SUSE-SU-2015:1071-1: important: Security update for the Linux Kernel
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Tue Jun 16 06:05:01 MDT 2015
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:1071-1
Rating: important
References: #899192 #900881 #909312 #913232 #914742 #915540
#916225 #917125 #919007 #919018 #920262 #921769
#922583 #922734 #922944 #924664 #924803 #924809
#925567 #926156 #926240 #926314 #927084 #927115
#927116 #927257 #927285 #927308 #927455 #928122
#928130 #928135 #928141 #928708 #929092 #929145
#929525 #929883 #930224 #930226 #930669 #930786
#931014 #931130
Cross-References: CVE-2014-3647 CVE-2014-8086 CVE-2014-8159
CVE-2015-1465 CVE-2015-2041 CVE-2015-2042
CVE-2015-2666 CVE-2015-2830 CVE-2015-2922
CVE-2015-3331 CVE-2015-3332 CVE-2015-3339
CVE-2015-3636
Affected Products:
SUSE Linux Enterprise Workstation Extension 12
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Module for Public Cloud 12
SUSE Linux Enterprise Live Patching 12
SUSE Linux Enterprise Desktop 12
______________________________________________________________________________
An update that solves 13 vulnerabilities and has 31 fixes
is now available.
Description:
The SUSE Linux Enterprise 12 kernel was updated to version 3.12.43 to
receive various security and bugfixes.
Following security bugs were fixed:
- CVE-2014-3647: arch/x86/kvm/emulate.c in the KVM subsystem in the Linux
kernel through 3.17.2 did not properly perform RIP changes, which
allowed guest OS users to cause a denial of service (guest OS crash) via
a crafted application (bsc#899192).
- CVE-2014-8086: Race condition in the ext4_file_write_iter function in
fs/ext4/file.c in the Linux kernel through 3.17 allowed local users to
cause a denial of service (file unavailability) via a combination of a
write action and an F_SETFL fcntl operation for the O_DIRECT flag
(bsc#900881).
- CVE-2014-8159: The InfiniBand (IB) implementation did not properly
restrict use of User Verbs for registration of memory regions, which
allowed local users to access arbitrary physical memory locations, and
consequently cause a denial of service (system crash) or gain
privileges, by leveraging permissions on a uverbs device under
/dev/infiniband/ (bsc#914742).
- CVE-2015-1465: The IPv4 implementation in the Linux kernel before 3.18.8
did not properly consider the length of the Read-Copy Update (RCU) grace
period for redirecting lookups in the absence of caching, which allowed
remote attackers to cause a denial of service (memory consumption or
system crash) via a flood of packets (bsc#916225).
- CVE-2015-2041: net/llc/sysctl_net_llc.c in the Linux kernel before 3.19
used an incorrect data type in a sysctl table, which allowed local users
to obtain potentially sensitive information from kernel memory or
possibly have unspecified other impact by accessing a sysctl entry
(bsc#919007).
- CVE-2015-2042: net/rds/sysctl.c in the Linux kernel before 3.19 used an
incorrect data type in a sysctl table, which allowed local users to
obtain potentially sensitive information from kernel memory or possibly
have unspecified other impact by accessing a sysctl entry (bsc#919018).
- CVE-2015-2666: Fixed a flaw that allowed crafted microcode to overflow
the kernel stack (bsc#922944).
- CVE-2015-2830: Fixed int80 fork from 64-bit tasks mishandling
(bsc#926240).
- CVE-2015-2922: Fixed possible denial of service (DoS) attack against
IPv6 network stacks due to improper handling of Router Advertisements
(bsc#922583).
- CVE-2015-3331: Fixed buffer overruns in RFC4106 implementation using
AESNI (bsc#927257).
- CVE-2015-3332: Fixed TCP Fast Open local DoS (bsc#928135).
- CVE-2015-3339: Fixed race condition flaw between the chown() and
execve() system calls which could have lead to local privilege
escalation (bsc#928130).
- CVE-2015-3636: Fixed use-after-free in ping sockets which could have
lead to local privilege escalation (bsc#929525).
The following non-security bugs were fixed:
- /proc/stat: convert to single_open_size() (bsc#928122).
- ACPI / sysfs: Treat the count field of counter_show() as unsigned
(bsc#909312).
- Automatically Provide/Obsolete all subpackages of old flavors
(bsc#925567)
- Btrfs: btrfs_release_extent_buffer_page did not free pages of dummy
extent (bsc#930226).
- Btrfs: fix inode eviction infinite loop after cloning into it
(bsc#930224).
- Btrfs: fix inode eviction infinite loop after extent_same ioctl
(bsc#930224).
- Btrfs: fix log tree corruption when fs mounted with -o discard
(bsc#927116).
- Btrfs: fix up bounds checking in lseek (bsc#927115).
- Fix rtworkqueues crash. Calling __sched_setscheduler() in interrupt
context is forbidden, and destroy_worker() did so in the timer interrupt
with a nohz_full config. Preclude that possibility for both boot options.
- Input: psmouse - add psmouse_matches_pnp_id helper function (bsc#929092).
- Input: synaptics - fix middle button on Lenovo 2015 products
(bsc#929092).
- Input: synaptics - handle spurious release of trackstick buttons
(bsc#929092).
- Input: synaptics - re-route tracksticks buttons on the Lenovo 2015
series (bsc#929092).
- Input: synaptics - remove TOPBUTTONPAD property for Lenovos 2015
(bsc#929092).
- Input: synaptics - retrieve the extended capabilities in query $10
(bsc#929092).
- NFS: Add attribute update barriers to nfs_setattr_update_inode()
(bsc#920262).
- NFS: restore kabi after change to nfs_setattr_update_inode (bsc#920262).
- af_iucv: fix AF_IUCV sendmsg() errno (bsc#927308, LTC#123304).
- audit: do not reject all AUDIT_INODE filter types (bsc#927455).
- bnx2x: Fix kdump when iommu=on (bsc#921769).
- cpufreq: fix a NULL pointer dereference in __cpufreq_governor()
(bsc#924664).
- dasd: Fix device having no paths after suspend/resume (bsc#927308,
LTC#123896).
- dasd: Fix inability to set a DASD device offline (bsc#927308,
LTC#123905).
- dasd: Fix unresumed device after suspend/resume (bsc#927308, LTC#123892).
- dasd: Missing partition after online processing (bsc#917125, LTC#120565).
- drm/radeon/cik: Add macrotile mode array query (bsc#927285).
- drm/radeon: fix display tiling setup on SI (bsc#927285).
- drm/radeon: set correct number of banks for CIK chips in DCE
(bsc#927285).
- iommu/amd: Correctly encode huge pages in iommu page tables (bsc#931014).
- iommu/amd: Optimize alloc_new_range for new fetch_pte interface
(bsc#931014).
- iommu/amd: Optimize amd_iommu_iova_to_phys for new fetch_pte interface
(bsc#931014).
- iommu/amd: Optimize iommu_unmap_page for new fetch_pte interface
(bsc#931014).
- iommu/amd: Return the pte page-size in fetch_pte (bsc#931014).
- ipc/shm.c: fix overly aggressive shmdt() when calls span multiple
segments (ipc fixes).
- ipmi: Turn off all activity on an idle ipmi interface (bsc#915540).
- ixgbe: fix detection of SFP+ capable interfaces (bsc#922734).
- kgr: add error code to the message in kgr_revert_replaced_funs.
- kgr: add kgraft annotations to kthreads wait_event_freezable() API calls.
- kgr: correct error handling of the first patching stage.
- kgr: handle the delayed patching of the modules.
- kgr: handle the failure of finalization stage.
- kgr: return error in kgr_init if notifier registration fails.
- kgr: take switching of the fops out of kgr_patch_code to new function.
- kgr: use for_each_process_thread (bsc#929883).
- kgr: use kgr_in_progress for all threads (bnc#929883).
- libata: Blacklist queued TRIM on Samsung SSD 850 Pro (bsc#926156).
- mlx4: Call dev_kfree_skby_any instead of dev_kfree_skb (bsc#928708).
- mm, numa: really disable NUMA balancing by default on single node
machines (Automatic NUMA Balancing).
- mm: vmscan: do not throttle based on pfmemalloc reserves if node has no
reclaimable pages (bsc#924803, VM Functionality).
- net/mlx4: Cache line CQE/EQE stride fixes (bsc#927084).
- net/mlx4_core: Cache line EQE size support (bsc#927084).
- net/mlx4_core: Enable CQE/EQE stride support (bsc#927084).
- net/mlx4_en: Add mlx4_en_get_cqe helper (bsc#927084).
- perf/x86/amd/ibs: Update IBS MSRs and feature definitions.
- powerpc/mm: Fix mmap errno when MAP_FIXED is set and mapping exceeds the
allowed address space (bsc#930669).
- powerpc/numa: Add ability to disable and debug topology updates
(bsc#924809).
- powerpc/numa: Enable CONFIG_HAVE_MEMORYLESS_NODES (bsc#924809).
- powerpc/numa: Enable USE_PERCPU_NUMA_NODE_ID (bsc#924809).
- powerpc/numa: check error return from proc_create (bsc#924809).
- powerpc/numa: ensure per-cpu NUMA mappings are correct on topology
update (bsc#924809).
- powerpc/numa: use cached value of update->cpu in update_cpu_topology
(bsc#924809).
- powerpc/perf: Cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH
(bsc#928141).
- powerpc/pseries: Introduce api_version to migration sysfs interface
(bsc#926314).
- powerpc/pseries: Little endian fixes for post mobility device tree
update (bsc#926314).
- powerpc/pseries: Simplify check for suspendability during
suspend/migration (bsc#926314).
- powerpc: Fix sys_call_table declaration to enable syscall tracing.
- powerpc: Fix warning reported by verify_cpu_node_mapping() (bsc#924809).
- powerpc: Only set numa node information for present cpus at boottime
(bsc#924809).
- powerpc: reorder per-cpu NUMA information initialization (bsc#924809).
- powerpc: some changes in numa_setup_cpu() (bsc#924809).
- quota: Fix use of units in quota getting / setting interfaces
(bsc#913232).
- rpm/kernel-binary.spec.in: Fix build if there is no *.crt file
- rpm/kernel-obs-qa.spec.in: Do not fail if the kernel versions do not
match
- s390/bpf: Fix ALU_NEG (A = -A) (bsc#917125, LTC#121759).
- s390/bpf: Fix JMP_JGE_K (A >= K) and JMP_JGT_K (A > K) (bsc#917125,
LTC#121759).
- s390/bpf: Fix JMP_JGE_X (A > X) and JMP_JGT_X (A >= X) (bsc#917125,
LTC#121759).
- s390/bpf: Fix offset parameter for skb_copy_bits() (bsc#917125,
LTC#121759).
- s390/bpf: Fix sk_load_byte_msh() (bsc#917125, LTC#121759).
- s390/bpf: Fix skb_copy_bits() parameter passing (bsc#917125, LTC#121759).
- s390/bpf: Zero extend parameters before calling C function (bsc#917125,
LTC#121759).
- s390/sclp: Consolidate early sclp init calls to sclp_early_detect()
(bsc#917125, LTC#122429).
- s390/sclp: Determine HSA size dynamically for zfcpdump (bsc#917125,
LTC#122429).
- s390/sclp: Move declarations for sclp_sdias into separate header file
(bsc#917125, LTC#122429).
- s390/sclp: Move early code from sclp_cmd.c to sclp_early.c (bsc#917125,
LTC#122429).
- s390/sclp: replace uninitialized early_event_mask_sccb variable with
sccb_early (bsc#917125, LTC#122429).
- s390/sclp: revert smp-detect-possible-cpus.patch (bsc#917125,
LTC#122429).
- s390/sclp_early: Add function to detect sclp console capabilities
(bsc#917125, LTC#122429).
- s390/sclp_early: Get rid of sclp_early_read_info_sccb_valid (bsc#917125,
LTC#122429).
- s390/sclp_early: Pass sccb pointer to every *_detect() function
(bsc#917125, LTC#122429).
- s390/sclp_early: Replace early_read_info_sccb with sccb_early
(bsc#917125, LTC#122429).
- s390/sclp_early: Return correct HSA block count also for zero
(bsc#917125, LTC#122429).
- s390/smp: limit number of cpus in possible cpu mask (bsc#917125,
LTC#122429).
- s390: kgr, change the kgraft state only if enabled.
- sched, time: Fix lock inversion in thread_group_cputime()
- sched: Fix potential near-infinite distribute_cfs_runtime() loop
(bsc#930786)
- sched: Robustify topology setup (bsc#924809).
- seqlock: Add irqsave variant of read_seqbegin_or_lock() (Time
scalability).
- storvsc: Set the SRB flags correctly when no data transfer is needed
(bsc#931130).
- x86/apic/uv: Update the APIC UV OEM check (bsc#929145).
- x86/apic/uv: Update the UV APIC HUB check (bsc#929145).
- x86/apic/uv: Update the UV APIC driver check (bsc#929145).
- x86/microcode/intel: Guard against stack overflow in the loader
(bsc#922944).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12:
zypper in -t patch SUSE-SLE-WE-12-2015-269=1
- SUSE Linux Enterprise Software Development Kit 12:
zypper in -t patch SUSE-SLE-SDK-12-2015-269=1
- SUSE Linux Enterprise Server 12:
zypper in -t patch SUSE-SLE-SERVER-12-2015-269=1
- SUSE Linux Enterprise Module for Public Cloud 12:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2015-269=1
- SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2015-269=1
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2015-269=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12 (x86_64):
kernel-default-debuginfo-3.12.43-52.6.1
kernel-default-debugsource-3.12.43-52.6.1
kernel-default-extra-3.12.43-52.6.1
kernel-default-extra-debuginfo-3.12.43-52.6.1
- SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):
kernel-obs-build-3.12.43-52.6.2
kernel-obs-build-debugsource-3.12.43-52.6.2
- SUSE Linux Enterprise Software Development Kit 12 (noarch):
kernel-docs-3.12.43-52.6.2
- SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
kernel-default-3.12.43-52.6.1
kernel-default-base-3.12.43-52.6.1
kernel-default-base-debuginfo-3.12.43-52.6.1
kernel-default-debuginfo-3.12.43-52.6.1
kernel-default-debugsource-3.12.43-52.6.1
kernel-default-devel-3.12.43-52.6.1
kernel-syms-3.12.43-52.6.1
- SUSE Linux Enterprise Server 12 (x86_64):
kernel-xen-3.12.43-52.6.1
kernel-xen-base-3.12.43-52.6.1
kernel-xen-base-debuginfo-3.12.43-52.6.1
kernel-xen-debuginfo-3.12.43-52.6.1
kernel-xen-debugsource-3.12.43-52.6.1
kernel-xen-devel-3.12.43-52.6.1
- SUSE Linux Enterprise Server 12 (noarch):
kernel-devel-3.12.43-52.6.1
kernel-macros-3.12.43-52.6.1
kernel-source-3.12.43-52.6.1
- SUSE Linux Enterprise Server 12 (s390x):
kernel-default-man-3.12.43-52.6.1
- SUSE Linux Enterprise Module for Public Cloud 12 (x86_64):
kernel-ec2-3.12.43-52.6.1
kernel-ec2-debuginfo-3.12.43-52.6.1
kernel-ec2-debugsource-3.12.43-52.6.1
kernel-ec2-devel-3.12.43-52.6.1
kernel-ec2-extra-3.12.43-52.6.1
kernel-ec2-extra-debuginfo-3.12.43-52.6.1
- SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-3_12_43-52_6-default-1-2.3
kgraft-patch-3_12_43-52_6-xen-1-2.3
- SUSE Linux Enterprise Desktop 12 (x86_64):
kernel-default-3.12.43-52.6.1
kernel-default-debuginfo-3.12.43-52.6.1
kernel-default-debugsource-3.12.43-52.6.1
kernel-default-devel-3.12.43-52.6.1
kernel-default-extra-3.12.43-52.6.1
kernel-default-extra-debuginfo-3.12.43-52.6.1
kernel-syms-3.12.43-52.6.1
kernel-xen-3.12.43-52.6.1
kernel-xen-debuginfo-3.12.43-52.6.1
kernel-xen-debugsource-3.12.43-52.6.1
kernel-xen-devel-3.12.43-52.6.1
- SUSE Linux Enterprise Desktop 12 (noarch):
kernel-devel-3.12.43-52.6.1
kernel-macros-3.12.43-52.6.1
kernel-source-3.12.43-52.6.1
References:
https://www.suse.com/security/cve/CVE-2014-3647.html
https://www.suse.com/security/cve/CVE-2014-8086.html
https://www.suse.com/security/cve/CVE-2014-8159.html
https://www.suse.com/security/cve/CVE-2015-1465.html
https://www.suse.com/security/cve/CVE-2015-2041.html
https://www.suse.com/security/cve/CVE-2015-2042.html
https://www.suse.com/security/cve/CVE-2015-2666.html
https://www.suse.com/security/cve/CVE-2015-2830.html
https://www.suse.com/security/cve/CVE-2015-2922.html
https://www.suse.com/security/cve/CVE-2015-3331.html
https://www.suse.com/security/cve/CVE-2015-3332.html
https://www.suse.com/security/cve/CVE-2015-3339.html
https://www.suse.com/security/cve/CVE-2015-3636.html
https://bugzilla.suse.com/899192
https://bugzilla.suse.com/900881
https://bugzilla.suse.com/909312
https://bugzilla.suse.com/913232
https://bugzilla.suse.com/914742
https://bugzilla.suse.com/915540
https://bugzilla.suse.com/916225
https://bugzilla.suse.com/917125
https://bugzilla.suse.com/919007
https://bugzilla.suse.com/919018
https://bugzilla.suse.com/920262
https://bugzilla.suse.com/921769
https://bugzilla.suse.com/922583
https://bugzilla.suse.com/922734
https://bugzilla.suse.com/922944
https://bugzilla.suse.com/924664
https://bugzilla.suse.com/924803
https://bugzilla.suse.com/924809
https://bugzilla.suse.com/925567
https://bugzilla.suse.com/926156
https://bugzilla.suse.com/926240
https://bugzilla.suse.com/926314
https://bugzilla.suse.com/927084
https://bugzilla.suse.com/927115
https://bugzilla.suse.com/927116
https://bugzilla.suse.com/927257
https://bugzilla.suse.com/927285
https://bugzilla.suse.com/927308
https://bugzilla.suse.com/927455
https://bugzilla.suse.com/928122
https://bugzilla.suse.com/928130
https://bugzilla.suse.com/928135
https://bugzilla.suse.com/928141
https://bugzilla.suse.com/928708
https://bugzilla.suse.com/929092
https://bugzilla.suse.com/929145
https://bugzilla.suse.com/929525
https://bugzilla.suse.com/929883
https://bugzilla.suse.com/930224
https://bugzilla.suse.com/930226
https://bugzilla.suse.com/930669
https://bugzilla.suse.com/930786
https://bugzilla.suse.com/931014
https://bugzilla.suse.com/931130
More information about the sle-security-updates
mailing list