SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2016:1690-1
Rating:             important
References:         #676471 #880007 #889207 #899908 #903279 #928547 
                    #931448 #940413 #943989 #944309 #945345 #947337 
                    #953233 #954847 #956491 #956852 #957805 #957986 
                    #960857 #962336 #962846 #962872 #963193 #963572 
                    #963762 #964461 #964727 #965319 #966054 #966245 
                    #966573 #966831 #967251 #967292 #967299 #967903 
                    #968010 #968141 #968448 #968512 #968667 #968670 
                    #968687 #968812 #968813 #969439 #969571 #969655 
                    #969690 #969735 #969992 #969993 #970062 #970114 
                    #970504 #970506 #970604 #970892 #970909 #970911 
                    #970948 #970955 #970956 #970958 #970970 #971049 
                    #971124 #971125 #971126 #971159 #971170 #971360 
                    #971600 #971628 #971947 #972003 #972174 #972844 
                    #972891 #972933 #972951 #973378 #973556 #973570 
                    #973855 #974165 #974308 #974406 #974418 #974646 
                    #975371 #975488 #975533 #975945 #976739 #976868 
                    #977582 #977685 #978401 #978822 #979169 #979213 
                    #979419 #979485 #979548 #979867 #979879 #980348 
                    #980371 #981143 #981344 #982354 #982698 #983213 
                    #983318 #983394 #983904 #984456 
Cross-References:   CVE-2014-9717 CVE-2015-8816 CVE-2015-8845
                    CVE-2016-0758 CVE-2016-2053 CVE-2016-2143
                    CVE-2016-2184 CVE-2016-2185 CVE-2016-2186
                    CVE-2016-2188 CVE-2016-2782 CVE-2016-2847
                    CVE-2016-3134 CVE-2016-3136 CVE-2016-3137
                    CVE-2016-3138 CVE-2016-3139 CVE-2016-3140
                    CVE-2016-3156 CVE-2016-3672 CVE-2016-3689
                    CVE-2016-3951 CVE-2016-4482 CVE-2016-4486
                    CVE-2016-4565 CVE-2016-4569 CVE-2016-4578
                    CVE-2016-4805 CVE-2016-5244
Affected Products:
                    SUSE Linux Enterprise Workstation Extension 12
                    SUSE Linux Enterprise Software Development Kit 12
                    SUSE Linux Enterprise Server 12
                    SUSE Linux Enterprise Module for Public Cloud 12
                    SUSE Linux Enterprise Live Patching 12
                    SUSE Linux Enterprise Desktop 12
______________________________________________________________________________

   An update that solves 29 vulnerabilities and has 89 fixes
   is now available.

Description:


   The SUSE Linux Enterprise 12 kernel was updated to 3.12.60 to receive
   various security and bugfixes.

   The following security bugs were fixed:
   - CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH
     umount2 system called without verifying that the MNT_LOCKED flag is
     unset, which allowed local users to bypass intended access restrictions
     and navigate to filesystem locations beneath a mount by calling umount2
     within a user namespace (bnc#928547).
   - CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in
     the Linux kernel did not properly maintain a hub-interface data
     structure, which allowed physically proximate attackers to cause a
     denial of service (invalid memory access and system crash) or possibly
     have unspecified other impact by unplugging a USB hub device
     (bnc#968010).
   - CVE-2015-8845: The tm_reclaim_thread function in
     arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms
     did not ensure that TM suspend mode exists before proceeding with a
     tm_reclaim call, which allowed local users to cause a denial of service
     (TM Bad Thing exception and panic) via a crafted application
     (bnc#975533).
   - CVE-2016-0758: Fix ASN.1 indefinite length object parsing (bsc#979867).
   - CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in
     the Linux kernel allowed attackers to cause a denial of service (panic)
     via an ASN.1 BER file that lacks a public key, leading to mishandling by
     the public_key_verify_signature function in
     crypto/asymmetric_keys/public_key.c (bnc#963762).
   - CVE-2016-2143: The fork implementation in the Linux kernel on s390
     platforms mishandled the case of four page-table levels, which allowed
     local users to cause a denial of service (system crash) or possibly have
     unspecified other impact via a crafted application, related to
     arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h.
     (bnc#970504)
   - CVE-2016-2184: The create_fixed_stream_quirk function in
     sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel
     allowed physically proximate attackers to cause a denial of service
     (NULL pointer dereference or double free, and system crash) via a
     crafted endpoints value in a USB device descriptor (bnc#971125).
   - CVE-2016-2185: The ati_remote2_probe function in
     drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically
     proximate attackers to cause a denial of service (NULL pointer
     dereference and system crash) via a crafted endpoints value in a USB
     device descriptor (bnc#971124).
   - CVE-2016-2186: The powermate_probe function in
     drivers/input/misc/powermate.c in the Linux kernel allowed physically
     proximate attackers to cause a denial of service (NULL pointer
     dereference and system crash) via a crafted endpoints value in a USB
     device descriptor (bnc#970958).
   - CVE-2016-2188: The iowarrior_probe function in
     drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically
     proximate attackers to cause a denial of service (NULL pointer
     dereference and system crash) via a crafted endpoints value in a USB
     device descriptor (bnc#970956).
   - CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in
     the Linux kernel allowed physically proximate attackers to cause a
     denial of service (NULL pointer dereference and system crash) or
     possibly have unspecified other impact by inserting a USB device that
     lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670).
   - CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of
     unread data in pipes, which allowed local users to cause a denial of
     service (memory consumption) by creating many pipes with non-default
     sizes (bnc#970948).
   - CVE-2016-3134: The netfilter subsystem in the Linux kernel did not
     validate certain offset fields, which allowed local users to gain
     privileges or cause a denial of service (heap memory corruption) via an
     IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
   - CVE-2016-3136: The mct_u232_msr_to_state function in
     drivers/usb/serial/mct_u232.c in the Linux kernel allowed physically
     proximate attackers to cause a denial of service (NULL pointer
     dereference and system crash) via a crafted USB device without two
     interrupt-in endpoint descriptors (bnc#970955).
   - CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel
     allowed physically proximate attackers to cause a denial of service
     (NULL pointer dereference and system crash) via a USB device without
     both an interrupt-in and an interrupt-out endpoint descriptor, related
     to the cypress_generic_port_probe and cypress_open functions
     (bnc#970970).
   - CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in
     the Linux kernel allowed physically proximate attackers to cause a
     denial of service (NULL pointer dereference and system crash) via a USB
     device without both a control and a data endpoint descriptor
     (bnc#970911).
   - CVE-2016-3139: The wacom_probe function in
     drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically
     proximate attackers to cause a denial of service (NULL pointer
     dereference and system crash) via a crafted endpoints value in a USB
     device descriptor (bnc#970909).
   - CVE-2016-3140: The digi_port_init function in
     drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed
     physically proximate attackers to cause a denial of service (NULL
     pointer dereference and system crash) via a crafted endpoints value in a
     USB device descriptor (bnc#970892).
   - CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandled
     destruction of device objects, which allowed guest OS users to cause a
     denial of service (host OS networking outage) by arranging for a large
     number of IP addresses (bnc#971360).
   - CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c
     in the Linux kernel did not properly randomize the legacy base address,
     which made it easier for local users to defeat the intended restrictions
     on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism
     for a setuid or setgid program, by disabling stack-consumption resource
     limits (bnc#974308).
   - CVE-2016-3689: The ims_pcu_parse_cdc_data function in
     drivers/input/misc/ims-pcu.c in the Linux kernel allowed physically
     proximate attackers to cause a denial of service (system crash) via a
     USB device without both a master and a slave interface (bnc#971628).
   - CVE-2016-3951: Double free vulnerability in drivers/net/usb/cdc_ncm.c in
     the Linux kernel allowed physically proximate attackers to cause a
     denial of service (system crash) or possibly have unspecified other
     impact by inserting a USB device with an invalid USB descriptor
     (bnc#974418).
   - CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c
     in the Linux kernel did not initialize a certain data structure, which
     allowed local users to obtain sensitive information from kernel stack
     memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
   - CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c
     in the Linux kernel did not initialize a certain data structure, which
     allowed local users to obtain sensitive information from kernel stack
     memory by reading a Netlink message (bnc#978822).
   - CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel
     incorrectly relied on the write system call, which allowed local users     to cause a denial of service (kernel memory write operation) or possibly
     have unspecified other impact via a uAPI interface (bnc#979548).
   - CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c
     in the Linux kernel did not initialize a certain data structure, which
     allowed local users to obtain sensitive information from kernel stack
     memory via crafted use of the ALSA timer interface (bnc#979213).
   - CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize
     certain r1 data structures, which allowed local users to obtain
     sensitive information from kernel stack memory via crafted use of the
     ALSA timer interface, related to the (1) snd_timer_user_ccallback and
     (2) snd_timer_user_tinterrupt functions (bnc#979879).
   - CVE-2016-4805: Use-after-free vulnerability in
     drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to
     cause a denial of service (memory corruption and system crash, or
     spinlock) or possibly have unspecified other impact by removing a
     network namespace, related to the ppp_register_net_channel and
     ppp_unregister_channel functions (bnc#980371).
   - CVE-2016-5244: Fixed an infoleak in rds_inc_info_copy (bsc#983213).

   The following non-security bugs were fixed:
   - ALSA: hrtimer: Handle start/stop more properly (bsc#973378).
   - ALSA: timer: Call notifier in the same spinlock (bsc#973378).
   - ALSA: timer: Protect the whole snd_timer_close() with open race
     (bsc#973378).
   - ALSA: timer: Sync timer deletion at closing the system timer
     (bsc#973378).
   - ALSA: timer: Use mod_timer() for rearming the system timer (bsc#973378).
   - Btrfs-8394-qgroup-Account-data-space-in-more-proper-timin.patch:
     (bsc#963193).
   - Btrfs: do not collect ordered extents when logging that inode exists
     (bsc#977685).
   - Btrfs: do not use src fd for printk (bsc#980348).
   - Btrfs: fix deadlock between direct IO reads and buffered writes
     (bsc#973855).
   - Btrfs: fix empty symlink after creating symlink and fsync parent dir
     (bsc#977685).
   - Btrfs: fix file loss on log replay after renaming a file and fsync
     (bsc#977685).
   - Btrfs: fix file/data loss caused by fsync after rename and new inode
     (bsc#977685).
   - Btrfs: fix for incorrect directory entries after fsync log replay
     (bsc#957805, bsc#977685).
   - Btrfs: fix loading of orphan roots leading to BUG_ON (bsc#972844).
   - Btrfs: fix race between fsync and lockless direct IO writes (bsc#977685).
   - Btrfs: fix unreplayable log after snapshot delete + parent dir fsync
     (bsc#977685).
   - Btrfs: handle non-fatal errors in btrfs_qgroup_inherit() (bsc#972951).
   - Btrfs: qgroup: Fix dead judgement on qgroup_rescan_leaf() return value
     (bsc#969439).
   - Btrfs: qgroup: Fix qgroup accounting when creating snapshot (bsc#972933).
   - Btrfs: qgroup: return EINVAL if level of parent is not higher than
     child's (bsc#972951).
   - Btrfs: teach backref walking about backrefs with underflowed offset
     values (bsc#975371).
   - CacheFiles: Fix incorrect test for in-memory object collision
     (bsc#971049).
   - CacheFiles: Handle object being killed before being set up (bsc#971049).
   - Ceph: Remove racey watch/notify event infrastructure (bsc#964727)
   - Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).
   - FS-Cache: Add missing initialization of ret in cachefiles_write_page()
     (bsc#971049).
   - FS-Cache: Count culled objects and objects rejected due to lack of space
     (bsc#971049).
   - FS-Cache: Fix cancellation of in-progress operation (bsc#971049).
   - FS-Cache: Handle a new operation submitted against a killed object
     (bsc#971049).
   - FS-Cache: Move fscache_report_unexpected_submission() to make it more
     available (bsc#971049).
   - FS-Cache: Out of line fscache_operation_init() (bsc#971049).
   - FS-Cache: Permit fscache_cancel_op() to cancel in-progress operations
     too (bsc#971049).
   - FS-Cache: Put an aborted initialised op so that it is accounted
     correctly (bsc#971049).
   - FS-Cache: Reduce cookie ref count if submit fails (bsc#971049).
   - FS-Cache: Synchronise object death state change vs operation submission
     (bsc#971049).
   - FS-Cache: The operation cancellation method needs calling in more places
     (bsc#971049).
   - FS-Cache: Timeout for releasepage() (bsc#971049).
   - FS-Cache: When submitting an op, cancel it if the target object is dying
     (bsc#971049).
   - FS-Cache: fscache_object_is_dead() has wrong logic, kill it (bsc#971049).
   - Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
   - Fix kabi issue (bsc#971049).
   - Fix kmalloc overflow in LPFC driver at large core count (bsc#969690).
   - Fix problem with setting ACL on directories (bsc#967251).
   - Input: i8042 - lower log level for "no controller" message (bsc#945345).
   - KVM: SVM: add rdmsr support for AMD event registers (bsc#968448).
   - MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).
   - NFSv4.1: do not use machine credentials for CLOSE when using "sec=sys"
     (bsc#972003).
   - PCI/AER: Fix aer_inject error codes (bsc#931448).
   - PCI/AER: Log actual error causes in aer_inject (bsc#931448).
   - PCI/AER: Log aer_inject error injections (bsc#931448).
   - PCI/AER: Use dev_warn() in aer_inject (bsc#931448).
   - Revert "libata: Align ata_device's id on a cacheline".
   - Revert "net/ipv6: add sysctl option accept_ra_min_hop_limit".
   - USB: quirk to stop runtime PM for Intel 7260 (bnc#984456).
   - USB: usbip: fix potential out-of-bounds write (bnc#975945).
   - USB: xhci: Add broken streams quirk for Frescologic device id 1009
     (bnc#982698).
   - Update
     patches.drivers/0001-nvme-fix-max_segments-integer-truncation.patch
     (bsc#979419). Fix reference.
   - Update
     patches.drivers/drm-ast-Initialize-data-needed-to-map-fbdev-memory.patch
     (bnc#880007). Fix refs and upstream status.
   - Update patches.kernel.org/patch-3.12.55-56 references (add bsc#973570).
   - Update patches.suse/kgr-0102-add-TAINT_KGRAFT.patch (bsc#974406).
   - acpi: Disable ACPI table override when UEFI Secure Boot is enabled
     (bsc#970604).
   - acpi: Disable APEI error injection if securelevel is set (bsc#972891).
   - cachefiles: perform test on s_blocksize when opening cache file
     (bsc#971049).
   - cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857,
     bsc#974646).
   - dmapi: fix dm_open_by_handle_rvp taking an extra ref to mnt (bsc#967292).
   - drm/core: Preserve the framebuffer after removing it (bsc#968812).
   - drm/mgag200: Add support for a new G200eW3 chipset (bsc#983904).
   - drm/mgag200: Add support for a new rev of G200e (bsc#983904).
   - drm/mgag200: Black screen fix for G200e rev 4 (bsc#983904).
   - drm/mgag200: remove unused variables (bsc#983904).
   - drm/radeon: fix-up some float to fixed conversion thinkos (bsc#968813).
   - drm/radeon: use HDP_MEM_COHERENCY_FLUSH_CNTL for sdma as well
     (bsc#968813).
   - drm: qxl: Workaround for buggy user-space (bsc#981344).
   - efifb: Fix 16 color palette entry calculation (bsc#983318).
   - ehci-pci: enable interrupt on BayTrail (bnc#947337).
   - enic: set netdev->vlan_features (bsc#966245).
   - ext4: fix races between page faults and hole punching (bsc#972174).
   - ext4: fix races of writeback with punch hole and zero range (bsc#972174).
   - fix: print ext4 mountopt data_err=abort correctly (bsc#969735).
   - fs, seq_file: fallback to vmalloc instead of oom kill processes
     (bnc#968687).
   - fs, seqfile: always allow oom killer (bnc#968687).
   - fs/pipe.c: skip file_update_time on frozen fs (bsc#975488).
   - hid-elo: kill not flush the work (bnc#982354).
   - ibmvscsi: Remove unsupported host config MAD (bsc#973556).
   - ipv6: make fib6 serial number per namespace (bsc#965319).
   - ipv6: mld: fix add_grhead skb_over_panic for devs with large MTUs
     (bsc#956852).
   - ipv6: per netns FIB garbage collection (bsc#965319).
   - ipv6: per netns fib6 walkers (bsc#965319).
   - ipv6: replace global gc_args with local variable (bsc#965319).
   - ipvs: count pre-established TCP states as active (bsc#970114).
   - kABI: kgr: fix subtle race with kgr_module_init(), going notifier and
     kgr_modify_kernel().
   - kABI: protect enum enclosure_component_type.
   - kABI: protect function file_open_root.
   - kABI: protect include in evm.
   - kABI: protect struct dm_exception_store_type.
   - kABI: protect struct fib_nh_exception.
   - kABI: protect struct module.
   - kABI: protect struct rq.
   - kABI: protect struct sched_class.
   - kABI: protect struct scm_creds.
   - kABI: protect struct user_struct.
   - kABI: protect struct user_struct.
   - kabi fix for patches.fixes/reduce-m_start-cost (bsc#966573).
   - kabi/severities: Whitelist libceph and rbd (bsc#964727).
   - kabi: kgr, add reserved fields
   - kabi: protect struct fc_rport_priv (bsc#953233, bsc#962846).
   - kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319).
   - kgr: add TAINT_KGRAFT
   - kgr: add kgraft annotation to hwrng kthread.
   - kgr: add kgraft annotations to kthreads' wait_event_freezable() API
     calls.
   - kgr: add objname to kgr_patch_fun struct.
   - kgr: add sympos and objname to error and debug messages.
   - kgr: add sympos as disambiguator field to kgr_patch_fun structure.
   - kgr: add sympos to sysfs.
   - kgr: call kgr_init_ftrace_ops() only for loaded objects.
   - kgr: change to kallsyms_on_each_symbol iterator.
   - kgr: define pr_fmt and modify all pr_* messages.
   - kgr: do not print error for !abort_if_missing symbols (bnc#943989).
   - kgr: do not return and print an error only if the object is not loaded.
   - kgr: do not use WQ_MEM_RECLAIM workqueue (bnc#963572).
   - kgr: fix an asymmetric dealing with delayed module loading.
   - kgr: fix redirection on s390x arch (bsc#903279).
   - kgr: fix subtle race with kgr_module_init(), going notifier and
     kgr_modify_kernel().
   - kgr: handle btrfs kthreads (bnc#889207).
   - kgr: kmemleak, really mark the kthread safe after an interrupt.
   - kgr: log when modifying kernel.
   - kgr: mark some more missed kthreads (bnc#962336).
   - kgr: remove abort_if_missing flag.
   - kgr: usb/storage: do not emit thread awakened (bnc#899908).
   - kgraft/gfs2: Do not block livepatching in the log daemon for too long.
   - kgraft/xen: Do not block livepatching in the XEN blkif kthread.
   - libfc: replace 'rp_mutex' with 'rp_lock' (bsc#953233, bsc#962846).
   - memcg: do not hang on OOM when killed by userspace OOM access to memory
     reserves (bnc#969571).
   - mld, igmp: Fix reserved tailroom calculation (bsc#956852).
   - mmc: Allow forward compatibility for eMMC (bnc#966054).
   - mmc: sdhci: Allow for irq being shared (bnc#977582).
   - net/qlge: Avoids recursive EEH error (bsc#954847).
   - net: Account for all vlan headers in skb_mac_gso_segment (bsc#968667).
   - net: Start with correct mac_len in skb_network_protocol (bsc#968667).
   - net: disable fragment reassembly if high_thresh is set to zero
     (bsc#970506).
   - net: fix wrong mac_len calculation for vlans (bsc#968667).
   - net: irda: Fix use-after-free in irtty_open() (bnc#967903).
   - nfs4: treat lock owners as opaque values (bnc#968141).
   - nfs: fix high load average due to callback thread sleeping (bsc#971170).
   - nfsd: fix nfsd_setattr return code for HSM (bsc#969992).
   - nvme: fix max_segments integer truncation (bsc#676471).
   - ocfs2: do not set fs read-only if rec[0] is empty while committing
     truncate (bnc#971947).
   - ocfs2: extend enough credits for freeing one truncate record while
     replaying truncate records (bnc#971947).
   - ocfs2: extend transaction for ocfs2_remove_rightmost_path() and
     ocfs2_update_edge_lengths() before to avoid inconsistency between inode
     and et (bnc#971947).
   - perf, nmi: Fix unknown NMI warning (bsc#968512).
   - pipe: limit the per-user amount of pages allocated in pipes (bsc#970948).
   - rbd: do not log miscompare as an error (bsc#970062).
   - rbd: handle OBJ_REQUEST_SG types for copyup (bsc#983394).
   - rbd: report unsupported features to syslog (bsc#979169).
   - rbd: use GFP_NOIO consistently for request allocations (bsc#971159).
   - reduce m_start() cost.. (bsc#966573).
   - rpm/modprobe-xen.conf: Revert comment change to allow parallel install
     (bsc#957986). This reverts commit
     6c6d86d3cdc26f7746fe4ba2bef8859b5aeb346c.
   - s390/pageattr: do a single TLB flush for change_page_attr (bsc#940413).
   - sched/x86: Fix up typo in topology detection (bsc#974165).
   - scsi: proper state checking and module refcount handling in
     scsi_device_get (boo#966831).
   - series.conf: move netfilter section at the end of core networking
   - supported.conf: Add bridge.ko for OpenStack (bsc#971600)
   - supported.conf: Add isofs to -base (bsc#969655).
   - supported.conf:Add drivers/infiniband/hw/ocrdma/ocrdma.ko to
     supported.conf (bsc#964461)
   - target/rbd: do not put snap_context twice (bsc#981143).
   - target/rbd: remove caw_mutex usage (bsc#981143).
   - target: Drop incorrect ABORT_TASK put for completed commands
     (bsc#962872).
   - target: Fix LUN_RESET active I/O handling for ACK_KREF (bsc#962872).
   - target: Fix LUN_RESET active TMR descriptor handling (bsc#962872).
   - target: Fix TAS handling for multi-session se_node_acls (bsc#962872).
   - target: Fix race with SCF_SEND_DELAYED_TAS handling (bsc#962872).
   - target: Fix remote-port TMR ABORT + se_cmd fabric stop (bsc#962872).
   - vgaarb: Add more context to error messages (bsc#976868).
   - x86, sched: Add new topology for multi-NUMA-node CPUs (bsc#974165).
   - x86/efi: parse_efi_setup() build fix (bsc#979485).
   - x86: standardize mmap_rnd() usage (bnc#974308).
   - xen/acpi: Disable ACPI table override when UEFI Secure Boot is enabled
     (bsc#970604).
   - xfs/dmapi: drop lock over synchronous XFS_SEND_DATA events (bsc#969993).
   - xfs/dmapi: propertly send postcreate event (bsc#967299).


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 12:

      zypper in -t patch SUSE-SLE-WE-12-2016-1001=1

   - SUSE Linux Enterprise Software Development Kit 12:

      zypper in -t patch SUSE-SLE-SDK-12-2016-1001=1

   - SUSE Linux Enterprise Server 12:

      zypper in -t patch SUSE-SLE-SERVER-12-2016-1001=1

   - SUSE Linux Enterprise Module for Public Cloud 12:

      zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2016-1001=1

   - SUSE Linux Enterprise Live Patching 12:

      zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1001=1

   - SUSE Linux Enterprise Desktop 12:

      zypper in -t patch SUSE-SLE-DESKTOP-12-2016-1001=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Workstation Extension 12 (x86_64):

      kernel-default-debuginfo-3.12.60-52.49.1
      kernel-default-debugsource-3.12.60-52.49.1
      kernel-default-extra-3.12.60-52.49.1
      kernel-default-extra-debuginfo-3.12.60-52.49.1

   - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):

      kernel-obs-build-3.12.60-52.49.1
      kernel-obs-build-debugsource-3.12.60-52.49.1

   - SUSE Linux Enterprise Software Development Kit 12 (noarch):

      kernel-docs-3.12.60-52.49.3

   - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):

      kernel-default-3.12.60-52.49.1
      kernel-default-base-3.12.60-52.49.1
      kernel-default-base-debuginfo-3.12.60-52.49.1
      kernel-default-debuginfo-3.12.60-52.49.1
      kernel-default-debugsource-3.12.60-52.49.1
      kernel-default-devel-3.12.60-52.49.1
      kernel-syms-3.12.60-52.49.1

   - SUSE Linux Enterprise Server 12 (noarch):

      kernel-devel-3.12.60-52.49.1
      kernel-macros-3.12.60-52.49.1
      kernel-source-3.12.60-52.49.1

   - SUSE Linux Enterprise Server 12 (x86_64):

      kernel-xen-3.12.60-52.49.1
      kernel-xen-base-3.12.60-52.49.1
      kernel-xen-base-debuginfo-3.12.60-52.49.1
      kernel-xen-debuginfo-3.12.60-52.49.1
      kernel-xen-debugsource-3.12.60-52.49.1
      kernel-xen-devel-3.12.60-52.49.1

   - SUSE Linux Enterprise Server 12 (s390x):

      kernel-default-man-3.12.60-52.49.1

   - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64):

      kernel-ec2-3.12.60-52.49.1
      kernel-ec2-debuginfo-3.12.60-52.49.1
      kernel-ec2-debugsource-3.12.60-52.49.1
      kernel-ec2-devel-3.12.60-52.49.1
      kernel-ec2-extra-3.12.60-52.49.1
      kernel-ec2-extra-debuginfo-3.12.60-52.49.1

   - SUSE Linux Enterprise Live Patching 12 (x86_64):

      kgraft-patch-3_12_60-52_49-default-1-2.1
      kgraft-patch-3_12_60-52_49-xen-1-2.1

   - SUSE Linux Enterprise Desktop 12 (x86_64):

      kernel-default-3.12.60-52.49.1
      kernel-default-debuginfo-3.12.60-52.49.1
      kernel-default-debugsource-3.12.60-52.49.1
      kernel-default-devel-3.12.60-52.49.1
      kernel-default-extra-3.12.60-52.49.1
      kernel-default-extra-debuginfo-3.12.60-52.49.1
      kernel-syms-3.12.60-52.49.1
      kernel-xen-3.12.60-52.49.1
      kernel-xen-debuginfo-3.12.60-52.49.1
      kernel-xen-debugsource-3.12.60-52.49.1
      kernel-xen-devel-3.12.60-52.49.1

   - SUSE Linux Enterprise Desktop 12 (noarch):

      kernel-devel-3.12.60-52.49.1
      kernel-macros-3.12.60-52.49.1
      kernel-source-3.12.60-52.49.1


References:

   https://www.suse.com/security/cve/CVE-2014-9717.html
   https://www.suse.com/security/cve/CVE-2015-8816.html
   https://www.suse.com/security/cve/CVE-2015-8845.html
   https://www.suse.com/security/cve/CVE-2016-0758.html
   https://www.suse.com/security/cve/CVE-2016-2053.html
   https://www.suse.com/security/cve/CVE-2016-2143.html
   https://www.suse.com/security/cve/CVE-2016-2184.html
   https://www.suse.com/security/cve/CVE-2016-2185.html
   https://www.suse.com/security/cve/CVE-2016-2186.html
   https://www.suse.com/security/cve/CVE-2016-2188.html
   https://www.suse.com/security/cve/CVE-2016-2782.html
   https://www.suse.com/security/cve/CVE-2016-2847.html
   https://www.suse.com/security/cve/CVE-2016-3134.html
   https://www.suse.com/security/cve/CVE-2016-3136.html
   https://www.suse.com/security/cve/CVE-2016-3137.html
   https://www.suse.com/security/cve/CVE-2016-3138.html
   https://www.suse.com/security/cve/CVE-2016-3139.html
   https://www.suse.com/security/cve/CVE-2016-3140.html
   https://www.suse.com/security/cve/CVE-2016-3156.html
   https://www.suse.com/security/cve/CVE-2016-3672.html
   https://www.suse.com/security/cve/CVE-2016-3689.html
   https://www.suse.com/security/cve/CVE-2016-3951.html
   https://www.suse.com/security/cve/CVE-2016-4482.html
   https://www.suse.com/security/cve/CVE-2016-4486.html
   https://www.suse.com/security/cve/CVE-2016-4565.html
   https://www.suse.com/security/cve/CVE-2016-4569.html
   https://www.suse.com/security/cve/CVE-2016-4578.html
   https://www.suse.com/security/cve/CVE-2016-4805.html
   https://www.suse.com/security/cve/CVE-2016-5244.html
   https://bugzilla.suse.com/676471
   https://bugzilla.suse.com/880007
   https://bugzilla.suse.com/889207
   https://bugzilla.suse.com/899908
   https://bugzilla.suse.com/903279
   https://bugzilla.suse.com/928547
   https://bugzilla.suse.com/931448
   https://bugzilla.suse.com/940413
   https://bugzilla.suse.com/943989
   https://bugzilla.suse.com/944309
   https://bugzilla.suse.com/945345
   https://bugzilla.suse.com/947337
   https://bugzilla.suse.com/953233
   https://bugzilla.suse.com/954847
   https://bugzilla.suse.com/956491
   https://bugzilla.suse.com/956852
   https://bugzilla.suse.com/957805
   https://bugzilla.suse.com/957986
   https://bugzilla.suse.com/960857
   https://bugzilla.suse.com/962336
   https://bugzilla.suse.com/962846
   https://bugzilla.suse.com/962872
   https://bugzilla.suse.com/963193
   https://bugzilla.suse.com/963572
   https://bugzilla.suse.com/963762
   https://bugzilla.suse.com/964461
   https://bugzilla.suse.com/964727
   https://bugzilla.suse.com/965319
   https://bugzilla.suse.com/966054
   https://bugzilla.suse.com/966245
   https://bugzilla.suse.com/966573
   https://bugzilla.suse.com/966831
   https://bugzilla.suse.com/967251
   https://bugzilla.suse.com/967292
   https://bugzilla.suse.com/967299
   https://bugzilla.suse.com/967903
   https://bugzilla.suse.com/968010
   https://bugzilla.suse.com/968141
   https://bugzilla.suse.com/968448
   https://bugzilla.suse.com/968512
   https://bugzilla.suse.com/968667
   https://bugzilla.suse.com/968670
   https://bugzilla.suse.com/968687
   https://bugzilla.suse.com/968812
   https://bugzilla.suse.com/968813
   https://bugzilla.suse.com/969439
   https://bugzilla.suse.com/969571
   https://bugzilla.suse.com/969655
   https://bugzilla.suse.com/969690
   https://bugzilla.suse.com/969735
   https://bugzilla.suse.com/969992
   https://bugzilla.suse.com/969993
   https://bugzilla.suse.com/970062
   https://bugzilla.suse.com/970114
   https://bugzilla.suse.com/970504
   https://bugzilla.suse.com/970506
   https://bugzilla.suse.com/970604
   https://bugzilla.suse.com/970892
   https://bugzilla.suse.com/970909
   https://bugzilla.suse.com/970911
   https://bugzilla.suse.com/970948
   https://bugzilla.suse.com/970955
   https://bugzilla.suse.com/970956
   https://bugzilla.suse.com/970958
   https://bugzilla.suse.com/970970
   https://bugzilla.suse.com/971049
   https://bugzilla.suse.com/971124
   https://bugzilla.suse.com/971125
   https://bugzilla.suse.com/971126
   https://bugzilla.suse.com/971159
   https://bugzilla.suse.com/971170
   https://bugzilla.suse.com/971360
   https://bugzilla.suse.com/971600
   https://bugzilla.suse.com/971628
   https://bugzilla.suse.com/971947
   https://bugzilla.suse.com/972003
   https://bugzilla.suse.com/972174
   https://bugzilla.suse.com/972844
   https://bugzilla.suse.com/972891
   https://bugzilla.suse.com/972933
   https://bugzilla.suse.com/972951
   https://bugzilla.suse.com/973378
   https://bugzilla.suse.com/973556
   https://bugzilla.suse.com/973570
   https://bugzilla.suse.com/973855
   https://bugzilla.suse.com/974165
   https://bugzilla.suse.com/974308
   https://bugzilla.suse.com/974406
   https://bugzilla.suse.com/974418
   https://bugzilla.suse.com/974646
   https://bugzilla.suse.com/975371
   https://bugzilla.suse.com/975488
   https://bugzilla.suse.com/975533
   https://bugzilla.suse.com/975945
   https://bugzilla.suse.com/976739
   https://bugzilla.suse.com/976868
   https://bugzilla.suse.com/977582
   https://bugzilla.suse.com/977685
   https://bugzilla.suse.com/978401
   https://bugzilla.suse.com/978822
   https://bugzilla.suse.com/979169
   https://bugzilla.suse.com/979213
   https://bugzilla.suse.com/979419
   https://bugzilla.suse.com/979485
   https://bugzilla.suse.com/979548
   https://bugzilla.suse.com/979867
   https://bugzilla.suse.com/979879
   https://bugzilla.suse.com/980348
   https://bugzilla.suse.com/980371
   https://bugzilla.suse.com/981143
   https://bugzilla.suse.com/981344
   https://bugzilla.suse.com/982354
   https://bugzilla.suse.com/982698
   https://bugzilla.suse.com/983213
   https://bugzilla.suse.com/983318
   https://bugzilla.suse.com/983394
   https://bugzilla.suse.com/983904
   https://bugzilla.suse.com/984456

SuSE: 2016:1690-1: important: the Linux Kernel

June 27, 2016
An update that solves 29 vulnerabilities and has 89 fixes An update that solves 29 vulnerabilities and has 89 fixes An update that solves 29 vulnerabilities and has 89 fixes is now...

Summary

The SUSE Linux Enterprise 12 kernel was updated to 3.12.60 to receive various security and bugfixes. The following security bugs were fixed: - CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system called without verifying that the MNT_LOCKED flag is unset, which allowed local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace (bnc#928547). - CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010). - CVE-2015-8845: The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms did not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allowed local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application (bnc#975533). - CVE-2016-0758: Fix ASN.1 indefinite length object parsing (bsc#979867). - CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762). - CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandled the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h. (bnc#970504) - CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125). - CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124). - CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958). - CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956). - CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670). - CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948). - CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126). - CVE-2016-3136: The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors (bnc#970955). - CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970). - CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911). - CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909). - CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892). - CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandled destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360). - CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel did not properly randomize the legacy base address, which made it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits (bnc#974308). - CVE-2016-3689: The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface (bnc#971628). - CVE-2016-3951: Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor (bnc#974418). - CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401). - CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822). - CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548). - CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213). - CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879). - CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371). - CVE-2016-5244: Fixed an infoleak in rds_inc_info_copy (bsc#983213). The following non-security bugs were fixed: - ALSA: hrtimer: Handle start/stop more properly (bsc#973378). - ALSA: timer: Call notifier in the same spinlock (bsc#973378). - ALSA: timer: Protect the whole snd_timer_close() with open race (bsc#973378). - ALSA: timer: Sync timer deletion at closing the system timer (bsc#973378). - ALSA: timer: Use mod_timer() for rearming the system timer (bsc#973378). - Btrfs-8394-qgroup-Account-data-space-in-more-proper-timin.patch: (bsc#963193). - Btrfs: do not collect ordered extents when logging that inode exists (bsc#977685). - Btrfs: do not use src fd for printk (bsc#980348). - Btrfs: fix deadlock between direct IO reads and buffered writes (bsc#973855). - Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#977685). - Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#977685). - Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#977685). - Btrfs: fix for incorrect directory entries after fsync log replay (bsc#957805, bsc#977685). - Btrfs: fix loading of orphan roots leading to BUG_ON (bsc#972844). - Btrfs: fix race between fsync and lockless direct IO writes (bsc#977685). - Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#977685). - Btrfs: handle non-fatal errors in btrfs_qgroup_inherit() (bsc#972951). - Btrfs: qgroup: Fix dead judgement on qgroup_rescan_leaf() return value (bsc#969439). - Btrfs: qgroup: Fix qgroup accounting when creating snapshot (bsc#972933). - Btrfs: qgroup: return EINVAL if level of parent is not higher than child's (bsc#972951). - Btrfs: teach backref walking about backrefs with underflowed offset values (bsc#975371). - CacheFiles: Fix incorrect test for in-memory object collision (bsc#971049). - CacheFiles: Handle object being killed before being set up (bsc#971049). - Ceph: Remove racey watch/notify event infrastructure (bsc#964727) - Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739). - FS-Cache: Add missing initialization of ret in cachefiles_write_page() (bsc#971049). - FS-Cache: Count culled objects and objects rejected due to lack of space (bsc#971049). - FS-Cache: Fix cancellation of in-progress operation (bsc#971049). - FS-Cache: Handle a new operation submitted against a killed object (bsc#971049). - FS-Cache: Move fscache_report_unexpected_submission() to make it more available (bsc#971049). - FS-Cache: Out of line fscache_operation_init() (bsc#971049). - FS-Cache: Permit fscache_cancel_op() to cancel in-progress operations too (bsc#971049). - FS-Cache: Put an aborted initialised op so that it is accounted correctly (bsc#971049). - FS-Cache: Reduce cookie ref count if submit fails (bsc#971049). - FS-Cache: Synchronise object death state change vs operation submission (bsc#971049). - FS-Cache: The operation cancellation method needs calling in more places (bsc#971049). - FS-Cache: Timeout for releasepage() (bsc#971049). - FS-Cache: When submitting an op, cancel it if the target object is dying (bsc#971049). - FS-Cache: fscache_object_is_dead() has wrong logic, kill it (bsc#971049). - Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309) - Fix kabi issue (bsc#971049). - Fix kmalloc overflow in LPFC driver at large core count (bsc#969690). - Fix problem with setting ACL on directories (bsc#967251). - Input: i8042 - lower log level for "no controller" message (bsc#945345). - KVM: SVM: add rdmsr support for AMD event registers (bsc#968448). - MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491). - NFSv4.1: do not use machine credentials for CLOSE when using "sec=sys" (bsc#972003). - PCI/AER: Fix aer_inject error codes (bsc#931448). - PCI/AER: Log actual error causes in aer_inject (bsc#931448). - PCI/AER: Log aer_inject error injections (bsc#931448). - PCI/AER: Use dev_warn() in aer_inject (bsc#931448). - Revert "libata: Align ata_device's id on a cacheline". - Revert "net/ipv6: add sysctl option accept_ra_min_hop_limit". - USB: quirk to stop runtime PM for Intel 7260 (bnc#984456). - USB: usbip: fix potential out-of-bounds write (bnc#975945). - USB: xhci: Add broken streams quirk for Frescologic device id 1009 (bnc#982698). - Update patches.drivers/0001-nvme-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference. - Update patches.drivers/drm-ast-Initialize-data-needed-to-map-fbdev-memory.patch (bnc#880007). Fix refs and upstream status. - Update patches.kernel.org/patch-3.12.55-56 references (add bsc#973570). - Update patches.suse/kgr-0102-add-TAINT_KGRAFT.patch (bsc#974406). - acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604). - acpi: Disable APEI error injection if securelevel is set (bsc#972891). - cachefiles: perform test on s_blocksize when opening cache file (bsc#971049). - cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646). - dmapi: fix dm_open_by_handle_rvp taking an extra ref to mnt (bsc#967292). - drm/core: Preserve the framebuffer after removing it (bsc#968812). - drm/mgag200: Add support for a new G200eW3 chipset (bsc#983904). - drm/mgag200: Add support for a new rev of G200e (bsc#983904). - drm/mgag200: Black screen fix for G200e rev 4 (bsc#983904). - drm/mgag200: remove unused variables (bsc#983904). - drm/radeon: fix-up some float to fixed conversion thinkos (bsc#968813). - drm/radeon: use HDP_MEM_COHERENCY_FLUSH_CNTL for sdma as well (bsc#968813). - drm: qxl: Workaround for buggy user-space (bsc#981344). - efifb: Fix 16 color palette entry calculation (bsc#983318). - ehci-pci: enable interrupt on BayTrail (bnc#947337). - enic: set netdev->vlan_features (bsc#966245). - ext4: fix races between page faults and hole punching (bsc#972174). - ext4: fix races of writeback with punch hole and zero range (bsc#972174). - fix: print ext4 mountopt data_err=abort correctly (bsc#969735). - fs, seq_file: fallback to vmalloc instead of oom kill processes (bnc#968687). - fs, seqfile: always allow oom killer (bnc#968687). - fs/pipe.c: skip file_update_time on frozen fs (bsc#975488). - hid-elo: kill not flush the work (bnc#982354). - ibmvscsi: Remove unsupported host config MAD (bsc#973556). - ipv6: make fib6 serial number per namespace (bsc#965319). - ipv6: mld: fix add_grhead skb_over_panic for devs with large MTUs (bsc#956852). - ipv6: per netns FIB garbage collection (bsc#965319). - ipv6: per netns fib6 walkers (bsc#965319). - ipv6: replace global gc_args with local variable (bsc#965319). - ipvs: count pre-established TCP states as active (bsc#970114). - kABI: kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel(). - kABI: protect enum enclosure_component_type. - kABI: protect function file_open_root. - kABI: protect include in evm. - kABI: protect struct dm_exception_store_type. - kABI: protect struct fib_nh_exception. - kABI: protect struct module. - kABI: protect struct rq. - kABI: protect struct sched_class. - kABI: protect struct scm_creds. - kABI: protect struct user_struct. - kABI: protect struct user_struct. - kabi fix for patches.fixes/reduce-m_start-cost (bsc#966573). - kabi/severities: Whitelist libceph and rbd (bsc#964727). - kabi: kgr, add reserved fields - kabi: protect struct fc_rport_priv (bsc#953233, bsc#962846). - kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319). - kgr: add TAINT_KGRAFT - kgr: add kgraft annotation to hwrng kthread. - kgr: add kgraft annotations to kthreads' wait_event_freezable() API calls. - kgr: add objname to kgr_patch_fun struct. - kgr: add sympos and objname to error and debug messages. - kgr: add sympos as disambiguator field to kgr_patch_fun structure. - kgr: add sympos to sysfs. - kgr: call kgr_init_ftrace_ops() only for loaded objects. - kgr: change to kallsyms_on_each_symbol iterator. - kgr: define pr_fmt and modify all pr_* messages. - kgr: do not print error for !abort_if_missing symbols (bnc#943989). - kgr: do not return and print an error only if the object is not loaded. - kgr: do not use WQ_MEM_RECLAIM workqueue (bnc#963572). - kgr: fix an asymmetric dealing with delayed module loading. - kgr: fix redirection on s390x arch (bsc#903279). - kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel(). - kgr: handle btrfs kthreads (bnc#889207). - kgr: kmemleak, really mark the kthread safe after an interrupt. - kgr: log when modifying kernel. - kgr: mark some more missed kthreads (bnc#962336). - kgr: remove abort_if_missing flag. - kgr: usb/storage: do not emit thread awakened (bnc#899908). - kgraft/gfs2: Do not block livepatching in the log daemon for too long. - kgraft/xen: Do not block livepatching in the XEN blkif kthread. - libfc: replace 'rp_mutex' with 'rp_lock' (bsc#953233, bsc#962846). - memcg: do not hang on OOM when killed by userspace OOM access to memory reserves (bnc#969571). - mld, igmp: Fix reserved tailroom calculation (bsc#956852). - mmc: Allow forward compatibility for eMMC (bnc#966054). - mmc: sdhci: Allow for irq being shared (bnc#977582). - net/qlge: Avoids recursive EEH error (bsc#954847). - net: Account for all vlan headers in skb_mac_gso_segment (bsc#968667). - net: Start with correct mac_len in skb_network_protocol (bsc#968667). - net: disable fragment reassembly if high_thresh is set to zero (bsc#970506). - net: fix wrong mac_len calculation for vlans (bsc#968667). - net: irda: Fix use-after-free in irtty_open() (bnc#967903). - nfs4: treat lock owners as opaque values (bnc#968141). - nfs: fix high load average due to callback thread sleeping (bsc#971170). - nfsd: fix nfsd_setattr return code for HSM (bsc#969992). - nvme: fix max_segments integer truncation (bsc#676471). - ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947). - ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947). - ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947). - perf, nmi: Fix unknown NMI warning (bsc#968512). - pipe: limit the per-user amount of pages allocated in pipes (bsc#970948). - rbd: do not log miscompare as an error (bsc#970062). - rbd: handle OBJ_REQUEST_SG types for copyup (bsc#983394). - rbd: report unsupported features to syslog (bsc#979169). - rbd: use GFP_NOIO consistently for request allocations (bsc#971159). - reduce m_start() cost.. (bsc#966573). - rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 6c6d86d3cdc26f7746fe4ba2bef8859b5aeb346c. - s390/pageattr: do a single TLB flush for change_page_attr (bsc#940413). - sched/x86: Fix up typo in topology detection (bsc#974165). - scsi: proper state checking and module refcount handling in scsi_device_get (boo#966831). - series.conf: move netfilter section at the end of core networking - supported.conf: Add bridge.ko for OpenStack (bsc#971600) - supported.conf: Add isofs to -base (bsc#969655). - supported.conf:Add drivers/infiniband/hw/ocrdma/ocrdma.ko to supported.conf (bsc#964461) - target/rbd: do not put snap_context twice (bsc#981143). - target/rbd: remove caw_mutex usage (bsc#981143). - target: Drop incorrect ABORT_TASK put for completed commands (bsc#962872). - target: Fix LUN_RESET active I/O handling for ACK_KREF (bsc#962872). - target: Fix LUN_RESET active TMR descriptor handling (bsc#962872). - target: Fix TAS handling for multi-session se_node_acls (bsc#962872). - target: Fix race with SCF_SEND_DELAYED_TAS handling (bsc#962872). - target: Fix remote-port TMR ABORT + se_cmd fabric stop (bsc#962872). - vgaarb: Add more context to error messages (bsc#976868). - x86, sched: Add new topology for multi-NUMA-node CPUs (bsc#974165). - x86/efi: parse_efi_setup() build fix (bsc#979485). - x86: standardize mmap_rnd() usage (bnc#974308). - xen/acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604). - xfs/dmapi: drop lock over synchronous XFS_SEND_DATA events (bsc#969993). - xfs/dmapi: propertly send postcreate event (bsc#967299). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12: zypper in -t patch SUSE-SLE-WE-12-2016-1001=1 - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2016-1001=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2016-1001=1 - SUSE Linux Enterprise Module for Public Cloud 12: zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2016-1001=1 - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1001=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2016-1001=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12 (x86_64): kernel-default-debuginfo-3.12.60-52.49.1 kernel-default-debugsource-3.12.60-52.49.1 kernel-default-extra-3.12.60-52.49.1 kernel-default-extra-debuginfo-3.12.60-52.49.1 - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): kernel-obs-build-3.12.60-52.49.1 kernel-obs-build-debugsource-3.12.60-52.49.1 - SUSE Linux Enterprise Software Development Kit 12 (noarch): kernel-docs-3.12.60-52.49.3 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): kernel-default-3.12.60-52.49.1 kernel-default-base-3.12.60-52.49.1 kernel-default-base-debuginfo-3.12.60-52.49.1 kernel-default-debuginfo-3.12.60-52.49.1 kernel-default-debugsource-3.12.60-52.49.1 kernel-default-devel-3.12.60-52.49.1 kernel-syms-3.12.60-52.49.1 - SUSE Linux Enterprise Server 12 (noarch): kernel-devel-3.12.60-52.49.1 kernel-macros-3.12.60-52.49.1 kernel-source-3.12.60-52.49.1 - SUSE Linux Enterprise Server 12 (x86_64): kernel-xen-3.12.60-52.49.1 kernel-xen-base-3.12.60-52.49.1 kernel-xen-base-debuginfo-3.12.60-52.49.1 kernel-xen-debuginfo-3.12.60-52.49.1 kernel-xen-debugsource-3.12.60-52.49.1 kernel-xen-devel-3.12.60-52.49.1 - SUSE Linux Enterprise Server 12 (s390x): kernel-default-man-3.12.60-52.49.1 - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64): kernel-ec2-3.12.60-52.49.1 kernel-ec2-debuginfo-3.12.60-52.49.1 kernel-ec2-debugsource-3.12.60-52.49.1 kernel-ec2-devel-3.12.60-52.49.1 kernel-ec2-extra-3.12.60-52.49.1 kernel-ec2-extra-debuginfo-3.12.60-52.49.1 - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_60-52_49-default-1-2.1 kgraft-patch-3_12_60-52_49-xen-1-2.1 - SUSE Linux Enterprise Desktop 12 (x86_64): kernel-default-3.12.60-52.49.1 kernel-default-debuginfo-3.12.60-52.49.1 kernel-default-debugsource-3.12.60-52.49.1 kernel-default-devel-3.12.60-52.49.1 kernel-default-extra-3.12.60-52.49.1 kernel-default-extra-debuginfo-3.12.60-52.49.1 kernel-syms-3.12.60-52.49.1 kernel-xen-3.12.60-52.49.1 kernel-xen-debuginfo-3.12.60-52.49.1 kernel-xen-debugsource-3.12.60-52.49.1 kernel-xen-devel-3.12.60-52.49.1 - SUSE Linux Enterprise Desktop 12 (noarch): kernel-devel-3.12.60-52.49.1 kernel-macros-3.12.60-52.49.1 kernel-source-3.12.60-52.49.1

References

#676471 #880007 #889207 #899908 #903279 #928547

#931448 #940413 #943989 #944309 #945345 #947337

#953233 #954847 #956491 #956852 #957805 #957986

#960857 #962336 #962846 #962872 #963193 #963572

#963762 #964461 #964727 #965319 #966054 #966245

#966573 #966831 #967251 #967292 #967299 #967903

#968010 #968141 #968448 #968512 #968667 #968670

#968687 #968812 #968813 #969439 #969571 #969655

#969690 #969735 #969992 #969993 #970062 #970114

#970504 #970506 #970604 #970892 #970909 #970911

#970948 #970955 #970956 #970958 #970970 #971049

#971124 #971125 #971126 #971159 #971170 #971360

#971600 #971628 #971947 #972003 #972174 #972844

#972891 #972933 #972951 #973378 #973556 #973570

#973855 #974165 #974308 #974406 #974418 #974646

#975371 #975488 #975533 #975945 #976739 #976868

#977582 #977685 #978401 #978822 #979169 #979213

#979419 #979485 #979548 #979867 #979879 #980348

#980371 #981143 #981344 #982354 #982698 #983213

#983318 #983394 #983904 #984456

Cross- CVE-2014-9717 CVE-2015-8816 CVE-2015-8845

CVE-2016-0758 CVE-2016-2053 CVE-2016-2143

CVE-2016-2184 CVE-2016-2185 CVE-2016-2186

CVE-2016-2188 CVE-2016-2782 CVE-2016-2847

CVE-2016-3134 CVE-2016-3136 CVE-2016-3137

CVE-2016-3138 CVE-2016-3139 CVE-2016-3140

CVE-2016-3156 CVE-2016-3672 CVE-2016-3689

CVE-2016-3951 CVE-2016-4482 CVE-2016-4486

CVE-2016-4565 CVE-2016-4569 CVE-2016-4578

CVE-2016-4805 CVE-2016-5244

Affected Products:

SUSE Linux Enterprise Workstation Extension 12

SUSE Linux Enterprise Software Development Kit 12

SUSE Linux Enterprise Server 12

SUSE Linux Enterprise Module for Public Cloud 12

SUSE Linux Enterprise Live Patching 12

SUSE Linux Enterprise Desktop 12

https://www.suse.com/security/cve/CVE-2014-9717.html

https://www.suse.com/security/cve/CVE-2015-8816.html

https://www.suse.com/security/cve/CVE-2015-8845.html

https://www.suse.com/security/cve/CVE-2016-0758.html

https://www.suse.com/security/cve/CVE-2016-2053.html

https://www.suse.com/security/cve/CVE-2016-2143.html

https://www.suse.com/security/cve/CVE-2016-2184.html

https://www.suse.com/security/cve/CVE-2016-2185.html

https://www.suse.com/security/cve/CVE-2016-2186.html

https://www.suse.com/security/cve/CVE-2016-2188.html

https://www.suse.com/security/cve/CVE-2016-2782.html

https://www.suse.com/security/cve/CVE-2016-2847.html

https://www.suse.com/security/cve/CVE-2016-3134.html

https://www.suse.com/security/cve/CVE-2016-3136.html

https://www.suse.com/security/cve/CVE-2016-3137.html

https://www.suse.com/security/cve/CVE-2016-3138.html

https://www.suse.com/security/cve/CVE-2016-3139.html

https://www.suse.com/security/cve/CVE-2016-3140.html

https://www.suse.com/security/cve/CVE-2016-3156.html

https://www.suse.com/security/cve/CVE-2016-3672.html

https://www.suse.com/security/cve/CVE-2016-3689.html

https://www.suse.com/security/cve/CVE-2016-3951.html

https://www.suse.com/security/cve/CVE-2016-4482.html

https://www.suse.com/security/cve/CVE-2016-4486.html

https://www.suse.com/security/cve/CVE-2016-4565.html

https://www.suse.com/security/cve/CVE-2016-4569.html

https://www.suse.com/security/cve/CVE-2016-4578.html

https://www.suse.com/security/cve/CVE-2016-4805.html

https://www.suse.com/security/cve/CVE-2016-5244.html

https://bugzilla.suse.com/676471

https://bugzilla.suse.com/880007

https://bugzilla.suse.com/889207

https://bugzilla.suse.com/899908

https://bugzilla.suse.com/903279

https://bugzilla.suse.com/928547

https://bugzilla.suse.com/931448

https://bugzilla.suse.com/940413

https://bugzilla.suse.com/943989

https://bugzilla.suse.com/944309

https://bugzilla.suse.com/945345

https://bugzilla.suse.com/947337

https://bugzilla.suse.com/953233

https://bugzilla.suse.com/954847

https://bugzilla.suse.com/956491

https://bugzilla.suse.com/956852

https://bugzilla.suse.com/957805

https://bugzilla.suse.com/957986

https://bugzilla.suse.com/960857

https://bugzilla.suse.com/962336

https://bugzilla.suse.com/962846

https://bugzilla.suse.com/962872

https://bugzilla.suse.com/963193

https://bugzilla.suse.com/963572

https://bugzilla.suse.com/963762

https://bugzilla.suse.com/964461

https://bugzilla.suse.com/964727

https://bugzilla.suse.com/965319

https://bugzilla.suse.com/966054

https://bugzilla.suse.com/966245

https://bugzilla.suse.com/966573

https://bugzilla.suse.com/966831

https://bugzilla.suse.com/967251

https://bugzilla.suse.com/967292

https://bugzilla.suse.com/967299

https://bugzilla.suse.com/967903

https://bugzilla.suse.com/968010

https://bugzilla.suse.com/968141

https://bugzilla.suse.com/968448

https://bugzilla.suse.com/968512

https://bugzilla.suse.com/968667

https://bugzilla.suse.com/968670

https://bugzilla.suse.com/968687

https://bugzilla.suse.com/968812

https://bugzilla.suse.com/968813

https://bugzilla.suse.com/969439

https://bugzilla.suse.com/969571

https://bugzilla.suse.com/969655

https://bugzilla.suse.com/969690

https://bugzilla.suse.com/969735

https://bugzilla.suse.com/969992

https://bugzilla.suse.com/969993

https://bugzilla.suse.com/970062

https://bugzilla.suse.com/970114

https://bugzilla.suse.com/970504

https://bugzilla.suse.com/970506

https://bugzilla.suse.com/970604

https://bugzilla.suse.com/970892

https://bugzilla.suse.com/970909

https://bugzilla.suse.com/970911

https://bugzilla.suse.com/970948

https://bugzilla.suse.com/970955

https://bugzilla.suse.com/970956

https://bugzilla.suse.com/970958

https://bugzilla.suse.com/970970

https://bugzilla.suse.com/971049

https://bugzilla.suse.com/971124

https://bugzilla.suse.com/971125

https://bugzilla.suse.com/971126

https://bugzilla.suse.com/971159

https://bugzilla.suse.com/971170

https://bugzilla.suse.com/971360

https://bugzilla.suse.com/971600

https://bugzilla.suse.com/971628

https://bugzilla.suse.com/971947

https://bugzilla.suse.com/972003

https://bugzilla.suse.com/972174

https://bugzilla.suse.com/972844

https://bugzilla.suse.com/972891

https://bugzilla.suse.com/972933

https://bugzilla.suse.com/972951

https://bugzilla.suse.com/973378

https://bugzilla.suse.com/973556

https://bugzilla.suse.com/973570

https://bugzilla.suse.com/973855

https://bugzilla.suse.com/974165

https://bugzilla.suse.com/974308

https://bugzilla.suse.com/974406

https://bugzilla.suse.com/974418

https://bugzilla.suse.com/974646

https://bugzilla.suse.com/975371

https://bugzilla.suse.com/975488

https://bugzilla.suse.com/975533

https://bugzilla.suse.com/975945

https://bugzilla.suse.com/976739

https://bugzilla.suse.com/976868

https://bugzilla.suse.com/977582

https://bugzilla.suse.com/977685

https://bugzilla.suse.com/978401

https://bugzilla.suse.com/978822

https://bugzilla.suse.com/979169

https://bugzilla.suse.com/979213

https://bugzilla.suse.com/979419

https://bugzilla.suse.com/979485

https://bugzilla.suse.com/979548

https://bugzilla.suse.com/979867

https://bugzilla.suse.com/979879

https://bugzilla.suse.com/980348

https://bugzilla.suse.com/980371

https://bugzilla.suse.com/981143

https://bugzilla.suse.com/981344

https://bugzilla.suse.com/982354

https://bugzilla.suse.com/982698

https://bugzilla.suse.com/983213

https://bugzilla.suse.com/983318

https://bugzilla.suse.com/983394

https://bugzilla.suse.com/983904

https://bugzilla.suse.com/984456

Severity
Announcement ID: SUSE-SU-2016:1690-1
Rating: important

Related News