SUSE-SU-2017:1360-1: important: Security update for the Linux Kernel

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Fri May 19 10:10:38 MDT 2017


   SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:1360-1
Rating:             important
References:         #1003077 #1008842 #1009682 #1012620 #1012985 
                    #1015703 #1015787 #1015821 #1017512 #1018100 
                    #1018263 #1018419 #1018446 #1019168 #1019514 
                    #1020048 #1020795 #1021256 #1021374 #1021762 
                    #1021913 #1022559 #1022971 #1023164 #1023207 
                    #1023377 #1023762 #1023824 #1023888 #1023992 
                    #1024081 #1024234 #1024309 #1024508 #1024788 
                    #1025039 #1025235 #1025354 #1025802 #1026024 
                    #1026722 #1026914 #1027066 #1027178 #1027189 
                    #1027190 #1027974 #1028041 #1028415 #1028595 
                    #1028648 #1028895 #1029470 #1029850 #1029986 
                    #1030118 #1030213 #1030593 #1030901 #1031003 
                    #1031052 #1031080 #1031440 #1031567 #1031579 
                    #1031662 #1031842 #1032125 #1032141 #1032344 
                    #1032345 #1033336 #1034670 #103470 #1034700 
                    #1035576 #1035699 #1035738 #1035877 #1036752 
                    #1038261 #799133 #857926 #914939 #917630 
                    #922853 #930399 #931620 #937444 #940946 #954763 
                    #968697 #970083 #971933 #979215 #982783 #983212 
                    #984530 #985561 #988065 #989056 #993832 
Cross-References:   CVE-2015-1350 CVE-2016-10044 CVE-2016-10200
                    CVE-2016-10208 CVE-2016-2117 CVE-2016-3070
                    CVE-2016-5243 CVE-2016-7117 CVE-2016-9191
                    CVE-2016-9588 CVE-2016-9604 CVE-2017-2647
                    CVE-2017-2671 CVE-2017-5669 CVE-2017-5897
                    CVE-2017-5986 CVE-2017-6074 CVE-2017-6214
                    CVE-2017-6345 CVE-2017-6346 CVE-2017-6348
                    CVE-2017-6353 CVE-2017-6951 CVE-2017-7187
                    CVE-2017-7261 CVE-2017-7294 CVE-2017-7308
                    CVE-2017-7616 CVE-2017-7645 CVE-2017-8106
                   
Affected Products:
                    SUSE Linux Enterprise Workstation Extension 12-SP1
                    SUSE Linux Enterprise Software Development Kit 12-SP1
                    SUSE Linux Enterprise Server 12-SP1
                    SUSE Linux Enterprise Module for Public Cloud 12
                    SUSE Linux Enterprise Live Patching 12
                    SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________

   An update that solves 30 vulnerabilities and has 72 fixes
   is now available.

Description:


   The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.74 to receive
   various security and bugfixes.

   Notable new/improved features:
   - Improved support for Hyper-V
   - Support for the tcp_westwood TCP scheduling algorithm

   The following security bugs were fixed:

   - CVE-2017-8106: The handle_invept function in arch/x86/kvm/vmx.c in the
     Linux kernel allowed privileged KVM guest OS users to cause a denial of
     service (NULL pointer dereference and host OS crash) via a
     single-context INVEPT instruction with a NULL EPT pointer (bsc#1035877).
   - CVE-2017-6951: The keyring_search_aux function in
     security/keys/keyring.c in the Linux kernel allowed local users to cause
     a denial of service (NULL pointer dereference and OOPS) via a
     request_key system call for the "dead" type. (bsc#1029850).
   - CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local
     users to gain privileges or cause a denial of service (NULL pointer
     dereference and system crash) via vectors involving a NULL value for a
     certain match field, related to the keyring_search_iterator function in
     keyring.c. (bsc#1030593)
   - CVE-2016-9604: This fixes handling of keyrings starting with '.' in
     KEYCTL_JOIN_SESSION_KEYRING, which could have allowed local users to
     manipulate privileged keyrings (bsc#1035576)
   - CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind
     compat syscalls in mm/mempolicy.c in the Linux kernel allowed local
     users to obtain sensitive information from uninitialized stack data by
     triggering failure of a certain bitmap operation. (bnc#1033336).
   - CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux
     kernel allowed remote attackers to cause a denial of service (system
     crash) via a long RPC reply, related to net/sunrpc/svc.c,
     fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c. (bsc#1034670).
   - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in
     the Linux kernel did not properly validate certain block-size data,
     which allowed local users to cause a denial of service (overflow) or
     possibly have unspecified other impact via crafted system calls
     (bnc#1031579)
   - CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux
     kernel was  too late in obtaining a certain lock and consequently could
     not ensure that disconnect function calls are safe, which allowed local
     users to cause a denial of service (panic) by leveraging access to the
     protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003)
   - CVE-2017-7294: The vmw_surface_define_ioctl function in
     drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not
     validate addition of certain levels data, which allowed local users to
     trigger an integer overflow and out-of-bounds write, and cause a denial
     of service (system hang or crash) or possibly gain privileges, via a
     crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440)
   - CVE-2017-7261: The vmw_surface_define_ioctl function in
     drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not
     check for a zero value of certain levels data, which allowed local users
     to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and
     possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device
     (bnc#1031052)
   - CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux
     kernel allowed local users to cause a denial of service (stack-based
     buffer overflow) or possibly have unspecified other impact via a large
     command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds
     write access in the sg_write function (bnc#1030213)
   - CVE-2016-9588: arch/x86/kvm/vmx.c in the Linux kernel mismanaged the #BP
     and #OF exceptions, which allowed guest OS users to cause a denial of
     service (guest OS crash) by declining to handle an exception thrown by
     an L2 guest (bsc#1015703).
   - CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel
     did not restrict the address calculated by a certain rounding operation,
     which allowed local users to map page zero, and consequently bypass a
     protection mechanism that exists for the mmap system call, by making
     crafted shmget and shmat system calls in a privileged context
     (bnc#1026914).
   - CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in
     the Linux kernel allowed local users to gain privileges or cause a
     denial of service (use-after-free) by making multiple bind system calls
     without properly ascertaining whether a socket has the SOCK_ZAPPED
     status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c
     (bnc#1028415)
   - CVE-2016-10208: The ext4_fill_super function in fs/ext4/super.c in the
     Linux kernel did not properly validate meta block groups, which allowed
     physically proximate attackers to cause a denial of service
     (out-of-bounds read and system crash) via a crafted ext4 image
     (bnc#1023377).
   - CVE-2017-5897: The ip6gre_err function in net/ipv6/ip6_gre.c in the
     Linux kernel allowed remote attackers to have unspecified impact via
     vectors involving GRE flags in an IPv6 packet, which trigger an
     out-of-bounds access (bsc#1023762).
   - CVE-2017-5986: A race condition in the sctp_wait_for_sndbuf function in
     net/sctp/socket.c in the Linux kernel allowed local users to cause a
     denial of service (assertion failure and panic) via a multithreaded
     application that peels off an association in a certain buffer-full state
     (bsc#1025235).
   - CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c
     in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures
     in the LISTEN state, which allowed local users to obtain root privileges
     or cause a denial of service (double free) via an application that made
     an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024)
   - CVE-2016-9191: The cgroup offline implementation in the Linux kernel
     mishandled certain drain operations, which allowed local users to cause
     a denial of service (system hang) by leveraging access to a container
     environment for executing a crafted application (bnc#1008842)
   - CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the
     Linux kernel improperly managed lock dropping, which allowed local users
     to cause a denial of service (deadlock) via crafted operations on IrDA
     devices (bnc#1027178).
   - CVE-2016-10044: The aio_mount function in fs/aio.c in the Linux kernel
     did not properly restrict execute access, which made it easier for local
     users to bypass intended SELinux W^X policy restrictions, and
     consequently gain privileges, via an io_setup system call (bnc#1023992).
   - CVE-2016-3070: The trace_writeback_dirty_page implementation in
     include/trace/events/writeback.h in the Linux kernel improperly
     interacts with mm/migrate.c, which allowed local users to cause a denial
     of service (NULL pointer dereference and system crash) or possibly have
     unspecified other impact by triggering a certain page move (bnc#979215).
   - CVE-2016-5243: The tipc_nl_compat_link_dump function in
     net/tipc/netlink_compat.c in the Linux kernel did not properly copy a
     certain string, which allowed local users to obtain sensitive
     information from kernel stack memory by reading a Netlink message
     (bnc#983212).
   - CVE-2017-6345: The LLC subsystem in the Linux kernel did not ensure that
     a certain destructor exists in required circumstances, which allowed
     local users to cause a denial of service (BUG_ON) or possibly have
     unspecified other impact via crafted system calls (bnc#1027190)
   - CVE-2017-6346: Race condition in net/packet/af_packet.c in the Linux
     kernel allowed local users to cause a denial of service (use-after-free)
     or possibly have unspecified other impact via a multithreaded
     application that made PACKET_FANOUT setsockopt system calls (bnc#1027189)
   - CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly
     restrict association peel-off operations during certain wait states,
     which allowed local users to cause a denial of service (invalid unlock
     and double free) via a multithreaded application. NOTE: this
     vulnerability exists because of an incorrect fix for CVE-2017-5986
     (bnc#1027066)
   - CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in
     net/sctp/socket.c in the Linux kernel allowed local users to cause a
     denial of service (assertion failure and panic) via a multithreaded
     application that peels off an association in a certain buffer-full state
     (bsc#1025235).
   - CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the
     Linux kernel allowed remote attackers to cause a denial of service
     (infinite loop and soft lockup) via vectors involving a TCP packet with
     the URG flag (bnc#1026722)
   - CVE-2016-2117: The atl2_probe function in
     drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel incorrectly
     enables scatter/gather I/O, which allowed remote attackers to obtain
     sensitive information from kernel memory by reading packet data
     (bnc#968697)
   - CVE-2015-1350: The VFS subsystem in the Linux kernel provided an
     incomplete set of requirements for setattr operations that
     underspecifies removing extended privilege attributes, which allowed
     local users to cause a denial of service (capability stripping) via a
     failed invocation of a system call, as demonstrated by using chown to
     remove a capability from the ping or Wireshark dumpcap program
     (bsc#914939).
   - CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg
     function in net/socket.c in the Linux kernel allowed remote attackers to
     execute arbitrary code via vectors involving a recvmmsg system call that
     is mishandled during error processing (bsc#1003077).

   The following non-security bugs were fixed:

   - ACPI / APEI: Fix NMI notification handling (bsc#917630).
   - arch: Mass conversion of smp_mb__*() (bsc#1020795).
   - asm-generic: add __smp_xxx wrappers (bsc#1020795).
   - block: remove struct request buffer member (bsc#1020795).
   - block: submit_bio_wait() conversions (bsc#1020795).
   - bonding: Advertize vxlan offload features when supported (bsc#1009682).
   - bonding: handle more gso types (bsc#1009682).
   - bonding: use the correct ether type for alb (bsc#1028595).
   - btrfs: allow unlink to exceed subvolume quota (bsc#1015821).
   - btrfs: Change qgroup_meta_rsv to 64bit (bsc#1015821).
   - btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls
     (bsc#1018100).
   - btrfs: make file clone aware of fatal signals (bsc#1015787).
   - btrfs: qgroups: Retry after commit on getting EDQUOT (bsc#1015821).
   - cancel the setfilesize transation when io error happen (bsc#1028648).
   - cgroup: remove stray references to css_id (bsc#1020795).
   - cpuidle: powernv/pseries: Auto-promotion of snooze to deeper idle state
     (bnc#1023164).
   - dm: add era target (bsc#1020795).
   - dm: allow remove to be deferred (bsc#1020795).
   - dm bitset: only flush the current word if it has been dirtied
     (bsc#1020795).
   - dm btree: add dm_btree_find_lowest_key (bsc#1020795).
   - dm cache: actually resize cache (bsc#1020795).
   - dm cache: add block sizes and total cache blocks to status output
     (bsc#1020795).
   - dm cache: add cache block invalidation support (bsc#1020795).
   - dm cache: add passthrough mode (bsc#1020795).
   - dm cache: add policy name to status output (bsc#1020795).
   - dm cache: add remove_cblock method to policy interface (bsc#1020795).
   - dm cache: be much more aggressive about promoting writes to discarded
     blocks (bsc#1020795).
   - dm cache: cache shrinking support (bsc#1020795).
   - dm cache: do not add migration to completed list before unhooking bio
     (bsc#1020795).
   - dm cache: fix a lock-inversion (bsc#1020795).
   - dm cache: fix truncation bug when mapping I/O to more than 2TB fast
     device (bsc#1020795).
   - dm cache: fix writethrough mode quiescing in cache_map (bsc#1020795).
   - dm cache: improve efficiency of quiescing flag management (bsc#1020795).
   - dm cache: io destined for the cache device can now serve as tick bios
     (bsc#1020795).
   - dm cache: log error message if dm_kcopyd_copy() fails (bsc#1020795).
   - dm cache metadata: check the metadata version when reading the
     superblock (bsc#1020795).
   - dm cache metadata: return bool from __superblock_all_zeroes
     (bsc#1020795).
   - dm cache: move hook_info into common portion of per_bio_data structure
     (bsc#1020795).
   - dm cache: optimize commit_if_needed (bsc#1020795).
   - dm cache policy mq: a few small fixes (bsc#1020795).
   - dm cache policy mq: fix promotions to occur as expected (bsc#1020795).
   - dm cache policy mq: implement writeback_work() and
     mq_{set,clear}_dirty() (bsc#1020795).
   - dm cache policy mq: introduce three promotion threshold tunables
     (bsc#1020795).
   - dm cache policy mq: protect residency method with existing mutex
     (bsc#1020795).
   - dm cache policy mq: reduce memory requirements (bsc#1020795).
   - dm cache policy mq: use list_del_init instead of list_del +
     INIT_LIST_HEAD (bsc#1020795).
   - dm cache policy: remove return from void policy_remove_mapping
     (bsc#1020795).
   - dm cache: promotion optimisation for writes (bsc#1020795).
   - dm cache: resolve small nits and improve Documentation (bsc#1020795).
   - dm cache: return -EINVAL if the user specifies unknown cache policy
     (bsc#1020795).
   - dm cache: use cell_defer() boolean argument consistently (bsc#1020795).
   - dm: change sector_count member in clone_info from sector_t to unsigned
     (bsc#1020795).
   - dm crypt: add TCW IV mode for old CBC TCRYPT containers (bsc#1020795).
   - dm crypt: properly handle extra key string in initialization
     (bsc#1020795).
   - dm delay: use per-bio data instead of a mempool and slab cache
     (bsc#1020795).
   - dm: fix Kconfig indentation (bsc#1020795).
   - dm: fix Kconfig menu indentation (bsc#1020795).
   - dm: make dm_table_alloc_md_mempools static (bsc#1020795).
   - dm mpath: do not call pg_init when it is already running (bsc#1020795).
   - dm mpath: fix lock order inconsistency in multipath_ioctl (bsc#1020795).
   - dm mpath: print more useful warnings in multipath_message()
     (bsc#1020795).
   - dm mpath: push back requests instead of queueing (bsc#1020795).
   - dm mpath: really fix lockdep warning (bsc#1020795).
   - dm mpath: reduce memory pressure when requeuing (bsc#1020795).
   - dm mpath: remove extra nesting in map function (bsc#1020795).
   - dm mpath: remove map_io() (bsc#1020795).
   - dm mpath: remove process_queued_ios() (bsc#1020795).
   - dm mpath: requeue I/O during pg_init (bsc#1020795).
   - dm persistent data: cleanup dm-thin specific references in text
     (bsc#1020795).
   - dm snapshot: call destroy_work_on_stack() to pair with
     INIT_WORK_ONSTACK() (bsc#1020795).
   - dm snapshot: fix metadata corruption (bsc#1020795).
   - dm snapshot: prepare for switch to using dm-bufio (bsc#1020795).
   - dm snapshot: use dm-bufio (bsc#1020795).
   - dm snapshot: use dm-bufio prefetch (bsc#1020795).
   - dm snapshot: use GFP_KERNEL when initializing exceptions (bsc#1020795).
   - dm space map disk: optimise sm_disk_dec_block (bsc#1020795).
   - dm space map metadata: limit errors in sm_metadata_new_block
     (bsc#1020795).
   - dm: stop using bi_private (bsc#1020795).
   - dm table: add dm_table_run_md_queue_async (bsc#1020795).
   - dm table: print error on preresume failure (bsc#1020795).
   - dm table: remove unused buggy code that extends the targets array
     (bsc#1020795).
   - dm thin: add error_if_no_space feature (bsc#1020795).
   - dm thin: add mappings to end of prepared_* lists (bsc#1020795).
   - dm thin: add 'no_space_timeout' dm-thin-pool module param (bsc#1020795).
   - dm thin: add timeout to stop out-of-data-space mode holding IO forever
     (bsc#1020795).
   - dm thin: allow metadata commit if pool is in PM_OUT_OF_DATA_SPACE mode
     (bsc#1020795).
   - dm thin: allow metadata space larger than supported to go unused
     (bsc#1020795).
   - dm thin: cleanup and improve no space handling (bsc#1020795).
   - dm thin: eliminate the no_free_space flag (bsc#1020795).
   - dm thin: ensure user takes action to validate data and metadata
     consistency (bsc#1020795).
   - dm thin: factor out check_low_water_mark and use bools (bsc#1020795).
   - dm thin: fix deadlock in __requeue_bio_list (bsc#1020795).
   - dm thin: fix noflush suspend IO queueing (bsc#1020795).
   - dm thin: fix out of data space handling (bsc#1020795).
   - dm thin: fix pool feature parsing (bsc#1020795).
   - dm thin: fix rcu_read_lock being held in code that can sleep
     (bsc#1020795).
   - dm thin: handle metadata failures more consistently (bsc#1020795).
   - dm thin: irqsave must always be used with the pool->lock spinlock
     (bsc#1020795).
   - dm thin: log info when growing the data or metadata device (bsc#1020795).
   - dm thin: requeue bios to DM core if no_free_space and in read-only mode
     (bsc#1020795).
   - dm thin: return error from alloc_data_block if pool is not in write mode
     (bsc#1020795).
   - dm thin: simplify pool_is_congested (bsc#1020795).
   - dm thin: sort the per thin deferred bios using an rb_tree (bsc#1020795).
   - dm thin: synchronize the pool mode during suspend (bsc#1020795).
   - dm thin: use bool rather than unsigned for flags in structures
     (bsc#1020795).
   - dm thin: use INIT_WORK_ONSTACK in noflush_work to avoid ODEBUG warning
     (bsc#1020795).
   - dm thin: use per thin device deferred bio lists (bsc#1020795).
   - dm: use RCU_INIT_POINTER instead of rcu_assign_pointer in __unbind
     (bsc#1020795).
   - drm/i915: relax uncritical udelay_range() (bsc#1038261).
   - ether: add loopback type ETH_P_LOOPBACK (bsc#1028595).
   - ext4: fix bh leak on error paths in ext4_rename() and
     ext4_cross_rename() (bsc#1012985).
   - ext4: fix fencepost in s_first_meta_bg validation (bsc#1029986).
   - ext4: mark inode dirty after converting inline directory (bsc#1012985).
   - ftrace: Make ftrace_location_range() global (FATE#322421).
   - HID: usbhid: improve handling of Clear-Halt and reset (bsc#1031080).
   - hv: util: catch allocation errors
   - hv: utils: use memdup_user in hvt_op_write
   - hwrng: virtio - ensure reads happen after successful probe (bsc#954763
     bsc#1032344).
   - i40e: avoid null pointer dereference (bsc#922853).
   - i40e/i40evf: Break up xmit_descriptor_count from maybe_stop_tx
     (bsc#985561).
   - i40e/i40evf: Limit TSO to 7 descriptors for payload instead of 8 per
     packet (bsc#985561).
   - i40e/i40evf: Rewrite logic for 8 descriptor per packet check
     (bsc#985561).
   - i40e: Impose a lower limit on gso size (bsc#985561).
   - i40e: Limit TX descriptor count in cases where frag size is greater than
     16K (bsc#985561).
   - iommu/vt-d: Flush old iommu caches for kdump when the device gets
     context mapped (bsc#1023824).
   - iommu/vt-d: Tylersburg isoch identity map check is done too late
     (bsc#1032125).
   - ipv6: make ECMP route replacement less greedy (bsc#930399).
   - kabi: hide changes in struct sk_buff (bsc#1009682).
   - KABI: Hide new include in arch/powerpc/kernel/process.c (fate#322421).
   - kABI: mask struct xfs_icdinode change (bsc#1024788).
   - kABI: protect struct inet6_dev (kabi).
   - kABI: protect struct iscsi_conn (bsc#103470).
   - kABI: protect struct xfs_buftarg and struct xfs_mount (bsc#1024508).
   - kABI: restore can_rx_register parameters (kabi).
   - kernel/watchdog: use nmi registers snapshot in hardlockup handler
     (bsc#940946, bsc#937444).
   - kgr: Mark eeh_event_handler() kthread safe using a timeout (bsc#1031662).
   - kgr/module: make a taint flag module-specific
   - kgr: remove unneeded kgr_needs_lazy_migration() s390x definition
   - l2tp: fix address test in __l2tp_ip6_bind_lookup() (bsc#1028415).
   - l2tp: fix lookup for sockets not bound to a device in l2tp_ip
     (bsc#1028415).
   - l2tp: fix racy socket lookup in l2tp_ip and l2tp_ip6 bind()
     (bsc#1028415).
   - l2tp: hold socket before dropping lock in l2tp_ip{, 6}_recv()
     (bsc#1028415).
   - l2tp: hold tunnel socket when handling control frames in l2tp_ip and
     l2tp_ip6 (bsc#1028415).
   - l2tp: lock socket before checking flags in connect() (bsc#1028415).
   - livepatch: Allow architectures to specify an alternate ftrace location
     (FATE#322421).
   - locking/semaphore: Add down_interruptible_timeout() (bsc#1031662).
   - md: avoid oops on unload if some process is in poll or select
     (bsc#1020795).
   - md: Convert use of typedef ctl_table to struct ctl_table (bsc#1020795).
   - md: ensure metadata is writen after raid level change (bsc#1020795).
   - md linear: fix a race between linear_add() and linear_congested()
     (bsc#1018446).
   - md: md_clear_badblocks should return an error code on failure
     (bsc#1020795).
   - md: refuse to change shape of array if it is active but read-only
     (bsc#1020795).
   - megaraid_sas: add missing curly braces in ioctl handler (bsc#1023207).
   - megaraid_sas: Fixup tgtid count in megasas_ld_list_query() (bsc#971933).
   - mm/huge_memory.c: respect FOLL_FORCE/FOLL_COW for thp (bnc#1030118).
   - mm, memcg: do not retry precharge charges (bnc#1022559).
   - mm/mempolicy.c: do not put mempolicy before using its nodemask
     (References: VM Performance, bnc#931620).
   - mm/page_alloc: fix nodes for reclaim in fast path (bnc#1031842).
   - module: move add_taint_module() to a header file
   - net: Add skb_gro_postpull_rcsum to udp and vxlan (bsc#1009682).
   - net: add skb_pop_rcv_encapsulation (bsc#1009682).
   - net: Call skb_checksum_init in IPv4 (bsc#1009682).
   - net: Call skb_checksum_init in IPv6 (bsc#1009682).
   - netfilter: allow logging fron non-init netns (bsc#970083).
   - net: Generalize checksum_init functions (bsc#1009682).
   - net: Preserve CHECKSUM_COMPLETE at validation (bsc#1009682).
   - NFS: do not try to cross a mountpount when there isn't one there
     (bsc#1028041).
   - NFS: Expedite unmount of NFS auto-mounts (bnc#1025802).
   - NFS: Fix a performance regression in readdir (bsc#857926).
   - NFS: flush out dirty data on file fput() (bsc#1021762).
   - ocfs2: do not write error flag to user structure we cannot copy from/to
     (bsc#1012985).
   - powerpc: Blacklist GCC 5.4 6.1 and 6.2 (boo#1028895).
   - powerpc: Create a helper for getting the kernel toc value (FATE#322421).
   - powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971).
   - powerpc/fadump: Reserve memory at an offset closer to bottom of RAM
     (bsc#1032141).
   - powerpc/fadump: Update fadump documentation (bsc#1032141).
   - powerpc/ftrace: Add Kconfig & Make glue for mprofile-kernel
     (FATE#322421).
   - powerpc/ftrace: Add support for -mprofile-kernel ftrace ABI
     (FATE#322421).
   - powerpc/ftrace: Use $(CC_FLAGS_FTRACE) when disabling ftrace
     (FATE#322421).
   - powerpc/ftrace: Use generic ftrace_modify_all_code() (FATE#322421).
   - powerpc: introduce TIF_KGR_IN_PROGRESS thread flag (FATE#322421).
   - powerpc/kgraft: Add kgraft header (FATE#322421).
   - powerpc/kgraft: Add kgraft stack to struct thread_info (FATE#322421).
   - powerpc/kgraft: Add live patching support on ppc64le (FATE#322421).
   - powerpc/module: Create a special stub for ftrace_caller() (FATE#322421).
   - powerpc/module: Mark module stubs with a magic value (FATE#322421).
   - powerpc/module: Only try to generate the ftrace_caller() stub once
     (FATE#322421).
   - powerpc/modules: Never restore r2 for a mprofile-kernel style mcount()
     call (FATE#322421).
   - powerpc/prom: Increase minimum RMA size to 512MB (bsc#984530).
   - powerpc/pseries/cpuidle: Remove MAX_IDLE_STATE macro (bnc#1023164).
   - powerpc/pseries/cpuidle: Use cpuidle_register() for initialisation
     (bnc#1023164).
   - powerpc: Reject binutils 2.24 when building little endian (boo#1028895).
   - RAID1: avoid unnecessary spin locks in I/O barrier code
     (bsc#982783,bsc#1020048).
   - raid1: include bio_end_io_list in nr_queued to prevent freeze_array hang
   - remove mpath patches from dmcache backport, for bsc#1035738
   - revert "procfs: mark thread stack correctly in proc/PID/maps"
     (bnc#1030901).
   - Revert "RDMA/core: Fix incorrect structure packing for booleans" (kabi).
   - rtnetlink: allow to register ops without ops->setup set (bsc#1021374).
   - s390/zcrypt: Introduce CEX6 toleration (FATE#321783, LTC#147506,
     bsc#1019514).
   - sched/loadavg: Avoid loadavg spikes caused by delayed NO_HZ accounting
     (bsc#1018419).
   - scsi_error: count medium access timeout only once per EH run
     (bsc#993832, bsc#1032345).
   - scsi: libiscsi: add lock around task lists to fix list corruption
     regression (bsc#1034700).
   - scsi: storvsc: fix SRB_STATUS_ABORTED handling
   - sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).
   - svcrpc: fix gss-proxy NULL dereference in some error cases (bsc#1024309).
   - taint/module: Clean up global and module taint flags handling
   - tcp: abort orphan sockets stalling on zero window probes (bsc#1021913).
   - thp: fix MADV_DONTNEED vs. numa balancing race (bnc#1027974).
   - thp: reduce indentation level in change_huge_pmd() (bnc#1027974).
   - treewide: fix "distingush" typo (bsc#1020795).
   - tree-wide: use reinit_completion instead of INIT_COMPLETION
     (bsc#1020795).
   - usb: dwc3: gadget: Fix incorrect DEPCMD and DGCMD status macros
     (bsc#1035699).
   - usb: host: xhci: print correct command ring address (bnc#1035699).
   - USB: serial: kl5kusb105: fix line-state error handling (bsc#1021256).
   - vfs: Do not exchange "short" filenames unconditionally (bsc#1012985).
   - vfs: split generic splice code from i_mutex locking (bsc#1024788).
   - vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).
   - VSOCK: Detach QP check should filter out non matching QPs (bsc#1036752).
   - vxlan: cancel sock_work in vxlan_dellink() (bsc#1031567).
   - vxlan: Checksum fixes (bsc#1009682).
   - vxlan: GRO support at tunnel layer (bsc#1009682).
   - xen-blkfront: correct maximum segment accounting (bsc#1018263).
   - xen-blkfront: do not call talk_to_blkback when already connected to
     blkback.
   - xen-blkfront: free resources if xlvbd_alloc_gendisk fails.
   - xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).
   - xfs: do not allow di_size with high bit set (bsc#1024234).
   - xfs: do not assert fail on non-async buffers on ioacct decrement
     (bsc#1024508).
   - xfs: exclude never-released buffers from buftarg I/O accounting
     (bsc#1024508).
   - xfs: fix broken multi-fsb buffer logging (bsc#1024081).
   - xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).
   - xfs: Fix lock ordering in splice write (bsc#1024788).
   - xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).
   - xfs: Make xfs_icdinode->di_dmstate atomic_t (bsc#1024788).
   - xfs: pass total block res. as total xfs_bmapi_write() parameter
     (bsc#1029470).
   - xfs: replace global xfslogd wq with per-mount wq (bsc#1024508).
   - xfs: track and serialize in-flight async buffers against unmount
     (bsc#1024508).


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 12-SP1:

      zypper in -t patch SUSE-SLE-WE-12-SP1-2017-831=1

   - SUSE Linux Enterprise Software Development Kit 12-SP1:

      zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-831=1

   - SUSE Linux Enterprise Server 12-SP1:

      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-831=1

   - SUSE Linux Enterprise Module for Public Cloud 12:

      zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2017-831=1

   - SUSE Linux Enterprise Live Patching 12:

      zypper in -t patch SUSE-SLE-Live-Patching-12-2017-831=1

   - SUSE Linux Enterprise Desktop 12-SP1:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-831=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):

      kernel-default-debuginfo-3.12.74-60.64.40.1
      kernel-default-debugsource-3.12.74-60.64.40.1
      kernel-default-extra-3.12.74-60.64.40.1
      kernel-default-extra-debuginfo-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):

      kernel-obs-build-3.12.74-60.64.40.1
      kernel-obs-build-debugsource-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Software Development Kit 12-SP1 (noarch):

      kernel-docs-3.12.74-60.64.40.4

   - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):

      kernel-default-3.12.74-60.64.40.1
      kernel-default-base-3.12.74-60.64.40.1
      kernel-default-base-debuginfo-3.12.74-60.64.40.1
      kernel-default-debuginfo-3.12.74-60.64.40.1
      kernel-default-debugsource-3.12.74-60.64.40.1
      kernel-default-devel-3.12.74-60.64.40.1
      kernel-syms-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Server 12-SP1 (noarch):

      kernel-devel-3.12.74-60.64.40.1
      kernel-macros-3.12.74-60.64.40.1
      kernel-source-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Server 12-SP1 (x86_64):

      kernel-xen-3.12.74-60.64.40.1
      kernel-xen-base-3.12.74-60.64.40.1
      kernel-xen-base-debuginfo-3.12.74-60.64.40.1
      kernel-xen-debuginfo-3.12.74-60.64.40.1
      kernel-xen-debugsource-3.12.74-60.64.40.1
      kernel-xen-devel-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Server 12-SP1 (s390x):

      kernel-default-man-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64):

      kernel-ec2-3.12.74-60.64.40.1
      kernel-ec2-debuginfo-3.12.74-60.64.40.1
      kernel-ec2-debugsource-3.12.74-60.64.40.1
      kernel-ec2-devel-3.12.74-60.64.40.1
      kernel-ec2-extra-3.12.74-60.64.40.1
      kernel-ec2-extra-debuginfo-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Live Patching 12 (x86_64):

      kgraft-patch-3_12_74-60_64_40-default-1-4.1
      kgraft-patch-3_12_74-60_64_40-xen-1-4.1

   - SUSE Linux Enterprise Desktop 12-SP1 (x86_64):

      kernel-default-3.12.74-60.64.40.1
      kernel-default-debuginfo-3.12.74-60.64.40.1
      kernel-default-debugsource-3.12.74-60.64.40.1
      kernel-default-devel-3.12.74-60.64.40.1
      kernel-default-extra-3.12.74-60.64.40.1
      kernel-default-extra-debuginfo-3.12.74-60.64.40.1
      kernel-syms-3.12.74-60.64.40.1
      kernel-xen-3.12.74-60.64.40.1
      kernel-xen-debuginfo-3.12.74-60.64.40.1
      kernel-xen-debugsource-3.12.74-60.64.40.1
      kernel-xen-devel-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Desktop 12-SP1 (noarch):

      kernel-devel-3.12.74-60.64.40.1
      kernel-macros-3.12.74-60.64.40.1
      kernel-source-3.12.74-60.64.40.1


References:

   https://www.suse.com/security/cve/CVE-2015-1350.html
   https://www.suse.com/security/cve/CVE-2016-10044.html
   https://www.suse.com/security/cve/CVE-2016-10200.html
   https://www.suse.com/security/cve/CVE-2016-10208.html
   https://www.suse.com/security/cve/CVE-2016-2117.html
   https://www.suse.com/security/cve/CVE-2016-3070.html
   https://www.suse.com/security/cve/CVE-2016-5243.html
   https://www.suse.com/security/cve/CVE-2016-7117.html
   https://www.suse.com/security/cve/CVE-2016-9191.html
   https://www.suse.com/security/cve/CVE-2016-9588.html
   https://www.suse.com/security/cve/CVE-2016-9604.html
   https://www.suse.com/security/cve/CVE-2017-2647.html
   https://www.suse.com/security/cve/CVE-2017-2671.html
   https://www.suse.com/security/cve/CVE-2017-5669.html
   https://www.suse.com/security/cve/CVE-2017-5897.html
   https://www.suse.com/security/cve/CVE-2017-5986.html
   https://www.suse.com/security/cve/CVE-2017-6074.html
   https://www.suse.com/security/cve/CVE-2017-6214.html
   https://www.suse.com/security/cve/CVE-2017-6345.html
   https://www.suse.com/security/cve/CVE-2017-6346.html
   https://www.suse.com/security/cve/CVE-2017-6348.html
   https://www.suse.com/security/cve/CVE-2017-6353.html
   https://www.suse.com/security/cve/CVE-2017-6951.html
   https://www.suse.com/security/cve/CVE-2017-7187.html
   https://www.suse.com/security/cve/CVE-2017-7261.html
   https://www.suse.com/security/cve/CVE-2017-7294.html
   https://www.suse.com/security/cve/CVE-2017-7308.html
   https://www.suse.com/security/cve/CVE-2017-7616.html
   https://www.suse.com/security/cve/CVE-2017-7645.html
   https://www.suse.com/security/cve/CVE-2017-8106.html
   https://bugzilla.suse.com/1003077
   https://bugzilla.suse.com/1008842
   https://bugzilla.suse.com/1009682
   https://bugzilla.suse.com/1012620
   https://bugzilla.suse.com/1012985
   https://bugzilla.suse.com/1015703
   https://bugzilla.suse.com/1015787
   https://bugzilla.suse.com/1015821
   https://bugzilla.suse.com/1017512
   https://bugzilla.suse.com/1018100
   https://bugzilla.suse.com/1018263
   https://bugzilla.suse.com/1018419
   https://bugzilla.suse.com/1018446
   https://bugzilla.suse.com/1019168
   https://bugzilla.suse.com/1019514
   https://bugzilla.suse.com/1020048
   https://bugzilla.suse.com/1020795
   https://bugzilla.suse.com/1021256
   https://bugzilla.suse.com/1021374
   https://bugzilla.suse.com/1021762
   https://bugzilla.suse.com/1021913
   https://bugzilla.suse.com/1022559
   https://bugzilla.suse.com/1022971
   https://bugzilla.suse.com/1023164
   https://bugzilla.suse.com/1023207
   https://bugzilla.suse.com/1023377
   https://bugzilla.suse.com/1023762
   https://bugzilla.suse.com/1023824
   https://bugzilla.suse.com/1023888
   https://bugzilla.suse.com/1023992
   https://bugzilla.suse.com/1024081
   https://bugzilla.suse.com/1024234
   https://bugzilla.suse.com/1024309
   https://bugzilla.suse.com/1024508
   https://bugzilla.suse.com/1024788
   https://bugzilla.suse.com/1025039
   https://bugzilla.suse.com/1025235
   https://bugzilla.suse.com/1025354
   https://bugzilla.suse.com/1025802
   https://bugzilla.suse.com/1026024
   https://bugzilla.suse.com/1026722
   https://bugzilla.suse.com/1026914
   https://bugzilla.suse.com/1027066
   https://bugzilla.suse.com/1027178
   https://bugzilla.suse.com/1027189
   https://bugzilla.suse.com/1027190
   https://bugzilla.suse.com/1027974
   https://bugzilla.suse.com/1028041
   https://bugzilla.suse.com/1028415
   https://bugzilla.suse.com/1028595
   https://bugzilla.suse.com/1028648
   https://bugzilla.suse.com/1028895
   https://bugzilla.suse.com/1029470
   https://bugzilla.suse.com/1029850
   https://bugzilla.suse.com/1029986
   https://bugzilla.suse.com/1030118
   https://bugzilla.suse.com/1030213
   https://bugzilla.suse.com/1030593
   https://bugzilla.suse.com/1030901
   https://bugzilla.suse.com/1031003
   https://bugzilla.suse.com/1031052
   https://bugzilla.suse.com/1031080
   https://bugzilla.suse.com/1031440
   https://bugzilla.suse.com/1031567
   https://bugzilla.suse.com/1031579
   https://bugzilla.suse.com/1031662
   https://bugzilla.suse.com/1031842
   https://bugzilla.suse.com/1032125
   https://bugzilla.suse.com/1032141
   https://bugzilla.suse.com/1032344
   https://bugzilla.suse.com/1032345
   https://bugzilla.suse.com/1033336
   https://bugzilla.suse.com/1034670
   https://bugzilla.suse.com/103470
   https://bugzilla.suse.com/1034700
   https://bugzilla.suse.com/1035576
   https://bugzilla.suse.com/1035699
   https://bugzilla.suse.com/1035738
   https://bugzilla.suse.com/1035877
   https://bugzilla.suse.com/1036752
   https://bugzilla.suse.com/1038261
   https://bugzilla.suse.com/799133
   https://bugzilla.suse.com/857926
   https://bugzilla.suse.com/914939
   https://bugzilla.suse.com/917630
   https://bugzilla.suse.com/922853
   https://bugzilla.suse.com/930399
   https://bugzilla.suse.com/931620
   https://bugzilla.suse.com/937444
   https://bugzilla.suse.com/940946
   https://bugzilla.suse.com/954763
   https://bugzilla.suse.com/968697
   https://bugzilla.suse.com/970083
   https://bugzilla.suse.com/971933
   https://bugzilla.suse.com/979215
   https://bugzilla.suse.com/982783
   https://bugzilla.suse.com/983212
   https://bugzilla.suse.com/984530
   https://bugzilla.suse.com/985561
   https://bugzilla.suse.com/988065
   https://bugzilla.suse.com/989056
   https://bugzilla.suse.com/993832



More information about the sle-security-updates mailing list