openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2016:2144-1
Rating:             important
References:         #901754 #941113 #942702 #945219 #955654 #957052 
                    #957988 #959709 #960561 #961512 #963762 #963765 
                    #966245 #966437 #966693 #966849 #967972 #967973 
                    #967974 #967975 #968010 #968011 #968012 #968013 
                    #968018 #968670 #969354 #969355 #970114 #970275 
                    #970892 #970909 #970911 #970948 #970955 #970956 
                    #970958 #970970 #971124 #971125 #971126 #971360 
                    #971628 #971799 #971919 #971944 #972174 #973378 
                    #973570 #974308 #974418 #974646 #975945 #978401 
                    #978445 #978469 #978821 #978822 #979021 #979213 
                    #979548 #979867 #979879 #979913 #980348 #980363 
                    #980371 #980725 #981267 #982706 #983143 #983213 
                    #984464 #984755 #984764 #986362 #986365 #986377 
                    #986572 #986573 #986811 
Cross-References:   CVE-2012-6701 CVE-2013-7446 CVE-2014-9904
                    CVE-2015-3288 CVE-2015-6526 CVE-2015-7566
                    CVE-2015-8709 CVE-2015-8785 CVE-2015-8812
                    CVE-2015-8816 CVE-2015-8830 CVE-2016-0758
                    CVE-2016-1583 CVE-2016-2053 CVE-2016-2184
                    CVE-2016-2185 CVE-2016-2186 CVE-2016-2187
                    CVE-2016-2188 CVE-2016-2384 CVE-2016-2543
                    CVE-2016-2544 CVE-2016-2545 CVE-2016-2546
                    CVE-2016-2547 CVE-2016-2548 CVE-2016-2549
                    CVE-2016-2782 CVE-2016-2847 CVE-2016-3134
                    CVE-2016-3136 CVE-2016-3137 CVE-2016-3138
                    CVE-2016-3139 CVE-2016-3140 CVE-2016-3156
                    CVE-2016-3672 CVE-2016-3689 CVE-2016-3951
                    CVE-2016-4470 CVE-2016-4482 CVE-2016-4485
                    CVE-2016-4486 CVE-2016-4565 CVE-2016-4569
                    CVE-2016-4578 CVE-2016-4580 CVE-2016-4581
                    CVE-2016-4805 CVE-2016-4913 CVE-2016-4997
                    CVE-2016-5244 CVE-2016-5829
Affected Products:
                    openSUSE 13.2
______________________________________________________________________________

   An update that solves 53 vulnerabilities and has 28 fixes
   is now available.

Description:


   The openSUSE 13.2 kernel was updated to fix various bugs and security
   issues.

   The following security bugs were fixed:
   - CVE-2016-1583: Prevent the usage of mmap when the lower file system does
     not allow it. This could have lead to local privilege escalation when
     ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid
     (bsc#983143).
   - CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c
     in the Linux kernel mishandles NM (aka alternate name) entries
     containing \0 characters, which allowed local users to obtain sensitive
     information from kernel memory or possibly have unspecified other impact
     via a crafted isofs filesystem (bnc#980725).
   - CVE-2016-4580: The x25_negotiate_facilities function in
     net/x25/x25_facilities.c in the Linux kernel did not properly initialize
     a certain data structure, which allowed attackers to obtain sensitive
     information from kernel stack memory via an X.25 Call Request
     (bnc#981267).
   - CVE-2016-0758: Tags with indefinite length could have corrupted pointers     in asn1_find_indefinite_length (bsc#979867).
   - CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in
     the Linux kernel allowed attackers to cause a denial of service (panic)
     via an ASN.1 BER file that lacks a public key, leading to mishandling by
     the public_key_verify_signature function in
     crypto/asymmetric_keys/public_key.c (bnc#963762).
   - CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in
     the Linux kernel allowed physically proximate attackers to cause a
     denial of service (NULL pointer dereference and system crash) via a
     crafted endpoints value in a USB device descriptor (bnc#971919 971944).
   - CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c
     in the Linux kernel did not initialize a certain data structure, which
     allowed local users to obtain sensitive information from kernel stack
     memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401
     bsc#978445).
   - CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel
     incorrectly relies on the write system call, which allowed local users     to cause a denial of service (kernel memory write operation) or possibly
     have unspecified other impact via a uAPI interface (bnc#979548
     bsc#980363).
   - CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c
     in the Linux kernel did not properly randomize the legacy base address,
     which made it easier for local users to defeat the intended restrictions
     on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism
     for a setuid or setgid program, by disabling stack-consumption resource
     limits (bnc#974308).
   - CVE-2016-4581: fs/pnode.c in the Linux kernel did not properly traverse
     a mount propagation tree in a certain case involving a slave mount,
     which allowed local users to cause a denial of service (NULL pointer
     dereference and OOPS) via a crafted series of mount system calls
     (bnc#979913).
   - CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the
     Linux kernel did not initialize a certain data structure, which allowed
     attackers to obtain sensitive information from kernel stack memory by
     reading a message (bnc#978821).
   - CVE-2015-3288: A security flaw was found in the Linux kernel that there
     was a way to arbitrary change zero page memory. (bnc#979021).
   - CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize
     certain r1 data structures, which allowed local users to obtain
     sensitive information from kernel stack memory via crafted use of the
     ALSA timer interface, related to the (1) snd_timer_user_ccallback and
     (2) snd_timer_user_tinterrupt functions (bnc#979879).
   - CVE-2016-3134: The netfilter subsystem in the Linux kernel did not
     validate certain offset fields, which allowed local users to gain
     privileges or cause a denial of service (heap memory corruption) via an
     IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
   - CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c
     in the Linux kernel did not initialize a certain data structure, which
     allowed local users to obtain sensitive information from kernel stack
     memory by reading a Netlink message (bnc#978822).
   - CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the
     Linux kernel allowed local users to bypass intended AF_UNIX socket
     permissions or cause a denial of service (panic) via crafted epoll_ctl
     calls (bnc#955654).
   - CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c
     in the Linux kernel did not initialize a certain data structure, which
     allowed local users to obtain sensitive information from kernel stack
     memory via crafted use of the ALSA timer interface (bnc#979213).
   - CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of
     unread data in pipes, which allowed local users to cause a denial of
     service (memory consumption) by creating many pipes with non-default
     sizes (bnc#970948 974646).
   - CVE-2016-3136: The mct_u232_msr_to_state function in
     drivers/usb/serial/mct_u232.c in the Linux kernel allowed physically
     proximate attackers to cause a denial of service (NULL pointer
     dereference and system crash) via a crafted USB device without two
     interrupt-in endpoint descriptors (bnc#970955).
   - CVE-2016-2188: The iowarrior_probe function in
     drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically
     proximate attackers to cause a denial of service (NULL pointer
     dereference and system crash) via a crafted endpoints value in a USB
     device descriptor (bnc#970956).
   - CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in
     the Linux kernel allowed physically proximate attackers to cause a
     denial of service (NULL pointer dereference and system crash) via a USB
     device without both a control and a data endpoint descriptor
     (bnc#970911).
   - CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel
     allowed physically proximate attackers to cause a denial of service
     (NULL pointer dereference and system crash) via a USB device without
     both an interrupt-in and an interrupt-out endpoint descriptor, related
     to the cypress_generic_port_probe and cypress_open functions
     (bnc#970970).
   - CVE-2016-3951: Double free vulnerability in drivers/net/usb/cdc_ncm.c in
     the Linux kernel allowed physically proximate attackers to cause a
     denial of service (system crash) or possibly have unspecified other
     impact by inserting a USB device with an invalid USB descriptor
     (bnc#974418).
   - CVE-2016-3140: The digi_port_init function in
     drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed
     physically proximate attackers to cause a denial of service (NULL
     pointer dereference and system crash) via a crafted endpoints value in a
     USB device descriptor (bnc#970892).
   - CVE-2016-2186: The powermate_probe function in
     drivers/input/misc/powermate.c in the Linux kernel allowed physically
     proximate attackers to cause a denial of service (NULL pointer
     dereference and system crash) via a crafted endpoints value in a USB
     device descriptor (bnc#970958).
   - CVE-2016-2185: The ati_remote2_probe function in
     drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically
     proximate attackers to cause a denial of service (NULL pointer
     dereference and system crash) via a crafted endpoints value in a USB
     device descriptor (bnc#971124).
   - CVE-2016-3689: The ims_pcu_parse_cdc_data function in
     drivers/input/misc/ims-pcu.c in the Linux kernel allowed physically
     proximate attackers to cause a denial of service (system crash) via a
     USB device without both a master and a slave interface (bnc#971628).
   - CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandles
     destruction of device objects, which allowed guest OS users to cause a
     denial of service (host OS networking outage) by arranging for a large
     number of IP addresses (bnc#971360).
   - CVE-2016-2184: The create_fixed_stream_quirk function in
     sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel
     allowed physically proximate attackers to cause a denial of service
     (NULL pointer dereference or double free, and system crash) via a
     crafted endpoints value in a USB device descriptor (bnc#971125).
   - CVE-2016-3139: The wacom_probe function in
     drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically
     proximate attackers to cause a denial of service (NULL pointer
     dereference and system crash) via a crafted endpoints value in a USB
     device descriptor (bnc#970909).
   - CVE-2015-8830: Integer overflow in the aio_setup_single_vector function
     in fs/aio.c in the Linux kernel 4.0 allowed local users to cause a
     denial of service or possibly have unspecified other impact via a large
     AIO iovec.  NOTE: this vulnerability exists because of a CVE-2012-6701
     regression (bnc#969354 bsc#969355).
   - CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in
     the Linux kernel allowed physically proximate attackers to cause a
     denial of service (NULL pointer dereference and system crash) or
     possibly have unspecified other impact by inserting a USB device that
     lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670).
   - CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in
     the Linux kernel did not properly maintain a hub-interface data
     structure, which allowed physically proximate attackers to cause a
     denial of service (invalid memory access and system crash) or possibly
     have unspecified other impact by unplugging a USB hub device
     (bnc#968010).
   - CVE-2015-7566: The clie_5_attach function in drivers/usb/serial/visor.c
     in the Linux kernel allowed physically proximate attackers to cause a
     denial of service (NULL pointer dereference and system crash) or
     possibly have unspecified other impact by inserting a USB device that
     lacks a bulk-out endpoint (bnc#961512).
   - CVE-2016-2549: sound/core/hrtimer.c in the Linux kernel did not prevent
     recursive callback access, which allowed local users to cause a denial
     of service (deadlock) via a crafted ioctl call (bnc#968013).
   - CVE-2016-2547: sound/core/timer.c in the Linux kernel employs a locking
     approach that did not consider slave timer instances, which allowed
     local users to cause a denial of service (race condition,
     use-after-free, and system crash) via a crafted ioctl call (bnc#968011).
   - CVE-2016-2548: sound/core/timer.c in the Linux kernel retains certain
     linked lists after a close or stop action, which allowed local users to
     cause a denial of service (system crash) via a crafted ioctl call,
     related to the (1) snd_timer_close and (2) _snd_timer_stop functions
     (bnc#968012).
   - CVE-2016-2546: sound/core/timer.c in the Linux kernel uses an incorrect
     type of mutex, which allowed local users to cause a denial of service
     (race condition, use-after-free, and system crash) via a crafted ioctl
     call (bnc#967975).
   - CVE-2016-2545: The snd_timer_interrupt function in sound/core/timer.c in
     the Linux kernel did not properly maintain a certain linked list, which
     allowed local users to cause a denial of service (race condition and
     system crash) via a crafted ioctl call (bnc#967974).
   - CVE-2016-2544: Race condition in the queue_delete function in
     sound/core/seq/seq_queue.c in the Linux kernel allowed local users to
     cause a denial of service (use-after-free and system crash) by making an
     ioctl call at a certain time (bnc#967973).
   - CVE-2016-2543: The snd_seq_ioctl_remove_events function in
     sound/core/seq/seq_clientmgr.c in the Linux kernel did not verify FIFO
     assignment before proceeding with FIFO clearing, which allowed local
     users to cause a denial of service (NULL pointer dereference and OOPS)
     via a crafted ioctl call (bnc#967972).
   - CVE-2015-8709: ** DISPUTED ** kernel/ptrace.c in the Linux kernel
     mishandles uid and gid mappings, which allowed local users to gain
     privileges by establishing a user namespace, waiting for a root process
     to enter that namespace with an unsafe uid or gid, and then using the
     ptrace system call.  NOTE: the vendor states "there is no kernel bug
     here (bnc#959709 960561 ).
   - CVE-2015-8812: drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel
     did not properly identify error conditions, which allowed remote
     attackers to execute arbitrary code or cause a denial of service
     (use-after-free) via crafted packets (bnc#966437).
   - CVE-2016-2384: Double free vulnerability in the snd_usbmidi_create
     function in sound/usb/midi.c in the Linux kernel allowed physically
     proximate attackers to cause a denial of service (panic) or possibly
     have unspecified other impact via vectors involving an invalid USB
     descriptor (bnc#966693).
   - CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in
     the Linux kernel allowed local users to cause a denial of service
     (infinite loop) via a writev system call that triggers a zero length for
     the first segment of an iov (bnc#963765).
   - CVE-2014-9904: The snd_compress_check_input function in
     sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel
     did not properly check for an integer overflow, which allowed local
     users to cause a denial of service (insufficient memory allocation) or
     possibly have unspecified other impact via a crafted
     SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).
   - CVE-2016-5829: Multiple heap-based buffer overflows in the
     hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux
     kernel allow local users to cause a denial of service or possibly have
     unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2)
     HIDIOCSUSAGES ioctl call (bnc#986572 986573).
   - CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation
     in the netfilter subsystem in the Linux kernel allowed local users to
     gain privileges or cause a denial of service (memory corruption) by
     leveraging in-container root access to provide a crafted offset value
     that triggers an unintended decrement (bnc#986362 986365 986377).
   - CVE-2016-4805: Use-after-free vulnerability in
     drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to
     cause a denial of service (memory corruption and system crash, or
     spinlock) or possibly have unspecified other impact by removing a
     network namespace, related to the ppp_register_net_channel and
     ppp_unregister_channel functions (bnc#980371).
   - CVE-2016-4470: The key_reject_and_link function in security/keys/key.c
     in the Linux kernel did not ensure that a certain data structure is
     initialized, which allowed local users to cause a denial of service
     (system crash) via vectors involving a crafted keyctl request2 command
     (bnc#984755 984764).
   - CVE-2015-6526: The perf_callchain_user_64 function in
     arch/powerpc/perf/callchain.c in the Linux kernel on ppc64 platforms
     allowed local users to cause a denial of service (infinite loop) via a
     deep 64-bit userspace backtrace (bnc#942702).
   - CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the
     Linux kernel did not initialize a certain structure member, which
     allowed remote attackers to obtain sensitive information from kernel
     stack memory by reading an RDS message (bnc#983213).

   The following non-security bugs were fixed:
   - ALSA: hrtimer: Handle start/stop more properly (bsc#973378).
   - ALSA: pcm: Fix potential deadlock in OSS emulation (bsc#968018).
   - ALSA: rawmidi: Fix race at copying & updating the position (bsc#968018).
   - ALSA: rawmidi: Make snd_rawmidi_transmit() race-free (bsc#968018).
   - ALSA: seq: Fix double port list deletion (bsc#968018).
   - ALSA: seq: Fix incorrect sanity check at snd_seq_oss_synth_cleanup()
     (bsc#968018).
   - ALSA: seq: Fix leak of pool buffer at concurrent writes (bsc#968018).
   - ALSA: seq: Fix lockdep warnings due to double mutex locks (bsc#968018).
   - ALSA: seq: Fix race at closing in virmidi driver (bsc#968018).
   - ALSA: seq: Fix yet another races among ALSA timer accesses (bsc#968018).
   - ALSA: timer: Call notifier in the same spinlock (bsc#973378).
   - ALSA: timer: Code cleanup (bsc#968018).
   - ALSA: timer: Fix leftover link at closing (bsc#968018).
   - ALSA: timer: Fix link corruption due to double start or stop
     (bsc#968018).
   - ALSA: timer: Fix race between stop and interrupt (bsc#968018).
   - ALSA: timer: Fix wrong instance passed to slave callbacks (bsc#968018).
   - ALSA: timer: Protect the whole snd_timer_close() with open race
     (bsc#973378).
   - ALSA: timer: Sync timer deletion at closing the system timer
     (bsc#973378).
   - ALSA: timer: Use mod_timer() for rearming the system timer (bsc#973378).
   - Bluetooth: vhci: Fix race at creating hci device (bsc#971799,bsc#966849).
   - Bluetooth: vhci: fix open_timeout vs. hdev race (bsc#971799,bsc#966849).
   - Bluetooth: vhci: purge unhandled skbs (bsc#971799,bsc#966849).
   - Btrfs: do not use src fd for printk (bsc#980348).
   - Refresh patches.drivers/ALSA-hrtimer-Handle-start-stop-more-properly.
     Fix the build error on 32bit architectures.
   - Refresh patches.xen/xen-netback-coalesce: Restore copying of SKBs with
     head exceeding page size (bsc#978469).
   - Refresh patches.xen/xen3-patch-3.14: Suppress atomic file position
     updates on /proc/xen/xenbus (bsc#970275).
   - Subject:  [PATCH] USB: xhci: Add broken streams quirk for Frescologic
     device id 1009 (bnc#982706).
   - USB: usbip: fix potential out-of-bounds write (bnc#975945).
   - af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570).
   - backends: guarantee one time reads of shared ring contents (bsc#957988).
   - btrfs: do not go readonly on existing qgroup items (bsc#957052).
   - btrfs: remove error message from search ioctl for nonexistent tree.
   - drm/i915: Fix missing backlight update during panel disablement
     (bsc#941113 boo#901754).
   - enic: set netdev->vlan_features (bsc#966245).
   - ext4: fix races between buffered IO and collapse / insert range
     (bsc#972174).
   - ext4: fix races between page faults and hole punching (bsc#972174).
   - ext4: fix races of writeback with punch hole and zero range (bsc#972174).
   - ext4: move unlocked dio protection from ext4_alloc_file_blocks()
     (bsc#972174).
   - ipv4/fib: do not warn when primary address is missing if in_dev is dead
     (bsc#971360).
   - ipvs: count pre-established TCP states as active (bsc#970114).
   - net: core: Correct an over-stringent device loop detection (bsc#945219).
   - netback: do not use last request to determine minimum Tx credit
     (bsc#957988).
   - pciback: Check PF instead of VF for PCI_COMMAND_MEMORY.
   - pciback: Save the number of MSI-X entries to be copied later.
   - pciback: guarantee one time reads of shared ring contents (bsc#957988).
   - series.conf: move cxgb3 patch to network drivers section
   - usb: quirk to stop runtime PM for Intel 7260 (bnc#984464).
   - x86: standardize mmap_rnd() usage (bnc#974308).


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE 13.2:

      zypper in -t patch openSUSE-2016-1015=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE 13.2 (i586 x86_64):

      bbswitch-0.8-3.20.3
      bbswitch-debugsource-0.8-3.20.3
      bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3
      bbswitch-kmp-default-debuginfo-0.8_k3.16.7_42-3.20.3
      bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3
      bbswitch-kmp-desktop-debuginfo-0.8_k3.16.7_42-3.20.3
      bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3
      bbswitch-kmp-xen-debuginfo-0.8_k3.16.7_42-3.20.3
      cloop-2.639-14.20.3
      cloop-debuginfo-2.639-14.20.3
      cloop-debugsource-2.639-14.20.3
      cloop-kmp-default-2.639_k3.16.7_42-14.20.3
      cloop-kmp-default-debuginfo-2.639_k3.16.7_42-14.20.3
      cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3
      cloop-kmp-desktop-debuginfo-2.639_k3.16.7_42-14.20.3
      cloop-kmp-xen-2.639_k3.16.7_42-14.20.3
      cloop-kmp-xen-debuginfo-2.639_k3.16.7_42-14.20.3
      crash-7.0.8-20.3
      crash-debuginfo-7.0.8-20.3
      crash-debugsource-7.0.8-20.3
      crash-devel-7.0.8-20.3
      crash-doc-7.0.8-20.3
      crash-eppic-7.0.8-20.3
      crash-eppic-debuginfo-7.0.8-20.3
      crash-gcore-7.0.8-20.3
      crash-gcore-debuginfo-7.0.8-20.3
      crash-kmp-default-7.0.8_k3.16.7_42-20.3
      crash-kmp-default-debuginfo-7.0.8_k3.16.7_42-20.3
      crash-kmp-desktop-7.0.8_k3.16.7_42-20.3
      crash-kmp-desktop-debuginfo-7.0.8_k3.16.7_42-20.3
      crash-kmp-xen-7.0.8_k3.16.7_42-20.3
      crash-kmp-xen-debuginfo-7.0.8_k3.16.7_42-20.3
      hdjmod-debugsource-1.28-18.21.3
      hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3
      hdjmod-kmp-default-debuginfo-1.28_k3.16.7_42-18.21.3
      hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3
      hdjmod-kmp-desktop-debuginfo-1.28_k3.16.7_42-18.21.3
      hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3
      hdjmod-kmp-xen-debuginfo-1.28_k3.16.7_42-18.21.3
      ipset-6.23-20.3
      ipset-debuginfo-6.23-20.3
      ipset-debugsource-6.23-20.3
      ipset-devel-6.23-20.3
      ipset-kmp-default-6.23_k3.16.7_42-20.3
      ipset-kmp-default-debuginfo-6.23_k3.16.7_42-20.3
      ipset-kmp-desktop-6.23_k3.16.7_42-20.3
      ipset-kmp-desktop-debuginfo-6.23_k3.16.7_42-20.3
      ipset-kmp-xen-6.23_k3.16.7_42-20.3
      ipset-kmp-xen-debuginfo-6.23_k3.16.7_42-20.3
      kernel-default-3.16.7-42.1
      kernel-default-base-3.16.7-42.1
      kernel-default-base-debuginfo-3.16.7-42.1
      kernel-default-debuginfo-3.16.7-42.1
      kernel-default-debugsource-3.16.7-42.1
      kernel-default-devel-3.16.7-42.1
      kernel-ec2-3.16.7-42.1
      kernel-ec2-base-3.16.7-42.1
      kernel-ec2-devel-3.16.7-42.1
      kernel-obs-build-3.16.7-42.2
      kernel-obs-build-debugsource-3.16.7-42.2
      kernel-obs-qa-3.16.7-42.1
      kernel-obs-qa-xen-3.16.7-42.1
      kernel-syms-3.16.7-42.1
      libipset3-6.23-20.3
      libipset3-debuginfo-6.23-20.3
      pcfclock-0.44-260.20.2
      pcfclock-debuginfo-0.44-260.20.2
      pcfclock-debugsource-0.44-260.20.2
      pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2
      pcfclock-kmp-default-debuginfo-0.44_k3.16.7_42-260.20.2
      pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2
      pcfclock-kmp-desktop-debuginfo-0.44_k3.16.7_42-260.20.2
      python-virtualbox-5.0.20-48.5
      python-virtualbox-debuginfo-5.0.20-48.5
      vhba-kmp-debugsource-20140629-2.20.2
      vhba-kmp-default-20140629_k3.16.7_42-2.20.2
      vhba-kmp-default-debuginfo-20140629_k3.16.7_42-2.20.2
      vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2
      vhba-kmp-desktop-debuginfo-20140629_k3.16.7_42-2.20.2
      vhba-kmp-xen-20140629_k3.16.7_42-2.20.2
      vhba-kmp-xen-debuginfo-20140629_k3.16.7_42-2.20.2
      virtualbox-5.0.20-48.5
      virtualbox-debuginfo-5.0.20-48.5
      virtualbox-debugsource-5.0.20-48.5
      virtualbox-devel-5.0.20-48.5
      virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5
      virtualbox-guest-kmp-default-debuginfo-5.0.20_k3.16.7_42-48.5
      virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5
      virtualbox-guest-kmp-desktop-debuginfo-5.0.20_k3.16.7_42-48.5
      virtualbox-guest-tools-5.0.20-48.5
      virtualbox-guest-tools-debuginfo-5.0.20-48.5
      virtualbox-guest-x11-5.0.20-48.5
      virtualbox-guest-x11-debuginfo-5.0.20-48.5
      virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5
      virtualbox-host-kmp-default-debuginfo-5.0.20_k3.16.7_42-48.5
      virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5
      virtualbox-host-kmp-desktop-debuginfo-5.0.20_k3.16.7_42-48.5
      virtualbox-qt-5.0.20-48.5
      virtualbox-qt-debuginfo-5.0.20-48.5
      virtualbox-websrv-5.0.20-48.5
      virtualbox-websrv-debuginfo-5.0.20-48.5
      xen-debugsource-4.4.4_02-46.2
      xen-devel-4.4.4_02-46.2
      xen-libs-4.4.4_02-46.2
      xen-libs-debuginfo-4.4.4_02-46.2
      xen-tools-domU-4.4.4_02-46.2
      xen-tools-domU-debuginfo-4.4.4_02-46.2
      xtables-addons-2.6-22.3
      xtables-addons-debuginfo-2.6-22.3
      xtables-addons-debugsource-2.6-22.3
      xtables-addons-kmp-default-2.6_k3.16.7_42-22.3
      xtables-addons-kmp-default-debuginfo-2.6_k3.16.7_42-22.3
      xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3
      xtables-addons-kmp-desktop-debuginfo-2.6_k3.16.7_42-22.3
      xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3
      xtables-addons-kmp-xen-debuginfo-2.6_k3.16.7_42-22.3

   - openSUSE 13.2 (i686 x86_64):

      kernel-debug-3.16.7-42.1
      kernel-debug-base-3.16.7-42.1
      kernel-debug-base-debuginfo-3.16.7-42.1
      kernel-debug-debuginfo-3.16.7-42.1
      kernel-debug-debugsource-3.16.7-42.1
      kernel-debug-devel-3.16.7-42.1
      kernel-debug-devel-debuginfo-3.16.7-42.1
      kernel-desktop-3.16.7-42.1
      kernel-desktop-base-3.16.7-42.1
      kernel-desktop-base-debuginfo-3.16.7-42.1
      kernel-desktop-debuginfo-3.16.7-42.1
      kernel-desktop-debugsource-3.16.7-42.1
      kernel-desktop-devel-3.16.7-42.1
      kernel-ec2-base-debuginfo-3.16.7-42.1
      kernel-ec2-debuginfo-3.16.7-42.1
      kernel-ec2-debugsource-3.16.7-42.1
      kernel-vanilla-3.16.7-42.1
      kernel-vanilla-debuginfo-3.16.7-42.1
      kernel-vanilla-debugsource-3.16.7-42.1
      kernel-vanilla-devel-3.16.7-42.1
      kernel-xen-3.16.7-42.1
      kernel-xen-base-3.16.7-42.1
      kernel-xen-base-debuginfo-3.16.7-42.1
      kernel-xen-debuginfo-3.16.7-42.1
      kernel-xen-debugsource-3.16.7-42.1
      kernel-xen-devel-3.16.7-42.1

   - openSUSE 13.2 (x86_64):

      xen-4.4.4_02-46.2
      xen-doc-html-4.4.4_02-46.2
      xen-kmp-default-4.4.4_02_k3.16.7_42-46.2
      xen-kmp-default-debuginfo-4.4.4_02_k3.16.7_42-46.2
      xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2
      xen-kmp-desktop-debuginfo-4.4.4_02_k3.16.7_42-46.2
      xen-libs-32bit-4.4.4_02-46.2
      xen-libs-debuginfo-32bit-4.4.4_02-46.2
      xen-tools-4.4.4_02-46.2
      xen-tools-debuginfo-4.4.4_02-46.2

   - openSUSE 13.2 (noarch):

      kernel-devel-3.16.7-42.1
      kernel-docs-3.16.7-42.2
      kernel-macros-3.16.7-42.1
      kernel-source-3.16.7-42.1
      kernel-source-vanilla-3.16.7-42.1
      virtualbox-guest-desktop-icons-5.0.20-48.5
      virtualbox-host-source-5.0.20-48.5

   - openSUSE 13.2 (i586):

      bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3
      bbswitch-kmp-pae-debuginfo-0.8_k3.16.7_42-3.20.3
      cloop-kmp-pae-2.639_k3.16.7_42-14.20.3
      cloop-kmp-pae-debuginfo-2.639_k3.16.7_42-14.20.3
      crash-kmp-pae-7.0.8_k3.16.7_42-20.3
      crash-kmp-pae-debuginfo-7.0.8_k3.16.7_42-20.3
      hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3
      hdjmod-kmp-pae-debuginfo-1.28_k3.16.7_42-18.21.3
      ipset-kmp-pae-6.23_k3.16.7_42-20.3
      ipset-kmp-pae-debuginfo-6.23_k3.16.7_42-20.3
      pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2
      pcfclock-kmp-pae-debuginfo-0.44_k3.16.7_42-260.20.2
      vhba-kmp-pae-20140629_k3.16.7_42-2.20.2
      vhba-kmp-pae-debuginfo-20140629_k3.16.7_42-2.20.2
      virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5
      virtualbox-guest-kmp-pae-debuginfo-5.0.20_k3.16.7_42-48.5
      virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5
      virtualbox-host-kmp-pae-debuginfo-5.0.20_k3.16.7_42-48.5
      xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3
      xtables-addons-kmp-pae-debuginfo-2.6_k3.16.7_42-22.3

   - openSUSE 13.2 (i686):

      kernel-pae-3.16.7-42.1
      kernel-pae-base-3.16.7-42.1
      kernel-pae-base-debuginfo-3.16.7-42.1
      kernel-pae-debuginfo-3.16.7-42.1
      kernel-pae-debugsource-3.16.7-42.1
      kernel-pae-devel-3.16.7-42.1


References:

   https://www.suse.com/security/cve/CVE-2012-6701.html
   https://www.suse.com/security/cve/CVE-2013-7446.html
   https://www.suse.com/security/cve/CVE-2014-9904.html
   https://www.suse.com/security/cve/CVE-2015-3288.html
   https://www.suse.com/security/cve/CVE-2015-6526.html
   https://www.suse.com/security/cve/CVE-2015-7566.html
   https://www.suse.com/security/cve/CVE-2015-8709.html
   https://www.suse.com/security/cve/CVE-2015-8785.html
   https://www.suse.com/security/cve/CVE-2015-8812.html
   https://www.suse.com/security/cve/CVE-2015-8816.html
   https://www.suse.com/security/cve/CVE-2015-8830.html
   https://www.suse.com/security/cve/CVE-2016-0758.html
   https://www.suse.com/security/cve/CVE-2016-1583.html
   https://www.suse.com/security/cve/CVE-2016-2053.html
   https://www.suse.com/security/cve/CVE-2016-2184.html
   https://www.suse.com/security/cve/CVE-2016-2185.html
   https://www.suse.com/security/cve/CVE-2016-2186.html
   https://www.suse.com/security/cve/CVE-2016-2187.html
   https://www.suse.com/security/cve/CVE-2016-2188.html
   https://www.suse.com/security/cve/CVE-2016-2384.html
   https://www.suse.com/security/cve/CVE-2016-2543.html
   https://www.suse.com/security/cve/CVE-2016-2544.html
   https://www.suse.com/security/cve/CVE-2016-2545.html
   https://www.suse.com/security/cve/CVE-2016-2546.html
   https://www.suse.com/security/cve/CVE-2016-2547.html
   https://www.suse.com/security/cve/CVE-2016-2548.html
   https://www.suse.com/security/cve/CVE-2016-2549.html
   https://www.suse.com/security/cve/CVE-2016-2782.html
   https://www.suse.com/security/cve/CVE-2016-2847.html
   https://www.suse.com/security/cve/CVE-2016-3134.html
   https://www.suse.com/security/cve/CVE-2016-3136.html
   https://www.suse.com/security/cve/CVE-2016-3137.html
   https://www.suse.com/security/cve/CVE-2016-3138.html
   https://www.suse.com/security/cve/CVE-2016-3139.html
   https://www.suse.com/security/cve/CVE-2016-3140.html
   https://www.suse.com/security/cve/CVE-2016-3156.html
   https://www.suse.com/security/cve/CVE-2016-3672.html
   https://www.suse.com/security/cve/CVE-2016-3689.html
   https://www.suse.com/security/cve/CVE-2016-3951.html
   https://www.suse.com/security/cve/CVE-2016-4470.html
   https://www.suse.com/security/cve/CVE-2016-4482.html
   https://www.suse.com/security/cve/CVE-2016-4485.html
   https://www.suse.com/security/cve/CVE-2016-4486.html
   https://www.suse.com/security/cve/CVE-2016-4565.html
   https://www.suse.com/security/cve/CVE-2016-4569.html
   https://www.suse.com/security/cve/CVE-2016-4578.html
   https://www.suse.com/security/cve/CVE-2016-4580.html
   https://www.suse.com/security/cve/CVE-2016-4581.html
   https://www.suse.com/security/cve/CVE-2016-4805.html
   https://www.suse.com/security/cve/CVE-2016-4913.html
   https://www.suse.com/security/cve/CVE-2016-4997.html
   https://www.suse.com/security/cve/CVE-2016-5244.html
   https://www.suse.com/security/cve/CVE-2016-5829.html
   https://bugzilla.suse.com/901754
   https://bugzilla.suse.com/941113
   https://bugzilla.suse.com/942702
   https://bugzilla.suse.com/945219
   https://bugzilla.suse.com/955654
   https://bugzilla.suse.com/957052
   https://bugzilla.suse.com/957988
   https://bugzilla.suse.com/959709
   https://bugzilla.suse.com/960561
   https://bugzilla.suse.com/961512
   https://bugzilla.suse.com/963762
   https://bugzilla.suse.com/963765
   https://bugzilla.suse.com/966245
   https://bugzilla.suse.com/966437
   https://bugzilla.suse.com/966693
   https://bugzilla.suse.com/966849
   https://bugzilla.suse.com/967972
   https://bugzilla.suse.com/967973
   https://bugzilla.suse.com/967974
   https://bugzilla.suse.com/967975
   https://bugzilla.suse.com/968010
   https://bugzilla.suse.com/968011
   https://bugzilla.suse.com/968012
   https://bugzilla.suse.com/968013
   https://bugzilla.suse.com/968018
   https://bugzilla.suse.com/968670
   https://bugzilla.suse.com/969354
   https://bugzilla.suse.com/969355
   https://bugzilla.suse.com/970114
   https://bugzilla.suse.com/970275
   https://bugzilla.suse.com/970892
   https://bugzilla.suse.com/970909
   https://bugzilla.suse.com/970911
   https://bugzilla.suse.com/970948
   https://bugzilla.suse.com/970955
   https://bugzilla.suse.com/970956
   https://bugzilla.suse.com/970958
   https://bugzilla.suse.com/970970
   https://bugzilla.suse.com/971124
   https://bugzilla.suse.com/971125
   https://bugzilla.suse.com/971126
   https://bugzilla.suse.com/971360
   https://bugzilla.suse.com/971628
   https://bugzilla.suse.com/971799
   https://bugzilla.suse.com/971919
   https://bugzilla.suse.com/971944
   https://bugzilla.suse.com/972174
   https://bugzilla.suse.com/973378
   https://bugzilla.suse.com/973570
   https://bugzilla.suse.com/974308
   https://bugzilla.suse.com/974418
   https://bugzilla.suse.com/974646
   https://bugzilla.suse.com/975945
   https://bugzilla.suse.com/978401
   https://bugzilla.suse.com/978445
   https://bugzilla.suse.com/978469
   https://bugzilla.suse.com/978821
   https://bugzilla.suse.com/978822
   https://bugzilla.suse.com/979021
   https://bugzilla.suse.com/979213
   https://bugzilla.suse.com/979548
   https://bugzilla.suse.com/979867
   https://bugzilla.suse.com/979879
   https://bugzilla.suse.com/979913
   https://bugzilla.suse.com/980348
   https://bugzilla.suse.com/980363
   https://bugzilla.suse.com/980371
   https://bugzilla.suse.com/980725
   https://bugzilla.suse.com/981267
   https://bugzilla.suse.com/982706
   https://bugzilla.suse.com/983143
   https://bugzilla.suse.com/983213
   https://bugzilla.suse.com/984464
   https://bugzilla.suse.com/984755
   https://bugzilla.suse.com/984764
   https://bugzilla.suse.com/986362
   https://bugzilla.suse.com/986365
   https://bugzilla.suse.com/986377
   https://bugzilla.suse.com/986572
   https://bugzilla.suse.com/986573
   https://bugzilla.suse.com/986811

-- 

openSUSE: 2016:2144-1: important: the Linux Kernel

August 24, 2016
An update that solves 53 vulnerabilities and has 28 fixes is now available.

Description

The openSUSE 13.2 kernel was updated to fix various bugs and security issues. The following security bugs were fixed: - CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143). - CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandles NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725). - CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267). - CVE-2016-0758: Tags with indefinite length could have corrupted pointers in asn1_find_indefinite_length (bsc#979867). - CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762). - CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971919 971944). - CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401 bsc#978445). - CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548 bsc#980363). - CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel did not properly randomize the legacy base address, which made it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits (bnc#974308). - CVE-2016-4581: fs/pnode.c in the Linux kernel did not properly traverse a mount propagation tree in a certain case involving a slave mount, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted series of mount system calls (bnc#979913). - CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821). - CVE-2015-3288: A security flaw was found in the Linux kernel that there was a way to arbitrary change zero page memory. (bnc#979021). - CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879). - CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126). - CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822). - CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bnc#955654). - CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213). - CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948 974646). - CVE-2016-3136: The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors (bnc#970955). - CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956). - CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911). - CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970). - CVE-2016-3951: Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor (bnc#974418). - CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892). - CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958). - CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124). - CVE-2016-3689: The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface (bnc#971628). - CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandles destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360). - CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125). - CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909). - CVE-2015-8830: Integer overflow in the aio_setup_single_vector function in fs/aio.c in the Linux kernel 4.0 allowed local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec. NOTE: this vulnerability exists because of a CVE-2012-6701 regression (bnc#969354 bsc#969355). - CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670). - CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010). - CVE-2015-7566: The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint (bnc#961512). - CVE-2016-2549: sound/core/hrtimer.c in the Linux kernel did not prevent recursive callback access, which allowed local users to cause a denial of service (deadlock) via a crafted ioctl call (bnc#968013). - CVE-2016-2547: sound/core/timer.c in the Linux kernel employs a locking approach that did not consider slave timer instances, which allowed local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call (bnc#968011). - CVE-2016-2548: sound/core/timer.c in the Linux kernel retains certain linked lists after a close or stop action, which allowed local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions (bnc#968012). - CVE-2016-2546: sound/core/timer.c in the Linux kernel uses an incorrect type of mutex, which allowed local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call (bnc#967975). - CVE-2016-2545: The snd_timer_interrupt function in sound/core/timer.c in the Linux kernel did not properly maintain a certain linked list, which allowed local users to cause a denial of service (race condition and system crash) via a crafted ioctl call (bnc#967974). - CVE-2016-2544: Race condition in the queue_delete function in sound/core/seq/seq_queue.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) by making an ioctl call at a certain time (bnc#967973). - CVE-2016-2543: The snd_seq_ioctl_remove_events function in sound/core/seq/seq_clientmgr.c in the Linux kernel did not verify FIFO assignment before proceeding with FIFO clearing, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ioctl call (bnc#967972). - CVE-2015-8709: ** DISPUTED ** kernel/ptrace.c in the Linux kernel mishandles uid and gid mappings, which allowed local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here (bnc#959709 960561 ). - CVE-2015-8812: drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel did not properly identify error conditions, which allowed remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets (bnc#966437). - CVE-2016-2384: Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor (bnc#966693). - CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel allowed local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov (bnc#963765). - CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811). - CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572 986573). - CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362 986365 986377). - CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371). - CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755 984764). - CVE-2015-6526: The perf_callchain_user_64 function in arch/powerpc/perf/callchain.c in the Linux kernel on ppc64 platforms allowed local users to cause a denial of service (infinite loop) via a deep 64-bit userspace backtrace (bnc#942702). - CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213). The following non-security bugs were fixed: - ALSA: hrtimer: Handle start/stop more properly (bsc#973378). - ALSA: pcm: Fix potential deadlock in OSS emulation (bsc#968018). - ALSA: rawmidi: Fix race at copying & updating the position (bsc#968018). - ALSA: rawmidi: Make snd_rawmidi_transmit() race-free (bsc#968018). - ALSA: seq: Fix double port list deletion (bsc#968018). - ALSA: seq: Fix incorrect sanity check at snd_seq_oss_synth_cleanup() (bsc#968018). - ALSA: seq: Fix leak of pool buffer at concurrent writes (bsc#968018). - ALSA: seq: Fix lockdep warnings due to double mutex locks (bsc#968018). - ALSA: seq: Fix race at closing in virmidi driver (bsc#968018). - ALSA: seq: Fix yet another races among ALSA timer accesses (bsc#968018). - ALSA: timer: Call notifier in the same spinlock (bsc#973378). - ALSA: timer: Code cleanup (bsc#968018). - ALSA: timer: Fix leftover link at closing (bsc#968018). - ALSA: timer: Fix link corruption due to double start or stop (bsc#968018). - ALSA: timer: Fix race between stop and interrupt (bsc#968018). - ALSA: timer: Fix wrong instance passed to slave callbacks (bsc#968018). - ALSA: timer: Protect the whole snd_timer_close() with open race (bsc#973378). - ALSA: timer: Sync timer deletion at closing the system timer (bsc#973378). - ALSA: timer: Use mod_timer() for rearming the system timer (bsc#973378). - Bluetooth: vhci: Fix race at creating hci device (bsc#971799,bsc#966849). - Bluetooth: vhci: fix open_timeout vs. hdev race (bsc#971799,bsc#966849). - Bluetooth: vhci: purge unhandled skbs (bsc#971799,bsc#966849). - Btrfs: do not use src fd for printk (bsc#980348). - Refresh patches.drivers/ALSA-hrtimer-Handle-start-stop-more-properly. Fix the build error on 32bit architectures. - Refresh patches.xen/xen-netback-coalesce: Restore copying of SKBs with head exceeding page size (bsc#978469). - Refresh patches.xen/xen3-patch-3.14: Suppress atomic file position updates on /proc/xen/xenbus (bsc#970275). - Subject: [PATCH] USB: xhci: Add broken streams quirk for Frescologic device id 1009 (bnc#982706). - USB: usbip: fix potential out-of-bounds write (bnc#975945). - af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570). - backends: guarantee one time reads of shared ring contents (bsc#957988). - btrfs: do not go readonly on existing qgroup items (bsc#957052). - btrfs: remove error message from search ioctl for nonexistent tree. - drm/i915: Fix missing backlight update during panel disablement (bsc#941113 boo#901754). - enic: set netdev->vlan_features (bsc#966245). - ext4: fix races between buffered IO and collapse / insert range (bsc#972174). - ext4: fix races between page faults and hole punching (bsc#972174). - ext4: fix races of writeback with punch hole and zero range (bsc#972174). - ext4: move unlocked dio protection from ext4_alloc_file_blocks() (bsc#972174). - ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360). - ipvs: count pre-established TCP states as active (bsc#970114). - net: core: Correct an over-stringent device loop detection (bsc#945219). - netback: do not use last request to determine minimum Tx credit (bsc#957988). - pciback: Check PF instead of VF for PCI_COMMAND_MEMORY. - pciback: Save the number of MSI-X entries to be copied later. - pciback: guarantee one time reads of shared ring contents (bsc#957988). - series.conf: move cxgb3 patch to network drivers section - usb: quirk to stop runtime PM for Intel 7260 (bnc#984464). - x86: standardize mmap_rnd() usage (bnc#974308).

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2016-1015=1 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE 13.2 (i586 x86_64): bbswitch-0.8-3.20.3 bbswitch-debugsource-0.8-3.20.3 bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 bbswitch-kmp-default-debuginfo-0.8_k3.16.7_42-3.20.3 bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 bbswitch-kmp-desktop-debuginfo-0.8_k3.16.7_42-3.20.3 bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 bbswitch-kmp-xen-debuginfo-0.8_k3.16.7_42-3.20.3 cloop-2.639-14.20.3 cloop-debuginfo-2.639-14.20.3 cloop-debugsource-2.639-14.20.3 cloop-kmp-default-2.639_k3.16.7_42-14.20.3 cloop-kmp-default-debuginfo-2.639_k3.16.7_42-14.20.3 cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 cloop-kmp-desktop-debuginfo-2.639_k3.16.7_42-14.20.3 cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 cloop-kmp-xen-debuginfo-2.639_k3.16.7_42-14.20.3 crash-7.0.8-20.3 crash-debuginfo-7.0.8-20.3 crash-debugsource-7.0.8-20.3 crash-devel-7.0.8-20.3 crash-doc-7.0.8-20.3 crash-eppic-7.0.8-20.3 crash-eppic-debuginfo-7.0.8-20.3 crash-gcore-7.0.8-20.3 crash-gcore-debuginfo-7.0.8-20.3 crash-kmp-default-7.0.8_k3.16.7_42-20.3 crash-kmp-default-debuginfo-7.0.8_k3.16.7_42-20.3 crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 crash-kmp-desktop-debuginfo-7.0.8_k3.16.7_42-20.3 crash-kmp-xen-7.0.8_k3.16.7_42-20.3 crash-kmp-xen-debuginfo-7.0.8_k3.16.7_42-20.3 hdjmod-debugsource-1.28-18.21.3 hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 hdjmod-kmp-default-debuginfo-1.28_k3.16.7_42-18.21.3 hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 hdjmod-kmp-desktop-debuginfo-1.28_k3.16.7_42-18.21.3 hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 hdjmod-kmp-xen-debuginfo-1.28_k3.16.7_42-18.21.3 ipset-6.23-20.3 ipset-debuginfo-6.23-20.3 ipset-debugsource-6.23-20.3 ipset-devel-6.23-20.3 ipset-kmp-default-6.23_k3.16.7_42-20.3 ipset-kmp-default-debuginfo-6.23_k3.16.7_42-20.3 ipset-kmp-desktop-6.23_k3.16.7_42-20.3 ipset-kmp-desktop-debuginfo-6.23_k3.16.7_42-20.3 ipset-kmp-xen-6.23_k3.16.7_42-20.3 ipset-kmp-xen-debuginfo-6.23_k3.16.7_42-20.3 kernel-default-3.16.7-42.1 kernel-default-base-3.16.7-42.1 kernel-default-base-debuginfo-3.16.7-42.1 kernel-default-debuginfo-3.16.7-42.1 kernel-default-debugsource-3.16.7-42.1 kernel-default-devel-3.16.7-42.1 kernel-ec2-3.16.7-42.1 kernel-ec2-base-3.16.7-42.1 kernel-ec2-devel-3.16.7-42.1 kernel-obs-build-3.16.7-42.2 kernel-obs-build-debugsource-3.16.7-42.2 kernel-obs-qa-3.16.7-42.1 kernel-obs-qa-xen-3.16.7-42.1 kernel-syms-3.16.7-42.1 libipset3-6.23-20.3 libipset3-debuginfo-6.23-20.3 pcfclock-0.44-260.20.2 pcfclock-debuginfo-0.44-260.20.2 pcfclock-debugsource-0.44-260.20.2 pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 pcfclock-kmp-default-debuginfo-0.44_k3.16.7_42-260.20.2 pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 pcfclock-kmp-desktop-debuginfo-0.44_k3.16.7_42-260.20.2 python-virtualbox-5.0.20-48.5 python-virtualbox-debuginfo-5.0.20-48.5 vhba-kmp-debugsource-20140629-2.20.2 vhba-kmp-default-20140629_k3.16.7_42-2.20.2 vhba-kmp-default-debuginfo-20140629_k3.16.7_42-2.20.2 vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 vhba-kmp-desktop-debuginfo-20140629_k3.16.7_42-2.20.2 vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 vhba-kmp-xen-debuginfo-20140629_k3.16.7_42-2.20.2 virtualbox-5.0.20-48.5 virtualbox-debuginfo-5.0.20-48.5 virtualbox-debugsource-5.0.20-48.5 virtualbox-devel-5.0.20-48.5 virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 virtualbox-guest-kmp-default-debuginfo-5.0.20_k3.16.7_42-48.5 virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 virtualbox-guest-kmp-desktop-debuginfo-5.0.20_k3.16.7_42-48.5 virtualbox-guest-tools-5.0.20-48.5 virtualbox-guest-tools-debuginfo-5.0.20-48.5 virtualbox-guest-x11-5.0.20-48.5 virtualbox-guest-x11-debuginfo-5.0.20-48.5 virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 virtualbox-host-kmp-default-debuginfo-5.0.20_k3.16.7_42-48.5 virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 virtualbox-host-kmp-desktop-debuginfo-5.0.20_k3.16.7_42-48.5 virtualbox-qt-5.0.20-48.5 virtualbox-qt-debuginfo-5.0.20-48.5 virtualbox-websrv-5.0.20-48.5 virtualbox-websrv-debuginfo-5.0.20-48.5 xen-debugsource-4.4.4_02-46.2 xen-devel-4.4.4_02-46.2 xen-libs-4.4.4_02-46.2 xen-libs-debuginfo-4.4.4_02-46.2 xen-tools-domU-4.4.4_02-46.2 xen-tools-domU-debuginfo-4.4.4_02-46.2 xtables-addons-2.6-22.3 xtables-addons-debuginfo-2.6-22.3 xtables-addons-debugsource-2.6-22.3 xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 xtables-addons-kmp-default-debuginfo-2.6_k3.16.7_42-22.3 xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 xtables-addons-kmp-desktop-debuginfo-2.6_k3.16.7_42-22.3 xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 xtables-addons-kmp-xen-debuginfo-2.6_k3.16.7_42-22.3 - openSUSE 13.2 (i686 x86_64): kernel-debug-3.16.7-42.1 kernel-debug-base-3.16.7-42.1 kernel-debug-base-debuginfo-3.16.7-42.1 kernel-debug-debuginfo-3.16.7-42.1 kernel-debug-debugsource-3.16.7-42.1 kernel-debug-devel-3.16.7-42.1 kernel-debug-devel-debuginfo-3.16.7-42.1 kernel-desktop-3.16.7-42.1 kernel-desktop-base-3.16.7-42.1 kernel-desktop-base-debuginfo-3.16.7-42.1 kernel-desktop-debuginfo-3.16.7-42.1 kernel-desktop-debugsource-3.16.7-42.1 kernel-desktop-devel-3.16.7-42.1 kernel-ec2-base-debuginfo-3.16.7-42.1 kernel-ec2-debuginfo-3.16.7-42.1 kernel-ec2-debugsource-3.16.7-42.1 kernel-vanilla-3.16.7-42.1 kernel-vanilla-debuginfo-3.16.7-42.1 kernel-vanilla-debugsource-3.16.7-42.1 kernel-vanilla-devel-3.16.7-42.1 kernel-xen-3.16.7-42.1 kernel-xen-base-3.16.7-42.1 kernel-xen-base-debuginfo-3.16.7-42.1 kernel-xen-debuginfo-3.16.7-42.1 kernel-xen-debugsource-3.16.7-42.1 kernel-xen-devel-3.16.7-42.1 - openSUSE 13.2 (x86_64): xen-4.4.4_02-46.2 xen-doc-html-4.4.4_02-46.2 xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 xen-kmp-default-debuginfo-4.4.4_02_k3.16.7_42-46.2 xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 xen-kmp-desktop-debuginfo-4.4.4_02_k3.16.7_42-46.2 xen-libs-32bit-4.4.4_02-46.2 xen-libs-debuginfo-32bit-4.4.4_02-46.2 xen-tools-4.4.4_02-46.2 xen-tools-debuginfo-4.4.4_02-46.2 - openSUSE 13.2 (noarch): kernel-devel-3.16.7-42.1 kernel-docs-3.16.7-42.2 kernel-macros-3.16.7-42.1 kernel-source-3.16.7-42.1 kernel-source-vanilla-3.16.7-42.1 virtualbox-guest-desktop-icons-5.0.20-48.5 virtualbox-host-source-5.0.20-48.5 - openSUSE 13.2 (i586): bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 bbswitch-kmp-pae-debuginfo-0.8_k3.16.7_42-3.20.3 cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 cloop-kmp-pae-debuginfo-2.639_k3.16.7_42-14.20.3 crash-kmp-pae-7.0.8_k3.16.7_42-20.3 crash-kmp-pae-debuginfo-7.0.8_k3.16.7_42-20.3 hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 hdjmod-kmp-pae-debuginfo-1.28_k3.16.7_42-18.21.3 ipset-kmp-pae-6.23_k3.16.7_42-20.3 ipset-kmp-pae-debuginfo-6.23_k3.16.7_42-20.3 pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 pcfclock-kmp-pae-debuginfo-0.44_k3.16.7_42-260.20.2 vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 vhba-kmp-pae-debuginfo-20140629_k3.16.7_42-2.20.2 virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 virtualbox-guest-kmp-pae-debuginfo-5.0.20_k3.16.7_42-48.5 virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 virtualbox-host-kmp-pae-debuginfo-5.0.20_k3.16.7_42-48.5 xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 xtables-addons-kmp-pae-debuginfo-2.6_k3.16.7_42-22.3 - openSUSE 13.2 (i686): kernel-pae-3.16.7-42.1 kernel-pae-base-3.16.7-42.1 kernel-pae-base-debuginfo-3.16.7-42.1 kernel-pae-debuginfo-3.16.7-42.1 kernel-pae-debugsource-3.16.7-42.1 kernel-pae-devel-3.16.7-42.1


References

https://www.suse.com/security/cve/CVE-2012-6701.html https://www.suse.com/security/cve/CVE-2013-7446.html https://www.suse.com/security/cve/CVE-2014-9904.html https://www.suse.com/security/cve/CVE-2015-3288.html https://www.suse.com/security/cve/CVE-2015-6526.html https://www.suse.com/security/cve/CVE-2015-7566.html https://www.suse.com/security/cve/CVE-2015-8709.html https://www.suse.com/security/cve/CVE-2015-8785.html https://www.suse.com/security/cve/CVE-2015-8812.html https://www.suse.com/security/cve/CVE-2015-8816.html https://www.suse.com/security/cve/CVE-2015-8830.html https://www.suse.com/security/cve/CVE-2016-0758.html https://www.suse.com/security/cve/CVE-2016-1583.html https://www.suse.com/security/cve/CVE-2016-2053.html https://www.suse.com/security/cve/CVE-2016-2184.html https://www.suse.com/security/cve/CVE-2016-2185.html https://www.suse.com/security/cve/CVE-2016-2186.html https://www.suse.com/security/cve/CVE-2016-2187.html https://www.suse.com/security/cve/CVE-2016-2188.html https://www.suse.com/security/cve/CVE-2016-2384.html https://www.suse.com/security/cve/CVE-2016-2543.html https://www.suse.com/security/cve/CVE-2016-2544.html https://www.suse.com/security/cve/CVE-2016-2545.html https://www.suse.com/security/cve/CVE-2016-2546.html https://www.suse.com/security/cve/CVE-2016-2547.html https://www.suse.com/security/cve/CVE-2016-2548.html https://www.suse.com/security/cve/CVE-2016-2549.html https://www.suse.com/security/cve/CVE-2016-2782.html https://www.suse.com/security/cve/CVE-2016-2847.html https://www.suse.com/security/cve/CVE-2016-3134.html https://www.suse.com/security/cve/CVE-2016-3136.html https://www.suse.com/security/cve/CVE-2016-3137.html https://www.suse.com/security/cve/CVE-2016-3138.html https://www.suse.com/security/cve/CVE-2016-3139.html https://www.suse.com/security/cve/CVE-2016-3140.html https://www.suse.com/security/cve/CVE-2016-3156.html https://www.suse.com/security/cve/CVE-2016-3672.html https://www.suse.com/security/cve/CVE-2016-3689.html https://www.suse.com/security/cve/CVE-2016-3951.html https://www.suse.com/security/cve/CVE-2016-4470.html https://www.suse.com/security/cve/CVE-2016-4482.html https://www.suse.com/security/cve/CVE-2016-4485.html https://www.suse.com/security/cve/CVE-2016-4486.html https://www.suse.com/security/cve/CVE-2016-4565.html https://www.suse.com/security/cve/CVE-2016-4569.html https://www.suse.com/security/cve/CVE-2016-4578.html https://www.suse.com/security/cve/CVE-2016-4580.html https://www.suse.com/security/cve/CVE-2016-4581.html https://www.suse.com/security/cve/CVE-2016-4805.html https://www.suse.com/security/cve/CVE-2016-4913.html https://www.suse.com/security/cve/CVE-2016-4997.html https://www.suse.com/security/cve/CVE-2016-5244.html https://www.suse.com/security/cve/CVE-2016-5829.html https://bugzilla.suse.com/901754 https://bugzilla.suse.com/941113 https://bugzilla.suse.com/942702 https://bugzilla.suse.com/945219 https://bugzilla.suse.com/955654 https://bugzilla.suse.com/957052 https://bugzilla.suse.com/957988 https://bugzilla.suse.com/959709 https://bugzilla.suse.com/960561 https://bugzilla.suse.com/961512 https://bugzilla.suse.com/963762 https://bugzilla.suse.com/963765 https://bugzilla.suse.com/966245 https://bugzilla.suse.com/966437 https://bugzilla.suse.com/966693 https://bugzilla.suse.com/966849 https://bugzilla.suse.com/967972 https://bugzilla.suse.com/967973 https://bugzilla.suse.com/967974 https://bugzilla.suse.com/967975 https://bugzilla.suse.com/968010 https://bugzilla.suse.com/968011 https://bugzilla.suse.com/968012 https://bugzilla.suse.com/968013 https://bugzilla.suse.com/968018 https://bugzilla.suse.com/968670 https://bugzilla.suse.com/969354 https://bugzilla.suse.com/969355 https://bugzilla.suse.com/970114 https://bugzilla.suse.com/970275 https://bugzilla.suse.com/970892 https://bugzilla.suse.com/970909 https://bugzilla.suse.com/970911 https://bugzilla.suse.com/970948 https://bugzilla.suse.com/970955 https://bugzilla.suse.com/970956 https://bugzilla.suse.com/970958 https://bugzilla.suse.com/970970 https://bugzilla.suse.com/971124 https://bugzilla.suse.com/971125 https://bugzilla.suse.com/971126 https://bugzilla.suse.com/971360 https://bugzilla.suse.com/971628 https://bugzilla.suse.com/971799 https://bugzilla.suse.com/971919 https://bugzilla.suse.com/971944 https://bugzilla.suse.com/972174 https://bugzilla.suse.com/973378 https://bugzilla.suse.com/973570 https://bugzilla.suse.com/974308 https://bugzilla.suse.com/974418 https://bugzilla.suse.com/974646 https://bugzilla.suse.com/975945 https://bugzilla.suse.com/978401 https://bugzilla.suse.com/978445 https://bugzilla.suse.com/978469 https://bugzilla.suse.com/978821 https://bugzilla.suse.com/978822 https://bugzilla.suse.com/979021 https://bugzilla.suse.com/979213 https://bugzilla.suse.com/979548 https://bugzilla.suse.com/979867 https://bugzilla.suse.com/979879 https://bugzilla.suse.com/979913 https://bugzilla.suse.com/980348 https://bugzilla.suse.com/980363 https://bugzilla.suse.com/980371 https://bugzilla.suse.com/980725 https://bugzilla.suse.com/981267 https://bugzilla.suse.com/982706 https://bugzilla.suse.com/983143 https://bugzilla.suse.com/983213 https://bugzilla.suse.com/984464 https://bugzilla.suse.com/984755 https://bugzilla.suse.com/984764 https://bugzilla.suse.com/986362 https://bugzilla.suse.com/986365 https://bugzilla.suse.com/986377 https://bugzilla.suse.com/986572 https://bugzilla.suse.com/986573 https://bugzilla.suse.com/986811--


Severity
Announcement ID: openSUSE-SU-2016:2144-1
Rating: important
Affected Products: openSUSE 13.2 le.

Related News