SUSE-SU-2016:1203-1: important: Security update for the Linux Kernel

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Tue May 3 11:07:56 MDT 2016


   SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2016:1203-1
Rating:             important
References:         #758040 #781018 #879378 #879381 #904035 #924919 
                    #934787 #935123 #937444 #939955 #940017 #940413 
                    #940913 #940946 #941514 #942082 #946122 #947128 
                    #948330 #949298 #949752 #949936 #950750 #950998 
                    #951392 #952976 #954628 #955308 #955354 #955654 
                    #955673 #956375 #956514 #956707 #956708 #956709 
                    #956852 #956949 #957988 #957990 #958463 #958886 
                    #958906 #958912 #958951 #959190 #959312 #959399 
                    #959705 #960857 #961500 #961509 #961512 #961516 
                    #961518 #963276 #963765 #963767 #963998 #964201 
                    #965319 #965923 #966437 #966693 #967863 #967972 
                    #967973 #967974 #967975 #968010 #968011 #968012 
                    #968013 #968141 #968670 #969307 #970504 #970892 
                    #970909 #970911 #970948 #970956 #970958 #970970 
                    #971124 #971125 #971360 #973570 #974646 #975945 
                    
Cross-References:   CVE-2013-7446 CVE-2015-7509 CVE-2015-7515
                    CVE-2015-7550 CVE-2015-7566 CVE-2015-7799
                    CVE-2015-8215 CVE-2015-8539 CVE-2015-8543
                    CVE-2015-8550 CVE-2015-8551 CVE-2015-8552
                    CVE-2015-8569 CVE-2015-8575 CVE-2015-8767
                    CVE-2015-8785 CVE-2015-8812 CVE-2015-8816
                    CVE-2016-0723 CVE-2016-2069 CVE-2016-2143
                    CVE-2016-2184 CVE-2016-2185 CVE-2016-2186
                    CVE-2016-2188 CVE-2016-2384 CVE-2016-2543
                    CVE-2016-2544 CVE-2016-2545 CVE-2016-2546
                    CVE-2016-2547 CVE-2016-2548 CVE-2016-2549
                    CVE-2016-2782 CVE-2016-2847 CVE-2016-3137
                    CVE-2016-3138 CVE-2016-3139 CVE-2016-3140
                    CVE-2016-3156 CVE-2016-3955
Affected Products:
                    SUSE OpenStack Cloud 5
                    SUSE Manager Proxy 2.1
                    SUSE Manager 2.1
                    SUSE Linux Enterprise Server 11-SP3-LTSS
                    SUSE Linux Enterprise Server 11-EXTRA
                    SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________

   An update that solves 41 vulnerabilities and has 49 fixes
   is now available.

Description:


   The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various
   security and bugfixes.

   The following security bugs were fixed:
   - CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the
     Linux kernel allowed local users to bypass intended AF_UNIX socket
     permissions or cause a denial of service (panic) via crafted epoll_ctl
     calls (bnc#955654).
   - CVE-2015-7509: fs/ext4/namei.c in the Linux kernel allowed physically
     proximate attackers to cause a denial of service (system crash) via a
     crafted no-journal filesystem, a related issue to CVE-2013-2015
     (bnc#956707).
   - CVE-2015-7515: An out of bounds memory access in the aiptek USB driver
     could be used by physical local attackers to crash the kernel
     (bnc#956708).
   - CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c in
     the Linux kernel did not properly use a semaphore, which allowed local
     users to cause a denial of service (NULL pointer dereference and system
     crash) or possibly have unspecified other impact via a crafted
     application that leverages a race condition between keyctl_revoke and
     keyctl_read calls (bnc#958951).
   - CVE-2015-7566: A malicious USB device could cause kernel crashes in the
     visor device driver (bnc#961512).
   - CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the
     Linux kernel did not ensure that certain slot numbers are valid, which
     allowed local users to cause a denial of service (NULL pointer
     dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call
     (bnc#949936).
   - CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel
     did not validate attempted changes to the MTU value, which allowed
     context-dependent attackers to cause a denial of service (packet loss)
     via a value that is (1) smaller than the minimum compliant value or (2)
     larger than the MTU of an interface, as demonstrated by a Router
     Advertisement (RA) message that is not validated by a daemon, a
     different vulnerability than CVE-2015-0272.  NOTE: the scope of
     CVE-2015-0272 is limited to the NetworkManager product (bnc#955354).
   - CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local
     users to gain privileges or cause a denial of service (BUG) via crafted
     keyctl commands that negatively instantiate a key, related to
     security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and
     security/keys/user_defined.c (bnc#958463).
   - CVE-2015-8543: The networking implementation in the Linux kernel did not
     validate protocol identifiers for certain protocol families, which
     allowed local users to cause a denial of service (NULL function pointer
     dereference and system crash) or possibly gain privileges by leveraging
     CLONE_NEWUSER support to execute a crafted SOCK_RAW application
     (bnc#958886).
   - CVE-2015-8550: Optimizations introduced by the compiler could have lead
     to double fetch vulnerabilities, potentially possibly leading to
     arbitrary code execution in backend (bsc#957988). (bsc#957988 XSA-155).
   - CVE-2015-8551: The PCI backend driver in Xen, when running on an x86
     system and using Linux as the driver domain, allowed local guest
     administrators to hit BUG conditions and cause a denial of service (NULL
     pointer dereference and host OS crash) by leveraging a system with
     access to a passed-through MSI or MSI-X capable physical PCI device and
     a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback
     missing sanity checks (bnc#957990).
   - CVE-2015-8552: The PCI backend driver in Xen, when running on an x86
     system and using Linux as the driver domain, allowed local guest
     administrators to generate a continuous stream of WARN messages and
     cause a denial of service (disk consumption) by leveraging a system with
     access to a passed-through MSI or MSI-X capable physical PCI device and
     XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity
     checks (bnc#957990).
   - CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in
     drivers/net/ppp/pptp.c in the Linux kernel do not verify an address
     length, which allowed local users to obtain sensitive information from
     kernel memory and bypass the KASLR protection mechanism via a crafted
     application (bnc#959190).
   - CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the
     Linux kernel did not verify an address length, which allowed local users
     to obtain sensitive information from kernel memory and bypass the KASLR
     protection mechanism via a crafted application (bnc#959399).
   - CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not
     properly manage the relationship between a lock and a socket, which
     allowed local users to cause a denial of service (deadlock) via a
     crafted sctp_accept call (bnc#961509).
   - CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in
     the Linux kernel allowed local users to cause a denial of service
     (infinite loop) via a writev system call that triggers a zero length for
     the first segment of an iov (bnc#963765).
   - CVE-2015-8812: A flaw was found in the CXGB3 kernel driver when the
     network was considered congested. The kernel would incorrectly
     misinterpret the congestion as an error condition and incorrectly
     free/clean up the skb. When the device would then send the skb's queued,
     these structures would be referenced and may panic the system
     or allow an attacker to escalate privileges in a use-after-free
      scenario.(bsc#966437).
   - CVE-2015-8816: A malicious USB device could cause kernel crashes in the
     in hub_activate() function (bnc#968010).
   - CVE-2016-0723: Race condition in the tty_ioctl function in
     drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain
     sensitive information from kernel memory or cause a denial of service
     (use-after-free and system crash) by making a TIOCGETD ioctl call during
     processing of a TIOCSETD ioctl call (bnc#961500).
   - CVE-2016-2069: A race in invalidating paging structures that were not in
     use locally could have lead to disclosoure of information or arbitrary
     code exectution (bnc#963767).
   - CVE-2016-2143: On zSeries a fork of a large process could have caused
     memory corruption due to incorrect page table handling. (bnc#970504,
     LTC#138810).
   - CVE-2016-2184: A malicious USB device could cause kernel crashes in the
     alsa usb-audio device driver (bsc#971125).
   - CVE-2016-2185: A malicious USB device could cause kernel crashes in the
     usb_driver_claim_interface function (bnc#971124).
   - CVE-2016-2186: A malicious USB device could cause kernel crashes in the
     powermate device driver (bnc#970958).
   - CVE-2016-2384: A double free on the ALSA umidi object was fixed.
     (bsc#966693).
   - CVE-2016-2543: A missing NULL check at remove_events ioctl in the ALSA
     seq driver was fixed. (bsc#967972).
   - CVE-2016-2544: Fix race at timer setup and close in the ALSA seq driver
     was fixed. (bsc#967973).
   - CVE-2016-2545: A double unlink of active_list in the ALSA timer driver
     was fixed. (bsc#967974).
   - CVE-2016-2546: A race among ALSA timer ioctls was fixed (bsc#967975).
   - CVE-2016-2547,CVE-2016-2548: The ALSA slave timer list handling was
     hardened against hangs and races.
     (CVE-2016-2547,CVE-2016-2548,bsc#968011,bsc#968012).
   - CVE-2016-2549: A stall in ALSA hrtimer handling was fixed (bsc#968013).
   - CVE-2016-2782: A malicious USB device could cause kernel crashes in the
     visor device driver (bnc#968670).
   - CVE-2016-3137: A malicious USB device could cause kernel crashes in the
     cypress_m8 device driver (bnc#970970).
   - CVE-2016-3139: A malicious USB device could cause kernel crashes in the
     wacom device driver (bnc#970909).
   - CVE-2016-3140: A malicious USB device could cause kernel crashes in the
     digi_acceleport device driver (bnc#970892).
   - CVE-2016-3156: A quadratic algorithm could lead to long kernel ipv4
     hangs when removing a device with a large number of addresses.
     (bsc#971360).
   - CVE-2016-3955: A remote buffer overflow in the usbip driver could be
     used by authenticated attackers to crash the kernel. (bsc#975945)
   - CVE-2016-2847: A local user could exhaust kernel memory by pushing lots
     of data into pipes. (bsc#970948).
   - CVE-2016-2188: A malicious USB device could cause kernel crashes in the
     iowarrior device driver (bnc#970956).
   - CVE-2016-3138: A malicious USB device could cause kernel crashes in the
     cdc-acm device driver (bnc#970911).

   The following non-security bugs were fixed:
   - af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570).
   - blktap: also call blkif_disconnect() when frontend switched to closed
     (bsc#952976).
   - blktap: refine mm tracking (bsc#952976).
   - cachefiles: Avoid deadlocks with fs freezing (bsc#935123).
   - cifs: Schedule on hard mount retry (bsc#941514).
   - cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857,
     bsc#974646).
   - dcache: use IS_ROOT to decide where dentry is hashed (bsc#949752).
   - driver: Vmxnet3: Fix ethtool -S to return correct rx queue stats
     (bsc#950750).
   - drm/i915: Change semantics of hw_contexts_disabled (bsc#963276).
   - drm/i915: Evict CS TLBs between batches (bsc#758040).
   - drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040).
   - e1000e: Do not read ICR in Other interrupt (bsc#924919).
   - e1000e: Do not write lsc to ics in msi-x mode (bsc#924919).
   - e1000e: Fix msi-x interrupt automask (bsc#924919).
   - e1000e: Remove unreachable code (bsc#924919).
   - ext3: fix data=journal fast mount/umount hang (bsc#942082).
   - ext3: NULL dereference in ext3_evict_inode() (bsc#942082).
   - firmware: Create directories for external firmware (bsc#959312).
   - firmware: Simplify directory creation (bsc#959312).
   - fs: Avoid deadlocks of fsync_bdev() and fs freezing (bsc#935123).
   - fs: Fix deadlocks between sync and fs freezing (bsc#935123).
   - ftdi_sio: private backport of TIOCMIWAIT (bnc#956375).
   - ipr: Fix incorrect trace indexing (bsc#940913).
   - ipr: Fix invalid array indexing for HRRQ (bsc#940913).
   - ipv6: make fib6 serial number per namespace (bsc#965319).
   - ipv6: mld: fix add_grhead skb_over_panic for devs with large MTUs
     (bsc#956852).
   - ipv6: per netns fib6 walkers (bsc#965319).
   - ipv6: per netns FIB garbage collection (bsc#965319).
   - ipv6: replace global gc_args with local variable (bsc#965319).
   - jbd: Fix unreclaimed pages after truncate in data=journal mode
     (bsc#961516).
   - kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319).
   - kbuild: create directory for dir/file.o (bsc#959312).
   - kexec: Fix race between panic() and crash_kexec() called directly
     (bnc#937444).
   - lpfc: Fix null ndlp dereference in target_reset_handler (bsc#951392).
   - mld, igmp: Fix reserved tailroom calculation (bsc#956852).
   - mm-memcg-print-statistics-from-live-counters-fix (bnc#969307).
   - netfilter: xt_recent: fix namespace destroy path (bsc#879378).
   - nfs4: treat lock owners as opaque values (bnc#968141).
   - nfs: Fix handling of re-write-before-commit for mmapped NFS pages
     (bsc#964201).
   - nfs: use smaller allocations for 'struct id_map' (bsc#965923).
   - nfsv4: Fix two infinite loops in the mount code (bsc#954628).
   - nfsv4: Recovery of recalled read delegations is broken (bsc#956514).
   - panic/x86: Allow cpus to save registers even if they (bnc#940946).
   - panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
   - pciback: do not allow MSI-X ops if PCI_COMMAND_MEMORY is not set.
   - pciback: for XEN_PCI_OP_disable_msi[|x] only disable if device has
     MSI(X) enabled.
   - pciback: return error on XEN_PCI_OP_enable_msi when device has MSI or
     MSI-X enabled.
   - pciback: return error on XEN_PCI_OP_enable_msix when device has MSI or
     MSI-X enabled.
   - pci: Update VPD size with correct length (bsc#958906).
   - quota: Fix deadlock with suspend and quotas (bsc#935123).
   - rdma/ucma: Fix AB-BA deadlock (bsc#963998).
   - README.BRANCH: Switch to LTSS mode
   - Refresh patches.xen/xen3-08-x86-ldt-make-modify_ldt-synchronous.patch
     (bsc#959705).
   - Restore kabi after lock-owner change (bnc#968141).
   - s390/pageattr: Do a single TLB flush for change_page_attr (bsc#940413).
   - scsi_dh_rdac: always retry MODE SELECT on command lock violation
     (bsc#956949).
   - scsi: mpt2sas: Rearrange the the code so that the completion queues are
     initialized prior to sending the request to controller firmware
     (bsc#967863).
   - skb: Add inline helper for getting the skb end offset from head
     (bsc#956852).
   - sunrcp: restore fair scheduling to priority queues (bsc#955308).
   - sunrpc: refactor rpcauth_checkverf error returns (bsc#955673).
   - tcp: avoid order-1 allocations on wifi and tx path (bsc#956852).
   - tcp: fix skb_availroom() (bsc#956852).
   - tg3: 5715 does not link up when autoneg off (bsc#904035).
   - Update
     patches.fixes/mm-exclude-reserved-pages-from-dirtyable-memory-fix.patch
     (bnc#940017, bnc#949298, bnc#947128).
   - usb: ftdi_sio: fix race condition in TIOCMIWAIT, and abort of TIOCMIWAIT
     when the device is removed (bnc#956375).
   - usb: ftdi_sio: fix status line change handling for TIOCMIWAIT and
     TIOCGICOUNT (bnc#956375).
   - usb: ftdi_sio: fix tiocmget and tiocmset return values (bnc#956375).
   - usb: ftdi_sio: fix tiocmget indentation (bnc#956375).
   - usb: ftdi_sio: optimise chars_in_buffer (bnc#956375).
   - usb: ftdi_sio: refactor modem-control status retrieval (bnc#956375).
   - usb: ftdi_sio: remove unnecessary memset (bnc#956375).
   - usb: ftdi_sio: use ftdi_get_modem_status in chars_in_buffer (bnc#956375).
   - usb: ftdi_sio: use generic chars_in_buffer (bnc#956375).
   - usb: serial: export usb_serial_generic_chars_in_buffer (bnc#956375).
   - usb: serial: ftdi_sio: Add missing chars_in_buffer function (bnc#956375).
   - usbvision fix overflow of interfaces array (bnc#950998).
   - veth: extend device features (bsc#879381).
   - vfs: Provide function to get superblock and wait for it to thaw
     (bsc#935123).
   - vmxnet3: adjust ring sizes when interface is down (bsc#950750).
   - vmxnet3: fix building without CONFIG_PCI_MSI (bsc#958912).
   - vmxnet3: fix ethtool ring buffer size setting (bsc#950750).
   - vmxnet3: fix netpoll race condition (bsc#958912).
   - writeback: Skip writeback for frozen filesystem (bsc#935123).
   - x86/evtchn: make use of PHYSDEVOP_map_pirq.
   - x86, kvm: fix kvm's usage of kernel_fpu_begin/end() (bsc#961518).
   - x86, kvm: fix maintenance of guest/host xcr0 state (bsc#961518).
   - x86, kvm: use kernel_fpu_begin/end() in kvm_load/put_guest_fpu()
     (bsc#961518).
   - x86/mce: Fix return value of mce_chrdev_read() when erst is disabled
     (bsc#934787).
   - xen/panic/x86: Allow cpus to save registers even if they (bnc#940946).
   - xen/panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
   - xen: x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
   - xen: x86: mm: only do a local tlb flush in ptep_set_access_flags()
     (bsc#948330).
   - xfrm: do not segment UFO packets (bsc#946122).
   - xhci: silence TD warning (bnc#939955).


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE OpenStack Cloud 5:

      zypper in -t patch sleclo50sp3-kernel-20160414-12537=1

   - SUSE Manager Proxy 2.1:

      zypper in -t patch slemap21-kernel-20160414-12537=1

   - SUSE Manager 2.1:

      zypper in -t patch sleman21-kernel-20160414-12537=1

   - SUSE Linux Enterprise Server 11-SP3-LTSS:

      zypper in -t patch slessp3-kernel-20160414-12537=1

   - SUSE Linux Enterprise Server 11-EXTRA:

      zypper in -t patch slexsp3-kernel-20160414-12537=1

   - SUSE Linux Enterprise Debuginfo 11-SP3:

      zypper in -t patch dbgsp3-kernel-20160414-12537=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE OpenStack Cloud 5 (x86_64):

      kernel-bigsmp-3.0.101-0.47.79.1
      kernel-bigsmp-base-3.0.101-0.47.79.1
      kernel-bigsmp-devel-3.0.101-0.47.79.1
      kernel-default-3.0.101-0.47.79.1
      kernel-default-base-3.0.101-0.47.79.1
      kernel-default-devel-3.0.101-0.47.79.1
      kernel-ec2-3.0.101-0.47.79.1
      kernel-ec2-base-3.0.101-0.47.79.1
      kernel-ec2-devel-3.0.101-0.47.79.1
      kernel-source-3.0.101-0.47.79.1
      kernel-syms-3.0.101-0.47.79.1
      kernel-trace-3.0.101-0.47.79.1
      kernel-trace-base-3.0.101-0.47.79.1
      kernel-trace-devel-3.0.101-0.47.79.1
      kernel-xen-3.0.101-0.47.79.1
      kernel-xen-base-3.0.101-0.47.79.1
      kernel-xen-devel-3.0.101-0.47.79.1

   - SUSE Manager Proxy 2.1 (x86_64):

      kernel-bigsmp-3.0.101-0.47.79.1
      kernel-bigsmp-base-3.0.101-0.47.79.1
      kernel-bigsmp-devel-3.0.101-0.47.79.1
      kernel-default-3.0.101-0.47.79.1
      kernel-default-base-3.0.101-0.47.79.1
      kernel-default-devel-3.0.101-0.47.79.1
      kernel-ec2-3.0.101-0.47.79.1
      kernel-ec2-base-3.0.101-0.47.79.1
      kernel-ec2-devel-3.0.101-0.47.79.1
      kernel-source-3.0.101-0.47.79.1
      kernel-syms-3.0.101-0.47.79.1
      kernel-trace-3.0.101-0.47.79.1
      kernel-trace-base-3.0.101-0.47.79.1
      kernel-trace-devel-3.0.101-0.47.79.1
      kernel-xen-3.0.101-0.47.79.1
      kernel-xen-base-3.0.101-0.47.79.1
      kernel-xen-devel-3.0.101-0.47.79.1

   - SUSE Manager 2.1 (s390x x86_64):

      kernel-default-3.0.101-0.47.79.1
      kernel-default-base-3.0.101-0.47.79.1
      kernel-default-devel-3.0.101-0.47.79.1
      kernel-source-3.0.101-0.47.79.1
      kernel-syms-3.0.101-0.47.79.1
      kernel-trace-3.0.101-0.47.79.1
      kernel-trace-base-3.0.101-0.47.79.1
      kernel-trace-devel-3.0.101-0.47.79.1

   - SUSE Manager 2.1 (x86_64):

      kernel-bigsmp-3.0.101-0.47.79.1
      kernel-bigsmp-base-3.0.101-0.47.79.1
      kernel-bigsmp-devel-3.0.101-0.47.79.1
      kernel-ec2-3.0.101-0.47.79.1
      kernel-ec2-base-3.0.101-0.47.79.1
      kernel-ec2-devel-3.0.101-0.47.79.1
      kernel-xen-3.0.101-0.47.79.1
      kernel-xen-base-3.0.101-0.47.79.1
      kernel-xen-devel-3.0.101-0.47.79.1

   - SUSE Manager 2.1 (s390x):

      kernel-default-man-3.0.101-0.47.79.1

   - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):

      kernel-default-3.0.101-0.47.79.1
      kernel-default-base-3.0.101-0.47.79.1
      kernel-default-devel-3.0.101-0.47.79.1
      kernel-source-3.0.101-0.47.79.1
      kernel-syms-3.0.101-0.47.79.1
      kernel-trace-3.0.101-0.47.79.1
      kernel-trace-base-3.0.101-0.47.79.1
      kernel-trace-devel-3.0.101-0.47.79.1

   - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 x86_64):

      kernel-ec2-3.0.101-0.47.79.1
      kernel-ec2-base-3.0.101-0.47.79.1
      kernel-ec2-devel-3.0.101-0.47.79.1
      kernel-xen-3.0.101-0.47.79.1
      kernel-xen-base-3.0.101-0.47.79.1
      kernel-xen-devel-3.0.101-0.47.79.1

   - SUSE Linux Enterprise Server 11-SP3-LTSS (x86_64):

      kernel-bigsmp-3.0.101-0.47.79.1
      kernel-bigsmp-base-3.0.101-0.47.79.1
      kernel-bigsmp-devel-3.0.101-0.47.79.1

   - SUSE Linux Enterprise Server 11-SP3-LTSS (s390x):

      kernel-default-man-3.0.101-0.47.79.1

   - SUSE Linux Enterprise Server 11-SP3-LTSS (i586):

      kernel-pae-3.0.101-0.47.79.1
      kernel-pae-base-3.0.101-0.47.79.1
      kernel-pae-devel-3.0.101-0.47.79.1

   - SUSE Linux Enterprise Server 11-EXTRA (i586 ia64 ppc64 s390x x86_64):

      kernel-default-extra-3.0.101-0.47.79.1

   - SUSE Linux Enterprise Server 11-EXTRA (i586 x86_64):

      kernel-xen-extra-3.0.101-0.47.79.1

   - SUSE Linux Enterprise Server 11-EXTRA (x86_64):

      kernel-bigsmp-extra-3.0.101-0.47.79.1
      kernel-trace-extra-3.0.101-0.47.79.1

   - SUSE Linux Enterprise Server 11-EXTRA (ppc64):

      kernel-ppc64-extra-3.0.101-0.47.79.1

   - SUSE Linux Enterprise Server 11-EXTRA (i586):

      kernel-pae-extra-3.0.101-0.47.79.1

   - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):

      kernel-default-debuginfo-3.0.101-0.47.79.1
      kernel-default-debugsource-3.0.101-0.47.79.1
      kernel-trace-debuginfo-3.0.101-0.47.79.1
      kernel-trace-debugsource-3.0.101-0.47.79.1

   - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 x86_64):

      kernel-ec2-debuginfo-3.0.101-0.47.79.1
      kernel-ec2-debugsource-3.0.101-0.47.79.1
      kernel-xen-debuginfo-3.0.101-0.47.79.1
      kernel-xen-debugsource-3.0.101-0.47.79.1

   - SUSE Linux Enterprise Debuginfo 11-SP3 (x86_64):

      kernel-bigsmp-debuginfo-3.0.101-0.47.79.1
      kernel-bigsmp-debugsource-3.0.101-0.47.79.1

   - SUSE Linux Enterprise Debuginfo 11-SP3 (i586):

      kernel-pae-debuginfo-3.0.101-0.47.79.1
      kernel-pae-debugsource-3.0.101-0.47.79.1


References:

   https://www.suse.com/security/cve/CVE-2013-7446.html
   https://www.suse.com/security/cve/CVE-2015-7509.html
   https://www.suse.com/security/cve/CVE-2015-7515.html
   https://www.suse.com/security/cve/CVE-2015-7550.html
   https://www.suse.com/security/cve/CVE-2015-7566.html
   https://www.suse.com/security/cve/CVE-2015-7799.html
   https://www.suse.com/security/cve/CVE-2015-8215.html
   https://www.suse.com/security/cve/CVE-2015-8539.html
   https://www.suse.com/security/cve/CVE-2015-8543.html
   https://www.suse.com/security/cve/CVE-2015-8550.html
   https://www.suse.com/security/cve/CVE-2015-8551.html
   https://www.suse.com/security/cve/CVE-2015-8552.html
   https://www.suse.com/security/cve/CVE-2015-8569.html
   https://www.suse.com/security/cve/CVE-2015-8575.html
   https://www.suse.com/security/cve/CVE-2015-8767.html
   https://www.suse.com/security/cve/CVE-2015-8785.html
   https://www.suse.com/security/cve/CVE-2015-8812.html
   https://www.suse.com/security/cve/CVE-2015-8816.html
   https://www.suse.com/security/cve/CVE-2016-0723.html
   https://www.suse.com/security/cve/CVE-2016-2069.html
   https://www.suse.com/security/cve/CVE-2016-2143.html
   https://www.suse.com/security/cve/CVE-2016-2184.html
   https://www.suse.com/security/cve/CVE-2016-2185.html
   https://www.suse.com/security/cve/CVE-2016-2186.html
   https://www.suse.com/security/cve/CVE-2016-2188.html
   https://www.suse.com/security/cve/CVE-2016-2384.html
   https://www.suse.com/security/cve/CVE-2016-2543.html
   https://www.suse.com/security/cve/CVE-2016-2544.html
   https://www.suse.com/security/cve/CVE-2016-2545.html
   https://www.suse.com/security/cve/CVE-2016-2546.html
   https://www.suse.com/security/cve/CVE-2016-2547.html
   https://www.suse.com/security/cve/CVE-2016-2548.html
   https://www.suse.com/security/cve/CVE-2016-2549.html
   https://www.suse.com/security/cve/CVE-2016-2782.html
   https://www.suse.com/security/cve/CVE-2016-2847.html
   https://www.suse.com/security/cve/CVE-2016-3137.html
   https://www.suse.com/security/cve/CVE-2016-3138.html
   https://www.suse.com/security/cve/CVE-2016-3139.html
   https://www.suse.com/security/cve/CVE-2016-3140.html
   https://www.suse.com/security/cve/CVE-2016-3156.html
   https://www.suse.com/security/cve/CVE-2016-3955.html
   https://bugzilla.suse.com/758040
   https://bugzilla.suse.com/781018
   https://bugzilla.suse.com/879378
   https://bugzilla.suse.com/879381
   https://bugzilla.suse.com/904035
   https://bugzilla.suse.com/924919
   https://bugzilla.suse.com/934787
   https://bugzilla.suse.com/935123
   https://bugzilla.suse.com/937444
   https://bugzilla.suse.com/939955
   https://bugzilla.suse.com/940017
   https://bugzilla.suse.com/940413
   https://bugzilla.suse.com/940913
   https://bugzilla.suse.com/940946
   https://bugzilla.suse.com/941514
   https://bugzilla.suse.com/942082
   https://bugzilla.suse.com/946122
   https://bugzilla.suse.com/947128
   https://bugzilla.suse.com/948330
   https://bugzilla.suse.com/949298
   https://bugzilla.suse.com/949752
   https://bugzilla.suse.com/949936
   https://bugzilla.suse.com/950750
   https://bugzilla.suse.com/950998
   https://bugzilla.suse.com/951392
   https://bugzilla.suse.com/952976
   https://bugzilla.suse.com/954628
   https://bugzilla.suse.com/955308
   https://bugzilla.suse.com/955354
   https://bugzilla.suse.com/955654
   https://bugzilla.suse.com/955673
   https://bugzilla.suse.com/956375
   https://bugzilla.suse.com/956514
   https://bugzilla.suse.com/956707
   https://bugzilla.suse.com/956708
   https://bugzilla.suse.com/956709
   https://bugzilla.suse.com/956852
   https://bugzilla.suse.com/956949
   https://bugzilla.suse.com/957988
   https://bugzilla.suse.com/957990
   https://bugzilla.suse.com/958463
   https://bugzilla.suse.com/958886
   https://bugzilla.suse.com/958906
   https://bugzilla.suse.com/958912
   https://bugzilla.suse.com/958951
   https://bugzilla.suse.com/959190
   https://bugzilla.suse.com/959312
   https://bugzilla.suse.com/959399
   https://bugzilla.suse.com/959705
   https://bugzilla.suse.com/960857
   https://bugzilla.suse.com/961500
   https://bugzilla.suse.com/961509
   https://bugzilla.suse.com/961512
   https://bugzilla.suse.com/961516
   https://bugzilla.suse.com/961518
   https://bugzilla.suse.com/963276
   https://bugzilla.suse.com/963765
   https://bugzilla.suse.com/963767
   https://bugzilla.suse.com/963998
   https://bugzilla.suse.com/964201
   https://bugzilla.suse.com/965319
   https://bugzilla.suse.com/965923
   https://bugzilla.suse.com/966437
   https://bugzilla.suse.com/966693
   https://bugzilla.suse.com/967863
   https://bugzilla.suse.com/967972
   https://bugzilla.suse.com/967973
   https://bugzilla.suse.com/967974
   https://bugzilla.suse.com/967975
   https://bugzilla.suse.com/968010
   https://bugzilla.suse.com/968011
   https://bugzilla.suse.com/968012
   https://bugzilla.suse.com/968013
   https://bugzilla.suse.com/968141
   https://bugzilla.suse.com/968670
   https://bugzilla.suse.com/969307
   https://bugzilla.suse.com/970504
   https://bugzilla.suse.com/970892
   https://bugzilla.suse.com/970909
   https://bugzilla.suse.com/970911
   https://bugzilla.suse.com/970948
   https://bugzilla.suse.com/970956
   https://bugzilla.suse.com/970958
   https://bugzilla.suse.com/970970
   https://bugzilla.suse.com/971124
   https://bugzilla.suse.com/971125
   https://bugzilla.suse.com/971360
   https://bugzilla.suse.com/973570
   https://bugzilla.suse.com/974646
   https://bugzilla.suse.com/975945



More information about the sle-security-updates mailing list