SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:1360-1
Rating:             important
References:         #1003077 #1008842 #1009682 #1012620 #1012985 
                    #1015703 #1015787 #1015821 #1017512 #1018100 
                    #1018263 #1018419 #1018446 #1019168 #1019514 
                    #1020048 #1020795 #1021256 #1021374 #1021762 
                    #1021913 #1022559 #1022971 #1023164 #1023207 
                    #1023377 #1023762 #1023824 #1023888 #1023992 
                    #1024081 #1024234 #1024309 #1024508 #1024788 
                    #1025039 #1025235 #1025354 #1025802 #1026024 
                    #1026722 #1026914 #1027066 #1027178 #1027189 
                    #1027190 #1027974 #1028041 #1028415 #1028595 
                    #1028648 #1028895 #1029470 #1029850 #1029986 
                    #1030118 #1030213 #1030593 #1030901 #1031003 
                    #1031052 #1031080 #1031440 #1031567 #1031579 
                    #1031662 #1031842 #1032125 #1032141 #1032344 
                    #1032345 #1033336 #1034670 #103470 #1034700 
                    #1035576 #1035699 #1035738 #1035877 #1036752 
                    #1038261 #799133 #857926 #914939 #917630 
                    #922853 #930399 #931620 #937444 #940946 #954763 
                    #968697 #970083 #971933 #979215 #982783 #983212 
                    #984530 #985561 #988065 #989056 #993832 
Cross-References:   CVE-2015-1350 CVE-2016-10044 CVE-2016-10200
                    CVE-2016-10208 CVE-2016-2117 CVE-2016-3070
                    CVE-2016-5243 CVE-2016-7117 CVE-2016-9191
                    CVE-2016-9588 CVE-2016-9604 CVE-2017-2647
                    CVE-2017-2671 CVE-2017-5669 CVE-2017-5897
                    CVE-2017-5986 CVE-2017-6074 CVE-2017-6214
                    CVE-2017-6345 CVE-2017-6346 CVE-2017-6348
                    CVE-2017-6353 CVE-2017-6951 CVE-2017-7187
                    CVE-2017-7261 CVE-2017-7294 CVE-2017-7308
                    CVE-2017-7616 CVE-2017-7645 CVE-2017-8106
                   
Affected Products:
                    SUSE Linux Enterprise Workstation Extension 12-SP1
                    SUSE Linux Enterprise Software Development Kit 12-SP1
                    SUSE Linux Enterprise Server 12-SP1
                    SUSE Linux Enterprise Module for Public Cloud 12
                    SUSE Linux Enterprise Live Patching 12
                    SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________

   An update that solves 30 vulnerabilities and has 72 fixes
   is now available.

Description:


   The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.74 to receive
   various security and bugfixes.

   Notable new/improved features:
   - Improved support for Hyper-V
   - Support for the tcp_westwood TCP scheduling algorithm

   The following security bugs were fixed:

   - CVE-2017-8106: The handle_invept function in arch/x86/kvm/vmx.c in the
     Linux kernel allowed privileged KVM guest OS users to cause a denial of
     service (NULL pointer dereference and host OS crash) via a
     single-context INVEPT instruction with a NULL EPT pointer (bsc#1035877).
   - CVE-2017-6951: The keyring_search_aux function in
     security/keys/keyring.c in the Linux kernel allowed local users to cause
     a denial of service (NULL pointer dereference and OOPS) via a
     request_key system call for the "dead" type. (bsc#1029850).
   - CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local
     users to gain privileges or cause a denial of service (NULL pointer
     dereference and system crash) via vectors involving a NULL value for a
     certain match field, related to the keyring_search_iterator function in
     keyring.c. (bsc#1030593)
   - CVE-2016-9604: This fixes handling of keyrings starting with '.' in
     KEYCTL_JOIN_SESSION_KEYRING, which could have allowed local users to
     manipulate privileged keyrings (bsc#1035576)
   - CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind
     compat syscalls in mm/mempolicy.c in the Linux kernel allowed local
     users to obtain sensitive information from uninitialized stack data by
     triggering failure of a certain bitmap operation. (bnc#1033336).
   - CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux
     kernel allowed remote attackers to cause a denial of service (system
     crash) via a long RPC reply, related to net/sunrpc/svc.c,
     fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c. (bsc#1034670).
   - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in
     the Linux kernel did not properly validate certain block-size data,
     which allowed local users to cause a denial of service (overflow) or
     possibly have unspecified other impact via crafted system calls
     (bnc#1031579)
   - CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux
     kernel was  too late in obtaining a certain lock and consequently could
     not ensure that disconnect function calls are safe, which allowed local
     users to cause a denial of service (panic) by leveraging access to the
     protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003)
   - CVE-2017-7294: The vmw_surface_define_ioctl function in
     drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not
     validate addition of certain levels data, which allowed local users to
     trigger an integer overflow and out-of-bounds write, and cause a denial
     of service (system hang or crash) or possibly gain privileges, via a
     crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440)
   - CVE-2017-7261: The vmw_surface_define_ioctl function in
     drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not
     check for a zero value of certain levels data, which allowed local users     to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and
     possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device
     (bnc#1031052)
   - CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux
     kernel allowed local users to cause a denial of service (stack-based
     buffer overflow) or possibly have unspecified other impact via a large
     command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds
     write access in the sg_write function (bnc#1030213)
   - CVE-2016-9588: arch/x86/kvm/vmx.c in the Linux kernel mismanaged the #BP
     and #OF exceptions, which allowed guest OS users to cause a denial of
     service (guest OS crash) by declining to handle an exception thrown by
     an L2 guest (bsc#1015703).
   - CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel
     did not restrict the address calculated by a certain rounding operation,
     which allowed local users to map page zero, and consequently bypass a
     protection mechanism that exists for the mmap system call, by making
     crafted shmget and shmat system calls in a privileged context
     (bnc#1026914).
   - CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in
     the Linux kernel allowed local users to gain privileges or cause a
     denial of service (use-after-free) by making multiple bind system calls
     without properly ascertaining whether a socket has the SOCK_ZAPPED
     status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c
     (bnc#1028415)
   - CVE-2016-10208: The ext4_fill_super function in fs/ext4/super.c in the
     Linux kernel did not properly validate meta block groups, which allowed
     physically proximate attackers to cause a denial of service
     (out-of-bounds read and system crash) via a crafted ext4 image
     (bnc#1023377).
   - CVE-2017-5897: The ip6gre_err function in net/ipv6/ip6_gre.c in the
     Linux kernel allowed remote attackers to have unspecified impact via
     vectors involving GRE flags in an IPv6 packet, which trigger an
     out-of-bounds access (bsc#1023762).
   - CVE-2017-5986: A race condition in the sctp_wait_for_sndbuf function in
     net/sctp/socket.c in the Linux kernel allowed local users to cause a
     denial of service (assertion failure and panic) via a multithreaded
     application that peels off an association in a certain buffer-full state
     (bsc#1025235).
   - CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c
     in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures
     in the LISTEN state, which allowed local users to obtain root privileges
     or cause a denial of service (double free) via an application that made
     an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024)
   - CVE-2016-9191: The cgroup offline implementation in the Linux kernel
     mishandled certain drain operations, which allowed local users to cause
     a denial of service (system hang) by leveraging access to a container
     environment for executing a crafted application (bnc#1008842)
   - CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the
     Linux kernel improperly managed lock dropping, which allowed local users     to cause a denial of service (deadlock) via crafted operations on IrDA
     devices (bnc#1027178).
   - CVE-2016-10044: The aio_mount function in fs/aio.c in the Linux kernel
     did not properly restrict execute access, which made it easier for local
     users to bypass intended SELinux W^X policy restrictions, and
     consequently gain privileges, via an io_setup system call (bnc#1023992).
   - CVE-2016-3070: The trace_writeback_dirty_page implementation in
     include/trace/events/writeback.h in the Linux kernel improperly
     interacts with mm/migrate.c, which allowed local users to cause a denial
     of service (NULL pointer dereference and system crash) or possibly have
     unspecified other impact by triggering a certain page move (bnc#979215).
   - CVE-2016-5243: The tipc_nl_compat_link_dump function in
     net/tipc/netlink_compat.c in the Linux kernel did not properly copy a
     certain string, which allowed local users to obtain sensitive
     information from kernel stack memory by reading a Netlink message
     (bnc#983212).
   - CVE-2017-6345: The LLC subsystem in the Linux kernel did not ensure that
     a certain destructor exists in required circumstances, which allowed
     local users to cause a denial of service (BUG_ON) or possibly have
     unspecified other impact via crafted system calls (bnc#1027190)
   - CVE-2017-6346: Race condition in net/packet/af_packet.c in the Linux
     kernel allowed local users to cause a denial of service (use-after-free)
     or possibly have unspecified other impact via a multithreaded
     application that made PACKET_FANOUT setsockopt system calls (bnc#1027189)
   - CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly
     restrict association peel-off operations during certain wait states,
     which allowed local users to cause a denial of service (invalid unlock
     and double free) via a multithreaded application. NOTE: this
     vulnerability exists because of an incorrect fix for CVE-2017-5986
     (bnc#1027066)
   - CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in
     net/sctp/socket.c in the Linux kernel allowed local users to cause a
     denial of service (assertion failure and panic) via a multithreaded
     application that peels off an association in a certain buffer-full state
     (bsc#1025235).
   - CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the
     Linux kernel allowed remote attackers to cause a denial of service
     (infinite loop and soft lockup) via vectors involving a TCP packet with
     the URG flag (bnc#1026722)
   - CVE-2016-2117: The atl2_probe function in
     drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel incorrectly
     enables scatter/gather I/O, which allowed remote attackers to obtain
     sensitive information from kernel memory by reading packet data
     (bnc#968697)
   - CVE-2015-1350: The VFS subsystem in the Linux kernel provided an
     incomplete set of requirements for setattr operations that
     underspecifies removing extended privilege attributes, which allowed
     local users to cause a denial of service (capability stripping) via a
     failed invocation of a system call, as demonstrated by using chown to
     remove a capability from the ping or Wireshark dumpcap program
     (bsc#914939).
   - CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg
     function in net/socket.c in the Linux kernel allowed remote attackers to
     execute arbitrary code via vectors involving a recvmmsg system call that
     is mishandled during error processing (bsc#1003077).

   The following non-security bugs were fixed:

   - ACPI / APEI: Fix NMI notification handling (bsc#917630).
   - arch: Mass conversion of smp_mb__*() (bsc#1020795).
   - asm-generic: add __smp_xxx wrappers (bsc#1020795).
   - block: remove struct request buffer member (bsc#1020795).
   - block: submit_bio_wait() conversions (bsc#1020795).
   - bonding: Advertize vxlan offload features when supported (bsc#1009682).
   - bonding: handle more gso types (bsc#1009682).
   - bonding: use the correct ether type for alb (bsc#1028595).
   - btrfs: allow unlink to exceed subvolume quota (bsc#1015821).
   - btrfs: Change qgroup_meta_rsv to 64bit (bsc#1015821).
   - btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls
     (bsc#1018100).
   - btrfs: make file clone aware of fatal signals (bsc#1015787).
   - btrfs: qgroups: Retry after commit on getting EDQUOT (bsc#1015821).
   - cancel the setfilesize transation when io error happen (bsc#1028648).
   - cgroup: remove stray references to css_id (bsc#1020795).
   - cpuidle: powernv/pseries: Auto-promotion of snooze to deeper idle state
     (bnc#1023164).
   - dm: add era target (bsc#1020795).
   - dm: allow remove to be deferred (bsc#1020795).
   - dm bitset: only flush the current word if it has been dirtied
     (bsc#1020795).
   - dm btree: add dm_btree_find_lowest_key (bsc#1020795).
   - dm cache: actually resize cache (bsc#1020795).
   - dm cache: add block sizes and total cache blocks to status output
     (bsc#1020795).
   - dm cache: add cache block invalidation support (bsc#1020795).
   - dm cache: add passthrough mode (bsc#1020795).
   - dm cache: add policy name to status output (bsc#1020795).
   - dm cache: add remove_cblock method to policy interface (bsc#1020795).
   - dm cache: be much more aggressive about promoting writes to discarded
     blocks (bsc#1020795).
   - dm cache: cache shrinking support (bsc#1020795).
   - dm cache: do not add migration to completed list before unhooking bio
     (bsc#1020795).
   - dm cache: fix a lock-inversion (bsc#1020795).
   - dm cache: fix truncation bug when mapping I/O to more than 2TB fast
     device (bsc#1020795).
   - dm cache: fix writethrough mode quiescing in cache_map (bsc#1020795).
   - dm cache: improve efficiency of quiescing flag management (bsc#1020795).
   - dm cache: io destined for the cache device can now serve as tick bios
     (bsc#1020795).
   - dm cache: log error message if dm_kcopyd_copy() fails (bsc#1020795).
   - dm cache metadata: check the metadata version when reading the
     superblock (bsc#1020795).
   - dm cache metadata: return bool from __superblock_all_zeroes
     (bsc#1020795).
   - dm cache: move hook_info into common portion of per_bio_data structure
     (bsc#1020795).
   - dm cache: optimize commit_if_needed (bsc#1020795).
   - dm cache policy mq: a few small fixes (bsc#1020795).
   - dm cache policy mq: fix promotions to occur as expected (bsc#1020795).
   - dm cache policy mq: implement writeback_work() and
     mq_{set,clear}_dirty() (bsc#1020795).
   - dm cache policy mq: introduce three promotion threshold tunables
     (bsc#1020795).
   - dm cache policy mq: protect residency method with existing mutex
     (bsc#1020795).
   - dm cache policy mq: reduce memory requirements (bsc#1020795).
   - dm cache policy mq: use list_del_init instead of list_del +
     INIT_LIST_HEAD (bsc#1020795).
   - dm cache policy: remove return from void policy_remove_mapping
     (bsc#1020795).
   - dm cache: promotion optimisation for writes (bsc#1020795).
   - dm cache: resolve small nits and improve Documentation (bsc#1020795).
   - dm cache: return -EINVAL if the user specifies unknown cache policy
     (bsc#1020795).
   - dm cache: use cell_defer() boolean argument consistently (bsc#1020795).
   - dm: change sector_count member in clone_info from sector_t to unsigned
     (bsc#1020795).
   - dm crypt: add TCW IV mode for old CBC TCRYPT containers (bsc#1020795).
   - dm crypt: properly handle extra key string in initialization
     (bsc#1020795).
   - dm delay: use per-bio data instead of a mempool and slab cache
     (bsc#1020795).
   - dm: fix Kconfig indentation (bsc#1020795).
   - dm: fix Kconfig menu indentation (bsc#1020795).
   - dm: make dm_table_alloc_md_mempools static (bsc#1020795).
   - dm mpath: do not call pg_init when it is already running (bsc#1020795).
   - dm mpath: fix lock order inconsistency in multipath_ioctl (bsc#1020795).
   - dm mpath: print more useful warnings in multipath_message()
     (bsc#1020795).
   - dm mpath: push back requests instead of queueing (bsc#1020795).
   - dm mpath: really fix lockdep warning (bsc#1020795).
   - dm mpath: reduce memory pressure when requeuing (bsc#1020795).
   - dm mpath: remove extra nesting in map function (bsc#1020795).
   - dm mpath: remove map_io() (bsc#1020795).
   - dm mpath: remove process_queued_ios() (bsc#1020795).
   - dm mpath: requeue I/O during pg_init (bsc#1020795).
   - dm persistent data: cleanup dm-thin specific references in text
     (bsc#1020795).
   - dm snapshot: call destroy_work_on_stack() to pair with
     INIT_WORK_ONSTACK() (bsc#1020795).
   - dm snapshot: fix metadata corruption (bsc#1020795).
   - dm snapshot: prepare for switch to using dm-bufio (bsc#1020795).
   - dm snapshot: use dm-bufio (bsc#1020795).
   - dm snapshot: use dm-bufio prefetch (bsc#1020795).
   - dm snapshot: use GFP_KERNEL when initializing exceptions (bsc#1020795).
   - dm space map disk: optimise sm_disk_dec_block (bsc#1020795).
   - dm space map metadata: limit errors in sm_metadata_new_block
     (bsc#1020795).
   - dm: stop using bi_private (bsc#1020795).
   - dm table: add dm_table_run_md_queue_async (bsc#1020795).
   - dm table: print error on preresume failure (bsc#1020795).
   - dm table: remove unused buggy code that extends the targets array
     (bsc#1020795).
   - dm thin: add error_if_no_space feature (bsc#1020795).
   - dm thin: add mappings to end of prepared_* lists (bsc#1020795).
   - dm thin: add 'no_space_timeout' dm-thin-pool module param (bsc#1020795).
   - dm thin: add timeout to stop out-of-data-space mode holding IO forever
     (bsc#1020795).
   - dm thin: allow metadata commit if pool is in PM_OUT_OF_DATA_SPACE mode
     (bsc#1020795).
   - dm thin: allow metadata space larger than supported to go unused
     (bsc#1020795).
   - dm thin: cleanup and improve no space handling (bsc#1020795).
   - dm thin: eliminate the no_free_space flag (bsc#1020795).
   - dm thin: ensure user takes action to validate data and metadata
     consistency (bsc#1020795).
   - dm thin: factor out check_low_water_mark and use bools (bsc#1020795).
   - dm thin: fix deadlock in __requeue_bio_list (bsc#1020795).
   - dm thin: fix noflush suspend IO queueing (bsc#1020795).
   - dm thin: fix out of data space handling (bsc#1020795).
   - dm thin: fix pool feature parsing (bsc#1020795).
   - dm thin: fix rcu_read_lock being held in code that can sleep
     (bsc#1020795).
   - dm thin: handle metadata failures more consistently (bsc#1020795).
   - dm thin: irqsave must always be used with the pool->lock spinlock
     (bsc#1020795).
   - dm thin: log info when growing the data or metadata device (bsc#1020795).
   - dm thin: requeue bios to DM core if no_free_space and in read-only mode
     (bsc#1020795).
   - dm thin: return error from alloc_data_block if pool is not in write mode
     (bsc#1020795).
   - dm thin: simplify pool_is_congested (bsc#1020795).
   - dm thin: sort the per thin deferred bios using an rb_tree (bsc#1020795).
   - dm thin: synchronize the pool mode during suspend (bsc#1020795).
   - dm thin: use bool rather than unsigned for flags in structures
     (bsc#1020795).
   - dm thin: use INIT_WORK_ONSTACK in noflush_work to avoid ODEBUG warning
     (bsc#1020795).
   - dm thin: use per thin device deferred bio lists (bsc#1020795).
   - dm: use RCU_INIT_POINTER instead of rcu_assign_pointer in __unbind
     (bsc#1020795).
   - drm/i915: relax uncritical udelay_range() (bsc#1038261).
   - ether: add loopback type ETH_P_LOOPBACK (bsc#1028595).
   - ext4: fix bh leak on error paths in ext4_rename() and
     ext4_cross_rename() (bsc#1012985).
   - ext4: fix fencepost in s_first_meta_bg validation (bsc#1029986).
   - ext4: mark inode dirty after converting inline directory (bsc#1012985).
   - ftrace: Make ftrace_location_range() global (FATE#322421).
   - HID: usbhid: improve handling of Clear-Halt and reset (bsc#1031080).
   - hv: util: catch allocation errors   - hv: utils: use memdup_user in hvt_op_write
   - hwrng: virtio - ensure reads happen after successful probe (bsc#954763
     bsc#1032344).
   - i40e: avoid null pointer dereference (bsc#922853).
   - i40e/i40evf: Break up xmit_descriptor_count from maybe_stop_tx
     (bsc#985561).
   - i40e/i40evf: Limit TSO to 7 descriptors for payload instead of 8 per
     packet (bsc#985561).
   - i40e/i40evf: Rewrite logic for 8 descriptor per packet check
     (bsc#985561).
   - i40e: Impose a lower limit on gso size (bsc#985561).
   - i40e: Limit TX descriptor count in cases where frag size is greater than
     16K (bsc#985561).
   - iommu/vt-d: Flush old iommu caches for kdump when the device gets
     context mapped (bsc#1023824).
   - iommu/vt-d: Tylersburg isoch identity map check is done too late
     (bsc#1032125).
   - ipv6: make ECMP route replacement less greedy (bsc#930399).
   - kabi: hide changes in struct sk_buff (bsc#1009682).
   - KABI: Hide new include in arch/powerpc/kernel/process.c (fate#322421).
   - kABI: mask struct xfs_icdinode change (bsc#1024788).
   - kABI: protect struct inet6_dev (kabi).
   - kABI: protect struct iscsi_conn (bsc#103470).
   - kABI: protect struct xfs_buftarg and struct xfs_mount (bsc#1024508).
   - kABI: restore can_rx_register parameters (kabi).
   - kernel/watchdog: use nmi registers snapshot in hardlockup handler
     (bsc#940946, bsc#937444).
   - kgr: Mark eeh_event_handler() kthread safe using a timeout (bsc#1031662).
   - kgr/module: make a taint flag module-specific
   - kgr: remove unneeded kgr_needs_lazy_migration() s390x definition
   - l2tp: fix address test in __l2tp_ip6_bind_lookup() (bsc#1028415).
   - l2tp: fix lookup for sockets not bound to a device in l2tp_ip
     (bsc#1028415).
   - l2tp: fix racy socket lookup in l2tp_ip and l2tp_ip6 bind()
     (bsc#1028415).
   - l2tp: hold socket before dropping lock in l2tp_ip{, 6}_recv()
     (bsc#1028415).
   - l2tp: hold tunnel socket when handling control frames in l2tp_ip and
     l2tp_ip6 (bsc#1028415).
   - l2tp: lock socket before checking flags in connect() (bsc#1028415).
   - livepatch: Allow architectures to specify an alternate ftrace location
     (FATE#322421).
   - locking/semaphore: Add down_interruptible_timeout() (bsc#1031662).
   - md: avoid oops on unload if some process is in poll or select
     (bsc#1020795).
   - md: Convert use of typedef ctl_table to struct ctl_table (bsc#1020795).
   - md: ensure metadata is writen after raid level change (bsc#1020795).
   - md linear: fix a race between linear_add() and linear_congested()
     (bsc#1018446).
   - md: md_clear_badblocks should return an error code on failure
     (bsc#1020795).
   - md: refuse to change shape of array if it is active but read-only
     (bsc#1020795).
   - megaraid_sas: add missing curly braces in ioctl handler (bsc#1023207).
   - megaraid_sas: Fixup tgtid count in megasas_ld_list_query() (bsc#971933).
   - mm/huge_memory.c: respect FOLL_FORCE/FOLL_COW for thp (bnc#1030118).
   - mm, memcg: do not retry precharge charges (bnc#1022559).
   - mm/mempolicy.c: do not put mempolicy before using its nodemask
     (References: VM Performance, bnc#931620).
   - mm/page_alloc: fix nodes for reclaim in fast path (bnc#1031842).
   - module: move add_taint_module() to a header file
   - net: Add skb_gro_postpull_rcsum to udp and vxlan (bsc#1009682).
   - net: add skb_pop_rcv_encapsulation (bsc#1009682).
   - net: Call skb_checksum_init in IPv4 (bsc#1009682).
   - net: Call skb_checksum_init in IPv6 (bsc#1009682).
   - netfilter: allow logging fron non-init netns (bsc#970083).
   - net: Generalize checksum_init functions (bsc#1009682).
   - net: Preserve CHECKSUM_COMPLETE at validation (bsc#1009682).
   - NFS: do not try to cross a mountpount when there isn't one there
     (bsc#1028041).
   - NFS: Expedite unmount of NFS auto-mounts (bnc#1025802).
   - NFS: Fix a performance regression in readdir (bsc#857926).
   - NFS: flush out dirty data on file fput() (bsc#1021762).
   - ocfs2: do not write error flag to user structure we cannot copy from/to
     (bsc#1012985).
   - powerpc: Blacklist GCC 5.4 6.1 and 6.2 (boo#1028895).
   - powerpc: Create a helper for getting the kernel toc value (FATE#322421).
   - powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971).
   - powerpc/fadump: Reserve memory at an offset closer to bottom of RAM
     (bsc#1032141).
   - powerpc/fadump: Update fadump documentation (bsc#1032141).
   - powerpc/ftrace: Add Kconfig & Make glue for mprofile-kernel
     (FATE#322421).
   - powerpc/ftrace: Add support for -mprofile-kernel ftrace ABI
     (FATE#322421).
   - powerpc/ftrace: Use $(CC_FLAGS_FTRACE) when disabling ftrace
     (FATE#322421).
   - powerpc/ftrace: Use generic ftrace_modify_all_code() (FATE#322421).
   - powerpc: introduce TIF_KGR_IN_PROGRESS thread flag (FATE#322421).
   - powerpc/kgraft: Add kgraft header (FATE#322421).
   - powerpc/kgraft: Add kgraft stack to struct thread_info (FATE#322421).
   - powerpc/kgraft: Add live patching support on ppc64le (FATE#322421).
   - powerpc/module: Create a special stub for ftrace_caller() (FATE#322421).
   - powerpc/module: Mark module stubs with a magic value (FATE#322421).
   - powerpc/module: Only try to generate the ftrace_caller() stub once
     (FATE#322421).
   - powerpc/modules: Never restore r2 for a mprofile-kernel style mcount()
     call (FATE#322421).
   - powerpc/prom: Increase minimum RMA size to 512MB (bsc#984530).
   - powerpc/pseries/cpuidle: Remove MAX_IDLE_STATE macro (bnc#1023164).
   - powerpc/pseries/cpuidle: Use cpuidle_register() for initialisation
     (bnc#1023164).
   - powerpc: Reject binutils 2.24 when building little endian (boo#1028895).
   - RAID1: avoid unnecessary spin locks in I/O barrier code
     (bsc#982783,bsc#1020048).
   - raid1: include bio_end_io_list in nr_queued to prevent freeze_array hang
   - remove mpath patches from dmcache backport, for bsc#1035738
   - revert "procfs: mark thread stack correctly in proc/PID/maps"
     (bnc#1030901).
   - Revert "RDMA/core: Fix incorrect structure packing for booleans" (kabi).
   - rtnetlink: allow to register ops without ops->setup set (bsc#1021374).
   - s390/zcrypt: Introduce CEX6 toleration (FATE#321783, LTC#147506,
     bsc#1019514).
   - sched/loadavg: Avoid loadavg spikes caused by delayed NO_HZ accounting
     (bsc#1018419).
   - scsi_error: count medium access timeout only once per EH run
     (bsc#993832, bsc#1032345).
   - scsi: libiscsi: add lock around task lists to fix list corruption
     regression (bsc#1034700).
   - scsi: storvsc: fix SRB_STATUS_ABORTED handling
   - sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).
   - svcrpc: fix gss-proxy NULL dereference in some error cases (bsc#1024309).
   - taint/module: Clean up global and module taint flags handling
   - tcp: abort orphan sockets stalling on zero window probes (bsc#1021913).
   - thp: fix MADV_DONTNEED vs. numa balancing race (bnc#1027974).
   - thp: reduce indentation level in change_huge_pmd() (bnc#1027974).
   - treewide: fix "distingush" typo (bsc#1020795).
   - tree-wide: use reinit_completion instead of INIT_COMPLETION
     (bsc#1020795).
   - usb: dwc3: gadget: Fix incorrect DEPCMD and DGCMD status macros
     (bsc#1035699).
   - usb: host: xhci: print correct command ring address (bnc#1035699).
   - USB: serial: kl5kusb105: fix line-state error handling (bsc#1021256).
   - vfs: Do not exchange "short" filenames unconditionally (bsc#1012985).
   - vfs: split generic splice code from i_mutex locking (bsc#1024788).
   - vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).
   - VSOCK: Detach QP check should filter out non matching QPs (bsc#1036752).
   - vxlan: cancel sock_work in vxlan_dellink() (bsc#1031567).
   - vxlan: Checksum fixes (bsc#1009682).
   - vxlan: GRO support at tunnel layer (bsc#1009682).
   - xen-blkfront: correct maximum segment accounting (bsc#1018263).
   - xen-blkfront: do not call talk_to_blkback when already connected to
     blkback.
   - xen-blkfront: free resources if xlvbd_alloc_gendisk fails.
   - xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).
   - xfs: do not allow di_size with high bit set (bsc#1024234).
   - xfs: do not assert fail on non-async buffers on ioacct decrement
     (bsc#1024508).
   - xfs: exclude never-released buffers from buftarg I/O accounting
     (bsc#1024508).
   - xfs: fix broken multi-fsb buffer logging (bsc#1024081).
   - xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).
   - xfs: Fix lock ordering in splice write (bsc#1024788).
   - xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).
   - xfs: Make xfs_icdinode->di_dmstate atomic_t (bsc#1024788).
   - xfs: pass total block res. as total xfs_bmapi_write() parameter
     (bsc#1029470).
   - xfs: replace global xfslogd wq with per-mount wq (bsc#1024508).
   - xfs: track and serialize in-flight async buffers against unmount
     (bsc#1024508).


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 12-SP1:

      zypper in -t patch SUSE-SLE-WE-12-SP1-2017-831=1

   - SUSE Linux Enterprise Software Development Kit 12-SP1:

      zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-831=1

   - SUSE Linux Enterprise Server 12-SP1:

      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-831=1

   - SUSE Linux Enterprise Module for Public Cloud 12:

      zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2017-831=1

   - SUSE Linux Enterprise Live Patching 12:

      zypper in -t patch SUSE-SLE-Live-Patching-12-2017-831=1

   - SUSE Linux Enterprise Desktop 12-SP1:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-831=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):

      kernel-default-debuginfo-3.12.74-60.64.40.1
      kernel-default-debugsource-3.12.74-60.64.40.1
      kernel-default-extra-3.12.74-60.64.40.1
      kernel-default-extra-debuginfo-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):

      kernel-obs-build-3.12.74-60.64.40.1
      kernel-obs-build-debugsource-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Software Development Kit 12-SP1 (noarch):

      kernel-docs-3.12.74-60.64.40.4

   - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):

      kernel-default-3.12.74-60.64.40.1
      kernel-default-base-3.12.74-60.64.40.1
      kernel-default-base-debuginfo-3.12.74-60.64.40.1
      kernel-default-debuginfo-3.12.74-60.64.40.1
      kernel-default-debugsource-3.12.74-60.64.40.1
      kernel-default-devel-3.12.74-60.64.40.1
      kernel-syms-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Server 12-SP1 (noarch):

      kernel-devel-3.12.74-60.64.40.1
      kernel-macros-3.12.74-60.64.40.1
      kernel-source-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Server 12-SP1 (x86_64):

      kernel-xen-3.12.74-60.64.40.1
      kernel-xen-base-3.12.74-60.64.40.1
      kernel-xen-base-debuginfo-3.12.74-60.64.40.1
      kernel-xen-debuginfo-3.12.74-60.64.40.1
      kernel-xen-debugsource-3.12.74-60.64.40.1
      kernel-xen-devel-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Server 12-SP1 (s390x):

      kernel-default-man-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64):

      kernel-ec2-3.12.74-60.64.40.1
      kernel-ec2-debuginfo-3.12.74-60.64.40.1
      kernel-ec2-debugsource-3.12.74-60.64.40.1
      kernel-ec2-devel-3.12.74-60.64.40.1
      kernel-ec2-extra-3.12.74-60.64.40.1
      kernel-ec2-extra-debuginfo-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Live Patching 12 (x86_64):

      kgraft-patch-3_12_74-60_64_40-default-1-4.1
      kgraft-patch-3_12_74-60_64_40-xen-1-4.1

   - SUSE Linux Enterprise Desktop 12-SP1 (x86_64):

      kernel-default-3.12.74-60.64.40.1
      kernel-default-debuginfo-3.12.74-60.64.40.1
      kernel-default-debugsource-3.12.74-60.64.40.1
      kernel-default-devel-3.12.74-60.64.40.1
      kernel-default-extra-3.12.74-60.64.40.1
      kernel-default-extra-debuginfo-3.12.74-60.64.40.1
      kernel-syms-3.12.74-60.64.40.1
      kernel-xen-3.12.74-60.64.40.1
      kernel-xen-debuginfo-3.12.74-60.64.40.1
      kernel-xen-debugsource-3.12.74-60.64.40.1
      kernel-xen-devel-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Desktop 12-SP1 (noarch):

      kernel-devel-3.12.74-60.64.40.1
      kernel-macros-3.12.74-60.64.40.1
      kernel-source-3.12.74-60.64.40.1


References:

   https://www.suse.com/security/cve/CVE-2015-1350.html
   https://www.suse.com/security/cve/CVE-2016-10044.html
   https://www.suse.com/security/cve/CVE-2016-10200.html
   https://www.suse.com/security/cve/CVE-2016-10208.html
   https://www.suse.com/security/cve/CVE-2016-2117.html
   https://www.suse.com/security/cve/CVE-2016-3070.html
   https://www.suse.com/security/cve/CVE-2016-5243.html
   https://www.suse.com/security/cve/CVE-2016-7117.html
   https://www.suse.com/security/cve/CVE-2016-9191.html
   https://www.suse.com/security/cve/CVE-2016-9588.html
   https://www.suse.com/security/cve/CVE-2016-9604.html
   https://www.suse.com/security/cve/CVE-2017-2647.html
   https://www.suse.com/security/cve/CVE-2017-2671.html
   https://www.suse.com/security/cve/CVE-2017-5669.html
   https://www.suse.com/security/cve/CVE-2017-5897.html
   https://www.suse.com/security/cve/CVE-2017-5986.html
   https://www.suse.com/security/cve/CVE-2017-6074.html
   https://www.suse.com/security/cve/CVE-2017-6214.html
   https://www.suse.com/security/cve/CVE-2017-6345.html
   https://www.suse.com/security/cve/CVE-2017-6346.html
   https://www.suse.com/security/cve/CVE-2017-6348.html
   https://www.suse.com/security/cve/CVE-2017-6353.html
   https://www.suse.com/security/cve/CVE-2017-6951.html
   https://www.suse.com/security/cve/CVE-2017-7187.html
   https://www.suse.com/security/cve/CVE-2017-7261.html
   https://www.suse.com/security/cve/CVE-2017-7294.html
   https://www.suse.com/security/cve/CVE-2017-7308.html
   https://www.suse.com/security/cve/CVE-2017-7616.html
   https://www.suse.com/security/cve/CVE-2017-7645.html
   https://www.suse.com/security/cve/CVE-2017-8106.html
   https://bugzilla.suse.com/1003077
   https://bugzilla.suse.com/1008842
   https://bugzilla.suse.com/1009682
   https://bugzilla.suse.com/1012620
   https://bugzilla.suse.com/1012985
   https://bugzilla.suse.com/1015703
   https://bugzilla.suse.com/1015787
   https://bugzilla.suse.com/1015821
   https://bugzilla.suse.com/1017512
   https://bugzilla.suse.com/1018100
   https://bugzilla.suse.com/1018263
   https://bugzilla.suse.com/1018419
   https://bugzilla.suse.com/1018446
   https://bugzilla.suse.com/1019168
   https://bugzilla.suse.com/1019514
   https://bugzilla.suse.com/1020048
   https://bugzilla.suse.com/1020795
   https://bugzilla.suse.com/1021256
   https://bugzilla.suse.com/1021374
   https://bugzilla.suse.com/1021762
   https://bugzilla.suse.com/1021913
   https://bugzilla.suse.com/1022559
   https://bugzilla.suse.com/1022971
   https://bugzilla.suse.com/1023164
   https://bugzilla.suse.com/1023207
   https://bugzilla.suse.com/1023377
   https://bugzilla.suse.com/1023762
   https://bugzilla.suse.com/1023824
   https://bugzilla.suse.com/1023888
   https://bugzilla.suse.com/1023992
   https://bugzilla.suse.com/1024081
   https://bugzilla.suse.com/1024234
   https://bugzilla.suse.com/1024309
   https://bugzilla.suse.com/1024508
   https://bugzilla.suse.com/1024788
   https://bugzilla.suse.com/1025039
   https://bugzilla.suse.com/1025235
   https://bugzilla.suse.com/1025354
   https://bugzilla.suse.com/1025802
   https://bugzilla.suse.com/1026024
   https://bugzilla.suse.com/1026722
   https://bugzilla.suse.com/1026914
   https://bugzilla.suse.com/1027066
   https://bugzilla.suse.com/1027178
   https://bugzilla.suse.com/1027189
   https://bugzilla.suse.com/1027190
   https://bugzilla.suse.com/1027974
   https://bugzilla.suse.com/1028041
   https://bugzilla.suse.com/1028415
   https://bugzilla.suse.com/1028595
   https://bugzilla.suse.com/1028648
   https://bugzilla.suse.com/1028895
   https://bugzilla.suse.com/1029470
   https://bugzilla.suse.com/1029850
   https://bugzilla.suse.com/1029986
   https://bugzilla.suse.com/1030118
   https://bugzilla.suse.com/1030213
   https://bugzilla.suse.com/1030593
   https://bugzilla.suse.com/1030901
   https://bugzilla.suse.com/1031003
   https://bugzilla.suse.com/1031052
   https://bugzilla.suse.com/1031080
   https://bugzilla.suse.com/1031440
   https://bugzilla.suse.com/1031567
   https://bugzilla.suse.com/1031579
   https://bugzilla.suse.com/1031662
   https://bugzilla.suse.com/1031842
   https://bugzilla.suse.com/1032125
   https://bugzilla.suse.com/1032141
   https://bugzilla.suse.com/1032344
   https://bugzilla.suse.com/1032345
   https://bugzilla.suse.com/1033336
   https://bugzilla.suse.com/1034670
   https://bugzilla.suse.com/103470
   https://bugzilla.suse.com/1034700
   https://bugzilla.suse.com/1035576
   https://bugzilla.suse.com/1035699
   https://bugzilla.suse.com/1035738
   https://bugzilla.suse.com/1035877
   https://bugzilla.suse.com/1036752
   https://bugzilla.suse.com/1038261
   https://bugzilla.suse.com/799133
   https://bugzilla.suse.com/857926
   https://bugzilla.suse.com/914939
   https://bugzilla.suse.com/917630
   https://bugzilla.suse.com/922853
   https://bugzilla.suse.com/930399
   https://bugzilla.suse.com/931620
   https://bugzilla.suse.com/937444
   https://bugzilla.suse.com/940946
   https://bugzilla.suse.com/954763
   https://bugzilla.suse.com/968697
   https://bugzilla.suse.com/970083
   https://bugzilla.suse.com/971933
   https://bugzilla.suse.com/979215
   https://bugzilla.suse.com/982783
   https://bugzilla.suse.com/983212
   https://bugzilla.suse.com/984530
   https://bugzilla.suse.com/985561
   https://bugzilla.suse.com/988065
   https://bugzilla.suse.com/989056
   https://bugzilla.suse.com/993832

SuSE: 2017:1360-1: important: the Linux Kernel

May 19, 2017
An update that solves 30 vulnerabilities and has 72 fixes An update that solves 30 vulnerabilities and has 72 fixes An update that solves 30 vulnerabilities and has 72 fixes is now...

Summary

The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.74 to receive various security and bugfixes. Notable new/improved features: - Improved support for Hyper-V - Support for the tcp_westwood TCP scheduling algorithm The following security bugs were fixed: - CVE-2017-8106: The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel allowed privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer (bsc#1035877). - CVE-2017-6951: The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the "dead" type. (bsc#1029850). - CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c. (bsc#1030593) - CVE-2016-9604: This fixes handling of keyrings starting with '.' in KEYCTL_JOIN_SESSION_KEYRING, which could have allowed local users to manipulate privileged keyrings (bsc#1035576) - CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation. (bnc#1033336). - CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c. (bsc#1034670). - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579) - CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel was too late in obtaining a certain lock and consequently could not ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003) - CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440) - CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052) - CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213) - CVE-2016-9588: arch/x86/kvm/vmx.c in the Linux kernel mismanaged the #BP and #OF exceptions, which allowed guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest (bsc#1015703). - CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel did not restrict the address calculated by a certain rounding operation, which allowed local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context (bnc#1026914). - CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415) - CVE-2016-10208: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel did not properly validate meta block groups, which allowed physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image (bnc#1023377). - CVE-2017-5897: The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allowed remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access (bsc#1023762). - CVE-2017-5986: A race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235). - CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024) - CVE-2016-9191: The cgroup offline implementation in the Linux kernel mishandled certain drain operations, which allowed local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application (bnc#1008842) - CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel improperly managed lock dropping, which allowed local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (bnc#1027178). - CVE-2016-10044: The aio_mount function in fs/aio.c in the Linux kernel did not properly restrict execute access, which made it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call (bnc#1023992). - CVE-2016-3070: The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel improperly interacts with mm/migrate.c, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move (bnc#979215). - CVE-2016-5243: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel did not properly copy a certain string, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#983212). - CVE-2017-6345: The LLC subsystem in the Linux kernel did not ensure that a certain destructor exists in required circumstances, which allowed local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls (bnc#1027190) - CVE-2017-6346: Race condition in net/packet/af_packet.c in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that made PACKET_FANOUT setsockopt system calls (bnc#1027189) - CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986 (bnc#1027066) - CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235). - CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722) - CVE-2016-2117: The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel incorrectly enables scatter/gather I/O, which allowed remote attackers to obtain sensitive information from kernel memory by reading packet data (bnc#968697) - CVE-2015-1350: The VFS subsystem in the Linux kernel provided an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bsc#914939). - CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003077). The following non-security bugs were fixed: - ACPI / APEI: Fix NMI notification handling (bsc#917630). - arch: Mass conversion of smp_mb__*() (bsc#1020795). - asm-generic: add __smp_xxx wrappers (bsc#1020795). - block: remove struct request buffer member (bsc#1020795). - block: submit_bio_wait() conversions (bsc#1020795). - bonding: Advertize vxlan offload features when supported (bsc#1009682). - bonding: handle more gso types (bsc#1009682). - bonding: use the correct ether type for alb (bsc#1028595). - btrfs: allow unlink to exceed subvolume quota (bsc#1015821). - btrfs: Change qgroup_meta_rsv to 64bit (bsc#1015821). - btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls (bsc#1018100). - btrfs: make file clone aware of fatal signals (bsc#1015787). - btrfs: qgroups: Retry after commit on getting EDQUOT (bsc#1015821). - cancel the setfilesize transation when io error happen (bsc#1028648). - cgroup: remove stray references to css_id (bsc#1020795). - cpuidle: powernv/pseries: Auto-promotion of snooze to deeper idle state (bnc#1023164). - dm: add era target (bsc#1020795). - dm: allow remove to be deferred (bsc#1020795). - dm bitset: only flush the current word if it has been dirtied (bsc#1020795). - dm btree: add dm_btree_find_lowest_key (bsc#1020795). - dm cache: actually resize cache (bsc#1020795). - dm cache: add block sizes and total cache blocks to status output (bsc#1020795). - dm cache: add cache block invalidation support (bsc#1020795). - dm cache: add passthrough mode (bsc#1020795). - dm cache: add policy name to status output (bsc#1020795). - dm cache: add remove_cblock method to policy interface (bsc#1020795). - dm cache: be much more aggressive about promoting writes to discarded blocks (bsc#1020795). - dm cache: cache shrinking support (bsc#1020795). - dm cache: do not add migration to completed list before unhooking bio (bsc#1020795). - dm cache: fix a lock-inversion (bsc#1020795). - dm cache: fix truncation bug when mapping I/O to more than 2TB fast device (bsc#1020795). - dm cache: fix writethrough mode quiescing in cache_map (bsc#1020795). - dm cache: improve efficiency of quiescing flag management (bsc#1020795). - dm cache: io destined for the cache device can now serve as tick bios (bsc#1020795). - dm cache: log error message if dm_kcopyd_copy() fails (bsc#1020795). - dm cache metadata: check the metadata version when reading the superblock (bsc#1020795). - dm cache metadata: return bool from __superblock_all_zeroes (bsc#1020795). - dm cache: move hook_info into common portion of per_bio_data structure (bsc#1020795). - dm cache: optimize commit_if_needed (bsc#1020795). - dm cache policy mq: a few small fixes (bsc#1020795). - dm cache policy mq: fix promotions to occur as expected (bsc#1020795). - dm cache policy mq: implement writeback_work() and mq_{set,clear}_dirty() (bsc#1020795). - dm cache policy mq: introduce three promotion threshold tunables (bsc#1020795). - dm cache policy mq: protect residency method with existing mutex (bsc#1020795). - dm cache policy mq: reduce memory requirements (bsc#1020795). - dm cache policy mq: use list_del_init instead of list_del + INIT_LIST_HEAD (bsc#1020795). - dm cache policy: remove return from void policy_remove_mapping (bsc#1020795). - dm cache: promotion optimisation for writes (bsc#1020795). - dm cache: resolve small nits and improve Documentation (bsc#1020795). - dm cache: return -EINVAL if the user specifies unknown cache policy (bsc#1020795). - dm cache: use cell_defer() boolean argument consistently (bsc#1020795). - dm: change sector_count member in clone_info from sector_t to unsigned (bsc#1020795). - dm crypt: add TCW IV mode for old CBC TCRYPT containers (bsc#1020795). - dm crypt: properly handle extra key string in initialization (bsc#1020795). - dm delay: use per-bio data instead of a mempool and slab cache (bsc#1020795). - dm: fix Kconfig indentation (bsc#1020795). - dm: fix Kconfig menu indentation (bsc#1020795). - dm: make dm_table_alloc_md_mempools static (bsc#1020795). - dm mpath: do not call pg_init when it is already running (bsc#1020795). - dm mpath: fix lock order inconsistency in multipath_ioctl (bsc#1020795). - dm mpath: print more useful warnings in multipath_message() (bsc#1020795). - dm mpath: push back requests instead of queueing (bsc#1020795). - dm mpath: really fix lockdep warning (bsc#1020795). - dm mpath: reduce memory pressure when requeuing (bsc#1020795). - dm mpath: remove extra nesting in map function (bsc#1020795). - dm mpath: remove map_io() (bsc#1020795). - dm mpath: remove process_queued_ios() (bsc#1020795). - dm mpath: requeue I/O during pg_init (bsc#1020795). - dm persistent data: cleanup dm-thin specific references in text (bsc#1020795). - dm snapshot: call destroy_work_on_stack() to pair with INIT_WORK_ONSTACK() (bsc#1020795). - dm snapshot: fix metadata corruption (bsc#1020795). - dm snapshot: prepare for switch to using dm-bufio (bsc#1020795). - dm snapshot: use dm-bufio (bsc#1020795). - dm snapshot: use dm-bufio prefetch (bsc#1020795). - dm snapshot: use GFP_KERNEL when initializing exceptions (bsc#1020795). - dm space map disk: optimise sm_disk_dec_block (bsc#1020795). - dm space map metadata: limit errors in sm_metadata_new_block (bsc#1020795). - dm: stop using bi_private (bsc#1020795). - dm table: add dm_table_run_md_queue_async (bsc#1020795). - dm table: print error on preresume failure (bsc#1020795). - dm table: remove unused buggy code that extends the targets array (bsc#1020795). - dm thin: add error_if_no_space feature (bsc#1020795). - dm thin: add mappings to end of prepared_* lists (bsc#1020795). - dm thin: add 'no_space_timeout' dm-thin-pool module param (bsc#1020795). - dm thin: add timeout to stop out-of-data-space mode holding IO forever (bsc#1020795). - dm thin: allow metadata commit if pool is in PM_OUT_OF_DATA_SPACE mode (bsc#1020795). - dm thin: allow metadata space larger than supported to go unused (bsc#1020795). - dm thin: cleanup and improve no space handling (bsc#1020795). - dm thin: eliminate the no_free_space flag (bsc#1020795). - dm thin: ensure user takes action to validate data and metadata consistency (bsc#1020795). - dm thin: factor out check_low_water_mark and use bools (bsc#1020795). - dm thin: fix deadlock in __requeue_bio_list (bsc#1020795). - dm thin: fix noflush suspend IO queueing (bsc#1020795). - dm thin: fix out of data space handling (bsc#1020795). - dm thin: fix pool feature parsing (bsc#1020795). - dm thin: fix rcu_read_lock being held in code that can sleep (bsc#1020795). - dm thin: handle metadata failures more consistently (bsc#1020795). - dm thin: irqsave must always be used with the pool->lock spinlock (bsc#1020795). - dm thin: log info when growing the data or metadata device (bsc#1020795). - dm thin: requeue bios to DM core if no_free_space and in read-only mode (bsc#1020795). - dm thin: return error from alloc_data_block if pool is not in write mode (bsc#1020795). - dm thin: simplify pool_is_congested (bsc#1020795). - dm thin: sort the per thin deferred bios using an rb_tree (bsc#1020795). - dm thin: synchronize the pool mode during suspend (bsc#1020795). - dm thin: use bool rather than unsigned for flags in structures (bsc#1020795). - dm thin: use INIT_WORK_ONSTACK in noflush_work to avoid ODEBUG warning (bsc#1020795). - dm thin: use per thin device deferred bio lists (bsc#1020795). - dm: use RCU_INIT_POINTER instead of rcu_assign_pointer in __unbind (bsc#1020795). - drm/i915: relax uncritical udelay_range() (bsc#1038261). - ether: add loopback type ETH_P_LOOPBACK (bsc#1028595). - ext4: fix bh leak on error paths in ext4_rename() and ext4_cross_rename() (bsc#1012985). - ext4: fix fencepost in s_first_meta_bg validation (bsc#1029986). - ext4: mark inode dirty after converting inline directory (bsc#1012985). - ftrace: Make ftrace_location_range() global (FATE#322421). - HID: usbhid: improve handling of Clear-Halt and reset (bsc#1031080). - hv: util: catch allocation errors - hv: utils: use memdup_user in hvt_op_write - hwrng: virtio - ensure reads happen after successful probe (bsc#954763 bsc#1032344). - i40e: avoid null pointer dereference (bsc#922853). - i40e/i40evf: Break up xmit_descriptor_count from maybe_stop_tx (bsc#985561). - i40e/i40evf: Limit TSO to 7 descriptors for payload instead of 8 per packet (bsc#985561). - i40e/i40evf: Rewrite logic for 8 descriptor per packet check (bsc#985561). - i40e: Impose a lower limit on gso size (bsc#985561). - i40e: Limit TX descriptor count in cases where frag size is greater than 16K (bsc#985561). - iommu/vt-d: Flush old iommu caches for kdump when the device gets context mapped (bsc#1023824). - iommu/vt-d: Tylersburg isoch identity map check is done too late (bsc#1032125). - ipv6: make ECMP route replacement less greedy (bsc#930399). - kabi: hide changes in struct sk_buff (bsc#1009682). - KABI: Hide new include in arch/powerpc/kernel/process.c (fate#322421). - kABI: mask struct xfs_icdinode change (bsc#1024788). - kABI: protect struct inet6_dev (kabi). - kABI: protect struct iscsi_conn (bsc#103470). - kABI: protect struct xfs_buftarg and struct xfs_mount (bsc#1024508). - kABI: restore can_rx_register parameters (kabi). - kernel/watchdog: use nmi registers snapshot in hardlockup handler (bsc#940946, bsc#937444). - kgr: Mark eeh_event_handler() kthread safe using a timeout (bsc#1031662). - kgr/module: make a taint flag module-specific - kgr: remove unneeded kgr_needs_lazy_migration() s390x definition - l2tp: fix address test in __l2tp_ip6_bind_lookup() (bsc#1028415). - l2tp: fix lookup for sockets not bound to a device in l2tp_ip (bsc#1028415). - l2tp: fix racy socket lookup in l2tp_ip and l2tp_ip6 bind() (bsc#1028415). - l2tp: hold socket before dropping lock in l2tp_ip{, 6}_recv() (bsc#1028415). - l2tp: hold tunnel socket when handling control frames in l2tp_ip and l2tp_ip6 (bsc#1028415). - l2tp: lock socket before checking flags in connect() (bsc#1028415). - livepatch: Allow architectures to specify an alternate ftrace location (FATE#322421). - locking/semaphore: Add down_interruptible_timeout() (bsc#1031662). - md: avoid oops on unload if some process is in poll or select (bsc#1020795). - md: Convert use of typedef ctl_table to struct ctl_table (bsc#1020795). - md: ensure metadata is writen after raid level change (bsc#1020795). - md linear: fix a race between linear_add() and linear_congested() (bsc#1018446). - md: md_clear_badblocks should return an error code on failure (bsc#1020795). - md: refuse to change shape of array if it is active but read-only (bsc#1020795). - megaraid_sas: add missing curly braces in ioctl handler (bsc#1023207). - megaraid_sas: Fixup tgtid count in megasas_ld_list_query() (bsc#971933). - mm/huge_memory.c: respect FOLL_FORCE/FOLL_COW for thp (bnc#1030118). - mm, memcg: do not retry precharge charges (bnc#1022559). - mm/mempolicy.c: do not put mempolicy before using its nodemask

References

#1003077 #1008842 #1009682 #1012620 #1012985

#1015703 #1015787 #1015821 #1017512 #1018100

#1018263 #1018419 #1018446 #1019168 #1019514

#1020048 #1020795 #1021256 #1021374 #1021762

#1021913 #1022559 #1022971 #1023164 #1023207

#1023377 #1023762 #1023824 #1023888 #1023992

#1024081 #1024234 #1024309 #1024508 #1024788

#1025039 #1025235 #1025354 #1025802 #1026024

#1026722 #1026914 #1027066 #1027178 #1027189

#1027190 #1027974 #1028041 #1028415 #1028595

#1028648 #1028895 #1029470 #1029850 #1029986

#1030118 #1030213 #1030593 #1030901 #1031003

#1031052 #1031080 #1031440 #1031567 #1031579

#1031662 #1031842 #1032125 #1032141 #1032344

#1032345 #1033336 #1034670 #103470 #1034700

#1035576 #1035699 #1035738 #1035877 #1036752

#1038261 #799133 #857926 #914939 #917630

#922853 #930399 #931620 #937444 #940946 #954763

#968697 #970083 #971933 #979215 #982783 #983212

#984530 #985561 #988065 #989056 #993832

Cross- CVE-2015-1350 CVE-2016-10044 CVE-2016-10200

CVE-2016-10208 CVE-2016-2117 CVE-2016-3070

CVE-2016-5243 CVE-2016-7117 CVE-2016-9191

CVE-2016-9588 CVE-2016-9604 CVE-2017-2647

CVE-2017-2671 CVE-2017-5669 CVE-2017-5897

CVE-2017-5986 CVE-2017-6074 CVE-2017-6214

CVE-2017-6345 CVE-2017-6346 CVE-2017-6348

CVE-2017-6353 CVE-2017-6951 CVE-2017-7187

CVE-2017-7261 CVE-2017-7294 CVE-2017-7308

CVE-2017-7616 CVE-2017-7645 CVE-2017-8106

Affected Products:

SUSE Linux Enterprise Workstation Extension 12-SP1

SUSE Linux Enterprise Software Development Kit 12-SP1

SUSE Linux Enterprise Server 12-SP1

SUSE Linux Enterprise Module for Public Cloud 12

SUSE Linux Enterprise Live Patching 12

SUSE Linux Enterprise Desktop 12-SP1

( VM Performance, bnc#931620).

- mm/page_alloc: fix nodes for reclaim in fast path (bnc#1031842).

- module: move add_taint_module() to a header file

- net: Add skb_gro_postpull_rcsum to udp and vxlan (bsc#1009682).

- net: add skb_pop_rcv_encapsulation (bsc#1009682).

- net: Call skb_checksum_init in IPv4 (bsc#1009682).

- net: Call skb_checksum_init in IPv6 (bsc#1009682).

- netfilter: allow logging fron non-init netns (bsc#970083).

- net: Generalize checksum_init functions (bsc#1009682).

- net: Preserve CHECKSUM_COMPLETE at validation (bsc#1009682).

- NFS: do not try to cross a mountpount when there isn't one there

(bsc#1028041).

- NFS: Expedite unmount of NFS auto-mounts (bnc#1025802).

- NFS: Fix a performance regression in readdir (bsc#857926).

- NFS: flush out dirty data on file fput() (bsc#1021762).

- ocfs2: do not write error flag to user structure we cannot copy from/to

(bsc#1012985).

- powerpc: Blacklist GCC 5.4 6.1 and 6.2 (boo#1028895).

- powerpc: Create a helper for getting the kernel toc value (FATE#322421).

- powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971).

- powerpc/fadump: Reserve memory at an offset closer to bottom of RAM

(bsc#1032141).

- powerpc/fadump: Update fadump documentation (bsc#1032141).

- powerpc/ftrace: Add Kconfig & Make glue for mprofile-kernel

(FATE#322421).

- powerpc/ftrace: Add support for -mprofile-kernel ftrace ABI

(FATE#322421).

- powerpc/ftrace: Use $(CC_FLAGS_FTRACE) when disabling ftrace

(FATE#322421).

- powerpc/ftrace: Use generic ftrace_modify_all_code() (FATE#322421).

- powerpc: introduce TIF_KGR_IN_PROGRESS thread flag (FATE#322421).

- powerpc/kgraft: Add kgraft header (FATE#322421).

- powerpc/kgraft: Add kgraft stack to struct thread_info (FATE#322421).

- powerpc/kgraft: Add live patching support on ppc64le (FATE#322421).

- powerpc/module: Create a special stub for ftrace_caller() (FATE#322421).

- powerpc/module: Mark module stubs with a magic value (FATE#322421).

- powerpc/module: Only try to generate the ftrace_caller() stub once

(FATE#322421).

- powerpc/modules: Never restore r2 for a mprofile-kernel style mcount()

call (FATE#322421).

- powerpc/prom: Increase minimum RMA size to 512MB (bsc#984530).

- powerpc/pseries/cpuidle: Remove MAX_IDLE_STATE macro (bnc#1023164).

- powerpc/pseries/cpuidle: Use cpuidle_register() for initialisation

(bnc#1023164).

- powerpc: Reject binutils 2.24 when building little endian (boo#1028895).

- RAID1: avoid unnecessary spin locks in I/O barrier code

(bsc#982783,bsc#1020048).

- raid1: include bio_end_io_list in nr_queued to prevent freeze_array hang

- remove mpath patches from dmcache backport, for bsc#1035738

- revert "procfs: mark thread stack correctly in proc/PID/maps"

(bnc#1030901).

- Revert "RDMA/core: Fix incorrect structure packing for booleans" (kabi).

- rtnetlink: allow to register ops without ops->setup set (bsc#1021374).

- s390/zcrypt: Introduce CEX6 toleration (FATE#321783, LTC#147506,

bsc#1019514).

- sched/loadavg: Avoid loadavg spikes caused by delayed NO_HZ accounting

(bsc#1018419).

- scsi_error: count medium access timeout only once per EH run

(bsc#993832, bsc#1032345).

- scsi: libiscsi: add lock around task lists to fix list corruption

regression (bsc#1034700).

- scsi: storvsc: fix SRB_STATUS_ABORTED handling

- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).

- svcrpc: fix gss-proxy NULL dereference in some error cases (bsc#1024309).

- taint/module: Clean up global and module taint flags handling

- tcp: abort orphan sockets stalling on zero window probes (bsc#1021913).

- thp: fix MADV_DONTNEED vs. numa balancing race (bnc#1027974).

- thp: reduce indentation level in change_huge_pmd() (bnc#1027974).

- treewide: fix "distingush" typo (bsc#1020795).

- tree-wide: use reinit_completion instead of INIT_COMPLETION

(bsc#1020795).

- usb: dwc3: gadget: Fix incorrect DEPCMD and DGCMD status macros

(bsc#1035699).

- usb: host: xhci: print correct command ring address (bnc#1035699).

- USB: serial: kl5kusb105: fix line-state error handling (bsc#1021256).

- vfs: Do not exchange "short" filenames unconditionally (bsc#1012985).

- vfs: split generic splice code from i_mutex locking (bsc#1024788).

- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).

- VSOCK: Detach QP check should filter out non matching QPs (bsc#1036752).

- vxlan: cancel sock_work in vxlan_dellink() (bsc#1031567).

- vxlan: Checksum fixes (bsc#1009682).

- vxlan: GRO support at tunnel layer (bsc#1009682).

- xen-blkfront: correct maximum segment accounting (bsc#1018263).

- xen-blkfront: do not call talk_to_blkback when already connected to

blkback.

- xen-blkfront: free resources if xlvbd_alloc_gendisk fails.

- xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).

- xfs: do not allow di_size with high bit set (bsc#1024234).

- xfs: do not assert fail on non-async buffers on ioacct decrement

(bsc#1024508).

- xfs: exclude never-released buffers from buftarg I/O accounting

(bsc#1024508).

- xfs: fix broken multi-fsb buffer logging (bsc#1024081).

- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).

- xfs: Fix lock ordering in splice write (bsc#1024788).

- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).

- xfs: Make xfs_icdinode->di_dmstate atomic_t (bsc#1024788).

- xfs: pass total block res. as total xfs_bmapi_write() parameter

(bsc#1029470).

- xfs: replace global xfslogd wq with per-mount wq (bsc#1024508).

- xfs: track and serialize in-flight async buffers against unmount

(bsc#1024508).

Patch Instructions:

To install this SUSE Security Update use YaST online_update.

Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Workstation Extension 12-SP1:

zypper in -t patch SUSE-SLE-WE-12-SP1-2017-831=1

- SUSE Linux Enterprise Software Development Kit 12-SP1:

zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-831=1

- SUSE Linux Enterprise Server 12-SP1:

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-831=1

- SUSE Linux Enterprise Module for Public Cloud 12:

zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2017-831=1

- SUSE Linux Enterprise Live Patching 12:

zypper in -t patch SUSE-SLE-Live-Patching-12-2017-831=1

- SUSE Linux Enterprise Desktop 12-SP1:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-831=1

To bring your system up-to-date, use "zypper patch".

Package List:

- SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):

kernel-default-debuginfo-3.12.74-60.64.40.1

kernel-default-debugsource-3.12.74-60.64.40.1

kernel-default-extra-3.12.74-60.64.40.1

kernel-default-extra-debuginfo-3.12.74-60.64.40.1

- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):

kernel-obs-build-3.12.74-60.64.40.1

kernel-obs-build-debugsource-3.12.74-60.64.40.1

- SUSE Linux Enterprise Software Development Kit 12-SP1 (noarch):

kernel-docs-3.12.74-60.64.40.4

- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):

kernel-default-3.12.74-60.64.40.1

kernel-default-base-3.12.74-60.64.40.1

kernel-default-base-debuginfo-3.12.74-60.64.40.1

kernel-default-debuginfo-3.12.74-60.64.40.1

kernel-default-debugsource-3.12.74-60.64.40.1

kernel-default-devel-3.12.74-60.64.40.1

kernel-syms-3.12.74-60.64.40.1

- SUSE Linux Enterprise Server 12-SP1 (noarch):

kernel-devel-3.12.74-60.64.40.1

kernel-macros-3.12.74-60.64.40.1

kernel-source-3.12.74-60.64.40.1

- SUSE Linux Enterprise Server 12-SP1 (x86_64):

kernel-xen-3.12.74-60.64.40.1

kernel-xen-base-3.12.74-60.64.40.1

kernel-xen-base-debuginfo-3.12.74-60.64.40.1

kernel-xen-debuginfo-3.12.74-60.64.40.1

kernel-xen-debugsource-3.12.74-60.64.40.1

kernel-xen-devel-3.12.74-60.64.40.1

- SUSE Linux Enterprise Server 12-SP1 (s390x):

kernel-default-man-3.12.74-60.64.40.1

- SUSE Linux Enterprise Module for Public Cloud 12 (x86_64):

kernel-ec2-3.12.74-60.64.40.1

kernel-ec2-debuginfo-3.12.74-60.64.40.1

kernel-ec2-debugsource-3.12.74-60.64.40.1

kernel-ec2-devel-3.12.74-60.64.40.1

kernel-ec2-extra-3.12.74-60.64.40.1

kernel-ec2-extra-debuginfo-3.12.74-60.64.40.1

- SUSE Linux Enterprise Live Patching 12 (x86_64):

kgraft-patch-3_12_74-60_64_40-default-1-4.1

kgraft-patch-3_12_74-60_64_40-xen-1-4.1

- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):

kernel-default-3.12.74-60.64.40.1

kernel-default-debuginfo-3.12.74-60.64.40.1

kernel-default-debugsource-3.12.74-60.64.40.1

kernel-default-devel-3.12.74-60.64.40.1

kernel-default-extra-3.12.74-60.64.40.1

kernel-default-extra-debuginfo-3.12.74-60.64.40.1

kernel-syms-3.12.74-60.64.40.1

kernel-xen-3.12.74-60.64.40.1

kernel-xen-debuginfo-3.12.74-60.64.40.1

kernel-xen-debugsource-3.12.74-60.64.40.1

kernel-xen-devel-3.12.74-60.64.40.1

- SUSE Linux Enterprise Desktop 12-SP1 (noarch):

kernel-devel-3.12.74-60.64.40.1

kernel-macros-3.12.74-60.64.40.1

kernel-source-3.12.74-60.64.40.1

https://www.suse.com/security/cve/CVE-2015-1350.html

https://www.suse.com/security/cve/CVE-2016-10044.html

https://www.suse.com/security/cve/CVE-2016-10200.html

https://www.suse.com/security/cve/CVE-2016-10208.html

https://www.suse.com/security/cve/CVE-2016-2117.html

https://www.suse.com/security/cve/CVE-2016-3070.html

https://www.suse.com/security/cve/CVE-2016-5243.html

https://www.suse.com/security/cve/CVE-2016-7117.html

https://www.suse.com/security/cve/CVE-2016-9191.html

https://www.suse.com/security/cve/CVE-2016-9588.html

https://www.suse.com/security/cve/CVE-2016-9604.html

https://www.suse.com/security/cve/CVE-2017-2647.html

https://www.suse.com/security/cve/CVE-2017-2671.html

https://www.suse.com/security/cve/CVE-2017-5669.html

https://www.suse.com/security/cve/CVE-2017-5897.html

https://www.suse.com/security/cve/CVE-2017-5986.html

https://www.suse.com/security/cve/CVE-2017-6074.html

https://www.suse.com/security/cve/CVE-2017-6214.html

https://www.suse.com/security/cve/CVE-2017-6345.html

https://www.suse.com/security/cve/CVE-2017-6346.html

https://www.suse.com/security/cve/CVE-2017-6348.html

https://www.suse.com/security/cve/CVE-2017-6353.html

https://www.suse.com/security/cve/CVE-2017-6951.html

https://www.suse.com/security/cve/CVE-2017-7187.html

https://www.suse.com/security/cve/CVE-2017-7261.html

https://www.suse.com/security/cve/CVE-2017-7294.html

https://www.suse.com/security/cve/CVE-2017-7308.html

https://www.suse.com/security/cve/CVE-2017-7616.html

https://www.suse.com/security/cve/CVE-2017-7645.html

https://www.suse.com/security/cve/CVE-2017-8106.html

https://bugzilla.suse.com/1003077

https://bugzilla.suse.com/1008842

https://bugzilla.suse.com/1009682

https://bugzilla.suse.com/1012620

https://bugzilla.suse.com/1012985

https://bugzilla.suse.com/1015703

https://bugzilla.suse.com/1015787

https://bugzilla.suse.com/1015821

https://bugzilla.suse.com/1017512

https://bugzilla.suse.com/1018100

https://bugzilla.suse.com/1018263

https://bugzilla.suse.com/1018419

https://bugzilla.suse.com/1018446

https://bugzilla.suse.com/1019168

https://bugzilla.suse.com/1019514

https://bugzilla.suse.com/1020048

https://bugzilla.suse.com/1020795

https://bugzilla.suse.com/1021256

https://bugzilla.suse.com/1021374

https://bugzilla.suse.com/1021762

https://bugzilla.suse.com/1021913

https://bugzilla.suse.com/1022559

https://bugzilla.suse.com/1022971

https://bugzilla.suse.com/1023164

https://bugzilla.suse.com/1023207

https://bugzilla.suse.com/1023377

https://bugzilla.suse.com/1023762

https://bugzilla.suse.com/1023824

https://bugzilla.suse.com/1023888

https://bugzilla.suse.com/1023992

https://bugzilla.suse.com/1024081

https://bugzilla.suse.com/1024234

https://bugzilla.suse.com/1024309

https://bugzilla.suse.com/1024508

https://bugzilla.suse.com/1024788

https://bugzilla.suse.com/1025039

https://bugzilla.suse.com/1025235

https://bugzilla.suse.com/1025354

https://bugzilla.suse.com/1025802

https://bugzilla.suse.com/1026024

https://bugzilla.suse.com/1026722

https://bugzilla.suse.com/1026914

https://bugzilla.suse.com/1027066

https://bugzilla.suse.com/1027178

https://bugzilla.suse.com/1027189

https://bugzilla.suse.com/1027190

https://bugzilla.suse.com/1027974

https://bugzilla.suse.com/1028041

https://bugzilla.suse.com/1028415

https://bugzilla.suse.com/1028595

https://bugzilla.suse.com/1028648

https://bugzilla.suse.com/1028895

https://bugzilla.suse.com/1029470

https://bugzilla.suse.com/1029850

https://bugzilla.suse.com/1029986

https://bugzilla.suse.com/1030118

https://bugzilla.suse.com/1030213

https://bugzilla.suse.com/1030593

https://bugzilla.suse.com/1030901

https://bugzilla.suse.com/1031003

https://bugzilla.suse.com/1031052

https://bugzilla.suse.com/1031080

https://bugzilla.suse.com/1031440

https://bugzilla.suse.com/1031567

https://bugzilla.suse.com/1031579

https://bugzilla.suse.com/1031662

https://bugzilla.suse.com/1031842

https://bugzilla.suse.com/1032125

https://bugzilla.suse.com/1032141

https://bugzilla.suse.com/1032344

https://bugzilla.suse.com/1032345

https://bugzilla.suse.com/1033336

https://bugzilla.suse.com/1034670

https://bugzilla.suse.com/103470

https://bugzilla.suse.com/1034700

https://bugzilla.suse.com/1035576

https://bugzilla.suse.com/1035699

https://bugzilla.suse.com/1035738

https://bugzilla.suse.com/1035877

https://bugzilla.suse.com/1036752

https://bugzilla.suse.com/1038261

https://bugzilla.suse.com/799133

https://bugzilla.suse.com/857926

https://bugzilla.suse.com/914939

https://bugzilla.suse.com/917630

https://bugzilla.suse.com/922853

https://bugzilla.suse.com/930399

https://bugzilla.suse.com/931620

https://bugzilla.suse.com/937444

https://bugzilla.suse.com/940946

https://bugzilla.suse.com/954763

https://bugzilla.suse.com/968697

https://bugzilla.suse.com/970083

https://bugzilla.suse.com/971933

https://bugzilla.suse.com/979215

https://bugzilla.suse.com/982783

https://bugzilla.suse.com/983212

https://bugzilla.suse.com/984530

https://bugzilla.suse.com/985561

https://bugzilla.suse.com/988065

https://bugzilla.suse.com/989056

https://bugzilla.suse.com/993832

Severity
Announcement ID: SUSE-SU-2017:1360-1
Rating: important

Related News