openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2016:1641-1
Rating:             important
References:         #945345 #955654 #963762 #966245 #966849 #970506 
                    #971126 #971799 #973570 #974308 #975945 #977198 
                    #978073 #978401 #978821 #978822 #979018 #979213 
                    #979278 #979548 #979728 #979867 #979879 #979913 
                    #980348 #980371 #980657 #981058 #981267 #981344 
                    #982238 #982239 #982712 #983143 #983213 #984460 
                    
Cross-References:   CVE-2013-7446 CVE-2016-0758 CVE-2016-1583
                    CVE-2016-2053 CVE-2016-3134 CVE-2016-3672
                    CVE-2016-3955 CVE-2016-4482 CVE-2016-4485
                    CVE-2016-4486 CVE-2016-4557 CVE-2016-4565
                    CVE-2016-4569 CVE-2016-4578 CVE-2016-4580
                    CVE-2016-4581 CVE-2016-4805 CVE-2016-4951
                    CVE-2016-5244
Affected Products:
                    openSUSE Leap 42.1
______________________________________________________________________________

   An update that solves 19 vulnerabilities and has 17 fixes
   is now available.

Description:


   The openSUSE Leap 42.1 kernel was updated to 4.1.26 to receive various
   security and bugfixes.

   The following security bugs were fixed:
   - CVE-2016-1583: Prevent the usage of mmap when the lower file system does
     not allow it. This could have lead to local privilege escalation when
     ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid
     (bsc#983143).
   - CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel
     incorrectly relies on the write system call, which allows local users to
     cause a denial of service (kernel memory write operation) or possibly
     have unspecified other impact via a uAPI interface. (bsc#979548)
   - CVE-2016-4805: Use-after-free vulnerability in
     drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to
     cause a denial of service (memory corruption and system crash,
     or spinlock) or possibly have unspecified other impact by removing a
      network namespace, related to the ppp_register_net_channel and
      ppp_unregister_channel functions.  (bsc#980371).
   - CVE-2016-4951: The tipc_nl_publ_dump function in net/tipc/socket.c in
     the Linux kernel did not verify socket existence, which allowed local
     users to cause a denial of service (NULL pointer dereference and system
     crash) or possibly have unspecified other impact via a dumpit
     operation. (bsc#981058).
   - CVE-2016-5244: An information leak vulnerability in function
     rds_inc_info_copy of file net/rds/recv.c was fixed that might have
     leaked kernel stack data. (bsc#983213).
   - CVE-2016-4580: The x25_negotiate_facilities function in
     net/x25/x25_facilities.c in the Linux kernel did not properly initialize
     a certain data structure, which allowed attackers to
     obtain sensitive information from kernel stack memory via an X.25 Call
      Request. (bsc#981267).
   - CVE-2016-0758: Tags with indefinite length could have corrupted pointers     in asn1_find_indefinite_length (bsc#979867).
   - CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in
     the Linux kernel allowed attackers to cause a denial of service (panic)
     via an ASN.1 BER file that lacks a public key, leading to mishandling by
     the public_key_verify_signature function in
     crypto/asymmetric_keys/public_key.c (bnc#963762).
   - CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the
     Linux kernel allowed local users to bypass intended AF_UNIX socket
     permissions or cause a denial of service (panic) via crafted epoll_ctl
     calls (bnc#955654).
   - CVE-2016-3134: The netfilter subsystem in the Linux kernel did not
     validate certain offset fields, which allowed local users to gain
     privileges or cause a denial of service (heap memory corruption) via an
     IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
   - CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c
     in the Linux kernel did not properly randomize the legacy base address,
     which made it easier for local users to defeat the intended restrictions
     on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism
      for a setuid or setgid program, by disabling stack-consumption resource
      limits (bnc#974308).
   - CVE-2016-4482: A kernel information leak in the usbfs devio connectinfo
     was fixed, which could expose kernel stack memory to userspace.
     (bnc#978401).
   - CVE-2016-4485: A kernel information leak in llc was fixed (bsc#978821).
   - CVE-2016-4486: A kernel information leak in rtnetlink was fixed, where 4
     uninitialized bytes could leak to userspace (bsc#978822).
   - CVE-2016-4557: A use-after-free via double-fdput in
     replace_map_fd_with_map_ptr() was fixed, which could allow privilege
     escalation (bsc#979018).
   - CVE-2016-4565: When the "rdma_ucm" infiniband module is loaded, local
     attackers could escalate their privileges (bsc#979548).
   - CVE-2016-4569: A kernel information leak in the ALSA timer via events
     via snd_timer_user_tinterrupt that could leak information to userspace
     was fixed (bsc#979213).
   - CVE-2016-4578: A kernel information leak in the ALSA timer via events
     that could leak information to userspace was fixed (bsc#979879).
   - CVE-2016-4581: If the first propogated mount copy was being a slave it
     could oops the kernel (bsc#979913)

   The following non-security bugs were fixed:
   - ALSA: hda - Add dock support for ThinkPad X260 (boo#979278).
   - ALSA: hda - Apply fix for white noise on Asus N550JV, too (boo#979278).
   - ALSA: hda - Asus N750JV external subwoofer fixup (boo#979278).
   - ALSA: hda - Fix broken reconfig (boo#979278).
   - ALSA: hda - Fix headphone mic input on a few Dell ALC293 machines
     (boo#979278).
   - ALSA: hda - Fix subwoofer pin on ASUS N751 and N551 (boo#979278).
   - ALSA: hda - Fix white noise on Asus N750JV headphone (boo#979278).
   - ALSA: hda - Fix white noise on Asus UX501VW headset (boo#979278).
   - ALSA: hda/realtek - Add ALC3234 headset mode for Optiplex 9020m
     (boo#979278).
   - ALSA: hda/realtek - New codecs support for ALC234/ALC274/ALC294
     (boo#979278).
   - ALSA: hda/realtek - New codec support of ALC225 (boo#979278).
   - ALSA: hda/realtek - Support headset mode for ALC225 (boo#979278).
   - ALSA: pcxhr: Fix missing mutex unlock (boo#979278).
   - ALSA: usb-audio: Quirk for yet another Phoenix Audio devices (v2)
     (boo#979278).
   - bluetooth: fix power_on vs close race (bsc#966849).
   - bluetooth: vhci: fix open_timeout vs. hdev race (bsc#971799,bsc#966849).
   - bluetooth: vhci: Fix race at creating hci device (bsc#971799,bsc#966849).
   - bluetooth: vhci: purge unhandled skbs (bsc#971799,bsc#966849).
   - btrfs: do not use src fd for printk (bsc#980348).
   - btrfs: fix crash/invalid memory access on fsync when using overlayfs
     (bsc#977198)
   - drm: qxl: Workaround for buggy user-space (bsc#981344).
   - enic: set netdev->vlan_features (bsc#966245).
   - fs: add file_dentry() (bsc#977198).
   - IB/IPoIB: Do not set skb truesize since using one linearskb (bsc#980657).
   - input: i8042 - lower log level for "no controller" message (bsc#945345).
   - kabi: Add kabi/severities entries to ignore sound/hda/*, x509_*,
     efivar_validate, file_open_root and dax_fault
   - kabi: Add some fixups (module, pci_dev, drm, fuse and thermal)
   - kabi: file_dentry changes (bsc#977198).
   - kABI fixes for 4.1.22
   - mm/page_alloc.c: calculate 'available' memory in a separate function
     (bsc#982239).
   - net: disable fragment reassembly if high_thresh is zero (bsc#970506).
   - of: iommu: Silence misleading warning.
   - pstore_register() error handling was wrong -- it tried to release lock
     before it's acquired, causing spinlock / preemption imbalance.  - usb:
     quirk to stop runtime PM for Intel 7260 (bnc#984460).
   - Revert "usb: hub: do not clear BOS field during reset device"
     (boo#979728).
   - usb: core: hub: hub_port_init lock controller instead of bus
     (bnc#978073).
   - usb: preserve kABI in address0 locking (bnc#978073).
   - usb: usbip: fix potential out-of-bounds write (bnc#975945).
   - USB: xhci: Add broken streams quirk for Frescologic device id 1009
     (bnc#982712).
   - virtio_balloon: do not change memory amount visible via /proc/meminfo
     (bsc#982238).
   - virtio_balloon: export 'available' memory to balloon statistics
     (bsc#982239).


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE Leap 42.1:

      zypper in -t patch openSUSE-2016-753=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE Leap 42.1 (i686 x86_64):

      kernel-debug-4.1.26-21.1
      kernel-debug-base-4.1.26-21.1
      kernel-debug-base-debuginfo-4.1.26-21.1
      kernel-debug-debuginfo-4.1.26-21.1
      kernel-debug-debugsource-4.1.26-21.1
      kernel-debug-devel-4.1.26-21.1
      kernel-debug-devel-debuginfo-4.1.26-21.1
      kernel-ec2-4.1.26-21.1
      kernel-ec2-base-4.1.26-21.1
      kernel-ec2-base-debuginfo-4.1.26-21.1
      kernel-ec2-debuginfo-4.1.26-21.1
      kernel-ec2-debugsource-4.1.26-21.1
      kernel-ec2-devel-4.1.26-21.1
      kernel-pv-4.1.26-21.1
      kernel-pv-base-4.1.26-21.1
      kernel-pv-base-debuginfo-4.1.26-21.1
      kernel-pv-debuginfo-4.1.26-21.1
      kernel-pv-debugsource-4.1.26-21.1
      kernel-pv-devel-4.1.26-21.1
      kernel-vanilla-4.1.26-21.1
      kernel-vanilla-debuginfo-4.1.26-21.1
      kernel-vanilla-debugsource-4.1.26-21.1
      kernel-vanilla-devel-4.1.26-21.1
      kernel-xen-4.1.26-21.1
      kernel-xen-base-4.1.26-21.1
      kernel-xen-base-debuginfo-4.1.26-21.1
      kernel-xen-debuginfo-4.1.26-21.1
      kernel-xen-debugsource-4.1.26-21.1
      kernel-xen-devel-4.1.26-21.1

   - openSUSE Leap 42.1 (i586 x86_64):

      kernel-default-4.1.26-21.1
      kernel-default-base-4.1.26-21.1
      kernel-default-base-debuginfo-4.1.26-21.1
      kernel-default-debuginfo-4.1.26-21.1
      kernel-default-debugsource-4.1.26-21.1
      kernel-default-devel-4.1.26-21.1
      kernel-obs-build-4.1.26-21.1
      kernel-obs-build-debugsource-4.1.26-21.1
      kernel-obs-qa-4.1.26-21.1
      kernel-obs-qa-xen-4.1.26-21.1
      kernel-syms-4.1.26-21.1

   - openSUSE Leap 42.1 (noarch):

      kernel-devel-4.1.26-21.1
      kernel-docs-4.1.26-21.2
      kernel-docs-html-4.1.26-21.2
      kernel-docs-pdf-4.1.26-21.2
      kernel-macros-4.1.26-21.1
      kernel-source-4.1.26-21.1
      kernel-source-vanilla-4.1.26-21.1

   - openSUSE Leap 42.1 (i686):

      kernel-pae-4.1.26-21.1
      kernel-pae-base-4.1.26-21.1
      kernel-pae-base-debuginfo-4.1.26-21.1
      kernel-pae-debuginfo-4.1.26-21.1
      kernel-pae-debugsource-4.1.26-21.1
      kernel-pae-devel-4.1.26-21.1


References:

   https://www.suse.com/security/cve/CVE-2013-7446.html
   https://www.suse.com/security/cve/CVE-2016-0758.html
   https://www.suse.com/security/cve/CVE-2016-1583.html
   https://www.suse.com/security/cve/CVE-2016-2053.html
   https://www.suse.com/security/cve/CVE-2016-3134.html
   https://www.suse.com/security/cve/CVE-2016-3672.html
   https://www.suse.com/security/cve/CVE-2016-3955.html
   https://www.suse.com/security/cve/CVE-2016-4482.html
   https://www.suse.com/security/cve/CVE-2016-4485.html
   https://www.suse.com/security/cve/CVE-2016-4486.html
   https://www.suse.com/security/cve/CVE-2016-4557.html
   https://www.suse.com/security/cve/CVE-2016-4565.html
   https://www.suse.com/security/cve/CVE-2016-4569.html
   https://www.suse.com/security/cve/CVE-2016-4578.html
   https://www.suse.com/security/cve/CVE-2016-4580.html
   https://www.suse.com/security/cve/CVE-2016-4581.html
   https://www.suse.com/security/cve/CVE-2016-4805.html
   https://www.suse.com/security/cve/CVE-2016-4951.html
   https://www.suse.com/security/cve/CVE-2016-5244.html
   https://bugzilla.suse.com/945345
   https://bugzilla.suse.com/955654
   https://bugzilla.suse.com/963762
   https://bugzilla.suse.com/966245
   https://bugzilla.suse.com/966849
   https://bugzilla.suse.com/970506
   https://bugzilla.suse.com/971126
   https://bugzilla.suse.com/971799
   https://bugzilla.suse.com/973570
   https://bugzilla.suse.com/974308
   https://bugzilla.suse.com/975945
   https://bugzilla.suse.com/977198
   https://bugzilla.suse.com/978073
   https://bugzilla.suse.com/978401
   https://bugzilla.suse.com/978821
   https://bugzilla.suse.com/978822
   https://bugzilla.suse.com/979018
   https://bugzilla.suse.com/979213
   https://bugzilla.suse.com/979278
   https://bugzilla.suse.com/979548
   https://bugzilla.suse.com/979728
   https://bugzilla.suse.com/979867
   https://bugzilla.suse.com/979879
   https://bugzilla.suse.com/979913
   https://bugzilla.suse.com/980348
   https://bugzilla.suse.com/980371
   https://bugzilla.suse.com/980657
   https://bugzilla.suse.com/981058
   https://bugzilla.suse.com/981267
   https://bugzilla.suse.com/981344
   https://bugzilla.suse.com/982238
   https://bugzilla.suse.com/982239
   https://bugzilla.suse.com/982712
   https://bugzilla.suse.com/983143
   https://bugzilla.suse.com/983213
   https://bugzilla.suse.com/984460

openSUSE: 2016:1641-1: important: the Linux Kernel

June 21, 2016
An update that solves 19 vulnerabilities and has 17 fixes An update that solves 19 vulnerabilities and has 17 fixes An update that solves 19 vulnerabilities and has 17 fixes is now...

Description

The openSUSE Leap 42.1 kernel was updated to 4.1.26 to receive various security and bugfixes. The following security bugs were fixed: - CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143). - CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface. (bsc#979548) - CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions. (bsc#980371). - CVE-2016-4951: The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel did not verify socket existence, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation. (bsc#981058). - CVE-2016-5244: An information leak vulnerability in function rds_inc_info_copy of file net/rds/recv.c was fixed that might have leaked kernel stack data. (bsc#983213). - CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request. (bsc#981267). - CVE-2016-0758: Tags with indefinite length could have corrupted pointers in asn1_find_indefinite_length (bsc#979867). - CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762). - CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bnc#955654). - CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126). - CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel did not properly randomize the legacy base address, which made it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits (bnc#974308). - CVE-2016-4482: A kernel information leak in the usbfs devio connectinfo was fixed, which could expose kernel stack memory to userspace. (bnc#978401). - CVE-2016-4485: A kernel information leak in llc was fixed (bsc#978821). - CVE-2016-4486: A kernel information leak in rtnetlink was fixed, where 4 uninitialized bytes could leak to userspace (bsc#978822). - CVE-2016-4557: A use-after-free via double-fdput in replace_map_fd_with_map_ptr() was fixed, which could allow privilege escalation (bsc#979018). - CVE-2016-4565: When the "rdma_ucm" infiniband module is loaded, local attackers could escalate their privileges (bsc#979548). - CVE-2016-4569: A kernel information leak in the ALSA timer via events via snd_timer_user_tinterrupt that could leak information to userspace was fixed (bsc#979213). - CVE-2016-4578: A kernel information leak in the ALSA timer via events that could leak information to userspace was fixed (bsc#979879). - CVE-2016-4581: If the first propogated mount copy was being a slave it could oops the kernel (bsc#979913) The following non-security bugs were fixed: - ALSA: hda - Add dock support for ThinkPad X260 (boo#979278). - ALSA: hda - Apply fix for white noise on Asus N550JV, too (boo#979278). - ALSA: hda - Asus N750JV external subwoofer fixup (boo#979278). - ALSA: hda - Fix broken reconfig (boo#979278). - ALSA: hda - Fix headphone mic input on a few Dell ALC293 machines (boo#979278). - ALSA: hda - Fix subwoofer pin on ASUS N751 and N551 (boo#979278). - ALSA: hda - Fix white noise on Asus N750JV headphone (boo#979278). - ALSA: hda - Fix white noise on Asus UX501VW headset (boo#979278). - ALSA: hda/realtek - Add ALC3234 headset mode for Optiplex 9020m (boo#979278). - ALSA: hda/realtek - New codecs support for ALC234/ALC274/ALC294 (boo#979278). - ALSA: hda/realtek - New codec support of ALC225 (boo#979278). - ALSA: hda/realtek - Support headset mode for ALC225 (boo#979278). - ALSA: pcxhr: Fix missing mutex unlock (boo#979278). - ALSA: usb-audio: Quirk for yet another Phoenix Audio devices (v2) (boo#979278). - bluetooth: fix power_on vs close race (bsc#966849). - bluetooth: vhci: fix open_timeout vs. hdev race (bsc#971799,bsc#966849). - bluetooth: vhci: Fix race at creating hci device (bsc#971799,bsc#966849). - bluetooth: vhci: purge unhandled skbs (bsc#971799,bsc#966849). - btrfs: do not use src fd for printk (bsc#980348). - btrfs: fix crash/invalid memory access on fsync when using overlayfs (bsc#977198) - drm: qxl: Workaround for buggy user-space (bsc#981344). - enic: set netdev->vlan_features (bsc#966245). - fs: add file_dentry() (bsc#977198). - IB/IPoIB: Do not set skb truesize since using one linearskb (bsc#980657). - input: i8042 - lower log level for "no controller" message (bsc#945345). - kabi: Add kabi/severities entries to ignore sound/hda/*, x509_*, efivar_validate, file_open_root and dax_fault - kabi: Add some fixups (module, pci_dev, drm, fuse and thermal) - kabi: file_dentry changes (bsc#977198). - kABI fixes for 4.1.22 - mm/page_alloc.c: calculate 'available' memory in a separate function (bsc#982239). - net: disable fragment reassembly if high_thresh is zero (bsc#970506). - of: iommu: Silence misleading warning. - pstore_register() error handling was wrong -- it tried to release lock before it's acquired, causing spinlock / preemption imbalance. - usb: quirk to stop runtime PM for Intel 7260 (bnc#984460). - Revert "usb: hub: do not clear BOS field during reset device" (boo#979728). - usb: core: hub: hub_port_init lock controller instead of bus (bnc#978073). - usb: preserve kABI in address0 locking (bnc#978073). - usb: usbip: fix potential out-of-bounds write (bnc#975945). - USB: xhci: Add broken streams quirk for Frescologic device id 1009 (bnc#982712). - virtio_balloon: do not change memory amount visible via /proc/meminfo (bsc#982238). - virtio_balloon: export 'available' memory to balloon statistics (bsc#982239).

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2016-753=1 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE Leap 42.1 (i686 x86_64): kernel-debug-4.1.26-21.1 kernel-debug-base-4.1.26-21.1 kernel-debug-base-debuginfo-4.1.26-21.1 kernel-debug-debuginfo-4.1.26-21.1 kernel-debug-debugsource-4.1.26-21.1 kernel-debug-devel-4.1.26-21.1 kernel-debug-devel-debuginfo-4.1.26-21.1 kernel-ec2-4.1.26-21.1 kernel-ec2-base-4.1.26-21.1 kernel-ec2-base-debuginfo-4.1.26-21.1 kernel-ec2-debuginfo-4.1.26-21.1 kernel-ec2-debugsource-4.1.26-21.1 kernel-ec2-devel-4.1.26-21.1 kernel-pv-4.1.26-21.1 kernel-pv-base-4.1.26-21.1 kernel-pv-base-debuginfo-4.1.26-21.1 kernel-pv-debuginfo-4.1.26-21.1 kernel-pv-debugsource-4.1.26-21.1 kernel-pv-devel-4.1.26-21.1 kernel-vanilla-4.1.26-21.1 kernel-vanilla-debuginfo-4.1.26-21.1 kernel-vanilla-debugsource-4.1.26-21.1 kernel-vanilla-devel-4.1.26-21.1 kernel-xen-4.1.26-21.1 kernel-xen-base-4.1.26-21.1 kernel-xen-base-debuginfo-4.1.26-21.1 kernel-xen-debuginfo-4.1.26-21.1 kernel-xen-debugsource-4.1.26-21.1 kernel-xen-devel-4.1.26-21.1 - openSUSE Leap 42.1 (i586 x86_64): kernel-default-4.1.26-21.1 kernel-default-base-4.1.26-21.1 kernel-default-base-debuginfo-4.1.26-21.1 kernel-default-debuginfo-4.1.26-21.1 kernel-default-debugsource-4.1.26-21.1 kernel-default-devel-4.1.26-21.1 kernel-obs-build-4.1.26-21.1 kernel-obs-build-debugsource-4.1.26-21.1 kernel-obs-qa-4.1.26-21.1 kernel-obs-qa-xen-4.1.26-21.1 kernel-syms-4.1.26-21.1 - openSUSE Leap 42.1 (noarch): kernel-devel-4.1.26-21.1 kernel-docs-4.1.26-21.2 kernel-docs-html-4.1.26-21.2 kernel-docs-pdf-4.1.26-21.2 kernel-macros-4.1.26-21.1 kernel-source-4.1.26-21.1 kernel-source-vanilla-4.1.26-21.1 - openSUSE Leap 42.1 (i686): kernel-pae-4.1.26-21.1 kernel-pae-base-4.1.26-21.1 kernel-pae-base-debuginfo-4.1.26-21.1 kernel-pae-debuginfo-4.1.26-21.1 kernel-pae-debugsource-4.1.26-21.1 kernel-pae-devel-4.1.26-21.1


References

https://www.suse.com/security/cve/CVE-2013-7446.html https://www.suse.com/security/cve/CVE-2016-0758.html https://www.suse.com/security/cve/CVE-2016-1583.html https://www.suse.com/security/cve/CVE-2016-2053.html https://www.suse.com/security/cve/CVE-2016-3134.html https://www.suse.com/security/cve/CVE-2016-3672.html https://www.suse.com/security/cve/CVE-2016-3955.html https://www.suse.com/security/cve/CVE-2016-4482.html https://www.suse.com/security/cve/CVE-2016-4485.html https://www.suse.com/security/cve/CVE-2016-4486.html https://www.suse.com/security/cve/CVE-2016-4557.html https://www.suse.com/security/cve/CVE-2016-4565.html https://www.suse.com/security/cve/CVE-2016-4569.html https://www.suse.com/security/cve/CVE-2016-4578.html https://www.suse.com/security/cve/CVE-2016-4580.html https://www.suse.com/security/cve/CVE-2016-4581.html https://www.suse.com/security/cve/CVE-2016-4805.html https://www.suse.com/security/cve/CVE-2016-4951.html https://www.suse.com/security/cve/CVE-2016-5244.html https://bugzilla.suse.com/945345 https://bugzilla.suse.com/955654 https://bugzilla.suse.com/963762 https://bugzilla.suse.com/966245 https://bugzilla.suse.com/966849 https://bugzilla.suse.com/970506 https://bugzilla.suse.com/971126 https://bugzilla.suse.com/971799 https://bugzilla.suse.com/973570 https://bugzilla.suse.com/974308 https://bugzilla.suse.com/975945 https://bugzilla.suse.com/977198 https://bugzilla.suse.com/978073 https://bugzilla.suse.com/978401 https://bugzilla.suse.com/978821 https://bugzilla.suse.com/978822 https://bugzilla.suse.com/979018 https://bugzilla.suse.com/979213 https://bugzilla.suse.com/979278 https://bugzilla.suse.com/979548 https://bugzilla.suse.com/979728 https://bugzilla.suse.com/979867 https://bugzilla.suse.com/979879 https://bugzilla.suse.com/979913 https://bugzilla.suse.com/980348 https://bugzilla.suse.com/980371 https://bugzilla.suse.com/980657 https://bugzilla.suse.com/981058 https://bugzilla.suse.com/981267 https://bugzilla.suse.com/981344 https://bugzilla.suse.com/982238 https://bugzilla.suse.com/982239 https://bugzilla.suse.com/982712 https://bugzilla.suse.com/983143 https://bugzilla.suse.com/983213 https://bugzilla.suse.com/984460


Severity
Announcement ID: openSUSE-SU-2016:1641-1
Rating: important
Affected Products: openSUSE Leap 42.1

Related News