SUSE Security Update: Security update for Linux kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0912-1 Rating: important References: #767610 #786450 #792271 #821619 #832710 #837563 #840524 #846404 #846690 #847652 #850915 #851426 #851603 #852553 #855126 #857926 #858869 #858870 #858872 #859840 #861636 #861980 #862429 #862934 #863300 #863335 #863410 #863873 #864404 #864464 #865310 #865330 #865882 #866081 #866102 #866615 #866800 #866864 #867362 #867517 #867531 #867723 #867953 #868488 #868528 #868653 #868748 #869033 #869414 #869563 #869934 #870173 #870335 #870450 #870496 #870498 #870576 #870591 #870618 #870877 #870958 #871561 #871634 #871676 #871728 #871854 #871861 #871899 #872188 #872540 #872634 #873061 #873374 #873463 #874108 #874145 #874440 #874577 #875386 #876102 #876114 #876176 #876463 #877013 #877257 #877497 #877775 #878115 #878123 #878274 #878407 #878509 #879921 #879957 #880007 #880357 #880437 #880484 #881571 #881761 #881939 #882324 #883380 #883795 #885725 Cross-References: CVE-2012-2372 CVE-2013-2929 CVE-2013-4299 CVE-2013-4579 CVE-2013-6382 CVE-2013-7339 CVE-2014-0055 CVE-2014-0077 CVE-2014-0101 CVE-2014-0131 CVE-2014-0155 CVE-2014-1444 CVE-2014-1445 CVE-2014-1446 CVE-2014-1874 CVE-2014-2309 CVE-2014-2523 CVE-2014-2678 CVE-2014-2851 CVE-2014-3122 CVE-2014-3144 CVE-2014-3145 CVE-2014-3917 CVE-2014-4652 CVE-2014-4653 CVE-2014-4654 CVE-2014-4655 CVE-2014-4656 CVE-2014-4699 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise High Availability Extension 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 SLE 11 SERVER Unsupported Extras ______________________________________________________________________________ An update that solves 29 vulnerabilities and has 76 fixes is now available. It includes one version update. Description: The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix various bugs and security issues. The following security bugs have been fixed: * CVE-2012-2372: The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interfaces own IP address, as demonstrated by rds-ping. (bnc#767610) * CVE-2013-2929: The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h. (bnc#847652) * CVE-2013-4299: Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device. (bnc#846404) * CVE-2013-4579: The ath9k_htc_set_bssid_mask function in drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel through 3.12 uses a BSSID masking approach to determine the set of MAC addresses on which a Wi-Fi device is listening, which allows remote attackers to discover the original MAC address after spoofing by sending a series of packets to MAC addresses with certain bit manipulations. (bnc#851426) * CVE-2013-6382: Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for a (1) XFS_IOC_ATTRLIST_BY_HANDLE or (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 ioctl call with a crafted length value, related to the xfs_attrlist_by_handle function in fs/xfs/xfs_ioctl.c and the xfs_compat_attrlist_by_handle function in fs/xfs/xfs_ioctl32.c. (bnc#852553) * CVE-2013-7339: The rds_ib_laddr_check function in net/rds/ib.c in the Linux kernel before 3.12.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports. (bnc#869563) * CVE-2014-0055: The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors. (bnc#870173) * CVE-2014-0077: drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions. (bnc#870576) * CVE-2014-0101: The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk. (bnc#866102) * CVE-2014-0131: Use-after-free vulnerability in the skb_segment function in net/core/skbuff.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. (bnc#867723) * CVE-2014-0155: The ioapic_deliver function in virt/kvm/ioapic.c in the Linux kernel through 3.14.1 does not properly validate the kvm_irq_delivery_to_apic return value, which allows guest OS users to cause a denial of service (host OS crash) via a crafted entry in the redirection table of an I/O APIC. NOTE: the affected code was moved to the ioapic_service function before the vulnerability was announced. (bnc#872540) * CVE-2014-1444: The fst_get_iface function in drivers/net/wan/farsync.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCWANDEV ioctl call. (bnc#858869) * CVE-2014-1445: The wanxl_ioctl function in drivers/net/wan/wanxl.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an ioctl call. (bnc#858870) * CVE-2014-1446: The yam_ioctl function in drivers/net/hamradio/yam.c in the Linux kernel before 3.12.8 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCYAMGCFG ioctl call. (bnc#858872) * CVE-2014-1874: The security_context_to_sid_core function in security/selinux/ss/services.c in the Linux kernel before 3.13.4 allows local users to cause a denial of service (system crash) by leveraging the CAP_MAC_ADMIN capability to set a zero-length security context. (bnc#863335) * CVE-2014-2309: The ip6_route_add function in net/ipv6/route.c in the Linux kernel through 3.13.6 does not properly count the addition of routes, which allows remote attackers to cause a denial of service (memory consumption) via a flood of ICMPv6 Router Advertisement packets. (bnc#867531) * CVE-2014-2523: net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function. (bnc#868653) * CVE-2014-2678: The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel through 3.14 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports. (bnc#871561) * CVE-2014-2851: Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter. (bnc#873374) * CVE-2014-3122: The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel before 3.14.3 does not properly consider which pages must be locked, which allows local users to cause a denial of service (system crash) by triggering a memory-usage pattern that requires removal of page-table mappings. (bnc#876102) * CVE-2014-3144: The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced. (bnc#877257) * CVE-2014-3145: The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced. (bnc#877257) * CVE-2014-3917: kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number. (bnc#880484) * CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number * (bnc#883724) * CVE-2014-4652: Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allows local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access. (bnc#883795) * CVE-2014-4653: sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access. (bnc#883795) * CVE-2014-4654: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allows local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call. (bnc#883795) * CVE-2014-4655: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls. (bnc#883795) * CVE-2014-4656: Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function. (bnc#883795) * CVE-2014-4699: The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls. (bnc#885725) Also the following non-security bugs have been fixed: * kernel: avoid page table walk on user space access (bnc#878407, LTC#110316). * spinlock: fix system hang with spin_retry <= 0 (bnc#874145, LTC#110189). * x86/UV: Set n_lshift based on GAM_GR_CONFIG MMR for UV3 (bnc#876176). * x86: Enable multiple CPUs in crash kernel (bnc#846690). * x86/mce: Fix CMCI preemption bugs (bnc#786450). * x86, CMCI: Add proper detection of end of CMCI storms (bnc#786450). * futex: revert back to the explicit waiter counting code (bnc#851603). * futex: avoid race between requeue and wake (bnc#851603). * intel-iommu: fix off-by-one in pagetable freeing (bnc#874577). * ia64: Change default PSR.ac from "1" to "0" (Fix erratum #237) (bnc#874108). * drivers/rtc/interface.c: fix infinite loop in initializing the alarm (bnc#871676). * drm/ast: Fix double lock at PM resume (bnc#883380). * drm/ast: add widescreen + rb modes from X.org driver (v2) (bnc#883380). * drm/ast: deal with bo reserve fail in dirty update path (bnc#883380). * drm/ast: do not attempt to acquire a reservation while in an interrupt handler (bnc#883380). * drm/ast: fix the ast open key function (bnc#883380). * drm/ast: fix value check in cbr_scan2 (bnc#883380). * drm/ast: inline reservations (bnc#883380). * drm/ast: invalidate page tables when pinning a BO (bnc#883380). * drm/ast: rename the mindwm/moutdwm and deinline them (bnc#883380). * drm/ast: resync the dram post code with upstream (bnc#883380). * drm: ast: use drm_can_sleep (bnc#883380). * drm/ast: use drm_modeset_lock_all (bnc#883380). * drm/: Unified handling of unimplemented fb->create_handle (bnc#883380). * drm/mgag200,ast,cirrus: fix regression with drm_can_sleep conversion (bnc#883380). * drm/mgag200: Consolidate depth/bpp handling (bnc#882324). * drm/ast: Initialized data needed to map fbdev memory (bnc#880007). * drm/ast: add AST 2400 support (bnc#880007). * drm/ast: Initialized data needed to map fbdev memory (bnc#880007). * drm/mgag200: on cards with < 2MB VRAM default to 16-bit (bnc#882324). * drm/mgag200: fix typo causing bw limits to be ignored on some chips (bnc#882324). * drm/ttm: do not oops if no invalidate_caches() (bnc#869414). * drm/i915: Break encoder->crtc link separately in intel_sanitize_crtc() (bnc#855126). * dlm: keep listening connection alive with sctp mode (bnc#881939) * series.conf: Clarify comment about Xen kabi adjustments (bnc#876114#c25) * btrfs: fix a crash when running balance and defrag concurrently. * btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). * btrfs: free delayed node outside of root->inode_lock (bnc#866864). * btrfs: return EPERM when deleting a default subvolume (bnc#869934). * btrfs: do not loop on large offsets in readdir (bnc#863300) * sched: Consider pi boosting in setscheduler. * sched: Queue RT tasks to head when prio drops. * sched: Adjust sched_reset_on_fork when nothing else changes. * sched: Fix clock_gettime(CLOCK__CPUTIME_ID) monotonicity (bnc#880357). * sched: Do not allow scheduler time to go backwards (bnc#880357). * sched: Make scale_rt_power() deal with backward clocks (bnc#865310). * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check (bnc#871861). * sched: update_rq_clock() must skip ONE update (bnc#869033, bnc#868528). * tcp: allow to disable cwnd moderation in TCP_CA_Loss state (bnc#879921). * tcp: clear xmit timers in tcp_v4_syn_recv_sock() (bnc#862429). * net: add missing bh_unlock_sock() calls (bnc#862429). * bonding: fix vlan_features computing (bnc#872634). * vlan: more careful checksum features handling (bnc#872634). * xfrm: fix race between netns cleanup and state expire notification (bnc#879957). * xfrm: check peer pointer for null before calling inet_putpeer() (bnc#877775). * ipv6: do not overwrite inetpeer metrics prematurely (bnc#867362). * pagecachelimit: reduce lru_lock contention for heavy parallel kabi fixup: (bnc#878509, bnc#864464). * pagecachelimit: reduce lru_lock contention for heavy parallel reclaim (bnc#878509, bnc#864464). * TTY: serial, cleanup include file (bnc#881571). * TTY: serial, fix includes in some drivers (bnc#881571). * serial_core: Fix race in uart_handle_dcd_change (bnc#881571). * powerpc/perf: Power8 PMU support (bnc#832710). * powerpc/perf: Add support for SIER (bnc#832710). * powerpc/perf: Add regs_no_sipr() (bnc#832710). * powerpc/perf: Add an accessor for regs->result (bnc#832710). * powerpc/perf: Convert mmcra_sipr/sihv() to regs_sipr/sihv() (bnc#832710). * powerpc/perf: Add an explict flag indicating presence of SLOT field (bnc#832710). * swiotlb: do not assume PA 0 is invalid (bnc#865882). * lockref: implement lockless reference count updates using cmpxchg() (FATE#317271). * af_iucv: wrong mapping of sent and confirmed skbs (bnc#878407, LTC#110452). * af_iucv: recvmsg problem for SOCK_STREAM sockets (bnc#878407, LTC#110452). * af_iucv: fix recvmsg by replacing skb_pull() function (bnc#878407, LTC#110452). * qla2xxx: Poll during initialization for ISP25xx and ISP83xx (bnc#837563). * qla2xxx: Fix request queue null dereference (bnc#859840). * lpfc 8.3.41: Fixed SLI3 failing FCP write on check-condition no-sense with residual zero (bnc#850915). * reiserfs: call truncate_setsize under tailpack mutex (bnc#878115). * reiserfs: drop vmtruncate (bnc#878115). * ipvs: handle IPv6 fragments with one-packet scheduling (bnc#861980). * kabi: hide modifications of struct sk_buff done by bnc#861980 fix (bnc#861980). * loop: remove the incorrect write_begin/write_end shortcut (bnc#878123). * watchdog: hpwdt patch to display informative string (bnc#862934). * watchdog: hpwdt: Patch to ignore auxilary iLO devices (bnc#862934). * watchdog: hpwdt: Add check for UEFI bits (bnc#862934). * watchdog: hpwdt.c: Increase version string (bnc#862934). * hpilo: Correct panic when an AUX iLO is detected (bnc#837563). * locking/mutexes: Introduce cancelable MCS lock for adaptive spinning (FATE#317271). * locking/mutexes: Modify the way optimistic spinners are queued (FATE#317271). * locking/mutexes: Return false if task need_resched() in mutex_can_spin_on_owner() (FATE#317271). * mutex: Enable the queuing of mutex spinners with MCS lock (FATE#317271). config: disabled on all flavors * mutex: Queue mutex spinners with MCS lock to reduce cacheline contention (FATE#317271). * memcg: deprecate memory.force_empty knob (bnc#878274). * kabi: protect struct net from bnc#877013 changes (bnc#877013). * netfilter: nfnetlink_queue: add net namespace support for nfnetlink_queue (bnc#877013). * netfilter: make /proc/net/netfilter pernet (bnc#877013). * netfilter: xt_hashlimit: fix proc entry leak in netns destroy path (bnc#871634). * netfilter: xt_hashlimit: fix namespace destroy path (bnc#871634). * netfilter: nf_queue: reject NF_STOLEN verdicts from userspace (bnc#870877). * netfilter: avoid double free in nf_reinject (bnc#870877). * netfilter: ctnetlink: fix race between delete and timeout expiration (bnc#863410). * netfilter: reuse skb->nfct_reasm for ipvs conn reference (bnc#861980). * mm: per-thread vma caching (FATE#317271). config: enable CONFIG_VMA_CACHE for x86_64/bigsmp * mm, hugetlb: improve page-fault scalability (FATE#317271). * mm: vmscan: Do not throttle based on pfmemalloc reserves if node has no ZONE_NORMAL (bnc#870496). * mm: fix off-by-one bug in print_nodes_state() (bnc#792271). * hugetlb: ensure hugepage access is denied if hugepages are not supported (PowerKVM crash when mounting hugetlbfs without hugepage support (bnc#870498)). * SELinux: Increase ebitmap_node size for 64-bit configuration (FATE#317271). * SELinux: Reduce overhead of mls_level_isvalid() function call (FATE#317271). * mutex: Fix debug_mutexes (FATE#317271). * mutex: Fix debug checks (FATE#317271). * locking/mutexes: Unlock the mutex without the wait_lock (FATE#317271). * epoll: do not take the nested ep->mtx on EPOLL_CTL_DEL (FATE#317271). * epoll: do not take global "epmutex" for simple topologies (FATE#317271). * epoll: optimize EPOLL_CTL_DEL using rcu (FATE#317271). * vfs: Fix missing unlock of vfsmount_lock in unlazy_walk (bnc#880437). * dcache: kABI fixes for lockref dentries (FATE#317271). * vfs: make sure we do not have a stale root path if unlazy_walk() fails (FATE#317271). * vfs: fix dentry RCU to refcounting possibly sleeping dput() (FATE#317271). * vfs: use lockref "dead" flag to mark unrecoverably dead dentries (FATE#317271). * vfs: reimplement d_rcu_to_refcount() using lockref_get_or_lock() (FATE#317271). * vfs: Remove second variable named error in __dentry_path (FATE#317271). * make prepend_name() work correctly when called with negative *buflen (FATE#317271). * prepend_path() needs to reinitialize dentry/vfsmount on restarts (FATE#317271). * dcache: get/release read lock in read_seqbegin_or_lock() & friend (FATE#317271). * seqlock: Add a new locking reader type (FATE#317271). * dcache: Translating dentry into pathname without taking rename_lock (FATE#317271). * vfs: make the dentry cache use the lockref infrastructure (FATE#317271). * vfs: Remove dentry->d_lock locking from shrink_dcache_for_umount_subtree() (FATE#317271). * vfs: use lockref_get_not_zero() for optimistic lockless dget_parent() (FATE#317271). * vfs: constify dentry parameter in d_count() (FATE#317271). * helper for reading ->d_count (FATE#317271). * lockref: use arch_mutex_cpu_relax() in CMPXCHG_LOOP() (FATE#317271). * lockref: allow relaxed cmpxchg64 variant for lockless updates (FATE#317271). * lockref: use cmpxchg64 explicitly for lockless updates (FATE#317271). * lockref: add ability to mark lockrefs "dead" (FATE#317271). * lockref: fix docbook argument names (FATE#317271). * lockref: Relax in cmpxchg loop (FATE#317271). * lockref: implement lockless reference count updates using cmpxchg() (FATE#317271). * lockref: uninline lockref helper functions (FATE#317271). * lockref: add lockref_get_or_lock() helper (FATE#317271). * Add new lockref infrastructure reference implementation (FATE#317271). * vfs: make lremovexattr retry once on ESTALE error (bnc#876463). * vfs: make removexattr retry once on ESTALE (bnc#876463). * vfs: make llistxattr retry once on ESTALE error (bnc#876463). * vfs: make listxattr retry once on ESTALE error (bnc#876463). * vfs: make lgetxattr retry once on ESTALE (bnc#876463). * vfs: make getxattr retry once on an ESTALE error (bnc#876463). * vfs: allow lsetxattr() to retry once on ESTALE errors (bnc#876463). * vfs: allow setxattr to retry once on ESTALE errors (bnc#876463). * vfs: allow utimensat() calls to retry once on an ESTALE error (bnc#876463). * vfs: fix user_statfs to retry once on ESTALE errors (bnc#876463). * vfs: make fchownat retry once on ESTALE errors (bnc#876463). * vfs: make fchmodat retry once on ESTALE errors (bnc#876463). * vfs: have chroot retry once on ESTALE error (bnc#876463). * vfs: have chdir retry lookup and call once on ESTALE error (bnc#876463). * vfs: have faccessat retry once on an ESTALE error (bnc#876463). * vfs: have do_sys_truncate retry once on an ESTALE error (bnc#876463). * vfs: fix renameat to retry on ESTALE errors (bnc#876463). * vfs: make do_unlinkat retry once on ESTALE errors (bnc#876463). * vfs: make do_rmdir retry once on ESTALE errors (bnc#876463). * vfs: fix linkat to retry once on ESTALE errors (bnc#876463). * vfs: fix symlinkat to retry on ESTALE errors (bnc#876463). * vfs: fix mkdirat to retry once on an ESTALE error (bnc#876463). * vfs: fix mknodat to retry on ESTALE errors (bnc#876463). * vfs: add a flags argument to user_path_parent (bnc#876463). * vfs: fix readlinkat to retry on ESTALE (bnc#876463). * vfs: make fstatat retry on ESTALE errors from getattr call (bnc#876463). * vfs: add a retry_estale helper function to handle retries on ESTALE (bnc#876463). * crypto: s390 - fix aes,des ctr mode concurrency finding (bnc#874145, LTC#110078). * s390/cio: fix unlocked access of global bitmap (bnc#874145, LTC#109378). * s390/css: stop stsch loop after cc 3 (bnc#874145, LTC#109378). * s390/pci: add kmsg man page (bnc#874145, LTC#109224). * s390/pci/dma: use correct segment boundary size (bnc#866081, LTC#104566). * cio: Fix missing subchannels after CHPID configure on (bnc#866081, LTC#104808). * cio: Fix process hangs during subchannel scan (bnc#866081, LTC#104805). * cio: fix unusable device (bnc#866081, LTC#104168). * qeth: postpone freeing of qdio memory (bnc#874145, LTC#107873). * Fix race between starved list and device removal (bnc#861636). * namei.h: include errno.h (bnc#876463). * ALSA: hda - Implement bind mixer ctls for Conexant (bnc#872188). * ALSA: hda - Fix invalid Auto-Mute Mode enum from cxt codecs (bnc#872188). * ALSA: hda - Fix conflicting Capture Source on cxt codecs (bnc#872188). * ALSA: usb-audio: Fix NULL dereference while quick replugging (bnc#870335). * powerpc: Bring all threads online prior to migration/hibernation (bnc#870591). * powerpc/pseries: Update dynamic cache nodes for suspend/resume operation (bnc#873463). * powerpc/pseries: Device tree should only be updated once after suspend/migrate (bnc#873463). * powerpc/pseries: Expose in kernel device tree update to drmgr (bnc#873463). * powerpc: Add second POWER8 PVR entry (bnc#874440). * libata/ahci: accommodate tag ordered controllers (bnc#871728) * md: try to remove cause of a spinning md thread (bnc#875386). * md: fix up plugging (again) (bnc#866800). * NFSv4: Fix a reboot recovery race when opening a file (bnc#864404). * NFSv4: Ensure delegation recall and byte range lock removal do not conflict (bnc#864404). * NFSv4: Fix up the return values of nfs4_open_delegation_recall (bnc#864404). * NFSv4.1: Do not lose locks when a server reboots during delegation return (bnc#864404). * NFSv4.1: Prevent deadlocks between state recovery and file locking (bnc#864404). * NFSv4: Allow the state manager to mark an open_owner as being recovered (bnc#864404). * NFS: nfs_inode_return_delegation() should always flush dirty data (bnc#864404). * NFSv4: nfs_client_return_marked_delegations cannot flush data (bnc#864404). * NFS: avoid excessive GETATTR request when attributes expired but cached directory is valid (bnc#857926). * seqlock: add "raw_seqcount_begin()" function (bnc#864404). * Allow nfsdv4 to work when fips=1 (bnc#868488). * NFSv4: Add ACCESS operation to OPEN compound (bnc#870958). * NFSv4: Fix unnecessary delegation returns in nfs4_do_open (bnc#870958). * NFSv4: The NFSv4.0 client must send RENEW calls if it holds a delegation (bnc#863873). * NFSv4: nfs4_proc_renew should be declared static (bnc#863873). * NFSv4: do not put ACCESS in OPEN compound if O_EXCL (bnc#870958). * NFS: revalidate on open if dcache is negative (bnc#876463). * NFSD add module parameter to disable delegations (bnc#876463). * Do not lose sockets when nfsd shutdown races with connection timeout (bnc#871854). * timer: Prevent overflow in apply_slack (bnc#873061). * mei: me: do not load the driver if the FW does not support MEI interface (bnc#821619). * ipmi: Reset the KCS timeout when starting error recovery (bnc#870618). * ipmi: Fix a race restarting the timer (bnc#870618). * ipmi: increase KCS timeouts (bnc#870618). * bnx2x: Fix kernel crash and data miscompare after EEH recovery (bnc#881761). * bnx2x: Adapter not recovery from EEH error injection (bnc#881761). * kabi: hide modifications of struct inet_peer done by bnc#867953 fix (bnc#867953). * inetpeer: prevent unlinking from unused list twice (bnc#867953). * Ignore selected taints for tracepoint modules (bnc#870450, FATE#317134). * Use "E" instead of "X" for unsigned module taint flag (bnc#870450,FATE#317134). * Fix: module signature vs tracepoints: add new TAINT_UNSIGNED_MODULE (bnc#870450,FATE#317134). * xhci: extend quirk for Renesas cards (bnc#877497). * scsi: return target failure on EMC inactive snapshot (bnc#840524). * virtio_balloon: do not softlockup on huge balloon changes (bnc#871899). * ch: add refcounting (bnc#867517). * storvsc: NULL pointer dereference fix (bnc#865330). * Unlock the rename_lock in dentry_path() in the case when path is too long (bnc#868748). Security Issue references: * CVE-2012-2372 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2372> * CVE-2013-2929 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2929> * CVE-2013-4299 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4299> * CVE-2013-4579 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4579> * CVE-2013-6382 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6382> * CVE-2013-7339 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7339> * CVE-2014-0055 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0055> * CVE-2014-0077 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0077> * CVE-2014-0101 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0101> * CVE-2014-0131 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0131> * CVE-2014-0155 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0155> * CVE-2014-1444 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1444> * CVE-2014-1445 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1445> * CVE-2014-1446 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1446> * CVE-2014-1874 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1874> * CVE-2014-2309 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2309> * CVE-2014-2523 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2523> * CVE-2014-2678 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2678> * CVE-2014-2851 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2851> * CVE-2014-3122 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3122> * CVE-2014-3144 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144> * CVE-2014-3145 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145> * CVE-2014-3917 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917> * CVE-2014-4508 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508> * CVE-2014-4652 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4652> * CVE-2014-4653 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653> * CVE-2014-4654 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654> * CVE-2014-4655 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655> * CVE-2014-4656 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4656> * CVE-2014-4699 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699> Indications: Everyone using the Linux Kernel on x86_64 architecture should update. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-kernel-9488 slessp3-kernel-9493 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-kernel-9488 slessp3-kernel-9489 slessp3-kernel-9490 slessp3-kernel-9491 slessp3-kernel-9493 - SUSE Linux Enterprise High Availability Extension 11 SP3: zypper in -t patch slehasp3-kernel-9488 slehasp3-kernel-9489 slehasp3-kernel-9490 slehasp3-kernel-9491 slehasp3-kernel-9493 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-kernel-9488 sledsp3-kernel-9493 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 3.0.101]: kernel-default-3.0.101-0.35.1 kernel-default-base-3.0.101-0.35.1 kernel-default-devel-3.0.101-0.35.1 kernel-source-3.0.101-0.35.1 kernel-syms-3.0.101-0.35.1 kernel-trace-3.0.101-0.35.1 kernel-trace-base-3.0.101-0.35.1 kernel-trace-devel-3.0.101-0.35.1 kernel-xen-devel-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586) [New Version: 3.0.101]: kernel-pae-3.0.101-0.35.1 kernel-pae-base-3.0.101-0.35.1 kernel-pae-devel-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 3.0.101]: kernel-default-3.0.101-0.35.1 kernel-default-base-3.0.101-0.35.1 kernel-default-devel-3.0.101-0.35.1 kernel-source-3.0.101-0.35.1 kernel-syms-3.0.101-0.35.1 kernel-trace-3.0.101-0.35.1 kernel-trace-base-3.0.101-0.35.1 kernel-trace-devel-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 (i586 x86_64) [New Version: 3.0.101]: kernel-ec2-3.0.101-0.35.1 kernel-ec2-base-3.0.101-0.35.1 kernel-ec2-devel-3.0.101-0.35.1 kernel-xen-3.0.101-0.35.1 kernel-xen-base-3.0.101-0.35.1 kernel-xen-devel-3.0.101-0.35.1 xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 - SUSE Linux Enterprise Server 11 SP3 (s390x) [New Version: 3.0.101]: kernel-default-man-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 (ppc64) [New Version: 3.0.101]: kernel-ppc64-3.0.101-0.35.1 kernel-ppc64-base-3.0.101-0.35.1 kernel-ppc64-devel-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 (i586) [New Version: 3.0.101]: kernel-pae-3.0.101-0.35.1 kernel-pae-base-3.0.101-0.35.1 kernel-pae-devel-3.0.101-0.35.1 xen-kmp-pae-4.2.4_02_3.0.101_0.35-0.7.45 - SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 ia64 ppc64 s390x x86_64): cluster-network-kmp-default-1.4_3.0.101_0.35-2.27.78 cluster-network-kmp-trace-1.4_3.0.101_0.35-2.27.78 gfs2-kmp-default-2_3.0.101_0.35-0.16.84 gfs2-kmp-trace-2_3.0.101_0.35-0.16.84 ocfs2-kmp-default-1.6_3.0.101_0.35-0.20.78 ocfs2-kmp-trace-1.6_3.0.101_0.35-0.20.78 - SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 x86_64): cluster-network-kmp-xen-1.4_3.0.101_0.35-2.27.78 gfs2-kmp-xen-2_3.0.101_0.35-0.16.84 ocfs2-kmp-xen-1.6_3.0.101_0.35-0.20.78 - SUSE Linux Enterprise High Availability Extension 11 SP3 (ppc64): cluster-network-kmp-ppc64-1.4_3.0.101_0.35-2.27.78 gfs2-kmp-ppc64-2_3.0.101_0.35-0.16.84 ocfs2-kmp-ppc64-1.6_3.0.101_0.35-0.20.78 - SUSE Linux Enterprise High Availability Extension 11 SP3 (i586): cluster-network-kmp-pae-1.4_3.0.101_0.35-2.27.78 gfs2-kmp-pae-2_3.0.101_0.35-0.16.84 ocfs2-kmp-pae-1.6_3.0.101_0.35-0.20.78 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 3.0.101]: kernel-default-3.0.101-0.35.1 kernel-default-base-3.0.101-0.35.1 kernel-default-devel-3.0.101-0.35.1 kernel-default-extra-3.0.101-0.35.1 kernel-source-3.0.101-0.35.1 kernel-syms-3.0.101-0.35.1 kernel-trace-devel-3.0.101-0.35.1 kernel-xen-3.0.101-0.35.1 kernel-xen-base-3.0.101-0.35.1 kernel-xen-devel-3.0.101-0.35.1 kernel-xen-extra-3.0.101-0.35.1 xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 - SUSE Linux Enterprise Desktop 11 SP3 (i586) [New Version: 3.0.101]: kernel-pae-3.0.101-0.35.1 kernel-pae-base-3.0.101-0.35.1 kernel-pae-devel-3.0.101-0.35.1 kernel-pae-extra-3.0.101-0.35.1 xen-kmp-pae-4.2.4_02_3.0.101_0.35-0.7.45 - SLE 11 SERVER Unsupported Extras (i586 ia64 ppc64 s390x x86_64): kernel-default-extra-3.0.101-0.35.1 - SLE 11 SERVER Unsupported Extras (i586 x86_64): kernel-xen-extra-3.0.101-0.35.1 - SLE 11 SERVER Unsupported Extras (ppc64): kernel-ppc64-extra-3.0.101-0.35.1 - SLE 11 SERVER Unsupported Extras (i586): kernel-pae-extra-3.0.101-0.35.1 References: http://support.novell.com/security/cve/CVE-2012-2372.html http://support.novell.com/security/cve/CVE-2013-2929.html http://support.novell.com/security/cve/CVE-2013-4299.html http://support.novell.com/security/cve/CVE-2013-4579.html http://support.novell.com/security/cve/CVE-2013-6382.html http://support.novell.com/security/cve/CVE-2013-7339.html http://support.novell.com/security/cve/CVE-2014-0055.html http://support.novell.com/security/cve/CVE-2014-0077.html http://support.novell.com/security/cve/CVE-2014-0101.html http://support.novell.com/security/cve/CVE-2014-0131.html http://support.novell.com/security/cve/CVE-2014-0155.html http://support.novell.com/security/cve/CVE-2014-1444.html http://support.novell.com/security/cve/CVE-2014-1445.html http://support.novell.com/security/cve/CVE-2014-1446.html http://support.novell.com/security/cve/CVE-2014-1874.html http://support.novell.com/security/cve/CVE-2014-2309.html http://support.novell.com/security/cve/CVE-2014-2523.html http://support.novell.com/security/cve/CVE-2014-2678.html http://support.novell.com/security/cve/CVE-2014-2851.html http://support.novell.com/security/cve/CVE-2014-3122.html http://support.novell.com/security/cve/CVE-2014-3144.html http://support.novell.com/security/cve/CVE-2014-3145.html http://support.novell.com/security/cve/CVE-2014-3917.html http://support.novell.com/security/cve/CVE-2014-4652.html http://support.novell.com/security/cve/CVE-2014-4653.html http://support.novell.com/security/cve/CVE-2014-4654.html http://support.novell.com/security/cve/CVE-2014-4655.html http://support.novell.com/security/cve/CVE-2014-4656.html http://support.novell.com/security/cve/CVE-2014-4699.html https://bugzilla.novell.com/767610 https://bugzilla.novell.com/786450 https://bugzilla.novell.com/792271 https://bugzilla.novell.com/821619 https://bugzilla.novell.com/832710 https://bugzilla.novell.com/837563 https://bugzilla.novell.com/840524 https://bugzilla.novell.com/846404 https://bugzilla.novell.com/846690 https://bugzilla.novell.com/847652 https://bugzilla.novell.com/850915 https://bugzilla.novell.com/851426 https://bugzilla.novell.com/851603 https://bugzilla.novell.com/852553 https://bugzilla.novell.com/855126 https://bugzilla.novell.com/857926 https://bugzilla.novell.com/858869 https://bugzilla.novell.com/858870 https://bugzilla.novell.com/858872 https://bugzilla.novell.com/859840 https://bugzilla.novell.com/861636 https://bugzilla.novell.com/861980 https://bugzilla.novell.com/862429 https://bugzilla.novell.com/862934 https://bugzilla.novell.com/863300 https://bugzilla.novell.com/863335 https://bugzilla.novell.com/863410 https://bugzilla.novell.com/863873 https://bugzilla.novell.com/864404 https://bugzilla.novell.com/864464 https://bugzilla.novell.com/865310 https://bugzilla.novell.com/865330 https://bugzilla.novell.com/865882 https://bugzilla.novell.com/866081 https://bugzilla.novell.com/866102 https://bugzilla.novell.com/866615 https://bugzilla.novell.com/866800 https://bugzilla.novell.com/866864 https://bugzilla.novell.com/867362 https://bugzilla.novell.com/867517 https://bugzilla.novell.com/867531 https://bugzilla.novell.com/867723 https://bugzilla.novell.com/867953 https://bugzilla.novell.com/868488 https://bugzilla.novell.com/868528 https://bugzilla.novell.com/868653 https://bugzilla.novell.com/868748 https://bugzilla.novell.com/869033 https://bugzilla.novell.com/869414 https://bugzilla.novell.com/869563 https://bugzilla.novell.com/869934 https://bugzilla.novell.com/870173 https://bugzilla.novell.com/870335 https://bugzilla.novell.com/870450 https://bugzilla.novell.com/870496 https://bugzilla.novell.com/870498 https://bugzilla.novell.com/870576 https://bugzilla.novell.com/870591 https://bugzilla.novell.com/870618 https://bugzilla.novell.com/870877 https://bugzilla.novell.com/870958 https://bugzilla.novell.com/871561 https://bugzilla.novell.com/871634 https://bugzilla.novell.com/871676 https://bugzilla.novell.com/871728 https://bugzilla.novell.com/871854 https://bugzilla.novell.com/871861 https://bugzilla.novell.com/871899 https://bugzilla.novell.com/872188 https://bugzilla.novell.com/872540 https://bugzilla.novell.com/872634 https://bugzilla.novell.com/873061 https://bugzilla.novell.com/873374 https://bugzilla.novell.com/873463 https://bugzilla.novell.com/874108 https://bugzilla.novell.com/874145 https://bugzilla.novell.com/874440 https://bugzilla.novell.com/874577 https://bugzilla.novell.com/875386 https://bugzilla.novell.com/876102 https://bugzilla.novell.com/876114 https://bugzilla.novell.com/876176 https://bugzilla.novell.com/876463 https://bugzilla.novell.com/877013 https://bugzilla.novell.com/877257 https://bugzilla.novell.com/877497 https://bugzilla.novell.com/877775 https://bugzilla.novell.com/878115 https://bugzilla.novell.com/878123 https://bugzilla.novell.com/878274 https://bugzilla.novell.com/878407 https://bugzilla.novell.com/878509 https://bugzilla.novell.com/879921 https://bugzilla.novell.com/879957 https://bugzilla.novell.com/880007 https://bugzilla.novell.com/880357 https://bugzilla.novell.com/880437 https://bugzilla.novell.com/880484 https://bugzilla.novell.com/881571 https://bugzilla.novell.com/881761 https://bugzilla.novell.com/881939 https://bugzilla.novell.com/882324 https://bugzilla.novell.com/883380 https://bugzilla.novell.com/883795 https://bugzilla.novell.com/885725 http://download.suse.com/patch/finder/?keywords=0d90047cc045e1a3930a1deab877... http://download.suse.com/patch/finder/?keywords=13c414107953b996e47ad9beead5... http://download.suse.com/patch/finder/?keywords=1b23cbf839dfbac64393f47b2544... http://download.suse.com/patch/finder/?keywords=1e1024c9ceb6dfbd02087a8e7fc3... http://download.suse.com/patch/finder/?keywords=1eb98ba9ebb1cc2e805aa760347c... http://download.suse.com/patch/finder/?keywords=25116cdba8b0bd66ec544a70ecf6... http://download.suse.com/patch/finder/?keywords=ac3c1f41b2fef1c20481c11cba39... http://download.suse.com/patch/finder/?keywords=c05c80da5f8738980eb4c3cf7b7e... http://download.suse.com/patch/finder/?keywords=fcdaebb0744ca50e161239dbb665... http://download.suse.com/patch/finder/?keywords=ff40c298b0b146e85c2548cf9972... -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org