-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.0693
          SUSE Security Update: Security update for Linux kernel
                                15 May 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          kernel
Publisher:        SUSE
Operating System: SUSE
Impact/Access:    Root Compromise          -- Existing Account            
                  Denial of Service        -- Existing Account            
                  Access Confidential Data -- Remote with User Interaction
                  Reduced Security         -- Existing Account            
Resolution:       Patch/Upgrade
CVE Names:        CVE-2013-2635 CVE-2013-2634 CVE-2013-1860
                  CVE-2013-1848 CVE-2013-1798 CVE-2013-1797
                  CVE-2013-1796 CVE-2013-1792 CVE-2013-1774
                  CVE-2013-1772 CVE-2013-1767 CVE-2013-0914
                  CVE-2013-0913 CVE-2013-0871 CVE-2013-0349
                  CVE-2013-0311 CVE-2013-0268 CVE-2013-0231
                  CVE-2013-0216 CVE-2013-0160 CVE-2012-6549
                  CVE-2012-6548 CVE-2012-5517 CVE-2012-4461
                  CVE-2012-2137 CVE-2012-2119 CVE-2012-1601
                  CVE-2011-4622 CVE-2011-4604 CVE-2011-4131
                  CVE-2010-3873  

Reference:        ESB-2013.0691
                  ESB-2013.0645
                  ESB-2013.0573
                  ESB-2013.0572
                  ESB-2013.0539
                  ESB-2013.0538

- --------------------------BEGIN INCLUDED TEXT--------------------

   SUSE Security Update: Security update for Linux kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:0786-1
Rating:             important
References:         #578046 #651219 #709266 #709269 #714604 #722398 
                    #730117 #736149 #738210 #744692 #753371 #754583 
                    #754898 #758040 #758243 #761849 #762424 #763494 
                    #767612 #768052 #768470 #773577 #777616 #777746 
                    #779577 #780977 #786150 #786814 #786900 #787821 
                    #788826 #789235 #789311 #789359 #792674 #792793 
                    #793139 #794513 #794529 #794805 #795269 #795957 
                    #795961 #796412 #796418 #797042 #797175 #798921 
                    #799197 #799209 #799270 #799578 #799926 #800280 
                    #800701 #801038 #801178 #801713 #801717 #801720 
                    #801782 #802153 #802353 #802445 #802712 #803056 
                    #803067 #803394 #803674 #803712 #804154 #804220 
                    #804609 #805823 #806138 #806273 #806395 #806404 
                    #806431 #806466 #806469 #806492 #806631 #806825 
                    #806847 #806908 #806976 #806980 #807431 #807517 
                    #807560 #807853 #808166 #808307 #808829 #808966 
                    #808991 #809155 #809166 #809375 #809493 #809748 
                    #812281 #812315 #813963 #816443 #89359 
Cross-References:   CVE-2010-3873 CVE-2011-4131 CVE-2011-4604
                    CVE-2011-4622 CVE-2012-1601 CVE-2012-2119
                    CVE-2012-2137 CVE-2012-4461 CVE-2012-5517
                    CVE-2013-0160 CVE-2013-0216 CVE-2013-0231
                    CVE-2013-0871 CVE-2013-0913 CVE-2013-1767
                    CVE-2013-1774 CVE-2013-1796 CVE-2013-1797
                    CVE-2013-1798 CVE-2013-1848
Affected Products:
                    SUSE Linux Enterprise Real Time 11 SP2
______________________________________________________________________________

   An update that solves 20 vulnerabilities and has 87 fixes
   is now available. It includes one version update.

Description:


   The SUSE Linux Enterprise Server 11 SP2 Realtime kernel has
   been updated to  3.0.74 fixing various bugs and security
   issues.

   This update brings some features:

   * Updated HD-audio drivers for Nvidia/AMD HDMI and
   Haswell audio (FATE#314311 FATE#313695)
   * Lustre enablement patches were added (FATE#314679).
   * SGI UV (Ultraviolet) platform support. (FATE#306952)

   Security issues fixed in this update:

   * CVE-2013-0349: The hidp_setup_hid function in
   net/bluetooth/hidp/core.c in the Linux kernel did not
   properly copy a certain name field, which allowed local
   users to obtain sensitive information from kernel memory by
   setting a long name and making an HIDPCONNADD ioctl call.
   * CVE-2012-2137: Buffer overflow in virt/kvm/irq_comm.c
   in the KVM subsystem in the Linux kernel allowed local
   users to cause a denial of service (crash) and to possibly
   execute arbitrary code via vectors related to Message
   Signaled Interrupts (MSI), irq routing entries, and an
   incorrect check by the setup_routing_entry function before
   invoking the kvm_set_irq function.
   * CVE-2012-6549: The isofs_export_encode_fh function in
   fs/isofs/export.c in the Linux kernel did not initialize a
   certain structure member, which allowed local users to
   obtain sensitive information from kernel heap memory via a
   crafted application.
   * CVE-2012-6548: The udf_encode_fh function in
   fs/udf/namei.c in the Linux kernel did not initialize a
   certain structure member, which allowed local users to
   obtain sensitive information from kernel heap memory via a
   crafted application.
   * CVE-2013-0160: Timing side channel on attacks were
   possible on /dev/ptmx that could allow local attackers to
   predict keypresses like e.g. passwords. This has been fixed
   by not updating accessed/modified time on the pty devices.
   Note that this might break pty idle detection, so it might
   get reverted again.
   * CVE-2013-0216: The Xen netback functionality in the
   Linux kernel allowed guest OS users to cause a denial of
   service (loop) by triggering ring pointer corruption.
   * CVE-2013-0231: The pciback_enable_msi function in the
   PCI backend driver
   (drivers/xen/pciback/conf_space_capability_msi.c) in Xen
   for the Linux allowed guest OS users with PCI device access
   to cause a denial of service via a large number of kernel
   log messages.
   * CVE-2013-0311: The translate_desc function in
   drivers/vhost/vhost.c in the Linux kernel did not properly
   handle cross-region descriptors, which allowed guest OS
   users to obtain host OS privileges by leveraging KVM guest
   OS privileges.
   * CVE-2013-0913: Integer overflow in
   drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915
   driver in the Direct Rendering Manager (DRM) subsystem in
   the Linux kernel allowed local users to cause a denial of
   service (heap-based buffer overflow) or possibly have
   unspecified other impact via a crafted application that
   triggers many relocation copies, and potentially leads to a
   race condition.
   * CVE-2013-0914: The flush_signal_handlers function in
   kernel/signal.c in the Linux kernel preserved the value of
   the sa_restorer field across an exec operation, which makes
   it easier for local users to bypass the ASLR protection
   mechanism via a crafted application containing a sigaction
   system call.
   * CVE-2013-1767: Use-after-free vulnerability in the
   shmem_remount_fs function in mm/shmem.c in the Linux kernel
   allowed local users to gain privileges or to cause a denial
   of service (system crash) by remounting a tmpfs filesystem
   without specifying a required mpol (aka mempolicy) mount
   option.
   * CVE-2013-1772: The log_prefix function in
   kernel/printk.c in the Linux kernel 3.x did not properly
   remove a prefix string from a syslog header, which allowed
   local users to cause a denial of service (buffer overflow
   and system crash) by leveraging /dev/kmsg write access and
   triggering a call_console_drivers function call.
   * CVE-2013-1774: The chase_port function in
   drivers/usb/serial/io_ti.c in the Linux kernel allowed
   local users to cause a denial of service (NULL pointer
   dereference and system crash) via an attempted /dev/ttyUSB
   read or write operation on a disconnected Edgeport USB
   serial converter.
   * CVE-2013-1792: Race condition in the
   install_user_keyrings function in
   security/keys/process_keys.c in the Linux kernel allowed
   local users to cause a denial of service (NULL pointer
   dereference and system crash) via crafted keyctl system
   calls that trigger keyring operations in simultaneous
   threads.
   * CVE-2013-1796: The kvm_set_msr_common function in
   arch/x86/kvm/x86.c in the Linux kernel did not ensure a
   required time_page alignment during an MSR_KVM_SYSTEM_TIME
   operation, which allowed guest OS users to cause a denial
   of service (buffer overflow and host OS memory corruption)
   or possibly have unspecified other impact via a crafted
   application.
   * CVE-2013-1797: Use-after-free vulnerability in
   arch/x86/kvm/x86.c in the Linux kernel allowed guest OS
   users to cause a denial of service (host OS memory
   corruption) or possibly have unspecified other impact via a
   crafted application that triggers use of a guest physical
   address (GPA) in (1) movable or (2) removable memory during
   an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation.
   * CVE-2013-1798: The ioapic_read_indirect function in
   virt/kvm/ioapic.c in the Linux kernel did not properly
   handle a certain combination of invalid IOAPIC_REG_SELECT
   and IOAPIC_REG_WINDOW operations, which allows guest OS
   users to obtain sensitive information from host OS memory
   or cause a denial of service (host OS OOPS) via a crafted
   application.
   * CVE-2013-1848: fs/ext3/super.c in the Linux kernel
   used incorrect arguments to functions in certain
   circumstances related to printk input, which allowed local
   users to conduct format-string attacks and possibly gain
   privileges via a crafted application.
   * CVE-2013-1860: Heap-based buffer overflow in the
   wdm_in_callback function in drivers/usb/class/cdc-wdm.c in
   the Linux kernel allowed physically proximate attackers to
   cause a denial of service (system crash) or to possibly
   execute arbitrary code via a crafted cdc-wdm USB device.
   * CVE-2013-2634: net/dcb/dcbnl.c in the Linux kernel
   did not initialize certain structures, which allowed local
   users to obtain sensitive information from kernel stack
   memory via a crafted application.
   * CVE-2013-2635: The rtnl_fill_ifinfo function in
   net/core/rtnetlink.c in the Linux kernel did not initialize
   a certain structure member, which allowed local users to
   obtain sensitive information from kernel stack memory via a
   crafted application.
   * CVE-2013-0268: The msr_open function in
   arch/x86/kernel/msr.c in the Linux kernel allowed local
   users to bypass intended capability restrictions by
   executing a crafted application as root, as demonstrated by
   msr32.c.

   Bugs fixed in this update:

   BTRFS:

   * btrfs: do not try to notify udev about missing
   devices.
   * btrfs: add cancellation points to defrag.
   * btrfs: define BTRFS_MAGIC as a u64 value.
   * btrfs: make sure NODATACOW also gets NODATASUM set.
   * btrfs: enforce min_bytes parameter during extent
   allocation.
   * btrfs: build up error handling for merge_reloc_roots.
   * btrfs: free all recorded tree blocks on error .
   * btrfs: do not BUG_ON in prepare_to_reloc .
   * btrfs: do not BUG_ON on aborted situation .
   * btrfs: handle a bogus chunk tree nicely .
   * btrfs: do not drop path when printing out tree errors
   in scrub .
   * btrfs: make subvol creation/deletion killable in the
   early stages.
   * btrfs: abort unlink trans in missed error case.
   * btrfs: fix reada debug code compilation.
   * btrfs: return error when we specify wrong start to
   defrag.
   * btrfs: do not force pages under writeback to finish
   when aborting.

   USB:

   * USB: move usb_translate_errors to 1/usb (bnc#806908).
   * USB: add EOPNOTSUPP to usb_translate_errors
   (bnc#806908).
   * USB: cdc-wdm: sanitize error returns (bnc#806908).
   * USB: cdc-wdm: cleanup error codes (bnc#806908).
   * USB: cdc-wdm: add helper to preserve kABI
   (bnc#806908).
   * USB: Do not use EHCI port sempahore for USB 3.0 hubs
   (bnc#807560).
   * USB: Prepare for refactoring by adding extra udev
   checks (bnc#807560).
   * USB: Rip out recursive call on warm port reset
   (bnc#807560).
   * USB: Fix connected device switch to Inactive state
   (bnc#807560).
   * USB: modify hub to detect unplugs in all states
   (bnc#807560).
   * USB: io_ti: Fix NULL dereference in chase_port()
   (bnc#806976, CVE-2013-1774).
   * USB: cdc-wdm: fix buffer overflow (bnc#806431).
   * USB: cdc-wdm: cannot use dev_printk when device is
   gone (bnc#806469).
   * USB: cdc-wdm: fix memory leak (bnc#806466).
   * elousb: really long delays for broken devices
   (bnc#795269).
   * xhci: Fix conditional check in bandwidth calculation
   (bnc#795961).
   * xHCI: Fix TD Size calculation on 1.0 hosts
   (bnc#795957).
   * xhci: avoid dead ports, add roothub port polling
   (bnc#799197).
   * USB: Handle warm reset failure on empty port
   (bnc#799926).
   * USB: Ignore port state until reset completes
   (bnc#799926).
   * Allow USB 3.0 ports to be disabled (bnc#799926).
   * USB: Ignore xHCI Reset Device status (bnc#799926).
   * USB: Handle auto-transition from hot to warm reset
   (bnc#799926).

   S/390:

   * ipl: Implement diag308 loop for zfcpdump (bnc#801720,
   LTC#88197).
   * zcore: Add hsa file (bnc#801720, LTC#88198).
   * kernel: support physical memory > 4TB (bnc#801720,
   LTC#88787).
   * mm: Fix crst upgrade of mmap with MAP_FIXED
   (bnc#801720, LTC#88797).
   * Update patches.suse/zcrypt-feed-hwrandom
   (bnc#806825). Allow zcrypt module unload even when the
   thread is blocked writing to a full random pool.
   * dca: check against empty dca_domains list before
   unregister provider fix.
   * s390/kvm: Fix store status for ACRS/FPRS fix.
   * series.conf: disabled
   patches.arch/s390-64-03-kernel-inc-phys-mem.patch due to
   excessive kabi break. (bnc#801720)

   ALSA:

   *
   patches.drivers/alsa-sp3-pre-695-Yet-another-fix-for-broken-
   HSW-HDMI-pin: Refresh. Fix the invalid PCI SSID check
   (bnc#806404)
   * ALSA: hda - Support mute LED on HP AiO buttons
   (bnc#808991).
   * ALSA: hda: Allow multple SPDIF controls per codec
   (bnc#780977).
   * ALSA: hda: Virtualize SPDIF out controls (bnc#780977).
   * ALSA: hda: Separate generic and non-generic
   implementations.
   * ALSA: hda: hdmi_eld_update_pcm_info: update a stream
   in place.
   * ALSA: hda: HDMI: Support codecs with fewer cvts than
   pins.
   * ALSA: hda - Add snd_hda_get_conn_list() helper
   function.
   * ALSA: hda - Add snd_hda_override_conn_list() helper
   function.
   * ALSA: hda - Increase the max number of coverters/pins
   in patch_hdmi.c (bnc#780977).
   * ALSA: hda - Check non-snoop in a single place
   (bnc#801713).
   * ALSA: HDA: Use LPIB Position fix for Intel SCH
   Poulsbo (bnc#801713).
   * ALSA: hda_intel: Add Oaktrail identifiers
   (bnc#801713).
   * ALSA: HDA: Use LPIB position fix for Oaktrail
   (bnc#801713).
   * ALSA: hda - add id for Atom Cedar Trail HDMI codec
   (bnc#801713).
   * ALSA: hda - Fix detection of Creative SoundCore3D
   controllers (bnc#762424).
   * ALSA: hda - add power states information in proc
   (bnc#801713).
   * ALSA: hda - Show D3cold state in proc files
   (bnc#801713).
   * ALSA: hda - check supported power states (bnc#801713).
   * ALSA: hda - reduce msleep time if EPSS power states
   supported (bnc#801713).
   * ALSA: hda - check proper return value (bnc#801713).
   * ALSA: hda - power setting error check (bnc#801713).
   * ALSA: hda - Add DeviceID for Haswell HDA (bnc#801713).
   * ALSA: hda - add Haswell HDMI codec id (bnc#801713).
   * ALSA: hda - Fix driver type of Haswell controller to
   AZX_DRIVER_SCH.
   * ALSA: hda - Add new GPU codec ID to snd-hda
   (bnc#780977).
   * ALSA: HDMI - Fix channel_allocation array wrong order
   (bnc#801713).
   * ALSA: hda - Avoid BDL position workaround when
   no_period_wakeup is set (bnc#801713).
   * ALSA: hda - Allow to pass position_fix=0 explicitly
   (bnc#801713).
   * ALSA: hda - Add another pci id for Haswell board.
   * ALSA: hda - force use of SSYNC bits (bnc#801713).
   * ALSA: hda - use LPIB for delay estimation
   (bnc#801713).
   * ALSA: hda - add PCI identifier for Intel 5
   Series/3400 (bnc#801713).
   * ALSA: hda - Add workaround for conflicting IEC958
   controls (FATE#314311).
   * ALSA: hda - Stop LPIB delay counting on broken
   hardware (FATE#313695).
   * ALSA: hda - Always turn on pins for HDMI/DP
   (FATE#313695).
   * ALSA: hda - bug fix for invalid connection list of
   Haswell HDMI codec pins (FATE#313695).
   * ALSA - HDA: New PCI ID for Haswell ULT (bnc#801713).
   * ALSA: hda - Release assigned pin/cvt at error path of
   hdmi_pcm_open() (bnc#801713).
   * ALSA: hda - Support rereading widgets under the
   function group (bnc#801713).
   * ALSA: hda - Add fixup for Haswell to enable all pin
   and convertor widgets (bnc#801713).
   * ALSA: hda - Yet another fix for broken HSW HDMI pin
   connections (bnc#801713).
   * patches.kabi/alsa-spdif-update-kabi-fixes: Fix kABI
   breakage due to HD-audio HDMI updates (bnc#780977).
   * ALSA: hda - Fix non-snoop page handling (bnc#800701).
   * ALSA: hda - Apply mic-mute LED fixup for new HP
   laptops (bnc#796418).
   *
   patches.drivers/alsa-sp3-pre-695-Yet-another-fix-for-broken-
   HSW-HDMI-pin: Refresh. Fix a superfluous incremental
   leading to the double array size (bnc#808966)

   XEN:

   * pciback: notify hypervisor about devices intended to
   be assigned to guests.
   * patches.xen/xen-clockevents: Update (bnc#803712).
   * patches.xen/xen-ipi-per-cpu-irq: Update (bnc#803712).
   * patches.xen/xen3-patch-2.6.19: Update (bnc#809166).
   * Update Xen patches to 3.0.68.
   * Update Xen patches to 3.0.63.
   * netback: fix netbk_count_requests().
   * x86/mm: Check if PUD is large when validating a
   kerneladdress (bnc#794805).

   OTHER:

   * Revert dmi_scan: fix missing check for _DMI_
   signature in smbios_present().
   * Revert drivers/firmware/dmi_scan.c: fetch dmi version
   from SMBIOS if it exists.
   * Revert drivers/firmware/dmi_scan.c: check dmi version
   when get system uuid.
   * sysfs: Revert sysfs: fix race between readdir and
   lseek (bnc#816443).
   * 8021q: Revert 8021q: fix a potential use-after-free.
   * /dev/urandom returning EOF: trim down revert to not
   change kabi. (bnc#789359).
   * tun: reserves space for network in skb (bnc#803394).
   * Fixed /dev/urandom returning EOF (bnc#789359).
   * mm: Make snapshotting pages for stable writes a
   per-bio operation
   * fs: Only enable stable page writes when necessary
   (bnc#807517).
   *
   patches.drivers/ixgbe-Address-fact-that-RSC-was-not-setting-
   GSO-size.patch: Fix bnc#802712
   * Fix build error without CONFIG_BOOTSPLASH
   * Fix bootsplash breakage due to 3.0.67 stable fix
   (bnc#813963)
   * drivers/base/memory.c: fix memory_dev_init() long
   delay (bnc#804609).
   * mtd: drop physmap_configure (bnc#809375).
   * Bluetooth: btusb: hide more usb_submit_urb errors
   (bnc#812281).
   * o2dlm: fix NULL pointer dereference in
   o2dlm_blocking_ast_wrapper (bnc#806492)
   * qeth: fix qeth_wait_for_threads() deadlock for OSN
   devices (bnc#812315, LTC#90910).
   * Fix NULL pointer dereference in
   o2dlm_blocking_ast_wrapper (bnc#806492)
   * mm: fix ALLOC_WMARK_MASK check (bnc#808166)
   * pciehp: Fix dmi match table definition and missing
   space in printk (bnc#796412).
   * fnic: Fix SGEs limit (bnc#807431).
   * pciehp: Ignore missing surprise bit on some hosts
   (bnc#796412).
   * ipv6: Queue fragments per interface for
   multicast/link-local addresses (bnc#804220).
   * netfilter: send ICMPv6 message on fragment reassembly
   timeout (bnc#773577).
   * netfilter: fix sending ICMPv6 on netfilter reassembly
   timeout (bnc#773577).
   * jbd: clear revoked flag on buffers before a new
   transaction started (bnc#806395).
   * xfrm6: count extension headers into payload length
   (bnc#794513).
   * mm: page_alloc: Avoid marking zones full prematurely
   after zone_reclaim() (Evict inactive pages when
   zone_reclaim is enabled (bnc#808166)).
   * st: Take additional queue ref in st_probe
   (bnc#801038, bnc#788826).
   * drivers: xhci: fix incorrect bit test (bnc#714604).
   * xfrm: remove unused xfrm4_policy_fini() (bnc#801717).
   * xfrm: make gc_thresh configurable in all namespaces
   (bnc#801717).
   * kabi: use net_generic to avoid changes in struct net
   (bnc#801717).
   * xfs: Fix WARN_ON(delalloc) in xfs_vm_releasepage()
   (bnc#806631).
   *
   patches.drivers/alsa-sp2-hda-033-Support-mute-LED-on-HP-AiO-
   buttons: Refresh tags.
   * block: use i_size_write() in bd_set_size()
   (bnc#809748).
   * loopdev: fix a deadlock (bnc#809748).
   * patches.suse/supported-flag: fix mis-reported
   supported status (bnc#809493).
   * patches.suse/supported-flag-enterprise: Refresh.
   * KVM: Convert MSR_KVM_SYSTEM_TIME to use
   gfn_to_hva_cache_init (bnc#806980 CVE-2013-1797).
   * KVM: Fix bounds checking in ioapic indirect register
   read (bnc#806980 CVE-2013-1798).
   * KVM: Fix for buffer overflow in handling of
   MSR_KVM_SYSTEM_TIME (bnc#806980 CVE-2013-1796).
   * KVM: introduce kvm_read_guest_cached (bnc#806980).
   * x86/numa: Add constraints check for nid parameters
   (Cope with negative SRAT distances (bnc#807853)).
   * drm/i915: Periodically sanity check power management
   (bnc#808307).
   * drm/i915: bounds check execbuffer relocation count
   (bnc#808829,CVE-2013-0913).
   * ext3: Fix format string issues (bnc#809155,
   CVE-2013-1848).
   * x86-64: Fix memset() to support sizes of 4Gb and
   above (Properly initialise memmap on large machines
   (bnc#802353)).
   * bdi: allow block devices to say that they require
   stable page writes
   * mm: only enforce stable page writes if the backing
   device requires it
   * block: optionally snapshot page contents to provide
   stable pages during write
   * 9pfs: fix filesystem to wait for stable page writeback
   * ocfs2: wait for page writeback to provide stable pages
   * ubifs: wait for page writeback to provide stable pages
   * Only enable stable page writes when required by
   underlying BDI (bnc#807517).
   * KVM: emulator: drop RPL check from linearize()
   function (bnc#754583).
   * mlx4: Correct calls to to_ib_ah_attr() (bnc#806847).
   * DRM/i915: On G45 enable cursor plane briefly after
   enabling the display plane (bnc #753371) [backported from
   drm-intel-fixes].
   * cxgb4i: Remove the scsi host device when removing
   device (bnc#722398)
   * xprtrdma: The transport should not bug-check when a
   dup reply is received (bnc#763494).
   * tmpfs: fix use-after-free of mempolicy object
   (bnc#806138, CVE-2013-1767).
   * lpfc: Check fc_block_scsi_eh return value correctly
   for lpfc_abort_handler (bnc#803674).
   * md: fix bug in handling of new_data_offset
   (bnc#805823).
   * md: Avoid OOPS when reshaping raid1 to raid0 (Useful
   OOPS fix).
   * md: fix two bugs when attempting to resize RAID0
   array (Useful BUG() fix).
   * md: raid0: fix error return from create_stripe_zones
   (useful bug fix).
   * ext4: add missing kfree() on error return path in
   add_new_gdb().
   * ext4: Free resources in some error path in
   ext4_fill_super.
   * intel_idle: support Haswell (fate#313720).
   * hp_accel: Add a new PnP ID HPQ6007 for new HP laptops
   (bnc#802445).
   * nfs: Ensure NFS does not block on dead server during
   unmount (bnc#794529).
   * block: disable discard request merge temporarily
   (bnc#803067).
   * mm: mmu_notifier: have mmu_notifiers use a global
   SRCU so they may safely schedule
   * mm: mmu_notifier: make the mmu_notifier srcu static
   * mmu_notifier_unregister NULL Pointer deref and
   multiple ->release() callouts
   * Have mmu_notifiers use SRCU so they may safely
   schedule kabi compatability
   *
   patches.fixes/Have-mmu_notifiers-use-SRCU-so-they-may-safely
   -schedule.patch:
   *
   patches.fixes/Have-mmu_notifiers-use-SRCU-so-they-may-safely
   -schedule-build-fix.patch: Delete, replace with upstream
   equivalent and add KABI workaround (bnc#578046, bnc#786814,
   FATE#306952).
   * ipv6: Do not send packet to big messages to self
   (bnc#786150).
   * hpwdt: Unregister NMI events on exit (bnc#777746).
   * x86/mm: Check if PUD is large when validating a
   kernel address (bnc#794805).
   * ata: Fix DVD not dectected at some Haswell platforms
   (bnc#792674).
   * Avoid softlockups in printk (bnc#744692, bnc#789311).
   * Do not pack credentials for dying processes
   (bnc#779577, bnc#803056).
   * xfs: punch new delalloc blocks out of failed writes
   inside EOF (bnc#761849).
   * xfs: xfs_sync_data is redundant (bnc#761849).
   * Add GPIO support for Intel Centerton SOC (bnc#792793).
   * Add Multifunction Device support for Intel Centerton
   SOC (bnc#792793).
   * Add Intel Legacy Block support for Intel Centerton
   SOC (bnc#792793).
   * mm: net: Allow some !SOCK_MEMALLOC traffic through
   even if skb_pfmemalloc (Allow GPFS network traffic despite
   PF_MEMALLOC misuse (bnc#786900)).
   * kernel/resource.c: fix stack overflow in
   __reserve_region_with_split() (bnc#801782).
   * Lustre enablement patches
   * block: add dev_check_rdonly and friends for Lustre
   testing (FATE#314679).
   * dcache: Add DCACHE_LUSTRE_INVALID flag for Lustre to
   handle its own invalidation (FATE#314679).
   * lsm: export security_inode_unlink (FATE#315679).
   * lustre: Add lustre kernel version (FATE#314679).
   * st: fix memory leak with >1MB tape I/O (bnc#798921).
   * cifs: lower default wsize when 1 extensions are not
   used (bnc#799578).
   * ata_generic: Skip is_intel_ider() check when
   ata_generic=1 is set (bnc#777616).
   * quota: autoload the quota_v2 module for QFMT_VFS_V1
   quota format (bnc#802153).
   * xen: properly bound buffer access when parsing
   cpu/availability.
   * netback: shutdown the ring if it contains garbage
   (CVE-2013-0216 XSA-39 bnc#800280).
   * netback: correct netbk_tx_err() to handle wrap around
   (CVE-2013-0216 XSA-39 bnc#800280).
   * pciback: rate limit error message from
   pciback_enable_msi() (CVE-2013-0231 XSA-43 bnc#801178).
   * scsiback/usbback: move cond_resched() invocations to
   proper place.
   * drm/i915: Implement workaround for broken CS tlb on
   i830/845 (bnc #758040).
   * drivers: scsi: storvsc: Initialize the sglist.
   * e1000e: 82571 Fix Tx Data Corruption during Tx hang
   recovery (bnc#790867).
   * KVM: Fix buffer overflow in kvm_set_irq() (bnc#767612
   CVE-2012-2137).
   * mm: compaction: Abort async compaction if locks are
   contended or taking too long.
   * mm: compaction: abort compaction loop if lock is
   contended or run too long.
   * mm: compaction: acquire the zone->lock as late as
   possible.
   * mm: compaction: acquire the zone->lru_lock as late as
   possible.
   * mm: compaction: move fatal signal check out of
   compact_checklock_irqsave. Reduce LRU and zone lock
   contention when compacting memory for THP (bnc#796823).

   Security Issue references:

   * CVE-2012-6548
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6548>
   * CVE-2012-6549
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6549>
   * CVE-2012-2137
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2137>
   * CVE-2013-0160
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0160>
   * CVE-2013-0216
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0216>
   * CVE-2013-0231
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0231>
   * CVE-2013-0913
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0913>
   * CVE-2013-0914
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0914>
   * CVE-2013-1767
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1767>
   * CVE-2013-1774
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1774>
   * CVE-2013-1796
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1796>
   * CVE-2013-1797
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1797>
   * CVE-2013-1798
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1798>
   * CVE-2013-1848
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1848>
   * CVE-2013-1860
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1860>
   * CVE-2013-2634
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2634>
   * CVE-2013-2635
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2635>
   * CVE-2013-1792
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1792>
   * CVE-2013-0311
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0311>
   * CVE-2013-1772
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1772>
   * CVE-2013-0268
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0268>
    CVE-2013-0349
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0349>

Indications:

   Everyone using the Real Time Linux Kernel on x86_64 architecture should update.

Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Real Time 11 SP2:

      zypper in -t patch slertesp2-kernel-7695

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Real Time 11 SP2 (x86_64) [New Version: 3.0.74.rt98]:

      cluster-network-kmp-rt-1.4_3.0.74_rt98_0.6.2-2.18.37
      cluster-network-kmp-rt_trace-1.4_3.0.74_rt98_0.6.2-2.18.37
      drbd-kmp-rt-8.4.2_3.0.74_rt98_0.6.2-0.6.6.28
      drbd-kmp-rt_trace-8.4.2_3.0.74_rt98_0.6.2-0.6.6.28
      iscsitarget-kmp-rt-1.4.20_3.0.74_rt98_0.6.2-0.23.34
      iscsitarget-kmp-rt_trace-1.4.20_3.0.74_rt98_0.6.2-0.23.34
      kernel-rt-3.0.74.rt98-0.6.2.1
      kernel-rt-base-3.0.74.rt98-0.6.2.1
      kernel-rt-devel-3.0.74.rt98-0.6.2.1
      kernel-rt_trace-3.0.74.rt98-0.6.2.1
      kernel-rt_trace-base-3.0.74.rt98-0.6.2.1
      kernel-rt_trace-devel-3.0.74.rt98-0.6.2.1
      kernel-source-rt-3.0.74.rt98-0.6.2.1
      kernel-syms-rt-3.0.74.rt98-0.6.2.1
      lttng-modules-kmp-rt-2.0.4_3.0.74_rt98_0.6.2-0.7.30
      lttng-modules-kmp-rt_trace-2.0.4_3.0.74_rt98_0.6.2-0.7.30
      ocfs2-kmp-rt-1.6_3.0.74_rt98_0.6.2-0.11.36
      ocfs2-kmp-rt_trace-1.6_3.0.74_rt98_0.6.2-0.11.36
      ofed-kmp-rt-1.5.2_3.0.74_rt98_0.6.2-0.28.28.8
      ofed-kmp-rt_trace-1.5.2_3.0.74_rt98_0.6.2-0.28.28.8


References:

   http://support.novell.com/security/cve/CVE-2010-3873.html
   http://support.novell.com/security/cve/CVE-2011-4131.html
   http://support.novell.com/security/cve/CVE-2011-4604.html
   http://support.novell.com/security/cve/CVE-2011-4622.html
   http://support.novell.com/security/cve/CVE-2012-1601.html
   http://support.novell.com/security/cve/CVE-2012-2119.html
   http://support.novell.com/security/cve/CVE-2012-2137.html
   http://support.novell.com/security/cve/CVE-2012-4461.html
   http://support.novell.com/security/cve/CVE-2012-5517.html
   http://support.novell.com/security/cve/CVE-2013-0160.html
   http://support.novell.com/security/cve/CVE-2013-0216.html
   http://support.novell.com/security/cve/CVE-2013-0231.html
   http://support.novell.com/security/cve/CVE-2013-0871.html
   http://support.novell.com/security/cve/CVE-2013-0913.html
   http://support.novell.com/security/cve/CVE-2013-1767.html
   http://support.novell.com/security/cve/CVE-2013-1774.html
   http://support.novell.com/security/cve/CVE-2013-1796.html
   http://support.novell.com/security/cve/CVE-2013-1797.html
   http://support.novell.com/security/cve/CVE-2013-1798.html
   http://support.novell.com/security/cve/CVE-2013-1848.html
   https://bugzilla.novell.com/578046
   https://bugzilla.novell.com/651219
   https://bugzilla.novell.com/709266
   https://bugzilla.novell.com/709269
   https://bugzilla.novell.com/714604
   https://bugzilla.novell.com/722398
   https://bugzilla.novell.com/730117
   https://bugzilla.novell.com/736149
   https://bugzilla.novell.com/738210
   https://bugzilla.novell.com/744692
   https://bugzilla.novell.com/753371
   https://bugzilla.novell.com/754583
   https://bugzilla.novell.com/754898
   https://bugzilla.novell.com/758040
   https://bugzilla.novell.com/758243
   https://bugzilla.novell.com/761849
   https://bugzilla.novell.com/762424
   https://bugzilla.novell.com/763494
   https://bugzilla.novell.com/767612
   https://bugzilla.novell.com/768052
   https://bugzilla.novell.com/768470
   https://bugzilla.novell.com/773577
   https://bugzilla.novell.com/777616
   https://bugzilla.novell.com/777746
   https://bugzilla.novell.com/779577
   https://bugzilla.novell.com/780977
   https://bugzilla.novell.com/786150
   https://bugzilla.novell.com/786814
   https://bugzilla.novell.com/786900
   https://bugzilla.novell.com/787821
   https://bugzilla.novell.com/788826
   https://bugzilla.novell.com/789235
   https://bugzilla.novell.com/789311
   https://bugzilla.novell.com/789359
   https://bugzilla.novell.com/792674
   https://bugzilla.novell.com/792793
   https://bugzilla.novell.com/793139
   https://bugzilla.novell.com/794513
   https://bugzilla.novell.com/794529
   https://bugzilla.novell.com/794805
   https://bugzilla.novell.com/795269
   https://bugzilla.novell.com/795957
   https://bugzilla.novell.com/795961
   https://bugzilla.novell.com/796412
   https://bugzilla.novell.com/796418
   https://bugzilla.novell.com/797042
   https://bugzilla.novell.com/797175
   https://bugzilla.novell.com/798921
   https://bugzilla.novell.com/799197
   https://bugzilla.novell.com/799209
   https://bugzilla.novell.com/799270
   https://bugzilla.novell.com/799578
   https://bugzilla.novell.com/799926
   https://bugzilla.novell.com/800280
   https://bugzilla.novell.com/800701
   https://bugzilla.novell.com/801038
   https://bugzilla.novell.com/801178
   https://bugzilla.novell.com/801713
   https://bugzilla.novell.com/801717
   https://bugzilla.novell.com/801720
   https://bugzilla.novell.com/801782
   https://bugzilla.novell.com/802153
   https://bugzilla.novell.com/802353
   https://bugzilla.novell.com/802445
   https://bugzilla.novell.com/802712
   https://bugzilla.novell.com/803056
   https://bugzilla.novell.com/803067
   https://bugzilla.novell.com/803394
   https://bugzilla.novell.com/803674
   https://bugzilla.novell.com/803712
   https://bugzilla.novell.com/804154
   https://bugzilla.novell.com/804220
   https://bugzilla.novell.com/804609
   https://bugzilla.novell.com/805823
   https://bugzilla.novell.com/806138
   https://bugzilla.novell.com/806273
   https://bugzilla.novell.com/806395
   https://bugzilla.novell.com/806404
   https://bugzilla.novell.com/806431
   https://bugzilla.novell.com/806466
   https://bugzilla.novell.com/806469
   https://bugzilla.novell.com/806492
   https://bugzilla.novell.com/806631
   https://bugzilla.novell.com/806825
   https://bugzilla.novell.com/806847
   https://bugzilla.novell.com/806908
   https://bugzilla.novell.com/806976
   https://bugzilla.novell.com/806980
   https://bugzilla.novell.com/807431
   https://bugzilla.novell.com/807517
   https://bugzilla.novell.com/807560
   https://bugzilla.novell.com/807853
   https://bugzilla.novell.com/808166
   https://bugzilla.novell.com/808307
   https://bugzilla.novell.com/808829
   https://bugzilla.novell.com/808966
   https://bugzilla.novell.com/808991
   https://bugzilla.novell.com/809155
   https://bugzilla.novell.com/809166
   https://bugzilla.novell.com/809375
   https://bugzilla.novell.com/809493
   https://bugzilla.novell.com/809748
   https://bugzilla.novell.com/812281
   https://bugzilla.novell.com/812315
   https://bugzilla.novell.com/813963
   https://bugzilla.novell.com/816443
   https://bugzilla.novell.com/89359
   http://download.novell.com/patch/finder/?keywords=d2f8c0b58837ded577fa1f4a7a342e3f

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBUZQpp+4yVqjM2NGpAQJEAA//fxGBMJFXlFnpFmm7OgGPKCVYZ5m2yoh9
if+0+FXzMypvwFsId/MDWJb7dzRJGOz07onfnxQh2LBrrjgv9/3UNJQTDLf7au2h
l0HdaV/vLNRzobu5g3p4XCb6uvCROwuMRLX2x5vUH1b3o1+otVyyGewO7cnuieuK
SfZnNXOeQPOW3BJt8QOTFGat6X51Tg9tFTF3Uz7maT1XJcNZ6wQ1SLOrewmDN5Du
8nRry4qtW/CjAhXVkGztrig3f+Jh7VBDZO17WllkGkMNYgS3Cl5xbQnz9RVRj5Q5
jlfpHLfoPVEsX81DYdfNrbwrbrgda7QGZbhGRrG3ORhMvNxkpb2aV75LHgtLWbmq
kDShOREuDxWTReDG5cJSoXFZLBTjBM62lI60S7X+VSaBUbIBOl50H0OGgU2EUYNj
EQk83rgcCuuArsISWWC7g1vJ/4pxNKFzfRHJzUxp8azCBMB912ye2fOqMveyE8zS
Ctu6Mv7C5Jpu2V7BFJ6kLBt9Sn8TA2DDzKvgqLamMPcNMHrXw6XphLGB7AgyQ2a3
Wpd6/WAFxmP6BP/e+PlShfYhYW/PJGjoU3YdwNMb75Np6SH1XKHOjnd0b1lYcaIF
U0XjWOhK+wLzrw5i+yq8/jiOxI7nBxxa2t3bNCmZPqYNKfudBDEI0sj7ItWUZR3i
RYtRw+gp9eE=
=DdQ3
-----END PGP SIGNATURE-----