mpath: remove map_io() (bsc#1020795).

- dm mpath: remove process_queued_ios() (bsc#1020795).

- dm mpath: requeue I/O during pg_init (bsc#1020795).

- dm persistent data: cleanup dm-thin specific references in text

(bsc#1020795).

- dm snapshot: call destroy_work_on_stack() to pair with

INIT_WORK_ONSTACK() (bsc#1020795).

- dm snapshot: fix metadata corruption (bsc#1020795).

- dm snapshot: prepare for switch to using dm-bufio (bsc#1020795).

- dm snapshot: use dm-bufio (bsc#1020795).

- dm snapshot: use dm-bufio prefetch (bsc#1020795).

- dm snapshot: use GFP_KERNEL when initializing exceptions (bsc#1020795).

- dm space map disk: optimise sm_disk_dec_block (bsc#1020795).

- dm space map metadata: limit errors in sm_metadata_new_block

(bsc#1020795).

- dm: stop using bi_private (bsc#1020795).

- dm table: add dm_table_run_md_queue_async (bsc#1020795).

- dm table: print error on preresume failure (bsc#1020795).

- dm table: remove unused buggy code that extends the targets array

(bsc#1020795).

- dm thin: add error_if_no_space feature (bsc#1020795).

- dm thin: add mappings to end of prepared_* lists (bsc#1020795).

- dm thin: add 'no_space_timeout' dm-thin-pool module param (bsc#1020795).

- dm thin: add timeout to stop out-of-data-space mode holding IO forever

(bsc#1020795).

- dm thin: allow metadata commit if pool is in PM_OUT_OF_DATA_SPACE mode

(bsc#1020795).

- dm thin: allow metadata space larger than supported to go unused

(bsc#1020795).

- dm thin: cleanup and improve no space handling (bsc#1020795).

- dm thin: eliminate the no_free_space flag (bsc#1020795).

- dm thin: ensure user takes action to validate data and metadata

consistency (bsc#1020795).

- dm thin: factor out check_low_water_mark and use bools (bsc#1020795).

- dm thin: fix deadlock in __requeue_bio_list (bsc#1020795).

- dm thin: fix noflush suspend IO queueing (bsc#1020795).

- dm thin: fix out of data space handling (bsc#1020795).

- dm thin: fix pool feature parsing (bsc#1020795).

- dm thin: fix rcu_read_lock being held in code that can sleep

(bsc#1020795).

- dm thin: handle metadata failures more consistently (bsc#1020795).

- dm thin: irqsave must always be used with the pool->lock spinlock

(bsc#1020795).

- dm thin: log info when growing the data or metadata device (bsc#1020795).

- dm thin: requeue bios to DM core if no_free_space and in read-only mode

(bsc#1020795).

- dm thin: return error from alloc_data_block if pool is not in write mode

(bsc#1020795).

- dm thin: simplify pool_is_congested (bsc#1020795).

- dm thin: sort the per thin deferred bios using an rb_tree (bsc#1020795).

- dm thin: synchronize the pool mode during suspend (bsc#1020795).

- dm thin: use bool rather than unsigned for flags in structures

(bsc#1020795).

- dm thin: use INIT_WORK_ONSTACK in noflush_work to avoid ODEBUG warning

(bsc#1020795).

- dm thin: use per thin device deferred bio lists (bsc#1020795).

- dm: use RCU_INIT_POINTER instead of rcu_assign_pointer in __unbind

(bsc#1020795).

- drm/i915: relax uncritical udelay_range() (bsc#1038261).

- ether: add loopback type ETH_P_LOOPBACK (bsc#1028595).

- ext4: fix bh leak on error paths in ext4_rename() and

ext4_cross_rename() (bsc#1012985).

- ext4: fix fencepost in s_first_meta_bg validation (bsc#1029986).

- ext4: mark inode dirty after converting inline directory (bsc#1012985).

- ftrace: Make ftrace_location_range() global (FATE#322421).

- HID: usbhid: improve handling of Clear-Halt and reset (bsc#1031080).

- hv: util: catch allocation errors

- hv: utils: use memdup_user in hvt_op_write

- hwrng: virtio - ensure reads happen after successful probe (bsc#954763

bsc#1032344).

- i40e: avoid null pointer dereference (bsc#922853).

- i40e/i40evf: Break up xmit_descriptor_count from maybe_stop_tx

(bsc#985561).

- i40e/i40evf: Limit TSO to 7 descriptors for payload instead of 8 per

packet (bsc#985561).

- i40e/i40evf: Rewrite logic for 8 descriptor per packet check

(bsc#985561).

- i40e: Impose a lower limit on gso size (bsc#985561).

- i40e: Limit TX descriptor count in cases where frag size is greater than

16K (bsc#985561).

- iommu/vt-d: Flush old iommu caches for kdump when the device gets

context mapped (bsc#1023824).

- iommu/vt-d: Tylersburg isoch identity map check is done too late

(bsc#1032125).

- ipv6: make ECMP route replacement less greedy (bsc#930399).

- kabi: hide changes in struct sk_buff (bsc#1009682).

- KABI: Hide new include in arch/powerpc/kernel/process.c (fate#322421).

- kABI: mask struct xfs_icdinode change (bsc#1024788).

- kABI: protect struct inet6_dev (kabi).

- kABI: protect struct iscsi_conn (bsc#103470).

- kABI: protect struct xfs_buftarg and struct xfs_mount (bsc#1024508).

- kABI: restore can_rx_register parameters (kabi).

- kernel/watchdog: use nmi registers snapshot in hardlockup handler

(bsc#940946, bsc#937444).

- kgr: Mark eeh_event_handler() kthread safe using a timeout (bsc#1031662).

- kgr/module: make a taint flag module-specific

- kgr: remove unneeded kgr_needs_lazy_migration() s390x definition

- l2tp: fix address test in __l2tp_ip6_bind_lookup() (bsc#1028415).

- l2tp: fix lookup for sockets not bound to a device in l2tp_ip

(bsc#1028415).

- l2tp: fix racy socket lookup in l2tp_ip and l2tp_ip6 bind()

(bsc#1028415).

- l2tp: hold socket before dropping lock in l2tp_ip{, 6}_recv()

(bsc#1028415).

- l2tp: hold tunnel socket when handling control frames in l2tp_ip and

l2tp_ip6 (bsc#1028415).

- l2tp: lock socket before checking flags in connect() (bsc#1028415).

- livepatch: Allow architectures to specify an alternate ftrace location

(FATE#322421).

- locking/semaphore: Add down_interruptible_timeout() (bsc#1031662).

- md: avoid oops on unload if some process is in poll or select

(bsc#1020795).

- md: Convert use of typedef ctl_table to struct ctl_table (bsc#1020795).

- md: ensure metadata is writen after raid level change (bsc#1020795).

- md linear: fix a race between linear_add() and linear_congested()

(bsc#1018446).

- md: md_clear_badblocks should return an error code on failure

(bsc#1020795).

- md: refuse to change shape of array if it is active but read-only

(bsc#1020795).

- megaraid_sas: add missing curly braces in ioctl handler (bsc#1023207).

- megaraid_sas: Fixup tgtid count in megasas_ld_list_query() (bsc#971933).

- mm/huge_memory.c: respect FOLL_FORCE/FOLL_COW for thp (bnc#1030118).

- mm, memcg: do not retry precharge charges (bnc#1022559).

- mm/mempolicy.c: do not put mempolicy before using its nodemask

(References: VM Performance, bnc#931620).

- mm/page_alloc: fix nodes for reclaim in fast path (bnc#1031842).

- module: move add_taint_module() to a header file

- net: Add skb_gro_postpull_rcsum to udp and vxlan (bsc#1009682).

- net: add skb_pop_rcv_encapsulation (bsc#1009682).

- net: Call skb_checksum_init in IPv4 (bsc#1009682).

- net: Call skb_checksum_init in IPv6 (bsc#1009682).

- netfilter: allow logging fron non-init netns (bsc#970083).

- net: Generalize checksum_init functions (bsc#1009682).

- net: Preserve CHECKSUM_COMPLETE at validation (bsc#1009682).

- NFS: do not try to cross a mountpount when there isn't one there

(bsc#1028041).

- NFS: Expedite unmount of NFS auto-mounts (bnc#1025802).

- NFS: Fix a performance regression in readdir (bsc#857926).

- NFS: flush out dirty data on file fput() (bsc#1021762).

- ocfs2: do not write error flag to user structure we cannot copy from/to

(bsc#1012985).

- powerpc: Blacklist GCC 5.4 6.1 and 6.2 (boo#1028895).

- powerpc: Create a helper for getting the kernel toc value (FATE#322421).

- powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971).

- powerpc/fadump: Reserve memory at an offset closer to bottom of RAM

(bsc#1032141).

- powerpc/fadump: Update fadump documentation (bsc#1032141).

- powerpc/ftrace: Add Kconfig & Make glue for mprofile-kernel

(FATE#322421).

- powerpc/ftrace: Add support for -mprofile-kernel ftrace ABI

(FATE#322421).

- powerpc/ftrace: Use $(CC_FLAGS_FTRACE) when disabling ftrace

(FATE#322421).

- powerpc/ftrace: Use generic ftrace_modify_all_code() (FATE#322421).

- powerpc: introduce TIF_KGR_IN_PROGRESS thread flag (FATE#322421).

- powerpc/kgraft: Add kgraft header (FATE#322421).

- powerpc/kgraft: Add kgraft stack to struct thread_info (FATE#322421).

- powerpc/kgraft: Add live patching support on ppc64le (FATE#322421).

- powerpc/module: Create a special stub for ftrace_caller() (FATE#322421).

- powerpc/module: Mark module stubs with a magic value (FATE#322421).

- powerpc/module: Only try to generate the ftrace_caller() stub once

(FATE#322421).

- powerpc/modules: Never restore r2 for a mprofile-kernel style mcount()

call (FATE#322421).

- powerpc/prom: Increase minimum RMA size to 512MB (bsc#984530).

- powerpc/pseries/cpuidle: Remove MAX_IDLE_STATE macro (bnc#1023164).

- powerpc/pseries/cpuidle: Use cpuidle_register() for initialisation

(bnc#1023164).

- powerpc: Reject binutils 2.24 when building little endian (boo#1028895).

- RAID1: avoid unnecessary spin locks in I/O barrier code

(bsc#982783,bsc#1020048).

- raid1: include bio_end_io_list in nr_queued to prevent freeze_array hang

- remove mpath patches from dmcache backport, for bsc#1035738

- revert "procfs: mark thread stack correctly in proc/PID/maps"

(bnc#1030901).

- Revert "RDMA/core: Fix incorrect structure packing for booleans" (kabi).

- rtnetlink: allow to register ops without ops->setup set (bsc#1021374).

- s390/zcrypt: Introduce CEX6 toleration (FATE#321783, LTC#147506,

bsc#1019514).

- sched/loadavg: Avoid loadavg spikes caused by delayed NO_HZ accounting

(bsc#1018419).

- scsi_error: count medium access timeout only once per EH run

(bsc#993832, bsc#1032345).

- scsi: libiscsi: add lock around task lists to fix list corruption

regression (bsc#1034700).

- scsi: storvsc: fix SRB_STATUS_ABORTED handling

- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).

- svcrpc: fix gss-proxy NULL dereference in some error cases (bsc#1024309).

- taint/module: Clean up global and module taint flags handling

- tcp: abort orphan sockets stalling on zero window probes (bsc#1021913).

- thp: fix MADV_DONTNEED vs. numa balancing race (bnc#1027974).

- thp: reduce indentation level in change_huge_pmd() (bnc#1027974).

- treewide: fix "distingush" typo (bsc#1020795).

- tree-wide: use reinit_completion instead of INIT_COMPLETION

(bsc#1020795).

- usb: dwc3: gadget: Fix incorrect DEPCMD and DGCMD status macros

(bsc#1035699).

- usb: host: xhci: print correct command ring address (bnc#1035699).

- USB: serial: kl5kusb105: fix line-state error handling (bsc#1021256).

- vfs: Do not exchange "short" filenames unconditionally (bsc#1012985).

- vfs: split generic splice code from i_mutex locking (bsc#1024788).

- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).

- VSOCK: Detach QP check should filter out non matching QPs (bsc#1036752).

- vxlan: cancel sock_work in vxlan_dellink() (bsc#1031567).

- vxlan: Checksum fixes (bsc#1009682).

- vxlan: GRO support at tunnel layer (bsc#1009682).

- xen-blkfront: correct maximum segment accounting (bsc#1018263).

- xen-blkfront: do not call talk_to_blkback when already connected to

blkback.

- xen-blkfront: free resources if xlvbd_alloc_gendisk fails.

- xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).

- xfs: do not allow di_size with high bit set (bsc#1024234).

- xfs: do not assert fail on non-async buffers on ioacct decrement

(bsc#1024508).

- xfs: exclude never-released buffers from buftarg I/O accounting

(bsc#1024508).

- xfs: fix broken multi-fsb buffer logging (bsc#1024081).

- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).

- xfs: Fix lock ordering in splice write (bsc#1024788).

- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).

- xfs: Make xfs_icdinode->di_dmstate atomic_t (bsc#1024788).

- xfs: pass total block res. as total xfs_bmapi_write() parameter

(bsc#1029470).

- xfs: replace global xfslogd wq with per-mount wq (bsc#1024508).

- xfs: track and serialize in-flight async buffers against unmount

(bsc#1024508).

 

 

Patch Instructions:

 

To install this SUSE Security Update use YaST online_update.

Alternatively you can run the command listed for your product:

 

- SUSE Linux Enterprise Workstation Extension 12-SP1:

 

zypper in -t patch SUSE-SLE-WE-12-SP1-2017-831=1

 

- SUSE Linux Enterprise Software Development Kit 12-SP1:

 

zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-831=1

 

- SUSE Linux Enterprise Server 12-SP1:

 

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-831=1

 

- SUSE Linux Enterprise Module for Public Cloud 12:

 

zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2017-831=1

 

- SUSE Linux Enterprise Live Patching 12:

 

zypper in -t patch SUSE-SLE-Live-Patching-12-2017-831=1

 

- SUSE Linux Enterprise Desktop 12-SP1:

 

zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-831=1

 

To bring your system up-to-date, use "zypper patch".

 

 

Package List:

 

- SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):

 

kernel-default-debuginfo-3.12.74-60.64.40.1

kernel-default-debugsource-3.12.74-60.64.40.1

kernel-default-extra-3.12.74-60.64.40.1

kernel-default-extra-debuginfo-3.12.74-60.64.40.1

 

- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):

 

kernel-obs-build-3.12.74-60.64.40.1

kernel-obs-build-debugsource-3.12.74-60.64.40.1

 

- SUSE Linux Enterprise Software Development Kit 12-SP1 (noarch):

 

kernel-docs-3.12.74-60.64.40.4

 

- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):

 

kernel-default-3.12.74-60.64.40.1

kernel-default-base-3.12.74-60.64.40.1

kernel-default-base-debuginfo-3.12.74-60.64.40.1

kernel-default-debuginfo-3.12.74-60.64.40.1

kernel-default-debugsource-3.12.74-60.64.40.1

kernel-default-devel-3.12.74-60.64.40.1

kernel-syms-3.12.74-60.64.40.1

 

- SUSE Linux Enterprise Server 12-SP1 (noarch):

 

kernel-devel-3.12.74-60.64.40.1

kernel-macros-3.12.74-60.64.40.1

kernel-source-3.12.74-60.64.40.1

 

- SUSE Linux Enterprise Server 12-SP1 (x86_64):

 

kernel-xen-3.12.74-60.64.40.1

kernel-xen-base-3.12.74-60.64.40.1

kernel-xen-base-debuginfo-3.12.74-60.64.40.1

kernel-xen-debuginfo-3.12.74-60.64.40.1

kernel-xen-debugsource-3.12.74-60.64.40.1

kernel-xen-devel-3.12.74-60.64.40.1

 

- SUSE Linux Enterprise Server 12-SP1 (s390x):

 

kernel-default-man-3.12.74-60.64.40.1

 

- SUSE Linux Enterprise Module for Public Cloud 12 (x86_64):

 

kernel-ec2-3.12.74-60.64.40.1

kernel-ec2-debuginfo-3.12.74-60.64.40.1

kernel-ec2-debugsource-3.12.74-60.64.40.1

kernel-ec2-devel-3.12.74-60.64.40.1

kernel-ec2-extra-3.12.74-60.64.40.1

kernel-ec2-extra-debuginfo-3.12.74-60.64.40.1

 

- SUSE Linux Enterprise Live Patching 12 (x86_64):

 

kgraft-patch-3_12_74-60_64_40-default-1-4.1

kgraft-patch-3_12_74-60_64_40-xen-1-4.1

 

- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):

 

kernel-default-3.12.74-60.64.40.1

kernel-default-debuginfo-3.12.74-60.64.40.1

kernel-default-debugsource-3.12.74-60.64.40.1

kernel-default-devel-3.12.74-60.64.40.1

kernel-default-extra-3.12.74-60.64.40.1

kernel-default-extra-debuginfo-3.12.74-60.64.40.1

kernel-syms-3.12.74-60.64.40.1

kernel-xen-3.12.74-60.64.40.1

kernel-xen-debuginfo-3.12.74-60.64.40.1

kernel-xen-debugsource-3.12.74-60.64.40.1

kernel-xen-devel-3.12.74-60.64.40.1

 

- SUSE Linux Enterprise Desktop 12-SP1 (noarch):

 

kernel-devel-3.12.74-60.64.40.1

kernel-macros-3.12.74-60.64.40.1

kernel-source-3.12.74-60.64.40.1

 

 

References:

 

https://www.suse.com/security/cve/CVE-2015-1350.html

https://www.suse.com/security/cve/CVE-2016-10044.html

https://www.suse.com/security/cve/CVE-2016-10200.html

https://www.suse.com/security/cve/CVE-2016-10208.html

https://www.suse.com/security/cve/CVE-2016-2117.html

https://www.suse.com/security/cve/CVE-2016-3070.html

https://www.suse.com/security/cve/CVE-2016-5243.html

https://www.suse.com/security/cve/CVE-2016-7117.html

https://www.suse.com/security/cve/CVE-2016-9191.html

https://www.suse.com/security/cve/CVE-2016-9588.html

https://www.suse.com/security/cve/CVE-2016-9604.html

https://www.suse.com/security/cve/CVE-2017-2647.html

https://www.suse.com/security/cve/CVE-2017-2671.html

https://www.suse.com/security/cve/CVE-2017-5669.html

https://www.suse.com/security/cve/CVE-2017-5897.html

https://www.suse.com/security/cve/CVE-2017-5986.html

https://www.suse.com/security/cve/CVE-2017-6074.html

https://www.suse.com/security/cve/CVE-2017-6214.html

https://www.suse.com/security/cve/CVE-2017-6345.html

https://www.suse.com/security/cve/CVE-2017-6346.html

https://www.suse.com/security/cve/CVE-2017-6348.html

https://www.suse.com/security/cve/CVE-2017-6353.html

https://www.suse.com/security/cve/CVE-2017-6951.html

https://www.suse.com/security/cve/CVE-2017-7187.html

https://www.suse.com/security/cve/CVE-2017-7261.html

https://www.suse.com/security/cve/CVE-2017-7294.html

https://www.suse.com/security/cve/CVE-2017-7308.html

https://www.suse.com/security/cve/CVE-2017-7616.html

https://www.suse.com/security/cve/CVE-2017-7645.html

https://www.suse.com/security/cve/CVE-2017-8106.html

https://bugzilla.suse.com/1003077

https://bugzilla.suse.com/1008842

https://bugzilla.suse.com/1009682

https://bugzilla.suse.com/1012620

https://bugzilla.suse.com/1012985

https://bugzilla.suse.com/1015703

https://bugzilla.suse.com/1015787

https://bugzilla.suse.com/1015821

https://bugzilla.suse.com/1017512

https://bugzilla.suse.com/1018100

https://bugzilla.suse.com/1018263

https://bugzilla.suse.com/1018419

https://bugzilla.suse.com/1018446

https://bugzilla.suse.com/1019168

https://bugzilla.suse.com/1019514

https://bugzilla.suse.com/1020048

https://bugzilla.suse.com/1020795

https://bugzilla.suse.com/1021256

https://bugzilla.suse.com/1021374

https://bugzilla.suse.com/1021762

https://bugzilla.suse.com/1021913

https://bugzilla.suse.com/1022559

https://bugzilla.suse.com/1022971

https://bugzilla.suse.com/1023164

https://bugzilla.suse.com/1023207

https://bugzilla.suse.com/1023377

https://bugzilla.suse.com/1023762

https://bugzilla.suse.com/1023824

https://bugzilla.suse.com/1023888

https://bugzilla.suse.com/1023992

https://bugzilla.suse.com/1024081

https://bugzilla.suse.com/1024234

https://bugzilla.suse.com/1024309

https://bugzilla.suse.com/1024508

https://bugzilla.suse.com/1024788

https://bugzilla.suse.com/1025039

https://bugzilla.suse.com/1025235

https://bugzilla.suse.com/1025354

https://bugzilla.suse.com/1025802

https://bugzilla.suse.com/1026024

https://bugzilla.suse.com/1026722

https://bugzilla.suse.com/1026914

https://bugzilla.suse.com/1027066

https://bugzilla.suse.com/1027178

https://bugzilla.suse.com/1027189

https://bugzilla.suse.com/1027190

https://bugzilla.suse.com/1027974

https://bugzilla.suse.com/1028041

https://bugzilla.suse.com/1028415

https://bugzilla.suse.com/1028595

https://bugzilla.suse.com/1028648

https://bugzilla.suse.com/1028895

https://bugzilla.suse.com/1029470

https://bugzilla.suse.com/1029850

https://bugzilla.suse.com/1029986

https://bugzilla.suse.com/1030118

https://bugzilla.suse.com/1030213

https://bugzilla.suse.com/1030593

https://bugzilla.suse.com/1030901

https://bugzilla.suse.com/1031003

https://bugzilla.suse.com/1031052

https://bugzilla.suse.com/1031080

https://bugzilla.suse.com/1031440

https://bugzilla.suse.com/1031567

https://bugzilla.suse.com/1031579

https://bugzilla.suse.com/1031662

https://bugzilla.suse.com/1031842

https://bugzilla.suse.com/1032125

https://bugzilla.suse.com/1032141

https://bugzilla.suse.com/1032344

https://bugzilla.suse.com/1032345

https://bugzilla.suse.com/1033336

https://bugzilla.suse.com/1034670

https://bugzilla.suse.com/103470

https://bugzilla.suse.com/1034700

https://bugzilla.suse.com/1035576

https://bugzilla.suse.com/1035699

https://bugzilla.suse.com/1035738

https://bugzilla.suse.com/1035877

https://bugzilla.suse.com/1036752

https://bugzilla.suse.com/1038261

https://bugzilla.suse.com/799133

https://bugzilla.suse.com/857926

https://bugzilla.suse.com/914939

https://bugzilla.suse.com/917630

https://bugzilla.suse.com/922853

https://bugzilla.suse.com/930399

https://bugzilla.suse.com/931620

https://bugzilla.suse.com/937444

https://bugzilla.suse.com/940946

https://bugzilla.suse.com/954763

https://bugzilla.suse.com/968697

https://bugzilla.suse.com/970083

https://bugzilla.suse.com/971933

https://bugzilla.suse.com/979215

https://bugzilla.suse.com/982783

https://bugzilla.suse.com/983212

https://bugzilla.suse.com/984530

https://bugzilla.suse.com/985561

https://bugzilla.suse.com/988065

https://bugzilla.suse.com/989056

https://bugzilla.suse.com/993832

 

--

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org

For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org

 

 

 

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  

×