[security-announce] SUSE-SU-2015:2350-1: important: Security update for the Linux Kernel
SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2015:2350-1 Rating: important References: #814440 #879378 #879381 #900610 #904348 #904965 #921081 #926709 #926774 #930145 #930770 #930788 #930835 #932805 #935053 #935123 #935757 #937256 #937444 #937969 #937970 #938706 #939207 #939826 #939926 #939955 #940017 #940913 #940946 #941202 #942938 #943786 #944677 #944831 #944837 #944989 #944993 #945691 #945825 #945827 #946078 #946214 #946309 #947957 #948330 #948347 #948521 #949100 #949298 #949502 #949706 #949744 #949936 #949981 #950298 #950750 #950998 #951440 #952084 #952384 #952579 #952976 #953527 #953799 #953980 #954404 #954628 #954950 #954984 #955354 #955673 #956709 Cross-References: CVE-2015-0272 CVE-2015-5157 CVE-2015-5307 CVE-2015-6937 CVE-2015-7509 CVE-2015-7799 CVE-2015-7872 CVE-2015-7990 CVE-2015-8104 CVE-2015-8215 Affected Products: SUSE Linux Enterprise Real Time Extension 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that solves 10 vulnerabilities and has 62 fixes is now available. Description: The SUSE Linux Enterprise 11 SP4 Realtime kernel was updated to receive various security and bugfixes. Following security bugs were fixed: - CVE-2015-7509: Mounting a prepared ext2 filesystem as ext4 could lead to a local denial of service (crash) (bsc#956709). - CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936). - CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404). - CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527). - CVE-2015-7990: RDS: Verify the underlying transport exists before creating a connection, preventing possible DoS (bsc#952384). - CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on the x86_64 platform mishandled IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI (bnc#937969 937970 938706 939207). - CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440). - CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel did not validate attempted changes to the MTU value, which allowed context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product. (bnc#955354). - CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#945825). The following non-security bugs were fixed: - af_xhci: avoid path quiesce of severed path in shutdown() (bnc#946214, LTC#131684). - ahci: Add Device ID for Intel Sunrise Point PCH (bsc#953799). - alsa: hda - Disable 64bit address for Creative HDA controllers (bnc#814440). - blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976). - blktap: refine mm tracking (bsc#952976). - cachefiles: Avoid deadlocks with fs freezing (bsc#935123). - dm: do not start current request if it would've merged with the previous (bsc#904348). - dm: impose configurable deadline for dm_request_fn's merge heuristic (bsc#904348). - dm-snap: avoid deadock on s->lock when a read is split (bsc#939826). - dm sysfs: introduce ability to add writable attributes (bsc#904348). - drivers: hv: do not do hypercalls when hypercall_page is NULL. - drivers: hv: kvp: move poll_channel() to hyperv_vmbus.h. - drivers: hv: util: move kvp/vss function declarations to hyperv_vmbus.h. - drivers: hv: vmbus: add special crash handler (bnc#930770). - drivers: hv: vmbus: add special kexec handler. - drivers: hv: vmbus: Get rid of some unused definitions. - drivers: hv: vmbus: Implement the protocol for tearing down vmbus state. - drivers: hv: vmbus: kill tasklets on module unload. - drivers: hv: vmbus: prefer "die" notification chain to 'panic'. - drivers: hv: vmbus: remove hv_synic_free_cpu() call from hv_synic_cleanup(). - drivers: hv: vmbus: unregister panic notifier on module unload. - driver: Vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750). - drm/i915: add hotplug activation period to hotplug update mask (bsc#953980). - drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938). - drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924). - fix lpfc_send_rscn_event allocation size claims bnc#935757 - fs: Avoid deadlocks of fsync_bdev() and fs freezing (bsc#935123). - fs: Fix deadlocks between sync and fs freezing (bsc#935123). - hugetlb: simplify migrate_huge_page() (bnc#947957, VM Functionality). - hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bnc#947957, VM Functionality). - IB/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965). - IB/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965). - Import SP4-RT GA kabi files - ipr: Fix incorrect trace indexing (bsc#940913). - ipr: Fix invalid array indexing for HRRQ (bsc#940913). - ipv6: fix tunnel error handling (bsc#952579). - ipvs: drop first packet to dead server (bsc#946078). - ipvs: Fix reuse connection if real server is dead (bnc#945827). - kernel: correct uc_sigmask of the compat signal frame (bnc#946214, LTC#130124). - kernel: fix incorrect use of DIAG44 in continue_trylock_relax() (bnc#946214, LTC#132100). - kexec: Fix race between panic() and crash_kexec() called directly (bnc#937444). - keys: Fix race between key destruction and finding a keyring by name (bsc#951440). - ktime: add ktime_after and ktime_before helpe (bsc#904348). - lib/string.c: introduce memchr_inv() (bnc#930788). - lpfc: Fix cq_id masking problem (bsc#944677). - macvlan: Support bonding events bsc#948521 - Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309). - memory-failure: do code refactor of soft_offline_page() (bnc#947957, VM Functionality). - memory-failure: fix an error of mce_bad_pages statistics (bnc#947957, VM Functionality). - memory-failure: use num_poisoned_pages instead of mce_bad_pages (bnc#947957, VM Functionality). - memory-hotplug: update mce_bad_pages when removing the memory (bnc#947957, VM Functionality). - mm: exclude reserved pages from dirtyable memory 32b fix (bnc#940017, bnc#949298). - mm: fix GFP_THISNODE callers and clarify (bsc#954950, VM Functionality). - mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bnc#947957, VM Functionality). - mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bnc#947957, VM Functionality). - mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bnc#947957, VM Functionality). - mm: remove GFP_THISNODE (bsc#954950, VM Functionality). - mm: sl[au]b: add knowledge of PFMEMALLOC reserve pages (Swap over NFS (fate#304949)). - Modified -rt patches: 343 of 434, noise elided. - net/core: Add VF link state control policy (bsc#950298). - netfilter: xt_recent: fix namespace destroy path (bsc#879378). - NFSv4: Fix two infinite loops in the mount code (bsc#954628). - panic/x86: Allow cpus to save registers even if they (bnc#940946). - panic/x86: Fix re-entrance problem due to panic on (bnc#937444). - pci: Add dev_flags bit to access VPD through function 0 (bnc#943786). - pci: Add VPD function 0 quirk for Intel Ethernet devices (bnc#943786). - pci: Clear NumVFs when disabling SR-IOV in sriov_init() (bnc#952084). - pci: delay configuration of SRIOV capability (bnc#952084). - pci: Refresh First VF Offset and VF Stride when updating NumVFs (bnc#952084). - pci: set pci sriov page size before reading SRIOV BAR (bnc#952084). - pci: Update NumVFs register when disabling SR-IOV (bnc#952084). - pktgen: clean up ktime_t helpers (bsc#904348). - qla2xxx: do not clear slot in outstanding cmd array (bsc#944993). - qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993). - qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993). - qla2xxx: Remove unavailable firmware files (bsc#921081). - qlge: Fix qlge_update_hw_vlan_features to handle if interface is down (bsc#930835). - quota: Fix deadlock with suspend and quotas (bsc#935123). - rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706). - Refresh patches.xen/1282-usbback-limit-copying.patch (bsc#941202). - rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145). - rtnetlink: Fix VF IFLA policy (bsc#950298). - rtnetlink: fix VF info size (bsc#950298). - s390/dasd: fix disconnected device with valid path mask (bnc#946214, LTC#132707). - s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#946214, LTC#132706). - s390/dasd: fix list_del corruption after lcu changes (bnc#954984, LTC#133077). - s390/pci: handle events for unused functions (bnc#946214, LTC#130628). - s390/pci: improve handling of hotplug event 0x301 (bnc#946214, LTC#130628). - s390/pci: improve state check when processing hotplug events (bnc#946214, LTC#130628). - sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100). - scsi: hosts: update to use ida_simple for host_no (bsc#939926) - sg: fix read() error reporting (bsc#926774). - sunrpc: refactor rpcauth_checkverf error returns (bsc#955673). - Update patches.fixes/fanotify-fix-deadlock-during-thread-exit.patch (bsc#935053, bsc#926709). Add bug reference. - usbback: correct copy length for partial transfers (bsc#941202). - usbvision fix overflow of interfaces array (bnc#950998). - usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bnc#944989). - veth: extend device features (bsc#879381). - vfs: Provide function to get superblock and wait for it to thaw (bsc#935123). - vmxnet3: adjust ring sizes when interface is down (bsc#950750). - vmxnet3: fix ethtool ring buffer size setting (bsc#950750). - writeback: Skip writeback for frozen filesystem (bsc#935123). - x86/evtchn: make use of PHYSDEVOP_map_pirq. - x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330). - x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330). - x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (fate#317533, bnc#937256). - xen: x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (fate#317533, bnc#937256). - xfs: add background scanning to clear eofblocks inodes (bnc#930788). - xfs: add EOFBLOCKS inode tagging/untagging (bnc#930788). - xfs: add inode id filtering to eofblocks scan (bnc#930788). - xfs: add minimum file size filtering to eofblocks scan (bnc#930788). - xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bnc#930788). - xfs: create function to scan and clear EOFBLOCKS inodes (bnc#930788). - xfs: create helper to check whether to free eofblocks on inode (bnc#930788). - xfs: Fix lost direct IO write in the last block (bsc#949744). - xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347). - xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805). - xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bnc#930788). - xfs: support a tag-based inode_ag_iterator (bnc#930788). - xfs: support multiple inode id filtering in eofblocks scan (bnc#930788). - xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805). - xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805). - xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805). - xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805). - xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#949981). - xhci: Calculate old endpoints correctly on device reset (bnc#944831). - xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949502). - xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bnc#944837). - xhci: For streams the css flag most be read from the stream-ctx on ep stop (bnc#945691). - xhci: silence TD warning (bnc#939955). - xhci: use uninterruptible sleep for waiting for internal operations (bnc#939955). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Real Time Extension 11-SP4: zypper in -t patch slertesp4-kernel-rt-20151204-12284=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-kernel-rt-20151204-12284=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Real Time Extension 11-SP4 (x86_64): kernel-rt-3.0.101.rt130-48.1 kernel-rt-base-3.0.101.rt130-48.1 kernel-rt-devel-3.0.101.rt130-48.1 kernel-rt_trace-3.0.101.rt130-48.1 kernel-rt_trace-base-3.0.101.rt130-48.1 kernel-rt_trace-devel-3.0.101.rt130-48.1 kernel-source-rt-3.0.101.rt130-48.1 kernel-syms-rt-3.0.101.rt130-48.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (x86_64): kernel-rt-debuginfo-3.0.101.rt130-48.1 kernel-rt-debugsource-3.0.101.rt130-48.1 kernel-rt_debug-debuginfo-3.0.101.rt130-48.1 kernel-rt_debug-debugsource-3.0.101.rt130-48.1 kernel-rt_trace-debuginfo-3.0.101.rt130-48.1 kernel-rt_trace-debugsource-3.0.101.rt130-48.1 References: https://www.suse.com/security/cve/CVE-2015-0272.html https://www.suse.com/security/cve/CVE-2015-5157.html https://www.suse.com/security/cve/CVE-2015-5307.html https://www.suse.com/security/cve/CVE-2015-6937.html https://www.suse.com/security/cve/CVE-2015-7509.html https://www.suse.com/security/cve/CVE-2015-7799.html https://www.suse.com/security/cve/CVE-2015-7872.html https://www.suse.com/security/cve/CVE-2015-7990.html https://www.suse.com/security/cve/CVE-2015-8104.html https://www.suse.com/security/cve/CVE-2015-8215.html https://bugzilla.suse.com/814440 https://bugzilla.suse.com/879378 https://bugzilla.suse.com/879381 https://bugzilla.suse.com/900610 https://bugzilla.suse.com/904348 https://bugzilla.suse.com/904965 https://bugzilla.suse.com/921081 https://bugzilla.suse.com/926709 https://bugzilla.suse.com/926774 https://bugzilla.suse.com/930145 https://bugzilla.suse.com/930770 https://bugzilla.suse.com/930788 https://bugzilla.suse.com/930835 https://bugzilla.suse.com/932805 https://bugzilla.suse.com/935053 https://bugzilla.suse.com/935123 https://bugzilla.suse.com/935757 https://bugzilla.suse.com/937256 https://bugzilla.suse.com/937444 https://bugzilla.suse.com/937969 https://bugzilla.suse.com/937970 https://bugzilla.suse.com/938706 https://bugzilla.suse.com/939207 https://bugzilla.suse.com/939826 https://bugzilla.suse.com/939926 https://bugzilla.suse.com/939955 https://bugzilla.suse.com/940017 https://bugzilla.suse.com/940913 https://bugzilla.suse.com/940946 https://bugzilla.suse.com/941202 https://bugzilla.suse.com/942938 https://bugzilla.suse.com/943786 https://bugzilla.suse.com/944677 https://bugzilla.suse.com/944831 https://bugzilla.suse.com/944837 https://bugzilla.suse.com/944989 https://bugzilla.suse.com/944993 https://bugzilla.suse.com/945691 https://bugzilla.suse.com/945825 https://bugzilla.suse.com/945827 https://bugzilla.suse.com/946078 https://bugzilla.suse.com/946214 https://bugzilla.suse.com/946309 https://bugzilla.suse.com/947957 https://bugzilla.suse.com/948330 https://bugzilla.suse.com/948347 https://bugzilla.suse.com/948521 https://bugzilla.suse.com/949100 https://bugzilla.suse.com/949298 https://bugzilla.suse.com/949502 https://bugzilla.suse.com/949706 https://bugzilla.suse.com/949744 https://bugzilla.suse.com/949936 https://bugzilla.suse.com/949981 https://bugzilla.suse.com/950298 https://bugzilla.suse.com/950750 https://bugzilla.suse.com/950998 https://bugzilla.suse.com/951440 https://bugzilla.suse.com/952084 https://bugzilla.suse.com/952384 https://bugzilla.suse.com/952579 https://bugzilla.suse.com/952976 https://bugzilla.suse.com/953527 https://bugzilla.suse.com/953799 https://bugzilla.suse.com/953980 https://bugzilla.suse.com/954404 https://bugzilla.suse.com/954628 https://bugzilla.suse.com/954950 https://bugzilla.suse.com/954984 https://bugzilla.suse.com/955354 https://bugzilla.suse.com/955673 https://bugzilla.suse.com/956709 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
participants (1)
-
opensuse-security@opensuse.org