[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2016:0911-1 -- SLES kernel

ID: oval:org.secpod.oval:def:89045367Date: (C)2021-08-03   (M)2024-04-17
Class: PATCHFamily: unix




The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes. Following feature was added to kernel-xen: - A improved XEN blkfront module was added, which allows more I/O bandwidth. It is called xen-blkfront in PV, and xen-vbd-upstream in HVM mode. The following security bugs were fixed: - CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service via crafted epoll_ctl calls . - CVE-2015-7515: An out of bounds memory access in the aiptek USB driver could be used by physical local attackers to crash the kernel . - CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel did not properly use a semaphore, which allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls . - CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c . - CVE-2015-8543: The networking implementation in the Linux kernel did not validate protocol identifiers for certain protocol families, which allowed local users to cause a denial of service or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application . - CVE-2015-8550: Compiler optimizations in the XEN PV backend drivers could have lead to double fetch vulnerabilities, causing denial of service or arbitrary code execution . - CVE-2015-8551, CVE-2015-8552: xen/pciback: For XEN_PCI_OP_disable_msi[|x] only disable if device has MSI enabled . - CVE-2015-8569: The pptp_bind and pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application . - CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application . - CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not properly manage the relationship between a lock and a socket, which allowed local users to cause a denial of service via a crafted sctp_accept call . - CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel allowed local users to cause a denial of service via a writev system call that triggers a zero length for the first segment of an iov . - CVE-2015-8812: A use-after-free flaw was found in the CXGB3 kernel driver when the network was considered to be congested. This could be used by local attackers to cause machine crashes or potentially code execution . - CVE-2016-0723: Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call . - CVE-2016-2069: Race conditions in TLB syncing was fixed which could leak to information leaks . - CVE-2016-2384: Removed a double free in the ALSA usb-audio driver in the umidi object which could lead to crashes . - CVE-2016-2543: Added a missing NULL check at remove_events ioctl in ALSA that could lead to crashes. - CVE-2016-2544, CVE-2016-2545, CVE-2016-2546, CVE-2016-2547, CVE-2016-2548, CVE-2016-2549: Various race conditions in ALSAs timer handling were fixed. The following non-security bugs were fixed: - alsa: hda - Add one more node in the EAPD supporting candidate list . - alsa: hda - Apply clock gate workaround to Skylake, too . - alsa: hda - Fix playback noise with 24/32 bit sample size on BXT . - alsa: hda - disable dynamic clock gating on Broxton before reset . - Add /etc/modprobe.d/50-xen.conf selecting Xen frontend driver implementation . - Fix handling of re-write-before-commit for mmapped NFS pages . - nfsv4: Recovery of recalled read delegations is broken . - nvme: default to 4k device page size . - pci: leave MEM and IO decoding disabled during 64-bit BAR sizing, too . - Refresh patches.xen/xen3-08-x86-ldt-make-modify_ldt-synchronous.patch . - Refresh patches.xen/xen-vscsi-large-requests . - sunrpc: restore fair scheduling to priority queues . - usb: ftdi_sio: fix race condition in TIOCMIWAIT, and abort of TIOCMIWAIT when the device is removed . - usb: ftdi_sio: fix status line change handling for TIOCMIWAIT and TIOCGICOUNT . - usb: ftdi_sio: fix tiocmget and tiocmset return values . - usb: ftdi_sio: fix tiocmget indentation . - usb: ftdi_sio: optimise chars_in_buffer . - usb: ftdi_sio: refactor modem-control status retrieval . - usb: ftdi_sio: remove unnecessary memset . - usb: ftdi_sio: use ftdi_get_modem_status in chars_in_buffer . - usb: ftdi_sio: use generic chars_in_buffer . - usb: pl2303: clean up line-status handling . - usb: pl2303: only wake up MSR queue on changes . - usb: pl2303: remove bogus delta_msr_wait wake up . - usb: serial: export usb_serial_generic_chars_in_buffer . - Update patches.fixes/mm-exclude-reserved-pages-from-dirtyable-memory-fix.patch . - xen: Update Xen config files . - ec2: Update kabi files and start tracking ec2 - xen: consolidate and simplify struct xenbus_driver instantiation . - blktap: also call blkif_disconnect when frontend switched to closed . - blktap: refine mm tracking . - block: Always check queue limits for cloned requests . - block: xen-blkfront: Fix possible NULL ptr dereference . - bnx2x: Add new device ids under the Qlogic vendor . - bnx2x: Alloc 4k fragment for each rx ring buffer element . - bnx2x: fix DMA API usage . - driver core: Add BUS_NOTIFY_REMOVED_DEVICE event . - driver: xen-blkfront: move talk_to_blkback to a more suitable place . - drivers: xen-blkfront: only talk_to_blkback when in XenbusStateInitialising . - drm/i915: Change semantics of hw_contexts_disabled . - drm/i915: Evict CS TLBs between batches . - drm/i915: Fix SRC_COPY width on 830/845g . - e1000e: Do not read ICR in Other interrupt . - e1000e: Do not write lsc to ics in msi-x mode . - e1000e: Fix msi-x interrupt automask . - e1000e: Remove unreachable code . - ext3: NULL dereference in ext3_evict_inode . - ext3: fix data=journal fast mount/umount hang . - firmware: Create directories for external firmware . - firmware: Simplify directory creation . - ftdi_sio: private backport of TIOCMIWAIT . - iommu/vt-d: Do not change dma domain on dma-mask change . - jbd: Fix unreclaimed pages after truncate in data=journal mode . - kabi/severities: Add exception for bnx2x_schedule_sp_rtnl There is no external, 3rd party modules use the symbol and the bnx2x_schedule_sp_rtnl symbol is only used in the bnx2x driver. - kbuild: create directory for dir/file.o . - llist/xen-blkfront: implement safe version of llist_for_each_entry . - lpfc: Fix null ndlp dereference in target_reset_handler . - mm-memcg-print-statistics-from-live-counters-fix . - nvme: Clear BIO_SEG_VALID flag in nvme_bio_split . - pci: Update VPD size with correct length . - pl2303: fix TIOCMIWAIT . - pl2303: introduce private disconnect method . - qeth: initialize net_device with carrier off . - s390/cio: collect format 1 channel-path description data . - s390/cio: ensure consistent measurement state . - s390/cio: fix measurement characteristics memleak . - s390/cio: update measurement characteristics . - s390/dasd: fix failfast for disconnected devices . - s390/sclp: Determine HSA size dynamically for zfcpdump . - s390/sclp: Move declarations for sclp_sdias into separate header file . - scsi_dh_rdac: always retry MODE SELECT on command lock violation . - supported.conf: Add xen-blkfront. - tg3: 5715 does not link up when autoneg off . - usb: serial: ftdi_sio: Add missing chars_in_buffer function . - vmxnet3: fix building without CONFIG_PCI_MSI . - vmxnet3: fix netpoll race condition . - xen, blkfront: factor out flush-related checks from do_blkif_request . - xen-blkfront: Handle discard requests . - xen-blkfront: If no barrier or flush is supported, use invalid operation . - xen-blkfront: Introduce a "max" module parameter to alter the amount of indirect segments . - xen-blkfront: Silence pfn maybe-uninitialized warning . - xen-blkfront: allow building in our Xen environment . - xen-blkfront: check for null drvdata in blkback_changed . - xen-blkfront: do not add indirect pages to list when !feature_persistent . - xen-blkfront: drop the use of llist_for_each_entry_safe . - xen-blkfront: fix a deadlock while handling discard response . - xen-blkfront: fix accounting of reqs when migrating . - xen-blkfront: free allocated page . - xen-blkfront: handle backend CLOSED without CLOSING . - xen-blkfront: handle bvecs with partial data . - xen-blkfront: improve aproximation of required grants per request . - xen-blkfront: make blkif_io_lock spinlock per-device . - xen-blkfront: plug device number leak in xlblk_init error path . - xen-blkfront: pre-allocate pages for requests . - xen-blkfront: remove frame list from blk_shadow . - xen-blkfront: remove type check from blkfront_setup_discard . - xen-blkfront: restore the non-persistent data path . - xen-blkfront: revoke foreign access for grants not mapped by the backend . - xen-blkfront: set blk_queue_max_hw_sectors correctly . - xen-blkfront: switch from llist to list . - xen-blkfront: use a different scatterlist for each request . - xen-block: implement indirect descriptors . - xen/blk[front|back]: Enhance discard support with secure erasing support . - xen/blk[front|back]: Squash blkif_request_rw and blkif_request_discard together . - xen/blkback: Persistent grant maps for xen blk drivers . - xen/blkback: persistent-grants fixes . - xen/blkfront: Fix crash if backend does not follow the right states . - xen/blkfront: do not put bdev right after getting it . - xen/blkfront: improve protection against issuing unsupported REQ_FUA . - xen/blkfront: remove redundant flush_op . - xen/panic/x86: Allow cpus to save registers even if they . - xen/panic/x86: Fix re-entrance problem due to panic on . - xen/pvhvm: If xen_platform_pci=0 is set do not blow up . - xen/x86/mm: Add barriers and document switch_mm-vs-flush synchronization . - xen: x86: mm: drop TLB flush from ptep_set_access_flags . - xen: x86: mm: only do a local tlb flush in ptep_set_access_flags . - xfs: Skip dirty pages in -releasepage . - zfcp: fix fc_host port_type with NPIV .

Platform:
SUSE Linux Enterprise Server 11 SP4
Product:
kernel
Reference:
SUSE-SU-2016:0911-1
CVE-2013-7446
CVE-2015-7515
CVE-2015-7550
CVE-2015-8539
CVE-2015-8543
CVE-2015-8550
CVE-2015-8551
CVE-2015-8552
CVE-2015-8569
CVE-2015-8575
CVE-2015-8767
CVE-2015-8785
CVE-2015-8812
CVE-2016-0723
CVE-2016-2069
CVE-2016-2384
CVE-2016-2543
CVE-2016-2544
CVE-2016-2545
CVE-2016-2546
CVE-2016-2547
CVE-2016-2548
CVE-2016-2549
CVE    23
CVE-2016-0723
CVE-2016-2384
CVE-2016-2546
CVE-2016-2547
...
CPE    2
cpe:/o:suse:suse_linux_enterprise_server:11:sp4
cpe:/o:linux:linux_kernel

© SecPod Technologies