openSUSE Security Announce
Threads by month
- ----- 2024 -----
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
December 2016
- 1 participants
- 103 discussions
[security-announce] SUSE-SU-2016:3068-1: important: Security update for java-1_7_0-ibm
by opensuse-security@opensuse.org 09 Dec '16
by opensuse-security@opensuse.org 09 Dec '16
09 Dec '16
SUSE Security Update: Security update for java-1_7_0-ibm
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:3068-1
Rating: important
References: #1009280 #992537
Cross-References: CVE-2016-5542 CVE-2016-5554 CVE-2016-5556
CVE-2016-5568 CVE-2016-5573 CVE-2016-5597
Affected Products:
SUSE OpenStack Cloud 5
SUSE Manager Proxy 2.1
SUSE Manager 2.1
SUSE Linux Enterprise Server 11-SP3-LTSS
SUSE Linux Enterprise Server 11-SP2-LTSS
SUSE Linux Enterprise Point of Sale 11-SP3
______________________________________________________________________________
An update that fixes 6 vulnerabilities is now available.
Description:
This update for java-1_7_0-ibm fixes the following issues:
- Version update to 7.0-9.60 (bsc#1009280, bsc#992537) fixing the
following CVE's: CVE-2016-5568, CVE-2016-5556, CVE-2016-5573,
CVE-2016-5597, CVE-2016-5554, CVE-2016-5542
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 5:
zypper in -t patch sleclo50sp3-java-1_7_0-ibm-12879=1
- SUSE Manager Proxy 2.1:
zypper in -t patch slemap21-java-1_7_0-ibm-12879=1
- SUSE Manager 2.1:
zypper in -t patch sleman21-java-1_7_0-ibm-12879=1
- SUSE Linux Enterprise Server 11-SP3-LTSS:
zypper in -t patch slessp3-java-1_7_0-ibm-12879=1
- SUSE Linux Enterprise Server 11-SP2-LTSS:
zypper in -t patch slessp2-java-1_7_0-ibm-12879=1
- SUSE Linux Enterprise Point of Sale 11-SP3:
zypper in -t patch sleposp3-java-1_7_0-ibm-12879=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE OpenStack Cloud 5 (x86_64):
java-1_7_0-ibm-1.7.0_sr9.60-58.2
java-1_7_0-ibm-alsa-1.7.0_sr9.60-58.2
java-1_7_0-ibm-devel-1.7.0_sr9.60-58.2
java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58.2
java-1_7_0-ibm-plugin-1.7.0_sr9.60-58.2
- SUSE Manager Proxy 2.1 (x86_64):
java-1_7_0-ibm-1.7.0_sr9.60-58.2
java-1_7_0-ibm-alsa-1.7.0_sr9.60-58.2
java-1_7_0-ibm-devel-1.7.0_sr9.60-58.2
java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58.2
java-1_7_0-ibm-plugin-1.7.0_sr9.60-58.2
- SUSE Manager 2.1 (s390x x86_64):
java-1_7_0-ibm-1.7.0_sr9.60-58.2
java-1_7_0-ibm-devel-1.7.0_sr9.60-58.2
java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58.2
- SUSE Manager 2.1 (x86_64):
java-1_7_0-ibm-alsa-1.7.0_sr9.60-58.2
java-1_7_0-ibm-plugin-1.7.0_sr9.60-58.2
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):
java-1_7_0-ibm-1.7.0_sr9.60-58.2
java-1_7_0-ibm-devel-1.7.0_sr9.60-58.2
java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58.2
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 x86_64):
java-1_7_0-ibm-alsa-1.7.0_sr9.60-58.2
java-1_7_0-ibm-plugin-1.7.0_sr9.60-58.2
- SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64):
java-1_7_0-ibm-1.7.0_sr9.60-58.2
java-1_7_0-ibm-devel-1.7.0_sr9.60-58.2
java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58.2
- SUSE Linux Enterprise Server 11-SP2-LTSS (i586 x86_64):
java-1_7_0-ibm-alsa-1.7.0_sr9.60-58.2
java-1_7_0-ibm-plugin-1.7.0_sr9.60-58.2
- SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
java-1_7_0-ibm-1.7.0_sr9.60-58.2
java-1_7_0-ibm-alsa-1.7.0_sr9.60-58.2
java-1_7_0-ibm-devel-1.7.0_sr9.60-58.2
java-1_7_0-ibm-jdbc-1.7.0_sr9.60-58.2
java-1_7_0-ibm-plugin-1.7.0_sr9.60-58.2
References:
https://www.suse.com/security/cve/CVE-2016-5542.html
https://www.suse.com/security/cve/CVE-2016-5554.html
https://www.suse.com/security/cve/CVE-2016-5556.html
https://www.suse.com/security/cve/CVE-2016-5568.html
https://www.suse.com/security/cve/CVE-2016-5573.html
https://www.suse.com/security/cve/CVE-2016-5597.html
https://bugzilla.suse.com/1009280
https://bugzilla.suse.com/992537
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2016:3067-1: important: Security update for xen
by opensuse-security@opensuse.org 09 Dec '16
by opensuse-security@opensuse.org 09 Dec '16
09 Dec '16
SUSE Security Update: Security update for xen
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:3067-1
Rating: important
References: #1000106 #1003030 #1003032 #1004981 #1005004
#1005005 #1007157 #1007941 #1009100 #1009103
#1009104 #1009105 #1009107 #1009108 #1009109
#1009111 #1011652
Cross-References: CVE-2016-7777 CVE-2016-7908 CVE-2016-7909
CVE-2016-8667 CVE-2016-8669 CVE-2016-8910
CVE-2016-9377 CVE-2016-9378 CVE-2016-9379
CVE-2016-9380 CVE-2016-9381 CVE-2016-9382
CVE-2016-9383 CVE-2016-9384 CVE-2016-9385
CVE-2016-9386 CVE-2016-9637
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________
An update that fixes 17 vulnerabilities is now available.
Description:
xen was updated to version 4.7.1 to fix 17 security issues.
These security issues were fixed:
- CVE-2016-9637: ioport array overflow allowing a malicious guest
administrator can escalate their privilege to that of the host
(bsc#1011652).
- CVE-2016-9386: x86 null segments were not always treated as unusable
allowing an unprivileged guest user program to elevate its privilege to
that of the guest operating system. Exploit of this vulnerability is
easy on Intel and more complicated on AMD (bsc#1009100).
- CVE-2016-9382: x86 task switch to VM86 mode was mis-handled, allowing a
unprivileged guest process to escalate its privilege to that of the
guest operating system on AMD hardware. On Intel hardware a malicious
unprivileged guest process can crash the guest (bsc#1009103).
- CVE-2016-9385: x86 segment base write emulation lacked canonical address
checks, allowing a malicious guest administrator to crash the host
(bsc#1009104).
- CVE-2016-9384: Guest 32-bit ELF symbol table load leaking host data to
unprivileged guest users (bsc#1009105).
- CVE-2016-9383: The x86 64-bit bit test instruction emulation was broken,
allowing a guest to modify arbitrary memory leading to arbitray code
execution (bsc#1009107).
- CVE-2016-9377: x86 software interrupt injection was mis-handled,
allowing an unprivileged guest user to crash the guest (bsc#1009108).
- CVE-2016-9378: x86 software interrupt injection was mis-handled,
allowing an unprivileged guest user to crash the guest (bsc#1009108)
- CVE-2016-9381: Improper processing of shared rings allowing guest
administrators take over the qemu process, elevating their privilege to
that of the qemu process (bsc#1009109).
- CVE-2016-9379: Delimiter injection vulnerabilities in pygrub allowed
guest administrators to obtain the contents of sensitive host files or
delete the files (bsc#1009111).
- CVE-2016-9380: Delimiter injection vulnerabilities in pygrub allowed
guest administrators to obtain the contents of sensitive host files or
delete the files (bsc#1009111).
- CVE-2016-7777: Xen did not properly honor CR0.TS and CR0.EM, which
allowed local x86 HVM guest OS users to read or modify FPU, MMX, or XMM
register state information belonging to arbitrary tasks on the guest by
modifying an instruction while the hypervisor is preparing to emulate it
(bsc#1000106).
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c
allowed local guest OS administrators to cause a denial of service
(infinite loop and CPU consumption) by leveraging failure to limit the
ring descriptor count (bsc#1007157).
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c in allowed
local guest OS administrators to cause a denial of service
(divide-by-zero error and QEMU process crash) via a large interval timer
reload value (bsc#1005004).
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c
allowed local guest OS administrators to cause a denial of service
(divide-by-zero error and QEMU process crash) via vectors involving a
value of divider greater than baud base (bsc#1005005).
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not
properly limit the buffer descriptor count when transmitting packets,
which allowed local guest OS administrators to cause a denial of service
(infinite loop and QEMU process crash) via vectors involving a buffer
descriptor with a length of 0 and crafted values in bd.flags
(bsc#1003030).
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed
local guest OS administrators to cause a denial of service (infinite
loop and QEMU process crash) by setting the (1) receive or (2) transmit
descriptor ring length to 0 (bsc#1003032).
These non-security issues were fixed:
- bsc#1004981: Xen RPM didn't contain debug hypervisor for EFI systems
- bsc#1007941: Xen tools limited the number of vcpus to 256
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2016-1785=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1785=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2016-1785=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 x86_64):
xen-debugsource-4.7.1_02-25.1
xen-devel-4.7.1_02-25.1
- SUSE Linux Enterprise Server 12-SP2 (x86_64):
xen-4.7.1_02-25.1
xen-debugsource-4.7.1_02-25.1
xen-doc-html-4.7.1_02-25.1
xen-libs-32bit-4.7.1_02-25.1
xen-libs-4.7.1_02-25.1
xen-libs-debuginfo-32bit-4.7.1_02-25.1
xen-libs-debuginfo-4.7.1_02-25.1
xen-tools-4.7.1_02-25.1
xen-tools-debuginfo-4.7.1_02-25.1
xen-tools-domU-4.7.1_02-25.1
xen-tools-domU-debuginfo-4.7.1_02-25.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
xen-4.7.1_02-25.1
xen-debugsource-4.7.1_02-25.1
xen-libs-32bit-4.7.1_02-25.1
xen-libs-4.7.1_02-25.1
xen-libs-debuginfo-32bit-4.7.1_02-25.1
xen-libs-debuginfo-4.7.1_02-25.1
References:
https://www.suse.com/security/cve/CVE-2016-7777.html
https://www.suse.com/security/cve/CVE-2016-7908.html
https://www.suse.com/security/cve/CVE-2016-7909.html
https://www.suse.com/security/cve/CVE-2016-8667.html
https://www.suse.com/security/cve/CVE-2016-8669.html
https://www.suse.com/security/cve/CVE-2016-8910.html
https://www.suse.com/security/cve/CVE-2016-9377.html
https://www.suse.com/security/cve/CVE-2016-9378.html
https://www.suse.com/security/cve/CVE-2016-9379.html
https://www.suse.com/security/cve/CVE-2016-9380.html
https://www.suse.com/security/cve/CVE-2016-9381.html
https://www.suse.com/security/cve/CVE-2016-9382.html
https://www.suse.com/security/cve/CVE-2016-9383.html
https://www.suse.com/security/cve/CVE-2016-9384.html
https://www.suse.com/security/cve/CVE-2016-9385.html
https://www.suse.com/security/cve/CVE-2016-9386.html
https://www.suse.com/security/cve/CVE-2016-9637.html
https://bugzilla.suse.com/1000106
https://bugzilla.suse.com/1003030
https://bugzilla.suse.com/1003032
https://bugzilla.suse.com/1004981
https://bugzilla.suse.com/1005004
https://bugzilla.suse.com/1005005
https://bugzilla.suse.com/1007157
https://bugzilla.suse.com/1007941
https://bugzilla.suse.com/1009100
https://bugzilla.suse.com/1009103
https://bugzilla.suse.com/1009104
https://bugzilla.suse.com/1009105
https://bugzilla.suse.com/1009107
https://bugzilla.suse.com/1009108
https://bugzilla.suse.com/1009109
https://bugzilla.suse.com/1009111
https://bugzilla.suse.com/1011652
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2016:3063-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 09 Dec '16
by opensuse-security@opensuse.org 09 Dec '16
09 Dec '16
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:3063-1
Rating: important
References: #1008831 #1011685 #1012754
Cross-References: CVE-2016-8632 CVE-2016-8655 CVE-2016-9555
Affected Products:
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server 12-LTSS
SUSE Linux Enterprise Module for Public Cloud 12
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
The SUSE Linux Enterprise 12 kernel was updated to receive critical
security fixes.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring
function could be used by local attackers to crash the kernel or gain
privileges (bsc#1012754).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the
Linux kernel did not validate the relationship between the minimum
fragment length and the maximum packet size, which allowed local users
to gain privileges or cause a denial of service (heap-based buffer
overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in
the Linux kernel lacks chunk-length checking for the first chunk, which
allowed remote attackers to cause a denial of service (out-of-bounds
slab access) or possibly have unspecified other impact via crafted SCTP
data (bnc#1011685).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for SAP 12:
zypper in -t patch SUSE-SLE-SAP-12-2016-1781=1
- SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2016-1781=1
- SUSE Linux Enterprise Module for Public Cloud 12:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2016-1781=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for SAP 12 (noarch):
kernel-devel-3.12.60-52.60.1
kernel-macros-3.12.60-52.60.1
kernel-source-3.12.60-52.60.1
- SUSE Linux Enterprise Server for SAP 12 (x86_64):
kernel-default-3.12.60-52.60.1
kernel-default-base-3.12.60-52.60.1
kernel-default-base-debuginfo-3.12.60-52.60.1
kernel-default-debuginfo-3.12.60-52.60.1
kernel-default-debugsource-3.12.60-52.60.1
kernel-default-devel-3.12.60-52.60.1
kernel-syms-3.12.60-52.60.1
kernel-xen-3.12.60-52.60.1
kernel-xen-base-3.12.60-52.60.1
kernel-xen-base-debuginfo-3.12.60-52.60.1
kernel-xen-debuginfo-3.12.60-52.60.1
kernel-xen-debugsource-3.12.60-52.60.1
kernel-xen-devel-3.12.60-52.60.1
kgraft-patch-3_12_60-52_60-default-1-2.1
kgraft-patch-3_12_60-52_60-xen-1-2.1
- SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):
kernel-default-3.12.60-52.60.1
kernel-default-base-3.12.60-52.60.1
kernel-default-base-debuginfo-3.12.60-52.60.1
kernel-default-debuginfo-3.12.60-52.60.1
kernel-default-debugsource-3.12.60-52.60.1
kernel-default-devel-3.12.60-52.60.1
kernel-syms-3.12.60-52.60.1
- SUSE Linux Enterprise Server 12-LTSS (noarch):
kernel-devel-3.12.60-52.60.1
kernel-macros-3.12.60-52.60.1
kernel-source-3.12.60-52.60.1
- SUSE Linux Enterprise Server 12-LTSS (x86_64):
kernel-xen-3.12.60-52.60.1
kernel-xen-base-3.12.60-52.60.1
kernel-xen-base-debuginfo-3.12.60-52.60.1
kernel-xen-debuginfo-3.12.60-52.60.1
kernel-xen-debugsource-3.12.60-52.60.1
kernel-xen-devel-3.12.60-52.60.1
kgraft-patch-3_12_60-52_60-default-1-2.1
kgraft-patch-3_12_60-52_60-xen-1-2.1
- SUSE Linux Enterprise Server 12-LTSS (s390x):
kernel-default-man-3.12.60-52.60.1
- SUSE Linux Enterprise Module for Public Cloud 12 (x86_64):
kernel-ec2-3.12.60-52.60.1
kernel-ec2-debuginfo-3.12.60-52.60.1
kernel-ec2-debugsource-3.12.60-52.60.1
kernel-ec2-devel-3.12.60-52.60.1
kernel-ec2-extra-3.12.60-52.60.1
kernel-ec2-extra-debuginfo-3.12.60-52.60.1
References:
https://www.suse.com/security/cve/CVE-2016-8632.html
https://www.suse.com/security/cve/CVE-2016-8655.html
https://www.suse.com/security/cve/CVE-2016-9555.html
https://bugzilla.suse.com/1008831
https://bugzilla.suse.com/1011685
https://bugzilla.suse.com/1012754
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2016:3061-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 08 Dec '16
by opensuse-security@opensuse.org 08 Dec '16
08 Dec '16
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:3061-1
Rating: important
References: #1001486 #1004517 #1007615 #1008833 #1010040
#1010150 #1010467 #1010475 #1010478 #1010501
#1010502 #1010711 #1010716 #1011685 #1012754
#934067 #990384 #993739 #999577 #999907
Cross-References: CVE-2015-8962 CVE-2015-8963 CVE-2016-7042
CVE-2016-7910 CVE-2016-7911 CVE-2016-7913
CVE-2016-7914 CVE-2016-7916 CVE-2016-8633
CVE-2016-8646 CVE-2016-8655 CVE-2016-9555
Affected Products:
openSUSE 13.2
______________________________________________________________________________
An update that solves 12 vulnerabilities and has 8 fixes is
now available.
Description:
The openSUSE 13.2 kernel was updated to receive various security and
bugfixes.
The following security bugs were fixed:
- CVE-2015-8962: Double free vulnerability in the sg_common_write function
in drivers/scsi/sg.c in the Linux kernel allowed local users to gain
privileges or cause a denial of service (memory corruption and system
crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2015-8963: Race condition in kernel/events/core.c in the Linux
kernel allowed local users to gain privileges or cause a denial of
service (use-after-free) by leveraging incorrect handling of an swevent
data structure during a CPU unplug operation (bnc#1010502).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in
the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc)
stack protector is enabled, uses an incorrect buffer size for certain
timeout data, which allowed local users to cause a denial of service
(stack memory corruption and panic) by reading the /proc/keys file
(bnc#1004517).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop
function in block/genhd.c in the Linux kernel allowed local users to
gain privileges by leveraging the execution of a certain stop operation
even if the corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in
block/ioprio.c in the Linux kernel allowed local users to gain
privileges or cause a denial of service (use-after-free) via a crafted
ioprio_get system call (bnc#1010711).
- CVE-2016-7913: The xc2028_set_config function in
drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local
users to gain privileges or cause a denial of service (use-after-free)
via vectors involving omission of the firmware name from a certain data
structure (bnc#1010478).
- CVE-2016-7914: The assoc_array_insert_into_terminal_node function in
lib/assoc_array.c in the Linux kernel did not check whether a slot is a
leaf, which allowed local users to obtain sensitive information from
kernel memory or cause a denial of service (invalid pointer dereference
and out-of-bounds read) via an application that uses associative-array
data structures, as demonstrated by the keyutils test suite
(bnc#1010475).
- CVE-2016-7916: Race condition in the environ_read function in
fs/proc/base.c in the Linux kernel allowed local users to obtain
sensitive information from kernel memory by reading a /proc/*/environ
file during a process-setup time interval in which environment-variable
copying is incomplete (bnc#1010467).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel before 4.8.7,
in certain unusual hardware configurations, allowed remote attackers to
execute arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the
Linux kernel allowed local users to cause a denial of service (OOPS) by
attempting to trigger use of in-kernel hash algorithms for a socket that
has received zero bytes of data (bnc#1010150).
- CVE-2016-8655: A race condition in the af_packet packet_set_ring
function could be used by local attackers to crash the kernel or gain
privileges (bsc#1012754).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in
the Linux kernel lacks chunk-length checking for the first chunk, which
allowed remote attackers to cause a denial of service (out-of-bounds
slab access) or possibly have unspecified other impact via crafted SCTP
data (bnc#1011685).
The following non-security bugs were fixed:
- bna: Add synchronization for tx ring (bsc#993739).
- bonding: set carrier off for devices created through netlink
(bsc#999577).
- btrfs: fix extent tree corruption due to relocation (bsc#990384).
- introduce NETIF_F_GSO_ENCAP_ALL helper mask (bsc#1001486).
- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).
- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).
- tunnels: Remove encapsulation offloads on decap (bsc#1001486).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- vmxnet3: Wake queue from reset work (bsc#999907).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2016-1431=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i686 x86_64):
kernel-debug-3.16.7-53.1
kernel-debug-base-3.16.7-53.1
kernel-debug-base-debuginfo-3.16.7-53.1
kernel-debug-debuginfo-3.16.7-53.1
kernel-debug-debugsource-3.16.7-53.1
kernel-debug-devel-3.16.7-53.1
kernel-debug-devel-debuginfo-3.16.7-53.1
kernel-desktop-3.16.7-53.1
kernel-desktop-base-3.16.7-53.1
kernel-desktop-base-debuginfo-3.16.7-53.1
kernel-desktop-debuginfo-3.16.7-53.1
kernel-desktop-debugsource-3.16.7-53.1
kernel-desktop-devel-3.16.7-53.1
kernel-ec2-base-debuginfo-3.16.7-53.1
kernel-ec2-debuginfo-3.16.7-53.1
kernel-ec2-debugsource-3.16.7-53.1
kernel-vanilla-3.16.7-53.1
kernel-vanilla-debuginfo-3.16.7-53.1
kernel-vanilla-debugsource-3.16.7-53.1
kernel-vanilla-devel-3.16.7-53.1
kernel-xen-3.16.7-53.1
kernel-xen-base-3.16.7-53.1
kernel-xen-base-debuginfo-3.16.7-53.1
kernel-xen-debuginfo-3.16.7-53.1
kernel-xen-debugsource-3.16.7-53.1
kernel-xen-devel-3.16.7-53.1
- openSUSE 13.2 (i586 x86_64):
bbswitch-0.8-3.26.1
bbswitch-debugsource-0.8-3.26.1
bbswitch-kmp-default-0.8_k3.16.7_53-3.26.1
bbswitch-kmp-default-debuginfo-0.8_k3.16.7_53-3.26.1
bbswitch-kmp-desktop-0.8_k3.16.7_53-3.26.1
bbswitch-kmp-desktop-debuginfo-0.8_k3.16.7_53-3.26.1
bbswitch-kmp-xen-0.8_k3.16.7_53-3.26.1
bbswitch-kmp-xen-debuginfo-0.8_k3.16.7_53-3.26.1
cloop-2.639-14.26.1
cloop-debuginfo-2.639-14.26.1
cloop-debugsource-2.639-14.26.1
cloop-kmp-default-2.639_k3.16.7_53-14.26.1
cloop-kmp-default-debuginfo-2.639_k3.16.7_53-14.26.1
cloop-kmp-desktop-2.639_k3.16.7_53-14.26.1
cloop-kmp-desktop-debuginfo-2.639_k3.16.7_53-14.26.1
cloop-kmp-xen-2.639_k3.16.7_53-14.26.1
cloop-kmp-xen-debuginfo-2.639_k3.16.7_53-14.26.1
crash-7.0.8-26.1
crash-debuginfo-7.0.8-26.1
crash-debugsource-7.0.8-26.1
crash-devel-7.0.8-26.1
crash-doc-7.0.8-26.1
crash-eppic-7.0.8-26.1
crash-eppic-debuginfo-7.0.8-26.1
crash-gcore-7.0.8-26.1
crash-gcore-debuginfo-7.0.8-26.1
crash-kmp-default-7.0.8_k3.16.7_53-26.1
crash-kmp-default-debuginfo-7.0.8_k3.16.7_53-26.1
crash-kmp-desktop-7.0.8_k3.16.7_53-26.1
crash-kmp-desktop-debuginfo-7.0.8_k3.16.7_53-26.1
crash-kmp-xen-7.0.8_k3.16.7_53-26.1
crash-kmp-xen-debuginfo-7.0.8_k3.16.7_53-26.1
hdjmod-debugsource-1.28-18.27.1
hdjmod-kmp-default-1.28_k3.16.7_53-18.27.1
hdjmod-kmp-default-debuginfo-1.28_k3.16.7_53-18.27.1
hdjmod-kmp-desktop-1.28_k3.16.7_53-18.27.1
hdjmod-kmp-desktop-debuginfo-1.28_k3.16.7_53-18.27.1
hdjmod-kmp-xen-1.28_k3.16.7_53-18.27.1
hdjmod-kmp-xen-debuginfo-1.28_k3.16.7_53-18.27.1
ipset-6.23-26.1
ipset-debuginfo-6.23-26.1
ipset-debugsource-6.23-26.1
ipset-devel-6.23-26.1
ipset-kmp-default-6.23_k3.16.7_53-26.1
ipset-kmp-default-debuginfo-6.23_k3.16.7_53-26.1
ipset-kmp-desktop-6.23_k3.16.7_53-26.1
ipset-kmp-desktop-debuginfo-6.23_k3.16.7_53-26.1
ipset-kmp-xen-6.23_k3.16.7_53-26.1
ipset-kmp-xen-debuginfo-6.23_k3.16.7_53-26.1
kernel-default-3.16.7-53.1
kernel-default-base-3.16.7-53.1
kernel-default-base-debuginfo-3.16.7-53.1
kernel-default-debuginfo-3.16.7-53.1
kernel-default-debugsource-3.16.7-53.1
kernel-default-devel-3.16.7-53.1
kernel-ec2-3.16.7-53.1
kernel-ec2-base-3.16.7-53.1
kernel-ec2-devel-3.16.7-53.1
kernel-obs-build-3.16.7-53.2
kernel-obs-build-debugsource-3.16.7-53.2
kernel-obs-qa-3.16.7-53.1
kernel-syms-3.16.7-53.1
libipset3-6.23-26.1
libipset3-debuginfo-6.23-26.1
pcfclock-0.44-260.26.1
pcfclock-debuginfo-0.44-260.26.1
pcfclock-debugsource-0.44-260.26.1
pcfclock-kmp-default-0.44_k3.16.7_53-260.26.1
pcfclock-kmp-default-debuginfo-0.44_k3.16.7_53-260.26.1
pcfclock-kmp-desktop-0.44_k3.16.7_53-260.26.1
pcfclock-kmp-desktop-debuginfo-0.44_k3.16.7_53-260.26.1
python-virtualbox-5.0.30-62.1
python-virtualbox-debuginfo-5.0.30-62.1
vhba-kmp-debugsource-20140629-2.26.1
vhba-kmp-default-20140629_k3.16.7_53-2.26.1
vhba-kmp-default-debuginfo-20140629_k3.16.7_53-2.26.1
vhba-kmp-desktop-20140629_k3.16.7_53-2.26.1
vhba-kmp-desktop-debuginfo-20140629_k3.16.7_53-2.26.1
vhba-kmp-xen-20140629_k3.16.7_53-2.26.1
vhba-kmp-xen-debuginfo-20140629_k3.16.7_53-2.26.1
virtualbox-5.0.30-62.1
virtualbox-debuginfo-5.0.30-62.1
virtualbox-debugsource-5.0.30-62.1
virtualbox-devel-5.0.30-62.1
virtualbox-guest-kmp-default-5.0.30_k3.16.7_53-62.1
virtualbox-guest-kmp-default-debuginfo-5.0.30_k3.16.7_53-62.1
virtualbox-guest-kmp-desktop-5.0.30_k3.16.7_53-62.1
virtualbox-guest-kmp-desktop-debuginfo-5.0.30_k3.16.7_53-62.1
virtualbox-guest-tools-5.0.30-62.1
virtualbox-guest-tools-debuginfo-5.0.30-62.1
virtualbox-guest-x11-5.0.30-62.1
virtualbox-guest-x11-debuginfo-5.0.30-62.1
virtualbox-host-kmp-default-5.0.30_k3.16.7_53-62.1
virtualbox-host-kmp-default-debuginfo-5.0.30_k3.16.7_53-62.1
virtualbox-host-kmp-desktop-5.0.30_k3.16.7_53-62.1
virtualbox-host-kmp-desktop-debuginfo-5.0.30_k3.16.7_53-62.1
virtualbox-qt-5.0.30-62.1
virtualbox-qt-debuginfo-5.0.30-62.1
virtualbox-websrv-5.0.30-62.1
virtualbox-websrv-debuginfo-5.0.30-62.1
xen-debugsource-4.4.4_05-55.1
xen-devel-4.4.4_05-55.1
xen-libs-4.4.4_05-55.1
xen-libs-debuginfo-4.4.4_05-55.1
xen-tools-domU-4.4.4_05-55.1
xen-tools-domU-debuginfo-4.4.4_05-55.1
xtables-addons-2.6-28.1
xtables-addons-debuginfo-2.6-28.1
xtables-addons-debugsource-2.6-28.1
xtables-addons-kmp-default-2.6_k3.16.7_53-28.1
xtables-addons-kmp-default-debuginfo-2.6_k3.16.7_53-28.1
xtables-addons-kmp-desktop-2.6_k3.16.7_53-28.1
xtables-addons-kmp-desktop-debuginfo-2.6_k3.16.7_53-28.1
xtables-addons-kmp-xen-2.6_k3.16.7_53-28.1
xtables-addons-kmp-xen-debuginfo-2.6_k3.16.7_53-28.1
- openSUSE 13.2 (x86_64):
xen-4.4.4_05-55.1
xen-doc-html-4.4.4_05-55.1
xen-kmp-default-4.4.4_05_k3.16.7_53-55.1
xen-kmp-default-debuginfo-4.4.4_05_k3.16.7_53-55.1
xen-kmp-desktop-4.4.4_05_k3.16.7_53-55.1
xen-kmp-desktop-debuginfo-4.4.4_05_k3.16.7_53-55.1
xen-libs-32bit-4.4.4_05-55.1
xen-libs-debuginfo-32bit-4.4.4_05-55.1
xen-tools-4.4.4_05-55.1
xen-tools-debuginfo-4.4.4_05-55.1
- openSUSE 13.2 (noarch):
kernel-devel-3.16.7-53.1
kernel-docs-3.16.7-53.2
kernel-macros-3.16.7-53.1
kernel-source-3.16.7-53.1
kernel-source-vanilla-3.16.7-53.1
virtualbox-guest-desktop-icons-5.0.30-62.1
virtualbox-host-source-5.0.30-62.1
- openSUSE 13.2 (i586):
bbswitch-kmp-pae-0.8_k3.16.7_53-3.26.1
bbswitch-kmp-pae-debuginfo-0.8_k3.16.7_53-3.26.1
cloop-kmp-pae-2.639_k3.16.7_53-14.26.1
cloop-kmp-pae-debuginfo-2.639_k3.16.7_53-14.26.1
crash-kmp-pae-7.0.8_k3.16.7_53-26.1
crash-kmp-pae-debuginfo-7.0.8_k3.16.7_53-26.1
hdjmod-kmp-pae-1.28_k3.16.7_53-18.27.1
hdjmod-kmp-pae-debuginfo-1.28_k3.16.7_53-18.27.1
ipset-kmp-pae-6.23_k3.16.7_53-26.1
ipset-kmp-pae-debuginfo-6.23_k3.16.7_53-26.1
pcfclock-kmp-pae-0.44_k3.16.7_53-260.26.1
pcfclock-kmp-pae-debuginfo-0.44_k3.16.7_53-260.26.1
vhba-kmp-pae-20140629_k3.16.7_53-2.26.1
vhba-kmp-pae-debuginfo-20140629_k3.16.7_53-2.26.1
virtualbox-guest-kmp-pae-5.0.30_k3.16.7_53-62.1
virtualbox-guest-kmp-pae-debuginfo-5.0.30_k3.16.7_53-62.1
virtualbox-host-kmp-pae-5.0.30_k3.16.7_53-62.1
virtualbox-host-kmp-pae-debuginfo-5.0.30_k3.16.7_53-62.1
xtables-addons-kmp-pae-2.6_k3.16.7_53-28.1
xtables-addons-kmp-pae-debuginfo-2.6_k3.16.7_53-28.1
- openSUSE 13.2 (i686):
kernel-pae-3.16.7-53.1
kernel-pae-base-3.16.7-53.1
kernel-pae-base-debuginfo-3.16.7-53.1
kernel-pae-debuginfo-3.16.7-53.1
kernel-pae-debugsource-3.16.7-53.1
kernel-pae-devel-3.16.7-53.1
References:
https://www.suse.com/security/cve/CVE-2015-8962.html
https://www.suse.com/security/cve/CVE-2015-8963.html
https://www.suse.com/security/cve/CVE-2016-7042.html
https://www.suse.com/security/cve/CVE-2016-7910.html
https://www.suse.com/security/cve/CVE-2016-7911.html
https://www.suse.com/security/cve/CVE-2016-7913.html
https://www.suse.com/security/cve/CVE-2016-7914.html
https://www.suse.com/security/cve/CVE-2016-7916.html
https://www.suse.com/security/cve/CVE-2016-8633.html
https://www.suse.com/security/cve/CVE-2016-8646.html
https://www.suse.com/security/cve/CVE-2016-8655.html
https://www.suse.com/security/cve/CVE-2016-9555.html
https://bugzilla.suse.com/1001486
https://bugzilla.suse.com/1004517
https://bugzilla.suse.com/1007615
https://bugzilla.suse.com/1008833
https://bugzilla.suse.com/1010040
https://bugzilla.suse.com/1010150
https://bugzilla.suse.com/1010467
https://bugzilla.suse.com/1010475
https://bugzilla.suse.com/1010478
https://bugzilla.suse.com/1010501
https://bugzilla.suse.com/1010502
https://bugzilla.suse.com/1010711
https://bugzilla.suse.com/1010716
https://bugzilla.suse.com/1011685
https://bugzilla.suse.com/1012754
https://bugzilla.suse.com/934067
https://bugzilla.suse.com/990384
https://bugzilla.suse.com/993739
https://bugzilla.suse.com/999577
https://bugzilla.suse.com/999907
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2016:3060-1: important: Security update for GraphicsMagick
by opensuse-security@opensuse.org 08 Dec '16
by opensuse-security@opensuse.org 08 Dec '16
08 Dec '16
openSUSE Security Update: Security update for GraphicsMagick
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:3060-1
Rating: important
References: #1000399 #1000434 #1000689 #1000698 #1000704
#1000707 #1000711 #1001066 #1001221 #1002206
#1002209 #1002422 #1003629 #1005123 #1005125
#1005127 #1007245 #1011130 #982178 #983521
#983752 #983794 #983799 #984145 #984150 #984166
#984372 #984375 #984394 #984400 #984436
Cross-References: CVE-2014-9805 CVE-2014-9807 CVE-2014-9809
CVE-2014-9815 CVE-2014-9817 CVE-2014-9820
CVE-2014-9831 CVE-2014-9834 CVE-2014-9835
CVE-2014-9837 CVE-2014-9845 CVE-2014-9846
CVE-2014-9853 CVE-2016-5118 CVE-2016-6823
CVE-2016-7101 CVE-2016-7515 CVE-2016-7522
CVE-2016-7528 CVE-2016-7529 CVE-2016-7531
CVE-2016-7533 CVE-2016-7537 CVE-2016-7800
CVE-2016-7996 CVE-2016-7997 CVE-2016-8682
CVE-2016-8683 CVE-2016-8684 CVE-2016-8862
CVE-2016-9556
Affected Products:
openSUSE Leap 42.2
______________________________________________________________________________
An update that fixes 31 vulnerabilities is now available.
Description:
This update for GraphicsMagick fixes the following issues:
- a possible shell execution attack was fixed. if the first character of
an input filename for 'convert' was a '|' then the remainder of the
filename was passed to the shell (CVE-2016-5118, boo#982178)
- Maliciously crafted pnm files could crash GraphicsMagick (CVE-2014-9805,
[boo#983752])
- Prevent overflow in rle files (CVE-2014-9846, boo#983521)
- Fix a double free in pdb coder (CVE-2014-9807, boo#983794)
- Fix a possible crash due to corrupted xwd images (CVE-2014-9809,
boo#983799)
- Fix a possible crash due to corrupted wpg images (CVE-2014-9815,
boo#984372)
- Fix a heap buffer overflow in pdb file handling (CVE-2014-9817,
boo#984400)
- Fix a heap overflow in xpm files (CVE-2014-9820, boo#984150)
- Fix a heap overflow in pict files (CVE-2014-9834, boo#984436)
- Fix a heap overflow in wpf files (CVE-2014-9835, CVE-2014-9831,
boo#984145, boo#984375)
- Additional PNM sanity checks (CVE-2014-9837, boo#984166)
- Fix a possible crash due to corrupted dib file (CVE-2014-9845,
boo#984394)
- Fix out of bound in quantum handling (CVE-2016-7529, boo#1000399)
- Fix out of bound access in xcf file coder (CVE-2016-7528, boo#1000434)
- Fix handling of corrupted lle files (CVE-2016-7515, boo#1000689)
- Fix out of bound access for malformed psd file (CVE-2016-7522,
boo#1000698)
- Fix out of bound access for pbd files (CVE-2016-7531, boo#1000704)
- Fix out of bound access in corrupted wpg files (CVE-2016-7533,
boo#1000707)
- Fix out of bound access in corrupted pdb files (CVE-2016-7537,
boo#1000711)
- BMP Coder Out-Of-Bounds Write Vulnerability (CVE-2016-6823, boo#1001066)
- SGI Coder Out-Of-Bounds Read Vulnerability (CVE-2016-7101, boo#1001221)
- Divide by zero in WriteTIFFImage (do not divide by zero in
WriteTIFFImage, boo#1002206)
- Buffer overflows in SIXEL, PDB, MAP, and TIFF coders (fix buffer
overflow, boo#1002209)
- 8BIM/8BIMW unsigned underflow leads to heap overflow (CVE-2016-7800,
boo#1002422)
- wpg reader issues (CVE-2016-7996, CVE-2016-7997, boo#1003629)
- Mismatch between real filesize and header values (CVE-2016-8684,
boo#1005123)
- Stack-buffer read overflow while reading SCT header (CVE-2016-8682,
boo#1005125)
- Check that filesize is reasonable compared to the header value
(CVE-2016-8683, boo#1005127)
- Memory allocation failure in AcquireMagickMemory (CVE-2016-8862,
boo#1007245)
- heap-based buffer overflow in IsPixelGray (CVE-2016-9556, boo#1011130)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2016-1430=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.2 (i586 x86_64):
GraphicsMagick-1.3.25-3.1
GraphicsMagick-debuginfo-1.3.25-3.1
GraphicsMagick-debugsource-1.3.25-3.1
GraphicsMagick-devel-1.3.25-3.1
libGraphicsMagick++-Q16-12-1.3.25-3.1
libGraphicsMagick++-Q16-12-debuginfo-1.3.25-3.1
libGraphicsMagick++-devel-1.3.25-3.1
libGraphicsMagick-Q16-3-1.3.25-3.1
libGraphicsMagick-Q16-3-debuginfo-1.3.25-3.1
libGraphicsMagick3-config-1.3.25-3.1
libGraphicsMagickWand-Q16-2-1.3.25-3.1
libGraphicsMagickWand-Q16-2-debuginfo-1.3.25-3.1
perl-GraphicsMagick-1.3.25-3.1
perl-GraphicsMagick-debuginfo-1.3.25-3.1
References:
https://www.suse.com/security/cve/CVE-2014-9805.html
https://www.suse.com/security/cve/CVE-2014-9807.html
https://www.suse.com/security/cve/CVE-2014-9809.html
https://www.suse.com/security/cve/CVE-2014-9815.html
https://www.suse.com/security/cve/CVE-2014-9817.html
https://www.suse.com/security/cve/CVE-2014-9820.html
https://www.suse.com/security/cve/CVE-2014-9831.html
https://www.suse.com/security/cve/CVE-2014-9834.html
https://www.suse.com/security/cve/CVE-2014-9835.html
https://www.suse.com/security/cve/CVE-2014-9837.html
https://www.suse.com/security/cve/CVE-2014-9845.html
https://www.suse.com/security/cve/CVE-2014-9846.html
https://www.suse.com/security/cve/CVE-2014-9853.html
https://www.suse.com/security/cve/CVE-2016-5118.html
https://www.suse.com/security/cve/CVE-2016-6823.html
https://www.suse.com/security/cve/CVE-2016-7101.html
https://www.suse.com/security/cve/CVE-2016-7515.html
https://www.suse.com/security/cve/CVE-2016-7522.html
https://www.suse.com/security/cve/CVE-2016-7528.html
https://www.suse.com/security/cve/CVE-2016-7529.html
https://www.suse.com/security/cve/CVE-2016-7531.html
https://www.suse.com/security/cve/CVE-2016-7533.html
https://www.suse.com/security/cve/CVE-2016-7537.html
https://www.suse.com/security/cve/CVE-2016-7800.html
https://www.suse.com/security/cve/CVE-2016-7996.html
https://www.suse.com/security/cve/CVE-2016-7997.html
https://www.suse.com/security/cve/CVE-2016-8682.html
https://www.suse.com/security/cve/CVE-2016-8683.html
https://www.suse.com/security/cve/CVE-2016-8684.html
https://www.suse.com/security/cve/CVE-2016-8862.html
https://www.suse.com/security/cve/CVE-2016-9556.html
https://bugzilla.suse.com/1000399
https://bugzilla.suse.com/1000434
https://bugzilla.suse.com/1000689
https://bugzilla.suse.com/1000698
https://bugzilla.suse.com/1000704
https://bugzilla.suse.com/1000707
https://bugzilla.suse.com/1000711
https://bugzilla.suse.com/1001066
https://bugzilla.suse.com/1001221
https://bugzilla.suse.com/1002206
https://bugzilla.suse.com/1002209
https://bugzilla.suse.com/1002422
https://bugzilla.suse.com/1003629
https://bugzilla.suse.com/1005123
https://bugzilla.suse.com/1005125
https://bugzilla.suse.com/1005127
https://bugzilla.suse.com/1007245
https://bugzilla.suse.com/1011130
https://bugzilla.suse.com/982178
https://bugzilla.suse.com/983521
https://bugzilla.suse.com/983752
https://bugzilla.suse.com/983794
https://bugzilla.suse.com/983799
https://bugzilla.suse.com/984145
https://bugzilla.suse.com/984150
https://bugzilla.suse.com/984166
https://bugzilla.suse.com/984372
https://bugzilla.suse.com/984375
https://bugzilla.suse.com/984394
https://bugzilla.suse.com/984400
https://bugzilla.suse.com/984436
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2016:3058-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 08 Dec '16
by opensuse-security@opensuse.org 08 Dec '16
08 Dec '16
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:3058-1
Rating: important
References: #1001171 #1001486 #1003925 #1004517 #1006580
#1007197 #1007615 #1007653 #1008650 #1008833
#1009222 #1010040 #1010150 #1010478 #1010501
#1010502 #1010507 #1010909 #1011685 #1012754
#1012876 #1013533 #934067 #990384 #993739
#995968 #999577 #999907
Cross-References: CVE-2015-8956 CVE-2015-8962 CVE-2015-8963
CVE-2015-8964 CVE-2016-7042 CVE-2016-7097
CVE-2016-7913 CVE-2016-8630 CVE-2016-8633
CVE-2016-8646 CVE-2016-8655 CVE-2016-9083
CVE-2016-9084 CVE-2016-9178 CVE-2016-9555
CVE-2016-9794
Affected Products:
openSUSE Leap 42.1
______________________________________________________________________________
An update that solves 16 vulnerabilities and has 12 fixes
is now available.
Description:
The openSUSE Leap 42.1 kernel was updated to 4.1.36 to receive various
security and bugfixes.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring
function could be used by local attackers to crash the kernel or gain
privileges (bsc#1012754).
- CVE-2016-9794: A use-after-free in ALSA pcm could lead to crashes or
allowed local users to potentially gain privileges (bsc#1013533).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function
in drivers/scsi/sg.c in the Linux kernel allowed local users to gain
privileges or cause a denial of service (memory corruption and system
crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9178: The __get_user_asm_ex macro in
arch/x86/include/asm/uaccess.h in the Linux kernel did not initialize a
certain integer variable, which allowed local users to obtain sensitive
information from kernel stack memory by triggering failure of a
get_user_ex call (bnc#1008650).
- CVE-2016-7913: The xc2028_set_config function in
drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local
users to gain privileges or cause a denial of service (use-after-free)
via vectors involving omission of the firmware name from a certain data
structure (bnc#1010478).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in
the Linux kernel lacks chunk-length checking for the first chunk, which
allowed remote attackers to cause a denial of service (out-of-bounds
slab access) or possibly have unspecified other impact via crafted SCTP
data (bnc#1011685).
- CVE-2015-8963: Race condition in kernel/events/core.c in the Linux
kernel allowed local users to gain privileges or cause a denial of
service (use-after-free) by leveraging incorrect handling of an swevent
data structure during a CPU unplug operation (bnc#1010502).
- CVE-2015-8964: The tty_set_termios_ldisc function in
drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to
obtain sensitive information from kernel memory by reading a tty data
structure (bnc#1010507).
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the
Linux kernel allowed local users to cause a denial of service (OOPS) by
attempting to trigger use of in-kernel hash algorithms for a socket that
has received zero bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel in certain
unusual hardware configurations, allowed remote attackers to execute
arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-8630: The x86_decode_insn function in arch/x86/kvm/emulate.c in
the Linux kernel, when KVM is enabled, allowed local users to cause a
denial of service (host OS crash) via a certain use of a ModR/M byte in
an undefined instruction (bnc#1009222).
- CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel allowed
local users to bypass integer overflow checks, and cause a denial of
service (memory corruption) or have unspecified other impact, by
leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS
ioctl call, aka a "state machine confusion bug (bnc#1007197).
- CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel
misuses the kzalloc function, which allowed local users to cause a
denial of service (integer overflow) or have unspecified other impact by
leveraging access to a vfio PCI device file (bnc#1007197).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in
the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc)
stack protector is enabled, uses an incorrect buffer size for certain
timeout data, which allowed local users to cause a denial of service
(stack memory corruption and panic) by reading the /proc/keys file
(bnc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel
preserves the setgid bit during a setxattr call, which allowed local
users to gain group privileges by leveraging the existence of a setgid
program with restrictions on execute permissions (bnc#995968).
- CVE-2015-8956: The rfcomm_sock_bind function in
net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to
obtain sensitive information or cause a denial of service (NULL pointer
dereference) via vectors involving a bind system call on a Bluetooth
RFCOMM socket (bnc#1003925).
The following non-security bugs were fixed:
- ata: ahci_xgene: dereferencing uninitialized pointer in probe
(bsc#1006580).
- blacklist.conf: add some commits (bsc#1006580)
- bna: Add synchronization for tx ring (bsc#993739).
- bonding: set carrier off for devices created through netlink
(bsc#999577).
- btrfs: deal with duplicates during extent_map insertion in
btrfs_get_extent (bsc#1001171).
- btrfs: deal with existing encompassing extent map in btrfs_get_extent()
(bsc#1001171).
- btrfs: fix extent tree corruption due to relocation (bsc#990384).
- btrfs: fix races on root_log_ctx lists (bsc#1007653).
- ext4: fix data exposure after a crash (bsc#1012876).
- ext4: fix reference counting bug on block allocation error (bsc#1012876).
- gre: Disable segmentation offloads w/ CSUM and we are encapsulated via
FOU (bsc#1001486).
- gro: Allow tunnel stacking in the case of FOU/GUE (bsc#1001486).
- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).
- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).
- isofs: Do not return EACCES for unknown filesystems (bsc#1012876).
- jbd2: fix checkpoint list cleanup (bsc#1012876).
- jbd2: Fix unreclaimed pages after truncate in data=journal mode
(bsc#1010909).
- locking/static_key: Fix concurrent static_key_slow_inc() (bsc#1006580).
- mmc: Fix kabi breakage of mmc-block in 4.1.36 (stable-4.1.36).
- posix_acl: Added fix for f2fs.
- Revert "kbuild: add -fno-PIE" (stable-4.1.36).
- Revert "x86/mm: Expand the exception table logic to allow new handling
options" (stable-4.1.36).
- tunnels: Remove encapsulation offloads on decap (bsc#1001486).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- vmxnet3: Wake queue from reset work (bsc#999907).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.1:
zypper in -t patch openSUSE-2016-1428=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.1 (i686 x86_64):
kernel-debug-4.1.36-38.1
kernel-debug-base-4.1.36-38.1
kernel-debug-base-debuginfo-4.1.36-38.1
kernel-debug-debuginfo-4.1.36-38.1
kernel-debug-debugsource-4.1.36-38.1
kernel-debug-devel-4.1.36-38.1
kernel-debug-devel-debuginfo-4.1.36-38.1
kernel-ec2-4.1.36-38.1
kernel-ec2-base-4.1.36-38.1
kernel-ec2-base-debuginfo-4.1.36-38.1
kernel-ec2-debuginfo-4.1.36-38.1
kernel-ec2-debugsource-4.1.36-38.1
kernel-ec2-devel-4.1.36-38.1
kernel-pv-4.1.36-38.1
kernel-pv-base-4.1.36-38.1
kernel-pv-base-debuginfo-4.1.36-38.1
kernel-pv-debuginfo-4.1.36-38.1
kernel-pv-debugsource-4.1.36-38.1
kernel-pv-devel-4.1.36-38.1
kernel-vanilla-4.1.36-38.1
kernel-vanilla-debuginfo-4.1.36-38.1
kernel-vanilla-debugsource-4.1.36-38.1
kernel-vanilla-devel-4.1.36-38.1
kernel-xen-4.1.36-38.1
kernel-xen-base-4.1.36-38.1
kernel-xen-base-debuginfo-4.1.36-38.1
kernel-xen-debuginfo-4.1.36-38.1
kernel-xen-debugsource-4.1.36-38.1
kernel-xen-devel-4.1.36-38.1
- openSUSE Leap 42.1 (i586 x86_64):
hdjmod-debugsource-1.28-28.2
hdjmod-kmp-default-1.28_k4.1.36_38-28.2
hdjmod-kmp-default-debuginfo-1.28_k4.1.36_38-28.2
hdjmod-kmp-pv-1.28_k4.1.36_38-28.2
hdjmod-kmp-pv-debuginfo-1.28_k4.1.36_38-28.2
hdjmod-kmp-xen-1.28_k4.1.36_38-28.2
hdjmod-kmp-xen-debuginfo-1.28_k4.1.36_38-28.2
ipset-6.25.1-9.2
ipset-debuginfo-6.25.1-9.2
ipset-debugsource-6.25.1-9.2
ipset-devel-6.25.1-9.2
ipset-kmp-default-6.25.1_k4.1.36_38-9.2
ipset-kmp-default-debuginfo-6.25.1_k4.1.36_38-9.2
ipset-kmp-pv-6.25.1_k4.1.36_38-9.2
ipset-kmp-pv-debuginfo-6.25.1_k4.1.36_38-9.2
ipset-kmp-xen-6.25.1_k4.1.36_38-9.2
ipset-kmp-xen-debuginfo-6.25.1_k4.1.36_38-9.2
kernel-default-4.1.36-38.1
kernel-default-base-4.1.36-38.1
kernel-default-base-debuginfo-4.1.36-38.1
kernel-default-debuginfo-4.1.36-38.1
kernel-default-debugsource-4.1.36-38.1
kernel-default-devel-4.1.36-38.1
kernel-obs-build-4.1.36-38.2
kernel-obs-build-debugsource-4.1.36-38.2
kernel-obs-qa-4.1.36-38.1
kernel-syms-4.1.36-38.1
libipset3-6.25.1-9.2
libipset3-debuginfo-6.25.1-9.2
pcfclock-0.44-270.2
pcfclock-debuginfo-0.44-270.2
pcfclock-debugsource-0.44-270.2
pcfclock-kmp-default-0.44_k4.1.36_38-270.2
pcfclock-kmp-default-debuginfo-0.44_k4.1.36_38-270.2
pcfclock-kmp-pv-0.44_k4.1.36_38-270.2
pcfclock-kmp-pv-debuginfo-0.44_k4.1.36_38-270.2
vhba-kmp-debugsource-20140928-9.2
vhba-kmp-default-20140928_k4.1.36_38-9.2
vhba-kmp-default-debuginfo-20140928_k4.1.36_38-9.2
vhba-kmp-pv-20140928_k4.1.36_38-9.2
vhba-kmp-pv-debuginfo-20140928_k4.1.36_38-9.2
vhba-kmp-xen-20140928_k4.1.36_38-9.2
vhba-kmp-xen-debuginfo-20140928_k4.1.36_38-9.2
- openSUSE Leap 42.1 (noarch):
kernel-devel-4.1.36-38.1
kernel-docs-4.1.36-38.2
kernel-docs-html-4.1.36-38.2
kernel-docs-pdf-4.1.36-38.2
kernel-macros-4.1.36-38.1
kernel-source-4.1.36-38.1
kernel-source-vanilla-4.1.36-38.1
- openSUSE Leap 42.1 (x86_64):
drbd-8.4.6-12.2
drbd-debugsource-8.4.6-12.2
drbd-kmp-default-8.4.6_k4.1.36_38-12.2
drbd-kmp-default-debuginfo-8.4.6_k4.1.36_38-12.2
drbd-kmp-pv-8.4.6_k4.1.36_38-12.2
drbd-kmp-pv-debuginfo-8.4.6_k4.1.36_38-12.2
drbd-kmp-xen-8.4.6_k4.1.36_38-12.2
drbd-kmp-xen-debuginfo-8.4.6_k4.1.36_38-12.2
lttng-modules-2.7.0-6.2
lttng-modules-debugsource-2.7.0-6.2
lttng-modules-kmp-default-2.7.0_k4.1.36_38-6.2
lttng-modules-kmp-default-debuginfo-2.7.0_k4.1.36_38-6.2
lttng-modules-kmp-pv-2.7.0_k4.1.36_38-6.2
lttng-modules-kmp-pv-debuginfo-2.7.0_k4.1.36_38-6.2
- openSUSE Leap 42.1 (i686):
kernel-pae-4.1.36-38.1
kernel-pae-base-4.1.36-38.1
kernel-pae-base-debuginfo-4.1.36-38.1
kernel-pae-debuginfo-4.1.36-38.1
kernel-pae-debugsource-4.1.36-38.1
kernel-pae-devel-4.1.36-38.1
- openSUSE Leap 42.1 (i586):
hdjmod-kmp-pae-1.28_k4.1.36_38-28.2
hdjmod-kmp-pae-debuginfo-1.28_k4.1.36_38-28.2
ipset-kmp-pae-6.25.1_k4.1.36_38-9.2
ipset-kmp-pae-debuginfo-6.25.1_k4.1.36_38-9.2
pcfclock-kmp-pae-0.44_k4.1.36_38-270.2
pcfclock-kmp-pae-debuginfo-0.44_k4.1.36_38-270.2
vhba-kmp-pae-20140928_k4.1.36_38-9.2
vhba-kmp-pae-debuginfo-20140928_k4.1.36_38-9.2
References:
https://www.suse.com/security/cve/CVE-2015-8956.html
https://www.suse.com/security/cve/CVE-2015-8962.html
https://www.suse.com/security/cve/CVE-2015-8963.html
https://www.suse.com/security/cve/CVE-2015-8964.html
https://www.suse.com/security/cve/CVE-2016-7042.html
https://www.suse.com/security/cve/CVE-2016-7097.html
https://www.suse.com/security/cve/CVE-2016-7913.html
https://www.suse.com/security/cve/CVE-2016-8630.html
https://www.suse.com/security/cve/CVE-2016-8633.html
https://www.suse.com/security/cve/CVE-2016-8646.html
https://www.suse.com/security/cve/CVE-2016-8655.html
https://www.suse.com/security/cve/CVE-2016-9083.html
https://www.suse.com/security/cve/CVE-2016-9084.html
https://www.suse.com/security/cve/CVE-2016-9178.html
https://www.suse.com/security/cve/CVE-2016-9555.html
https://www.suse.com/security/cve/CVE-2016-9794.html
https://bugzilla.suse.com/1001171
https://bugzilla.suse.com/1001486
https://bugzilla.suse.com/1003925
https://bugzilla.suse.com/1004517
https://bugzilla.suse.com/1006580
https://bugzilla.suse.com/1007197
https://bugzilla.suse.com/1007615
https://bugzilla.suse.com/1007653
https://bugzilla.suse.com/1008650
https://bugzilla.suse.com/1008833
https://bugzilla.suse.com/1009222
https://bugzilla.suse.com/1010040
https://bugzilla.suse.com/1010150
https://bugzilla.suse.com/1010478
https://bugzilla.suse.com/1010501
https://bugzilla.suse.com/1010502
https://bugzilla.suse.com/1010507
https://bugzilla.suse.com/1010909
https://bugzilla.suse.com/1011685
https://bugzilla.suse.com/1012754
https://bugzilla.suse.com/1012876
https://bugzilla.suse.com/1013533
https://bugzilla.suse.com/934067
https://bugzilla.suse.com/990384
https://bugzilla.suse.com/993739
https://bugzilla.suse.com/995968
https://bugzilla.suse.com/999577
https://bugzilla.suse.com/999907
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2016:3050-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 08 Dec '16
by opensuse-security@opensuse.org 08 Dec '16
08 Dec '16
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:3050-1
Rating: important
References: #1000118 #1000433 #1001171 #1001310 #1001486
#1001888 #1003813 #1004052 #1004365 #1004517
#1005169 #1005666 #1005745 #1005917 #1005921
#1005925 #1005929 #1006175 #1006576 #1006809
#1006827 #1006915 #1006918 #1007197 #1007615
#1007653 #1007955 #1008831 #1008979 #1009062
#1009454 #1010040 #1010158 #1010444 #1010478
#1010507 #1010665 #1010690 #1010970 #1011176
#1011685 #1011913 #1012060 #1012094 #1012452
#1012477 #1012754 #1012767 #1012829 #1012992
#1013479 #1013533 #1013700 #799133 #843661
#914939 #954986 #963609 #963655 #963904 #964462
#966186 #966191 #966316 #966318 #966325 #969476
#969477 #971975 #972993 #974313 #978907 #979681
#983087 #983318 #985850 #986255 #987805 #990384
#991414 #992555 #993739 #994881 #995278 #997059
#997807 #998054
Cross-References: CVE-2015-1350 CVE-2015-8964 CVE-2016-7042
CVE-2016-7913 CVE-2016-7917 CVE-2016-8632
CVE-2016-8655 CVE-2016-8666 CVE-2016-9083
CVE-2016-9084 CVE-2016-9555 CVE-2016-9794
Affected Products:
openSUSE Leap 42.2
______________________________________________________________________________
An update that solves 12 vulnerabilities and has 75 fixes
is now available.
Description:
The openSUSE Leap 42.2 kernel was updated to 4.4.36 to receive various
security and bugfixes.
The following security bugs were fixed:
- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provides an
incomplete set of requirements for setattr operations that
underspecifies removing extended privilege attributes, which allowed
local users to cause a denial of service (capability stripping) via a
failed invocation of a system call, as demonstrated by using chown to
remove a capability from the ping or Wireshark dumpcap program
(bnc#914939).
- CVE-2015-8964: The tty_set_termios_ldisc function in
drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to
obtain sensitive information from kernel memory by reading a tty data
structure (bnc#1010507).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in
the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc)
stack protector is enabled, uses an incorrect buffer size for certain
timeout data, which allowed local users to cause a denial of service
(stack memory corruption and panic) by reading the /proc/keys file
(bnc#1004517).
- CVE-2016-7913: The xc2028_set_config function in
drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local
users to gain privileges or cause a denial of service (use-after-free)
via vectors involving omission of the firmware name from a certain data
structure (bnc#1010478).
- CVE-2016-7917: The nfnetlink_rcv_batch function in
net/netfilter/nfnetlink.c in the Linux kernel did not check whether a
batch message's length field is large enough, which allowed local users
to obtain sensitive information from kernel memory or cause a denial of
service (infinite loop or out-of-bounds read) by leveraging the
CAP_NET_ADMIN capability (bnc#1010444).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the
Linux kernel did not validate the relationship between the minimum
fragment length and the maximum packet size, which allowed local users
to gain privileges or cause a denial of service (heap-based buffer
overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-8655: A race condition in the af_packet packet_set_ring
function could be used by local attackers to crash the kernel or gain
privileges (bsc#1012754).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers
to cause a denial of service (stack consumption and panic) or possibly
have unspecified other impact by triggering use of the GRO path for
packets with tunnel stacking, as demonstrated by interleaved IPv4
headers and GRE headers, a related issue to CVE-2016-7039 (bnc#1001486).
- CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel allowed
local users to bypass integer overflow checks, and cause a denial of
service (memory corruption) or have unspecified other impact, by
leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS
ioctl call, aka a "state machine confusion bug (bnc#1007197).
- CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel
misuses the kzalloc function, which allowed local users to cause a
denial of service (integer overflow) or have unspecified other impact by
leveraging access to a vfio PCI device file (bnc#1007197).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in
the Linux kernel lacks chunk-length checking for the first chunk, which
allowed remote attackers to cause a denial of service (out-of-bounds
slab access) or possibly have unspecified other impact via crafted SCTP
data (bnc#1011685).
- CVE-2016-9794: A use-after-free in alsa pcm could lead to crashes or
allowed local users to potentially gain privileges (bsc#1013533).
The following non-security bugs were fixed:
- acpi / pad: do not register acpi_pad driver if running as Xen dom0
(bnc#995278).
- Add power key support for PMIcs which are already included in the
configs (boo#1012477). Arm64 already has these so no need to patch it.
- alsa: hda - Bind with i915 only when Intel graphics is present
(bsc#1012767).
- alsa: hda - Clear the leftover component assignment at
snd_hdac_i915_exit() (bsc#1012767).
- alsa: hda - Degrade i915 binding failure message (bsc#1012767).
- alsa: hda - Fix yet another i915 pointer leftover in error path
(bsc#1012767).
- alsa: hda - Gate the mic jack on HP Z1 Gen3 AiO (bsc#1004365).
- arm64/efi: Enable runtime call flag checking (bsc#1005745).
- arm64/efi: Move to generic {__,}efi_call_virt() (bsc#1005745).
- arm64: Refuse to install 4k kernel on 64k system
- arm64: Update config files. Disable CONFIG_IPMI_SI_PROBE_DEFAULTS
(bsc#1006576)
- arm: bcm2835: add CPU node for ARM core (boo#1012094).
- arm: bcm2835: Split the DT for peripherals from the DT for the CPU
(boo#1012094).
- asoc: cht_bsw_rt5645: Enable jack detection (bsc#1010690).
- asoc: cht_bsw_rt5645: Fix writing to string literal (bsc#1010690).
- asoc: cht_bsw_rt5672: Use HID translation unit (bsc#1010690).
- asoc: intel: add function stub when ACPI is not enabled (bsc#1010690).
- asoc: Intel: add fw name to common dsp context (bsc#1010690).
- asoc: Intel: Add missing 10EC5672 ACPI ID matching for Cherry Trail
(bsc#1010690).
- asoc: Intel: Add module tags for common match module (bsc#1010690).
- asoc: Intel: add NULL test (bsc#1010690).
- asoc: Intel: Add quirks for MinnowBoard MAX (bsc#1010690).
- asoc: Intel: Add surface3 entry in CHT-RT5645 machine (bsc#1010690).
- asoc: Intel: Atom: add 24-bit support for media playback and capture
(bsc#1010690).
- asoc: Intel: Atom: add deep buffer definitions for atom platforms
(bsc#1010690).
- asoc: Intel: Atom: add definitions for modem/SSP0 interface
(bsc#1010690).
- asoc: Intel: Atom: Add quirk for Surface 3 (bsc#1010690).
- asoc: Intel: Atom: add support for CHT w/ RT5640 (bsc#1010690).
- asoc: Intel: Atom: Add support for HP ElitePad 1000 G2 (bsc#1010690).
- asoc: Intel: Atom: add support for RT5642 (bsc#1010690).
- asoc: Intel: Atom: add terminate entry for dmi_system_id tables
(bsc#1010690).
- asoc: Intel: Atom: auto-detection of Baytrail-CR (bsc#1010690).
- asoc: Intel: Atom: clean-up compressed DAI definition (bsc#1010690).
- asoc: Intel: atom: enable configuration of SSP0 (bsc#1010690).
- asoc: Intel: atom: fix 0-day warnings (bsc#1010690).
- asoc: Intel: Atom: fix boot warning (bsc#1010690).
- asoc: Intel: Atom: Fix message handling during drop stream (bsc#1010690).
- asoc: Intel: atom: fix missing breaks that would cause the wrong
operation to execute (bsc#1010690).
- asoc: Intel: Atom: fix regression on compress DAI (bsc#1010690).
- asoc: Intel: Atom: flip logic for gain Switch (bsc#1010690).
- asoc: Intel: atom: Make some messages to debug level (bsc#1010690).
- asoc: Intel: Atom: move atom driver to common acpi match (bsc#1010690).
- asoc: Intel: atom: statify cht_quirk (bsc#1010690).
- asoc: Intel: boards: add DEEP_BUFFER support for BYT/CHT/BSW
(bsc#1010690).
- asoc: Intel: boards: align pin names between byt-rt5640 drivers
(bsc#1010690).
- asoc: Intel: boards: merge DMI-based quirks in bytcr-rt5640 driver
(bsc#1010690).
- asoc: Intel: boards: start merging byt-rt5640 drivers (bsc#1010690).
- asoc: Intel: bytcr_rt56040: additional routing quirks (bsc#1010690).
- asoc: Intel: bytcr-rt5640: add Asus T100TAF quirks (bsc#1010690).
- asoc: Intel: bytcr_rt5640: add IN3 map (bsc#1010690).
- asoc: Intel: bytcr_rt5640: add MCLK support (bsc#1010690).
- asoc: Intel: bytcr_rt5640: Add quirk for Teclast X98 Air 3G tablet
(bsc#1010690).
- asoc: Intel: bytcr_rt5640: add SSP2_AIF2 routing (bsc#1010690).
- asoc: Intel: bytcr_rt5640: change quirk position (bsc#1010690).
- asoc: Intel: bytcr_rt5640: default routing and quirks on Baytrail-CR
(bsc#1010690).
- asoc: Intel: bytcr-rt5640: enable ASRC (bsc#1010690).
- asoc: Intel: bytcr_rt5640: enable differential mic quirk (bsc#1010690).
- asoc: Intel: bytcr_rt5640: fix dai/clock setup for SSP0 routing
(bsc#1010690).
- asoc: Intel: bytcr_rt5640: fixup DAI codec_name with HID (bsc#1010690).
- asoc: Intel: bytcr_rt5640: log quirks (bsc#1010690).
- asoc: Intel: bytcr_rt5640: quirk for Acer Aspire SWS-012 (bsc#1010690).
- asoc: Intel: bytcr_rt5640: quirk for mono speaker (bsc#1010690).
- asoc: Intel: bytcr_rt5640: set SSP to I2S mode 2ch (bsc#1010690).
- asoc: Intel: bytcr_rt5640: use HID translation util (bsc#1010690).
- asoc: Intel: cht: fix uninit variable warning (bsc#1010690).
- asoc: Intel: common: add translation from HID to codec-name
(bsc#1010690).
- asoc: Intel: common: filter ACPI devices with _STA return value
(bsc#1010690).
- asoc: Intel: common: increase the loglevel of "FW Poll Status"
(bsc#1010690).
- asoc: Intel: Create independent acpi match module (bsc#1010690).
- asoc: intel: Fix sst-dsp dependency on dw stuff (bsc#1010690).
- asoc: Intel: Keep building old baytrail machine drivers (bsc#1010690).
- asoc: Intel: Load the atom DPCM driver only (bsc#1010690).
- asoc: intel: make function stub static (bsc#1010690).
- asoc: Intel: Move apci find machine routines (bsc#1010690).
- asoc: intel: Replace kthread with work (bsc#1010690).
- asoc: Intel: Skylake: Always acquire runtime pm ref on unload
(bsc#1005917).
- asoc: Intel: sst: fix sst_memcpy32 wrong with non-4x bytes issue
(bsc#1010690).
- asoc: rt5640: add ASRC support (bsc#1010690).
- asoc: rt5640: add internal clock source support (bsc#1010690).
- asoc: rt5640: add master clock handling for rt5640 (bsc#1010690).
- asoc: rt5640: add supplys for dac power (bsc#1010690).
- asoc: rt5640: remove unused variable (bsc#1010690).
- asoc: rt5640: Set PLL src according to source (bsc#1010690).
- asoc: rt5645: add DAC1 soft volume func control (bsc#1010690).
- asoc: rt5645: Add dmi_system_id "Google Setzer" (bsc#1010690).
- asoc: rt5645: extend delay time for headphone pop noise (bsc#1010690).
- asoc: rt5645: fix reg-2f default value (bsc#1010690).
- asoc: rt5645: improve headphone pop when system resumes from S3
(bsc#1010690).
- asoc: rt5645: improve IRQ reaction time for HS button (bsc#1010690).
- asoc: rt5645: merge DMI tables of google projects (bsc#1010690).
- asoc: rt5645: patch reg-0x8a (bsc#1010690).
- asoc: rt5645: polling jd status in all conditions (bsc#1010690).
- asoc: rt5645: Separate regmap for rt5645 and rt5650 (bsc#1010690).
- asoc: rt5645: set RT5645_PRIV_INDEX as volatile (bsc#1010690).
- asoc: rt5645: use polling to support HS button (bsc#1010690).
- asoc: rt5645: Use the mod_delayed_work instead of the queue_delayed_work
and cancel_delayed_work_sync (bsc#1010690).
- asoc: rt5670: Add missing 10EC5072 ACPI ID (bsc#1010690).
- asoc: rt5670: Enable Braswell platform workaround for Dell Wyse 3040
(bsc#1010690).
- asoc: rt5670: fix HP Playback Volume control (bsc#1010690).
- asoc: rt5670: patch reg-0x8a (bsc#1010690).
- blacklist.conf: Remove intel_pstate potential patch that SLE 12 SP2 The
code layout upstream that motivated this patch is completely different
to what is in SLE 12 SP2 as schedutil was not backported.
- bna: Add synchronization for tx ring (bsc#993739).
- btrfs: allocate root item at snapshot ioctl time (bsc#1012452).
- btrfs: better packing of btrfs_delayed_extent_op (bsc#1012452).
- btrfs: Check metadata redundancy on balance (bsc#1012452).
- btrfs: clean up an error code in btrfs_init_space_info() (bsc#1012452).
- btrfs: cleanup, stop casting for extent_map->lookup everywhere
(bsc#1012452).
- btrfs: cleanup, use enum values for btrfs_path reada (bsc#1012452).
- btrfs: deal with duplicates during extent_map insertion in
btrfs_get_extent (bsc#1001171).
- btrfs: deal with existing encompassing extent map in btrfs_get_extent()
(bsc#1001171).
- btrfs: do an allocation earlier during snapshot creation (bsc#1012452).
- btrfs: do not create or leak aliased root while cleaning up orphans
(bsc#994881).
- btrfs: do not leave dangling dentry if symlink creation failed
(bsc#1012452).
- btrfs: do not use slab cache for struct btrfs_delalloc_work
(bsc#1012452).
- btrfs: drop duplicate prefix from scrub workqueues (bsc#1012452).
- btrfs: drop unused parameter from lock_extent_bits (bsc#1012452).
- btrfs: Enhance chunk validation check (bsc#1012452).
- btrfs: Enhance super validation check (bsc#1012452).
- btrfs: Ensure proper sector alignment for btrfs_free_reserved_data_space
(bsc#1005666).
- btrfs: Expoert and move leaf/subtree qgroup helpers to qgroup.c
(bsc983087, bsc986255).
- btrfs: fix incremental send failure caused by balance (bsc#985850).
- btrfs: fix locking bugs when defragging leaves (bsc#1012452).
- btrfs: fix memory leaks after transaction is aborted (bsc#1012452).
- btrfs: fix output of compression message in btrfs_parse_options()
(bsc#1012452).
- btrfs: fix race between free space endio workers and space cache
writeout (bsc#1012452).
- btrfs: fix races on root_log_ctx lists (bsc#1007653).
- btrfs: fix race when finishing dev replace leading to transaction abort
(bsc#1012452).
- btrfs: fix relocation incorrectly dropping data references (bsc#990384).
- btrfs: fix typo in log message when starting a balance (bsc#1012452).
- btrfs: fix unprotected list operations at btrfs_write_dirty_block_groups
(bsc#1012452).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: make btrfs_close_one_device static (bsc#1012452).
- btrfs: make clear_extent_bit helpers static inline (bsc#1012452).
- btrfs: make clear_extent_buffer_uptodate return void (bsc#1012452).
- btrfs: make end_extent_writepage return void (bsc#1012452).
- btrfs: make extent_clear_unlock_delalloc return void (bsc#1012452).
- btrfs: make extent_range_clear_dirty_for_io return void (bsc#1012452).
- btrfs: make extent_range_redirty_for_io return void (bsc#1012452).
- btrfs: make lock_extent static inline (bsc#1012452).
- btrfs: make set_extent_bit helpers static inline (bsc#1012452).
- btrfs: make set_extent_buffer_uptodate return void (bsc#1012452).
- btrfs: make set_range_writeback return void (bsc#1012452).
- btrfs: preallocate path for snapshot creation at ioctl time
(bsc#1012452).
- btrfs: put delayed item hook into inode (bsc#1012452).
- btrfs: qgroup: Add comments explaining how btrfs qgroup works
(bsc983087, bsc986255).
- btrfs: qgroup: Fix qgroup data leaking by using subtree tracing
(bsc983087, bsc986255).
- btrfs: qgroup: Rename functions to make it follow reserve, trace,
account steps (bsc983087, bsc986255).
- btrfs: remove a trivial helper btrfs_set_buffer_uptodate (bsc#1012452).
- btrfs: remove root_log_ctx from ctx list before btrfs_sync_log returns
(bsc#1007653).
- btrfs: remove unused inode argument from uncompress_inline()
(bsc#1012452).
- btrfs: remove wait from struct btrfs_delalloc_work (bsc#1012452).
- btrfs: send, do not bug on inconsistent snapshots (bsc#985850).
- btrfs: sink parameter wait to btrfs_alloc_delalloc_work (bsc#1012452).
- btrfs: Support convert to -d dup for btrfs-convert (bsc#1012452).
- btrfs: Update
patches.suse/btrfs-8401-fix-qgroup-accounting-when-creating-snap.patch
(bsc#972993).
- btrfs: use GFP_KERNEL for allocations in ioctl handlers (bsc#1012452).
- btrfs: use GFP_KERNEL for allocations of workqueues (bsc#1012452).
- btrfs: use GFP_KERNEL for xattr and acl allocations (bsc#1012452).
- btrfs: use smaller type for btrfs_path locks (bsc#1012452).
- btrfs: use smaller type for btrfs_path lowest_level (bsc#1012452).
- btrfs: use smaller type for btrfs_path reada (bsc#1012452).
- btrfs: verbose error when we find an unexpected item in sys_array
(bsc#1012452).
- config: i2c: Enable CONFIG_I2C_DESIGNWARE_PLATFORM and *_BAYTRAIL
(bsc#1010690) Realtek codecs on CHT platform require this i2c bus driver.
- config: select new CONFIG_SND_SOC_INTEL_SST_* helpers
- config: Update config files. (boo#1012094)
- config: Update config files (bsc#1009454) Do not set
CONFIG_EFI_SECURE_BOOT_SECURELEVEL in x86_64/default and x86_64/debug.
We do not need to set CONFIG_EFI_SECURE_BOOT_SECURELEVEL in openSUSE
kernel because openSUSE does not enable kernel module signature check
(bsc#843661). Without kernel module signature check, the root account is
allowed to load arbitrary kernel module to kernel space. Then lock
functions by securelevel is pointless.
- cxgbi: fix uninitialized flowi6 (bsc#963904 FATE#320115).
- Delete
patches.fixes/Add-a-missed-complete-in-iscsit_close_connection.patch.
remove patch Add-a-missed-complete-in-iscsit_close_connection.patch add
bsc#997807 bsc#992555 in patch-4.4.27-28 references
- dell-laptop: Fixate rfkill work on CPU#0 (bsc#1004052).
- dell-wmi: Check if Dell WMI descriptor structure is valid (bsc#1004052).
- dell-wmi: Clean up hotkey table size check (bsc#1004052).
- dell-wmi: Ignore WMI event code 0xe045 (bsc#1004052).
- dell-wmi: Improve unknown hotkey handling (bsc#1004052).
- dell-wmi: Process only one event on devices with interface version 0
(bsc#1004052).
- dell-wmi: Stop storing pointers to DMI tables (bsc#1004052).
- dell-wmi: Support new hotkeys on the XPS 13 9350 (Skylake) (bsc#1004052).
- dell_wmi: Use a C99-style array for bios_to_linux_keycode (bsc#1004052).
- drm/i915: Add missing ring_mask to Pineview (bsc#1005917).
- drm/i915: Calculate watermark related members in the crtc_state, v4
(bsc#1011176).
- drm/i915/ivb: Move WaCxSRDisabledForSpriteScaling w/a to atomic check
(bsc#1011176).
- drm/i915: Move disable_cxsr to the crtc_state (bsc#1011176).
- drm/mgag200: fix error return code in mgag200fb_create() (bsc#1005917).
- drm/radeon: Also call cursor_move_locked when the cursor size changes
(bsc#1000433).
- drm/radeon: Always store CRTC relative radeon_crtc->cursor_x/y values
(bsc#1000433).
- drm/radeon: Ensure vblank interrupt is enabled on DPMS transition to on
(bsc#998054)
- drm/radeon: Hide the HW cursor while it's out of bounds (bsc#1000433).
- drm/radeon: Switch to drm_vblank_on/off (bsc#998054).
- Drop kernel-obs-qa-xen unconditionally (bsc#1010040) The IBS cannot
build it, even if there is a xen-capable kernel-obs-build.
- edac/mce_amd: Add missing SMCA error descriptions (fate#320474,
bsc#1013700).
- edac/mce_amd: Use SMCA prefix for error descriptions arrays
(fate#320474, bsc#1013700).
- efi/runtime-wrappers: Add {__,}efi_call_virt() templates (bsc#1005745).
- efi/runtime-wrappers: Detect firmware IRQ flag corruption (bsc#1005745).
- efi/runtime-wrappers: Remove redundant #ifdefs (bsc#1005745).
- ext4: fix data exposure after a crash (bsc#1012829).
- fs, block: force direct-I/O for dax-enabled block devices (bsc#1012992).
- fs/cifs: cifs_get_root shouldn't use path with tree name (bsc#963655,
bsc#979681).
- fs/cifs: Compare prepaths when comparing superblocks (bsc#799133).
- fs/cifs: Fix memory leaks in cifs_do_mount() (bsc#799133).
- fs/cifs: Move check for prefix path to within cifs_get_root()
(bsc#799133).
- fuse: Fixup buggy conflict resolution in
patches.fixes/fuse-Propagate-dentry-down-to-inode_change_ok.patch.
- genirq: Add untracked irq handler (bsc#1006827).
- genirq: Use a common macro to go through the actions list (bsc#1006827).
- gre: Disable segmentation offloads w/ CSUM and we are encapsulated via
FOU (bsc#1001486).
- gro: Allow tunnel stacking in the case of FOU/GUE (bsc#1001486).
- hpsa: fallback to use legacy REPORT PHYS command (bsc#1006175).
- hpsa: use bus '3' for legacy HBA devices (bsc#1010665).
- hpsa: use correct DID_NO_CONNECT hostbyte (bsc#1010665).
- hv: do not lose pending heartbeat vmbus packets (bnc#1006918).
- i2c: designware-baytrail: Work around Cherry Trail semaphore errors
(bsc#1011913).
- i2c: xgene: Avoid dma_buffer overrun (bsc#1006576).
- i40e: fix an uninitialized variable bug (bsc#969476 FATE#319648).
- i40e: fix broken i40e_config_rss_aq function (bsc#969476 FATE#319648
bsc#969477 FATE#319816).
- i40e: Remove redundant memset (bsc#969476 FATE#319648 bsc#969477
FATE#319816).
- i810: Enable Intel i810 audio driver used in OpenQA VMs.
- Import kabi files for x86_64/default from 4.4.27-2.1
- iommu/arm-smmu: Add support for 16 bit VMID (fate#319978).
- iommu/arm-smmu: Workaround for ThunderX erratum #27704 (fate#319978).
- ipmi_si: create hardware-independent softdep for ipmi_devintf
(bsc#1009062).
- kABI: protect struct mmc_packed (kabi).
- kABI: protect struct mmc_packed (kabi).
- kABI: reintroduce sk_filter (kabi).
- kABI: reintroduce strtobool (kabi).
- kABI: reintroduce strtobool (kabi).
- kABI: restore ip_cmsg_recv_offset parameters (kabi).
- kabi/severities: Ignore kABI for asoc Intel SST drivers (bsc#1010690)
These drivers are self-contained, not for 3rd party drivers.
- kernel-module-subpackage: Properly quote flavor in expressions That
fixes a parse error if the flavor starts with a digit or contains other
non-alphabetic characters.
- kgr: ignore zombie tasks during the patching (bnc#1008979).
- md/raid1: fix: IO can block resync indefinitely (bsc#1001310).
- mm: do not use radix tree writeback tags for pages in swap cache
(bnc#971975 VM performance -- swap).
- mm/filemap: generic_file_read_iter(): check for zero reads
unconditionally (bnc#1007955).
- mm/mprotect.c: do not touch single threaded PTEs which are on the right
node (bnc#971975 VM performance -- numa balancing).
- net/mlx5: Add ConnectX-5 PCIe 4.0 to list of supported devices
(bsc#1006809).
- net: sctp, forbid negative length (bnc#1005921).
- netvsc: fix incorrect receive checksum offloading (bnc#1006915).
- overlayfs: allow writing on read-only btrfs subvolumes (bsc#1010158)
- pci/ACPI: Allow all PCIe services on non-ACPI host bridges (bsc#1006827).
- pci: Allow additional bus numbers for hotplug bridges (bsc#1006827).
- pci: correctly cast mem_base in pci_read_bridge_mmio_pref()
(bsc#1001888).
- pci: pciehp: Allow exclusive userspace control of indicators
(bsc#1006827).
- pci: Remove return values from pcie_port_platform_notify() and relatives
(bsc#1006827).
- perf/x86: Add perf support for AMD family-17h processors (fate#320473).
- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec
(bsc#1003813).
- proc: much faster /proc/vmstat (bnc#971975 VM performance -- vmstat).
- qede: Correctly map aggregation replacement pages (bsc#966318
FATE#320158 bsc#966316 FATE#320159).
- qed: FLR of active VFs might lead to FW assert (bsc#966318 FATE#320158
bsc#966316 FATE#320159).
- Reformat spec files according to the format_spec_file osc helper
- Replace
patches.kabi/kabi-hide-new-member-recursion_counter-in-struct-sk_.patch
by patches.kabi/kabi-hide-bsc-1001486-changes-in-struct-napi_gro_cb.patch
- Revert "ACPI / LPSS: allow to use specific PM domain during ->probe()"
(bsc#1005917).
- Revert "fix minor infoleak in get_user_ex()" (p.k.o).
- REVERT fs/cifs: fix wrongly prefixed path to root (bsc#963655,
bsc#979681)
- Revert "x86/mm: Expand the exception table logic to allow new handling
options" (p.k.o).
- rpm/config.sh: Build against SP2 in the OBS as well
- rpm/constraints.in: increase disk for kernel-syzkaller The
kernel-syzkaller build now consumes around 30G. This causes headache in
factory where the package rebuilds over and over. Require 35G disk size
to successfully build the flavor.
- rpm/kernel-binary.spec.in: Build the -base package unconditionally
(bsc#1000118)
- rpm/kernel-binary.spec.in: Do not create KMPs with CONFIG_MODULES=n
- rpm/kernel-binary.spec.in: Only build -base and -extra with
CONFIG_MODULES (bsc#1000118)
- rpm/kernel-binary.spec.in: Simplify debug info switch Any
CONFIG_DEBUG_INFO sub-options are answered in the configs nowadays.
- rpm/kernel-spec-macros: Ignore too high rebuild counter (bsc#1012060)
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- rpm/package-descriptions: Add 64kb kernel flavor description
- rpm/package-descriptions: add kernel-syzkaller
- rpm/package-descriptions: pv has been merged into -default (fate#315712)
- rpm/package-descriptions: the flavor is 64kb, not 64k
- sched/core: Optimize __schedule() (bnc#978907 Scheduler performance --
context switch).
- sched/fair: Optimize find_idlest_cpu() when there is no choice
(bnc#978907 Scheduler performance -- idle search).
- supported.conf: Add overlay.ko to -base (fate#321903) Also, delete the
stale entry for the old overlayfs.
- supported.conf: Mark vmx-crypto as supported (fate#319564)
- tg3: Avoid NULL pointer dereference in tg3_io_error_detected()
(bsc#963609 FATE#320143).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- Whitelist KVM KABI changes resulting from adding a hcall. caused by
5246adec59458b5d325b8e1462ea9ef3ead7f6ae powerpc/pseries: Use
H_CLEAR_HPT to clear MMU hash table during kexec No problem is expected
as result of changing KVM KABI so whitelisting for now. If we get some
additional input from IBM we can back out the patch.
- writeback: initialize inode members that track writeback history
(bsc#1012829).
- x86/apic: Order irq_enter/exit() calls correctly vs. ack_APIC_irq()
(bsc#1013479).
- x86/efi: Enable runtime call flag checking (bsc#1005745).
- x86/efi: Move to generic {__,}efi_call_virt() (bsc#1005745).
- x86/mce/AMD, EDAC/mce_amd: Define and use tables for known SMCA IP types
(fate#320474, bsc#1013700). Exclude removed symbols from kABI check.
They're AMD Zen relevant only and completely useless to other modules -
only edac_mce_amd.ko.
- x86/mce/AMD: Increase size of the bank_map type (fate#320474,
bsc#1013700).
- x86/mce/AMD: Read MSRs on the CPU allocating the threshold blocks
(fate#320474, bsc#1013700).
- x86/mce/AMD: Update sysfs bank names for SMCA systems (fate#320474,
bsc#1013700).
- x86/mce/AMD: Use msr_ops.misc() in allocate_threshold_blocks()
(fate#320474, bsc#1013700).
- x86/PCI: VMD: Attach VMD resources to parent domain's resource tree
(bsc#1006827).
- x86/PCI: VMD: Document code for maintainability (bsc#1006827).
- x86/PCI: VMD: Fix infinite loop executing irq's (bsc#1006827).
- x86/PCI: VMD: Initialize list item in IRQ disable (bsc#1006827).
- x86/PCI: VMD: Request userspace control of PCIe hotplug indicators
(bsc#1006827).
- x86/PCI: VMD: Select device dma ops to override (bsc#1006827).
- x86/PCI: VMD: Separate MSI and MSI-X vector sharing (bsc#1006827).
- x86/PCI: VMD: Set bus resource start to 0 (bsc#1006827).
- x86/PCI: VMD: Use lock save/restore in interrupt enable path
(bsc#1006827).
- x86/PCI/VMD: Use untracked irq handler (bsc#1006827).
- x86/PCI: VMD: Use x86_vector_domain as parent domain (bsc#1006827).
- xen/gntdev: Use VM_MIXEDMAP instead of VM_IO to avoid NUMA balancing
(bnc#1005169).
- zram: Fix unbalanced idr management at hot removal (bsc#1010970).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.2:
zypper in -t patch openSUSE-2016-1426=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Leap 42.2 (noarch):
kernel-devel-4.4.36-5.1
kernel-docs-4.4.36-5.3
kernel-docs-html-4.4.36-5.3
kernel-docs-pdf-4.4.36-5.3
kernel-macros-4.4.36-5.1
kernel-source-4.4.36-5.1
kernel-source-vanilla-4.4.36-5.1
- openSUSE Leap 42.2 (x86_64):
kernel-debug-4.4.36-5.1
kernel-debug-base-4.4.36-5.1
kernel-debug-base-debuginfo-4.4.36-5.1
kernel-debug-debuginfo-4.4.36-5.1
kernel-debug-debugsource-4.4.36-5.1
kernel-debug-devel-4.4.36-5.1
kernel-debug-devel-debuginfo-4.4.36-5.1
kernel-default-4.4.36-5.1
kernel-default-base-4.4.36-5.1
kernel-default-base-debuginfo-4.4.36-5.1
kernel-default-debuginfo-4.4.36-5.1
kernel-default-debugsource-4.4.36-5.1
kernel-default-devel-4.4.36-5.1
kernel-obs-build-4.4.36-5.1
kernel-obs-build-debugsource-4.4.36-5.1
kernel-obs-qa-4.4.36-5.1
kernel-syms-4.4.36-5.1
kernel-vanilla-4.4.36-5.1
kernel-vanilla-base-4.4.36-5.1
kernel-vanilla-base-debuginfo-4.4.36-5.1
kernel-vanilla-debuginfo-4.4.36-5.1
kernel-vanilla-debugsource-4.4.36-5.1
kernel-vanilla-devel-4.4.36-5.1
References:
https://www.suse.com/security/cve/CVE-2015-1350.html
https://www.suse.com/security/cve/CVE-2015-8964.html
https://www.suse.com/security/cve/CVE-2016-7042.html
https://www.suse.com/security/cve/CVE-2016-7913.html
https://www.suse.com/security/cve/CVE-2016-7917.html
https://www.suse.com/security/cve/CVE-2016-8632.html
https://www.suse.com/security/cve/CVE-2016-8655.html
https://www.suse.com/security/cve/CVE-2016-8666.html
https://www.suse.com/security/cve/CVE-2016-9083.html
https://www.suse.com/security/cve/CVE-2016-9084.html
https://www.suse.com/security/cve/CVE-2016-9555.html
https://www.suse.com/security/cve/CVE-2016-9794.html
https://bugzilla.suse.com/1000118
https://bugzilla.suse.com/1000433
https://bugzilla.suse.com/1001171
https://bugzilla.suse.com/1001310
https://bugzilla.suse.com/1001486
https://bugzilla.suse.com/1001888
https://bugzilla.suse.com/1003813
https://bugzilla.suse.com/1004052
https://bugzilla.suse.com/1004365
https://bugzilla.suse.com/1004517
https://bugzilla.suse.com/1005169
https://bugzilla.suse.com/1005666
https://bugzilla.suse.com/1005745
https://bugzilla.suse.com/1005917
https://bugzilla.suse.com/1005921
https://bugzilla.suse.com/1005925
https://bugzilla.suse.com/1005929
https://bugzilla.suse.com/1006175
https://bugzilla.suse.com/1006576
https://bugzilla.suse.com/1006809
https://bugzilla.suse.com/1006827
https://bugzilla.suse.com/1006915
https://bugzilla.suse.com/1006918
https://bugzilla.suse.com/1007197
https://bugzilla.suse.com/1007615
https://bugzilla.suse.com/1007653
https://bugzilla.suse.com/1007955
https://bugzilla.suse.com/1008831
https://bugzilla.suse.com/1008979
https://bugzilla.suse.com/1009062
https://bugzilla.suse.com/1009454
https://bugzilla.suse.com/1010040
https://bugzilla.suse.com/1010158
https://bugzilla.suse.com/1010444
https://bugzilla.suse.com/1010478
https://bugzilla.suse.com/1010507
https://bugzilla.suse.com/1010665
https://bugzilla.suse.com/1010690
https://bugzilla.suse.com/1010970
https://bugzilla.suse.com/1011176
https://bugzilla.suse.com/1011685
https://bugzilla.suse.com/1011913
https://bugzilla.suse.com/1012060
https://bugzilla.suse.com/1012094
https://bugzilla.suse.com/1012452
https://bugzilla.suse.com/1012477
https://bugzilla.suse.com/1012754
https://bugzilla.suse.com/1012767
https://bugzilla.suse.com/1012829
https://bugzilla.suse.com/1012992
https://bugzilla.suse.com/1013479
https://bugzilla.suse.com/1013533
https://bugzilla.suse.com/1013700
https://bugzilla.suse.com/799133
https://bugzilla.suse.com/843661
https://bugzilla.suse.com/914939
https://bugzilla.suse.com/954986
https://bugzilla.suse.com/963609
https://bugzilla.suse.com/963655
https://bugzilla.suse.com/963904
https://bugzilla.suse.com/964462
https://bugzilla.suse.com/966186
https://bugzilla.suse.com/966191
https://bugzilla.suse.com/966316
https://bugzilla.suse.com/966318
https://bugzilla.suse.com/966325
https://bugzilla.suse.com/969476
https://bugzilla.suse.com/969477
https://bugzilla.suse.com/971975
https://bugzilla.suse.com/972993
https://bugzilla.suse.com/974313
https://bugzilla.suse.com/978907
https://bugzilla.suse.com/979681
https://bugzilla.suse.com/983087
https://bugzilla.suse.com/983318
https://bugzilla.suse.com/985850
https://bugzilla.suse.com/986255
https://bugzilla.suse.com/987805
https://bugzilla.suse.com/990384
https://bugzilla.suse.com/991414
https://bugzilla.suse.com/992555
https://bugzilla.suse.com/993739
https://bugzilla.suse.com/994881
https://bugzilla.suse.com/995278
https://bugzilla.suse.com/997059
https://bugzilla.suse.com/997807
https://bugzilla.suse.com/998054
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2016:3049-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 07 Dec '16
by opensuse-security@opensuse.org 07 Dec '16
07 Dec '16
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:3049-1
Rating: important
References: #1008831 #1011685 #1012754
Cross-References: CVE-2016-8632 CVE-2016-8655 CVE-2016-9555
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Live Patching 12
SUSE Linux Enterprise High Availability 12-SP2
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive critical
security fixes.
The following security bugs were fixed:
- CVE-2016-8655: A race condition in the af_packet packet_set_ring
function could be used by local attackers to crash the kernel or gain
privileges (bsc#1012754).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the
Linux kernel did not validate the relationship between the minimum
fragment length and the maximum packet size, which allowed local users
to gain privileges or cause a denial of service (heap-based buffer
overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in
the Linux kernel lacks chunk-length checking for the first chunk, which
allowed remote attackers to cause a denial of service (out-of-bounds
slab access) or possibly have unspecified other impact via crafted SCTP
data (bnc#1011685).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP2:
zypper in -t patch SUSE-SLE-WE-12-SP2-2016-1772=1
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2016-1772=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2016-1772=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1772=1
- SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1772=1
- SUSE Linux Enterprise High Availability 12-SP2:
zypper in -t patch SUSE-SLE-HA-12-SP2-2016-1772=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2016-1772=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64):
kernel-default-debuginfo-4.4.21-84.1
kernel-default-debugsource-4.4.21-84.1
kernel-default-extra-4.4.21-84.1
kernel-default-extra-debuginfo-4.4.21-84.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
kernel-obs-build-4.4.21-84.1
kernel-obs-build-debugsource-4.4.21-84.1
- SUSE Linux Enterprise Software Development Kit 12-SP2 (noarch):
kernel-docs-4.4.21-84.3
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
kernel-default-4.4.21-84.1
kernel-default-base-4.4.21-84.1
kernel-default-base-debuginfo-4.4.21-84.1
kernel-default-debuginfo-4.4.21-84.1
kernel-default-debugsource-4.4.21-84.1
kernel-default-devel-4.4.21-84.1
kernel-syms-4.4.21-84.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch):
kernel-devel-4.4.21-84.1
kernel-macros-4.4.21-84.1
kernel-source-4.4.21-84.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
kernel-default-4.4.21-84.1
kernel-default-base-4.4.21-84.1
kernel-default-base-debuginfo-4.4.21-84.1
kernel-default-debuginfo-4.4.21-84.1
kernel-default-debugsource-4.4.21-84.1
kernel-default-devel-4.4.21-84.1
kernel-syms-4.4.21-84.1
- SUSE Linux Enterprise Server 12-SP2 (noarch):
kernel-devel-4.4.21-84.1
kernel-macros-4.4.21-84.1
kernel-source-4.4.21-84.1
- SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-4_4_21-84-default-1-2.1
- SUSE Linux Enterprise High Availability 12-SP2 (ppc64le s390x x86_64):
cluster-md-kmp-default-4.4.21-84.1
cluster-md-kmp-default-debuginfo-4.4.21-84.1
cluster-network-kmp-default-4.4.21-84.1
cluster-network-kmp-default-debuginfo-4.4.21-84.1
dlm-kmp-default-4.4.21-84.1
dlm-kmp-default-debuginfo-4.4.21-84.1
gfs2-kmp-default-4.4.21-84.1
gfs2-kmp-default-debuginfo-4.4.21-84.1
kernel-default-debuginfo-4.4.21-84.1
kernel-default-debugsource-4.4.21-84.1
ocfs2-kmp-default-4.4.21-84.1
ocfs2-kmp-default-debuginfo-4.4.21-84.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
kernel-default-4.4.21-84.1
kernel-default-debuginfo-4.4.21-84.1
kernel-default-debugsource-4.4.21-84.1
kernel-default-devel-4.4.21-84.1
kernel-default-extra-4.4.21-84.1
kernel-default-extra-debuginfo-4.4.21-84.1
kernel-syms-4.4.21-84.1
- SUSE Linux Enterprise Desktop 12-SP2 (noarch):
kernel-devel-4.4.21-84.1
kernel-macros-4.4.21-84.1
kernel-source-4.4.21-84.1
References:
https://www.suse.com/security/cve/CVE-2016-8632.html
https://www.suse.com/security/cve/CVE-2016-8655.html
https://www.suse.com/security/cve/CVE-2016-9555.html
https://bugzilla.suse.com/1008831
https://bugzilla.suse.com/1011685
https://bugzilla.suse.com/1012754
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2016:3048-1: important: Security update for MozillaFirefox
by opensuse-security@opensuse.org 07 Dec '16
by opensuse-security@opensuse.org 07 Dec '16
07 Dec '16
SUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:3048-1
Rating: important
References: #1012964
Cross-References: CVE-2016-9079
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Software Development Kit 12-SP1
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Server 12-SP1
SUSE Linux Enterprise Server 12-LTSS
SUSE Linux Enterprise Desktop 12-SP2
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for MozillaFirefox fixes security issues.
The following vulnerabilities were fixed in Firefox ESR 45.5.1
(bbsc#1012964):
- CVE-2016-9079: Use-after-free in SVG Animation could be used for code
execution (MFSA 2016-92 bsc#1012964)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP2:
zypper in -t patch SUSE-SLE-SDK-12-SP2-2016-1771=1
- SUSE Linux Enterprise Software Development Kit 12-SP1:
zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1771=1
- SUSE Linux Enterprise Server for SAP 12:
zypper in -t patch SUSE-SLE-SAP-12-2016-1771=1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2016-1771=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1771=1
- SUSE Linux Enterprise Server 12-SP1:
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1771=1
- SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2016-1771=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2016-1771=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1771=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):
MozillaFirefox-debuginfo-45.5.1esr-93.1
MozillaFirefox-debugsource-45.5.1esr-93.1
MozillaFirefox-devel-45.5.1esr-93.1
- SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):
MozillaFirefox-debuginfo-45.5.1esr-93.1
MozillaFirefox-debugsource-45.5.1esr-93.1
MozillaFirefox-devel-45.5.1esr-93.1
- SUSE Linux Enterprise Server for SAP 12 (x86_64):
MozillaFirefox-45.5.1esr-93.1
MozillaFirefox-debuginfo-45.5.1esr-93.1
MozillaFirefox-debugsource-45.5.1esr-93.1
MozillaFirefox-translations-45.5.1esr-93.1
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
MozillaFirefox-45.5.1esr-93.1
MozillaFirefox-debuginfo-45.5.1esr-93.1
MozillaFirefox-debugsource-45.5.1esr-93.1
MozillaFirefox-translations-45.5.1esr-93.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):
MozillaFirefox-45.5.1esr-93.1
MozillaFirefox-debuginfo-45.5.1esr-93.1
MozillaFirefox-debugsource-45.5.1esr-93.1
MozillaFirefox-translations-45.5.1esr-93.1
- SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):
MozillaFirefox-45.5.1esr-93.1
MozillaFirefox-debuginfo-45.5.1esr-93.1
MozillaFirefox-debugsource-45.5.1esr-93.1
MozillaFirefox-translations-45.5.1esr-93.1
- SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):
MozillaFirefox-45.5.1esr-93.1
MozillaFirefox-debuginfo-45.5.1esr-93.1
MozillaFirefox-debugsource-45.5.1esr-93.1
MozillaFirefox-translations-45.5.1esr-93.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
MozillaFirefox-45.5.1esr-93.1
MozillaFirefox-debuginfo-45.5.1esr-93.1
MozillaFirefox-debugsource-45.5.1esr-93.1
MozillaFirefox-translations-45.5.1esr-93.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
MozillaFirefox-45.5.1esr-93.1
MozillaFirefox-debuginfo-45.5.1esr-93.1
MozillaFirefox-debugsource-45.5.1esr-93.1
MozillaFirefox-translations-45.5.1esr-93.1
References:
https://www.suse.com/security/cve/CVE-2016-9079.html
https://bugzilla.suse.com/1012964
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2016:3044-1: important: Security update for xen
by opensuse-security@opensuse.org 07 Dec '16
by opensuse-security@opensuse.org 07 Dec '16
07 Dec '16
SUSE Security Update: Security update for xen
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:3044-1
Rating: important
References: #1000106 #1000893 #1003030 #1003032 #1005004
#1005005 #1007157 #1009100 #1009103 #1009107
#1009109 #1009111 #1011652 #990843
Cross-References: CVE-2016-6351 CVE-2016-7777 CVE-2016-7908
CVE-2016-7909 CVE-2016-8667 CVE-2016-8669
CVE-2016-8910 CVE-2016-9379 CVE-2016-9380
CVE-2016-9381 CVE-2016-9382 CVE-2016-9383
CVE-2016-9386 CVE-2016-9637
Affected Products:
SUSE Linux Enterprise Server 11-SP2-LTSS
SUSE Linux Enterprise Debuginfo 11-SP2
______________________________________________________________________________
An update that fixes 14 vulnerabilities is now available.
Description:
xen was updated to fix several security issues.
These security issues were fixed:
- CVE-2016-9637: ioport array overflow allowing a malicious guest
administrator can escalate their privilege to that of the host
(bsc#1011652).
- CVE-2016-9386: x86 null segments were not always treated as unusable
allowing an unprivileged guest user program to elevate its privilege to
that of the guest operating system. Exploit of this vulnerability is
easy on Intel and more complicated on AMD (bsc#1009100)
- CVE-2016-9382: x86 task switch to VM86 mode was mis-handled, allowing a
unprivileged guest process to escalate its privilege to that of the
guest operating system on AMD hardware. On Intel hardware a malicious
unprivileged guest process can crash the guest (bsc#1009103)
- CVE-2016-9383: The x86 64-bit bit test instruction emulation was broken,
allowing a guest to modify arbitrary memory leading to arbitray code
execution (bsc#1009107)
- CVE-2016-9381: Improper processing of shared rings allowing guest
administrators take over the qemu process, elevating their privilege to
that of the qemu process (bsc#1009109)
- CVE-2016-9380: Delimiter injection vulnerabilities in pygrub allowed
guest administrators to obtain the contents of sensitive host files or
delete the files (bsc#1009111)
- CVE-2016-9379: Delimiter injection vulnerabilities in pygrub allowed
guest administrators to obtain the contents of sensitive host files or
delete the files (bsc#1009111)
- CVE-2016-7777: Xen did not properly honor CR0.TS and CR0.EM, which
allowed local x86 HVM guest OS users to read or modify FPU, MMX, or XMM
register state information belonging to arbitrary tasks on the guest by
modifying an instruction while the hypervisor is preparing to emulate it
(bsc#1000106)
- CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c
allowed local guest OS administrators to cause a denial of service
(infinite loop and CPU consumption) by leveraging failure to limit the
ring descriptor count (bsc#1007157)
- CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c in allowed
local guest OS administrators to cause a denial of service
(divide-by-zero error and QEMU process crash) via a large interval timer
reload value (bsc#1005004)
- CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c
allowed local guest OS administrators to cause a denial of service
(divide-by-zero error and QEMU process crash) via vectors involving a
value of divider greater than baud base (bsc#1005005)
- CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not
properly limit the buffer descriptor count when transmitting packets,
which allowed local guest OS administrators to cause a denial of service
(infinite loop and QEMU process crash) via vectors involving a buffer
descriptor with a length of 0 and crafted values in bd.flags
(bsc#1003030)
- CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed
local guest OS administrators to cause a denial of service (infinite
loop and QEMU process crash) by setting the (1) receive or (2) transmit
descriptor ring length to 0 (bsc#1003032)
- CVE-2016-6351: The esp_do_dma function in hw/scsi/esp.c, when built with
ESP/NCR53C9x controller emulation support, allowed local guest OS
administrators to cause a denial of service (out-of-bounds write and
QEMU process crash) or execute arbitrary code on the host via vectors
involving DMA read into ESP command buffer (bsc#990843)
This non-security issue was fixed:
- bsc#1000893: virsh setmem didn't allow to set current guest memory to
max limit
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11-SP2-LTSS:
zypper in -t patch slessp2-xen-12874=1
- SUSE Linux Enterprise Debuginfo 11-SP2:
zypper in -t patch dbgsp2-xen-12874=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11-SP2-LTSS (i586 x86_64):
xen-devel-4.1.6_08-32.1
xen-kmp-default-4.1.6_08_3.0.101_0.7.44-32.1
xen-kmp-trace-4.1.6_08_3.0.101_0.7.44-32.1
xen-libs-4.1.6_08-32.1
xen-tools-domU-4.1.6_08-32.1
- SUSE Linux Enterprise Server 11-SP2-LTSS (x86_64):
xen-4.1.6_08-32.1
xen-doc-html-4.1.6_08-32.1
xen-doc-pdf-4.1.6_08-32.1
xen-libs-32bit-4.1.6_08-32.1
xen-tools-4.1.6_08-32.1
- SUSE Linux Enterprise Server 11-SP2-LTSS (i586):
xen-kmp-pae-4.1.6_08_3.0.101_0.7.44-32.1
- SUSE Linux Enterprise Debuginfo 11-SP2 (i586 x86_64):
xen-debuginfo-4.1.6_08-32.1
xen-debugsource-4.1.6_08-32.1
References:
https://www.suse.com/security/cve/CVE-2016-6351.html
https://www.suse.com/security/cve/CVE-2016-7777.html
https://www.suse.com/security/cve/CVE-2016-7908.html
https://www.suse.com/security/cve/CVE-2016-7909.html
https://www.suse.com/security/cve/CVE-2016-8667.html
https://www.suse.com/security/cve/CVE-2016-8669.html
https://www.suse.com/security/cve/CVE-2016-8910.html
https://www.suse.com/security/cve/CVE-2016-9379.html
https://www.suse.com/security/cve/CVE-2016-9380.html
https://www.suse.com/security/cve/CVE-2016-9381.html
https://www.suse.com/security/cve/CVE-2016-9382.html
https://www.suse.com/security/cve/CVE-2016-9383.html
https://www.suse.com/security/cve/CVE-2016-9386.html
https://www.suse.com/security/cve/CVE-2016-9637.html
https://bugzilla.suse.com/1000106
https://bugzilla.suse.com/1000893
https://bugzilla.suse.com/1003030
https://bugzilla.suse.com/1003032
https://bugzilla.suse.com/1005004
https://bugzilla.suse.com/1005005
https://bugzilla.suse.com/1007157
https://bugzilla.suse.com/1009100
https://bugzilla.suse.com/1009103
https://bugzilla.suse.com/1009107
https://bugzilla.suse.com/1009109
https://bugzilla.suse.com/1009111
https://bugzilla.suse.com/1011652
https://bugzilla.suse.com/990843
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0