-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.1304
        SUSE Security Update: Security update for the Linux Kernel
                                22 May 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          kernel
Publisher:        SUSE
Operating System: SUSE
Impact/Access:    Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                  Root Compromise                 -- Existing Account      
                  Denial of Service               -- Remote/Unauthenticated
                  Access Confidential Data        -- Remote/Unauthenticated
                  Reduced Security                -- Existing Account      
Resolution:       Patch/Upgrade
CVE Names:        CVE-2017-8106 CVE-2017-7645 CVE-2017-7616
                  CVE-2017-7308 CVE-2017-7294 CVE-2017-7261
                  CVE-2017-7187 CVE-2017-6951 CVE-2017-6353
                  CVE-2017-6348 CVE-2017-6346 CVE-2017-6345
                  CVE-2017-6214 CVE-2017-6074 CVE-2017-5986
                  CVE-2017-5897 CVE-2017-5669 CVE-2017-2671
                  CVE-2017-2647 CVE-2016-10208 CVE-2016-10200
                  CVE-2016-10044 CVE-2016-9604 CVE-2016-9588
                  CVE-2016-9191 CVE-2016-7117 CVE-2016-5243
                  CVE-2016-3070 CVE-2016-2117 CVE-2015-1350

Reference:        ASB-2017.0067
                  ASB-2017.0021
                  ASB-2016.0093
                  ESB-2016.2602
                  ESB-2016.2592
                  ESB-2016.1616

- --------------------------BEGIN INCLUDED TEXT--------------------

   SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:1360-1
Rating:             important
References:         #1003077 #1008842 #1009682 #1012620 #1012985 
                    #1015703 #1015787 #1015821 #1017512 #1018100 
                    #1018263 #1018419 #1018446 #1019168 #1019514 
                    #1020048 #1020795 #1021256 #1021374 #1021762 
                    #1021913 #1022559 #1022971 #1023164 #1023207 
                    #1023377 #1023762 #1023824 #1023888 #1023992 
                    #1024081 #1024234 #1024309 #1024508 #1024788 
                    #1025039 #1025235 #1025354 #1025802 #1026024 
                    #1026722 #1026914 #1027066 #1027178 #1027189 
                    #1027190 #1027974 #1028041 #1028415 #1028595 
                    #1028648 #1028895 #1029470 #1029850 #1029986 
                    #1030118 #1030213 #1030593 #1030901 #1031003 
                    #1031052 #1031080 #1031440 #1031567 #1031579 
                    #1031662 #1031842 #1032125 #1032141 #1032344 
                    #1032345 #1033336 #1034670 #103470 #1034700 
                    #1035576 #1035699 #1035738 #1035877 #1036752 
                    #1038261 #799133 #857926 #914939 #917630 
                    #922853 #930399 #931620 #937444 #940946 #954763 
                    #968697 #970083 #971933 #979215 #982783 #983212 
                    #984530 #985561 #988065 #989056 #993832 
Cross-References:   CVE-2015-1350 CVE-2016-10044 CVE-2016-10200
                    CVE-2016-10208 CVE-2016-2117 CVE-2016-3070
                    CVE-2016-5243 CVE-2016-7117 CVE-2016-9191
                    CVE-2016-9588 CVE-2016-9604 CVE-2017-2647
                    CVE-2017-2671 CVE-2017-5669 CVE-2017-5897
                    CVE-2017-5986 CVE-2017-6074 CVE-2017-6214
                    CVE-2017-6345 CVE-2017-6346 CVE-2017-6348
                    CVE-2017-6353 CVE-2017-6951 CVE-2017-7187
                    CVE-2017-7261 CVE-2017-7294 CVE-2017-7308
                    CVE-2017-7616 CVE-2017-7645 CVE-2017-8106
                   
Affected Products:
                    SUSE Linux Enterprise Workstation Extension 12-SP1
                    SUSE Linux Enterprise Software Development Kit 12-SP1
                    SUSE Linux Enterprise Server 12-SP1
                    SUSE Linux Enterprise Module for Public Cloud 12
                    SUSE Linux Enterprise Live Patching 12
                    SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________

   An update that solves 30 vulnerabilities and has 72 fixes
   is now available.

Description:


   The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.74 to receive
   various security and bugfixes.

   Notable new/improved features:
   - Improved support for Hyper-V
   - Support for the tcp_westwood TCP scheduling algorithm

   The following security bugs were fixed:

   - CVE-2017-8106: The handle_invept function in arch/x86/kvm/vmx.c in the
     Linux kernel allowed privileged KVM guest OS users to cause a denial of
     service (NULL pointer dereference and host OS crash) via a
     single-context INVEPT instruction with a NULL EPT pointer (bsc#1035877).
   - CVE-2017-6951: The keyring_search_aux function in
     security/keys/keyring.c in the Linux kernel allowed local users to cause
     a denial of service (NULL pointer dereference and OOPS) via a
     request_key system call for the "dead" type. (bsc#1029850).
   - CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local
     users to gain privileges or cause a denial of service (NULL pointer
     dereference and system crash) via vectors involving a NULL value for a
     certain match field, related to the keyring_search_iterator function in
     keyring.c. (bsc#1030593)
   - CVE-2016-9604: This fixes handling of keyrings starting with '.' in
     KEYCTL_JOIN_SESSION_KEYRING, which could have allowed local users to
     manipulate privileged keyrings (bsc#1035576)
   - CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind
     compat syscalls in mm/mempolicy.c in the Linux kernel allowed local
     users to obtain sensitive information from uninitialized stack data by
     triggering failure of a certain bitmap operation. (bnc#1033336).
   - CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux
     kernel allowed remote attackers to cause a denial of service (system
     crash) via a long RPC reply, related to net/sunrpc/svc.c,
     fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c. (bsc#1034670).
   - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in
     the Linux kernel did not properly validate certain block-size data,
     which allowed local users to cause a denial of service (overflow) or
     possibly have unspecified other impact via crafted system calls
     (bnc#1031579)
   - CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux
     kernel was  too late in obtaining a certain lock and consequently could
     not ensure that disconnect function calls are safe, which allowed local
     users to cause a denial of service (panic) by leveraging access to the
     protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003)
   - CVE-2017-7294: The vmw_surface_define_ioctl function in
     drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not
     validate addition of certain levels data, which allowed local users to
     trigger an integer overflow and out-of-bounds write, and cause a denial
     of service (system hang or crash) or possibly gain privileges, via a
     crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440)
   - CVE-2017-7261: The vmw_surface_define_ioctl function in
     drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not
     check for a zero value of certain levels data, which allowed local users
     to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and
     possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device
     (bnc#1031052)
   - CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux
     kernel allowed local users to cause a denial of service (stack-based
     buffer overflow) or possibly have unspecified other impact via a large
     command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds
     write access in the sg_write function (bnc#1030213)
   - CVE-2016-9588: arch/x86/kvm/vmx.c in the Linux kernel mismanaged the #BP
     and #OF exceptions, which allowed guest OS users to cause a denial of
     service (guest OS crash) by declining to handle an exception thrown by
     an L2 guest (bsc#1015703).
   - CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel
     did not restrict the address calculated by a certain rounding operation,
     which allowed local users to map page zero, and consequently bypass a
     protection mechanism that exists for the mmap system call, by making
     crafted shmget and shmat system calls in a privileged context
     (bnc#1026914).
   - CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in
     the Linux kernel allowed local users to gain privileges or cause a
     denial of service (use-after-free) by making multiple bind system calls
     without properly ascertaining whether a socket has the SOCK_ZAPPED
     status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c
     (bnc#1028415)
   - CVE-2016-10208: The ext4_fill_super function in fs/ext4/super.c in the
     Linux kernel did not properly validate meta block groups, which allowed
     physically proximate attackers to cause a denial of service
     (out-of-bounds read and system crash) via a crafted ext4 image
     (bnc#1023377).
   - CVE-2017-5897: The ip6gre_err function in net/ipv6/ip6_gre.c in the
     Linux kernel allowed remote attackers to have unspecified impact via
     vectors involving GRE flags in an IPv6 packet, which trigger an
     out-of-bounds access (bsc#1023762).
   - CVE-2017-5986: A race condition in the sctp_wait_for_sndbuf function in
     net/sctp/socket.c in the Linux kernel allowed local users to cause a
     denial of service (assertion failure and panic) via a multithreaded
     application that peels off an association in a certain buffer-full state
     (bsc#1025235).
   - CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c
     in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures
     in the LISTEN state, which allowed local users to obtain root privileges
     or cause a denial of service (double free) via an application that made
     an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024)
   - CVE-2016-9191: The cgroup offline implementation in the Linux kernel
     mishandled certain drain operations, which allowed local users to cause
     a denial of service (system hang) by leveraging access to a container
     environment for executing a crafted application (bnc#1008842)
   - CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the
     Linux kernel improperly managed lock dropping, which allowed local users
     to cause a denial of service (deadlock) via crafted operations on IrDA
     devices (bnc#1027178).
   - CVE-2016-10044: The aio_mount function in fs/aio.c in the Linux kernel
     did not properly restrict execute access, which made it easier for local
     users to bypass intended SELinux W^X policy restrictions, and
     consequently gain privileges, via an io_setup system call (bnc#1023992).
   - CVE-2016-3070: The trace_writeback_dirty_page implementation in
     include/trace/events/writeback.h in the Linux kernel improperly
     interacts with mm/migrate.c, which allowed local users to cause a denial
     of service (NULL pointer dereference and system crash) or possibly have
     unspecified other impact by triggering a certain page move (bnc#979215).
   - CVE-2016-5243: The tipc_nl_compat_link_dump function in
     net/tipc/netlink_compat.c in the Linux kernel did not properly copy a
     certain string, which allowed local users to obtain sensitive
     information from kernel stack memory by reading a Netlink message
     (bnc#983212).
   - CVE-2017-6345: The LLC subsystem in the Linux kernel did not ensure that
     a certain destructor exists in required circumstances, which allowed
     local users to cause a denial of service (BUG_ON) or possibly have
     unspecified other impact via crafted system calls (bnc#1027190)
   - CVE-2017-6346: Race condition in net/packet/af_packet.c in the Linux
     kernel allowed local users to cause a denial of service (use-after-free)
     or possibly have unspecified other impact via a multithreaded
     application that made PACKET_FANOUT setsockopt system calls (bnc#1027189)
   - CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly
     restrict association peel-off operations during certain wait states,
     which allowed local users to cause a denial of service (invalid unlock
     and double free) via a multithreaded application. NOTE: this
     vulnerability exists because of an incorrect fix for CVE-2017-5986
     (bnc#1027066)
   - CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in
     net/sctp/socket.c in the Linux kernel allowed local users to cause a
     denial of service (assertion failure and panic) via a multithreaded
     application that peels off an association in a certain buffer-full state
     (bsc#1025235).
   - CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the
     Linux kernel allowed remote attackers to cause a denial of service
     (infinite loop and soft lockup) via vectors involving a TCP packet with
     the URG flag (bnc#1026722)
   - CVE-2016-2117: The atl2_probe function in
     drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel incorrectly
     enables scatter/gather I/O, which allowed remote attackers to obtain
     sensitive information from kernel memory by reading packet data
     (bnc#968697)
   - CVE-2015-1350: The VFS subsystem in the Linux kernel provided an
     incomplete set of requirements for setattr operations that
     underspecifies removing extended privilege attributes, which allowed
     local users to cause a denial of service (capability stripping) via a
     failed invocation of a system call, as demonstrated by using chown to
     remove a capability from the ping or Wireshark dumpcap program
     (bsc#914939).
   - CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg
     function in net/socket.c in the Linux kernel allowed remote attackers to
     execute arbitrary code via vectors involving a recvmmsg system call that
     is mishandled during error processing (bsc#1003077).

   The following non-security bugs were fixed:

   - ACPI / APEI: Fix NMI notification handling (bsc#917630).
   - arch: Mass conversion of smp_mb__*() (bsc#1020795).
   - asm-generic: add __smp_xxx wrappers (bsc#1020795).
   - block: remove struct request buffer member (bsc#1020795).
   - block: submit_bio_wait() conversions (bsc#1020795).
   - bonding: Advertize vxlan offload features when supported (bsc#1009682).
   - bonding: handle more gso types (bsc#1009682).
   - bonding: use the correct ether type for alb (bsc#1028595).
   - btrfs: allow unlink to exceed subvolume quota (bsc#1015821).
   - btrfs: Change qgroup_meta_rsv to 64bit (bsc#1015821).
   - btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls
     (bsc#1018100).
   - btrfs: make file clone aware of fatal signals (bsc#1015787).
   - btrfs: qgroups: Retry after commit on getting EDQUOT (bsc#1015821).
   - cancel the setfilesize transation when io error happen (bsc#1028648).
   - cgroup: remove stray references to css_id (bsc#1020795).
   - cpuidle: powernv/pseries: Auto-promotion of snooze to deeper idle state
     (bnc#1023164).
   - dm: add era target (bsc#1020795).
   - dm: allow remove to be deferred (bsc#1020795).
   - dm bitset: only flush the current word if it has been dirtied
     (bsc#1020795).
   - dm btree: add dm_btree_find_lowest_key (bsc#1020795).
   - dm cache: actually resize cache (bsc#1020795).
   - dm cache: add block sizes and total cache blocks to status output
     (bsc#1020795).
   - dm cache: add cache block invalidation support (bsc#1020795).
   - dm cache: add passthrough mode (bsc#1020795).
   - dm cache: add policy name to status output (bsc#1020795).
   - dm cache: add remove_cblock method to policy interface (bsc#1020795).
   - dm cache: be much more aggressive about promoting writes to discarded
     blocks (bsc#1020795).
   - dm cache: cache shrinking support (bsc#1020795).
   - dm cache: do not add migration to completed list before unhooking bio
     (bsc#1020795).
   - dm cache: fix a lock-inversion (bsc#1020795).
   - dm cache: fix truncation bug when mapping I/O to more than 2TB fast
     device (bsc#1020795).
   - dm cache: fix writethrough mode quiescing in cache_map (bsc#1020795).
   - dm cache: improve efficiency of quiescing flag management (bsc#1020795).
   - dm cache: io destined for the cache device can now serve as tick bios
     (bsc#1020795).
   - dm cache: log error message if dm_kcopyd_copy() fails (bsc#1020795).
   - dm cache metadata: check the metadata version when reading the
     superblock (bsc#1020795).
   - dm cache metadata: return bool from __superblock_all_zeroes
     (bsc#1020795).
   - dm cache: move hook_info into common portion of per_bio_data structure
     (bsc#1020795).
   - dm cache: optimize commit_if_needed (bsc#1020795).
   - dm cache policy mq: a few small fixes (bsc#1020795).
   - dm cache policy mq: fix promotions to occur as expected (bsc#1020795).
   - dm cache policy mq: implement writeback_work() and
     mq_{set,clear}_dirty() (bsc#1020795).
   - dm cache policy mq: introduce three promotion threshold tunables
     (bsc#1020795).
   - dm cache policy mq: protect residency method with existing mutex
     (bsc#1020795).
   - dm cache policy mq: reduce memory requirements (bsc#1020795).
   - dm cache policy mq: use list_del_init instead of list_del +
     INIT_LIST_HEAD (bsc#1020795).
   - dm cache policy: remove return from void policy_remove_mapping
     (bsc#1020795).
   - dm cache: promotion optimisation for writes (bsc#1020795).
   - dm cache: resolve small nits and improve Documentation (bsc#1020795).
   - dm cache: return -EINVAL if the user specifies unknown cache policy
     (bsc#1020795).
   - dm cache: use cell_defer() boolean argument consistently (bsc#1020795).
   - dm: change sector_count member in clone_info from sector_t to unsigned
     (bsc#1020795).
   - dm crypt: add TCW IV mode for old CBC TCRYPT containers (bsc#1020795).
   - dm crypt: properly handle extra key string in initialization
     (bsc#1020795).
   - dm delay: use per-bio data instead of a mempool and slab cache
     (bsc#1020795).
   - dm: fix Kconfig indentation (bsc#1020795).
   - dm: fix Kconfig menu indentation (bsc#1020795).
   - dm: make dm_table_alloc_md_mempools static (bsc#1020795).
   - dm mpath: do not call pg_init when it is already running (bsc#1020795).
   - dm mpath: fix lock order inconsistency in multipath_ioctl (bsc#1020795).
   - dm mpath: print more useful warnings in multipath_message()
     (bsc#1020795).
   - dm mpath: push back requests instead of queueing (bsc#1020795).
   - dm mpath: really fix lockdep warning (bsc#1020795).
   - dm mpath: reduce memory pressure when requeuing (bsc#1020795).
   - dm mpath: remove extra nesting in map function (bsc#1020795).
   - dm mpath: remove map_io() (bsc#1020795).
   - dm mpath: remove process_queued_ios() (bsc#1020795).
   - dm mpath: requeue I/O during pg_init (bsc#1020795).
   - dm persistent data: cleanup dm-thin specific references in text
     (bsc#1020795).
   - dm snapshot: call destroy_work_on_stack() to pair with
     INIT_WORK_ONSTACK() (bsc#1020795).
   - dm snapshot: fix metadata corruption (bsc#1020795).
   - dm snapshot: prepare for switch to using dm-bufio (bsc#1020795).
   - dm snapshot: use dm-bufio (bsc#1020795).
   - dm snapshot: use dm-bufio prefetch (bsc#1020795).
   - dm snapshot: use GFP_KERNEL when initializing exceptions (bsc#1020795).
   - dm space map disk: optimise sm_disk_dec_block (bsc#1020795).
   - dm space map metadata: limit errors in sm_metadata_new_block
     (bsc#1020795).
   - dm: stop using bi_private (bsc#1020795).
   - dm table: add dm_table_run_md_queue_async (bsc#1020795).
   - dm table: print error on preresume failure (bsc#1020795).
   - dm table: remove unused buggy code that extends the targets array
     (bsc#1020795).
   - dm thin: add error_if_no_space feature (bsc#1020795).
   - dm thin: add mappings to end of prepared_* lists (bsc#1020795).
   - dm thin: add 'no_space_timeout' dm-thin-pool module param (bsc#1020795).
   - dm thin: add timeout to stop out-of-data-space mode holding IO forever
     (bsc#1020795).
   - dm thin: allow metadata commit if pool is in PM_OUT_OF_DATA_SPACE mode
     (bsc#1020795).
   - dm thin: allow metadata space larger than supported to go unused
     (bsc#1020795).
   - dm thin: cleanup and improve no space handling (bsc#1020795).
   - dm thin: eliminate the no_free_space flag (bsc#1020795).
   - dm thin: ensure user takes action to validate data and metadata
     consistency (bsc#1020795).
   - dm thin: factor out check_low_water_mark and use bools (bsc#1020795).
   - dm thin: fix deadlock in __requeue_bio_list (bsc#1020795).
   - dm thin: fix noflush suspend IO queueing (bsc#1020795).
   - dm thin: fix out of data space handling (bsc#1020795).
   - dm thin: fix pool feature parsing (bsc#1020795).
   - dm thin: fix rcu_read_lock being held in code that can sleep
     (bsc#1020795).
   - dm thin: handle metadata failures more consistently (bsc#1020795).
   - dm thin: irqsave must always be used with the pool->lock spinlock
     (bsc#1020795).
   - dm thin: log info when growing the data or metadata device (bsc#1020795).
   - dm thin: requeue bios to DM core if no_free_space and in read-only mode
     (bsc#1020795).
   - dm thin: return error from alloc_data_block if pool is not in write mode
     (bsc#1020795).
   - dm thin: simplify pool_is_congested (bsc#1020795).
   - dm thin: sort the per thin deferred bios using an rb_tree (bsc#1020795).
   - dm thin: synchronize the pool mode during suspend (bsc#1020795).
   - dm thin: use bool rather than unsigned for flags in structures
     (bsc#1020795).
   - dm thin: use INIT_WORK_ONSTACK in noflush_work to avoid ODEBUG warning
     (bsc#1020795).
   - dm thin: use per thin device deferred bio lists (bsc#1020795).
   - dm: use RCU_INIT_POINTER instead of rcu_assign_pointer in __unbind
     (bsc#1020795).
   - drm/i915: relax uncritical udelay_range() (bsc#1038261).
   - ether: add loopback type ETH_P_LOOPBACK (bsc#1028595).
   - ext4: fix bh leak on error paths in ext4_rename() and
     ext4_cross_rename() (bsc#1012985).
   - ext4: fix fencepost in s_first_meta_bg validation (bsc#1029986).
   - ext4: mark inode dirty after converting inline directory (bsc#1012985).
   - ftrace: Make ftrace_location_range() global (FATE#322421).
   - HID: usbhid: improve handling of Clear-Halt and reset (bsc#1031080).
   - hv: util: catch allocation errors
   - hv: utils: use memdup_user in hvt_op_write
   - hwrng: virtio - ensure reads happen after successful probe (bsc#954763
     bsc#1032344).
   - i40e: avoid null pointer dereference (bsc#922853).
   - i40e/i40evf: Break up xmit_descriptor_count from maybe_stop_tx
     (bsc#985561).
   - i40e/i40evf: Limit TSO to 7 descriptors for payload instead of 8 per
     packet (bsc#985561).
   - i40e/i40evf: Rewrite logic for 8 descriptor per packet check
     (bsc#985561).
   - i40e: Impose a lower limit on gso size (bsc#985561).
   - i40e: Limit TX descriptor count in cases where frag size is greater than
     16K (bsc#985561).
   - iommu/vt-d: Flush old iommu caches for kdump when the device gets
     context mapped (bsc#1023824).
   - iommu/vt-d: Tylersburg isoch identity map check is done too late
     (bsc#1032125).
   - ipv6: make ECMP route replacement less greedy (bsc#930399).
   - kabi: hide changes in struct sk_buff (bsc#1009682).
   - KABI: Hide new include in arch/powerpc/kernel/process.c (fate#322421).
   - kABI: mask struct xfs_icdinode change (bsc#1024788).
   - kABI: protect struct inet6_dev (kabi).
   - kABI: protect struct iscsi_conn (bsc#103470).
   - kABI: protect struct xfs_buftarg and struct xfs_mount (bsc#1024508).
   - kABI: restore can_rx_register parameters (kabi).
   - kernel/watchdog: use nmi registers snapshot in hardlockup handler
     (bsc#940946, bsc#937444).
   - kgr: Mark eeh_event_handler() kthread safe using a timeout (bsc#1031662).
   - kgr/module: make a taint flag module-specific
   - kgr: remove unneeded kgr_needs_lazy_migration() s390x definition
   - l2tp: fix address test in __l2tp_ip6_bind_lookup() (bsc#1028415).
   - l2tp: fix lookup for sockets not bound to a device in l2tp_ip
     (bsc#1028415).
   - l2tp: fix racy socket lookup in l2tp_ip and l2tp_ip6 bind()
     (bsc#1028415).
   - l2tp: hold socket before dropping lock in l2tp_ip{, 6}_recv()
     (bsc#1028415).
   - l2tp: hold tunnel socket when handling control frames in l2tp_ip and
     l2tp_ip6 (bsc#1028415).
   - l2tp: lock socket before checking flags in connect() (bsc#1028415).
   - livepatch: Allow architectures to specify an alternate ftrace location
     (FATE#322421).
   - locking/semaphore: Add down_interruptible_timeout() (bsc#1031662).
   - md: avoid oops on unload if some process is in poll or select
     (bsc#1020795).
   - md: Convert use of typedef ctl_table to struct ctl_table (bsc#1020795).
   - md: ensure metadata is writen after raid level change (bsc#1020795).
   - md linear: fix a race between linear_add() and linear_congested()
     (bsc#1018446).
   - md: md_clear_badblocks should return an error code on failure
     (bsc#1020795).
   - md: refuse to change shape of array if it is active but read-only
     (bsc#1020795).
   - megaraid_sas: add missing curly braces in ioctl handler (bsc#1023207).
   - megaraid_sas: Fixup tgtid count in megasas_ld_list_query() (bsc#971933).
   - mm/huge_memory.c: respect FOLL_FORCE/FOLL_COW for thp (bnc#1030118).
   - mm, memcg: do not retry precharge charges (bnc#1022559).
   - mm/mempolicy.c: do not put mempolicy before using its nodemask
     (References: VM Performance, bnc#931620).
   - mm/page_alloc: fix nodes for reclaim in fast path (bnc#1031842).
   - module: move add_taint_module() to a header file
   - net: Add skb_gro_postpull_rcsum to udp and vxlan (bsc#1009682).
   - net: add skb_pop_rcv_encapsulation (bsc#1009682).
   - net: Call skb_checksum_init in IPv4 (bsc#1009682).
   - net: Call skb_checksum_init in IPv6 (bsc#1009682).
   - netfilter: allow logging fron non-init netns (bsc#970083).
   - net: Generalize checksum_init functions (bsc#1009682).
   - net: Preserve CHECKSUM_COMPLETE at validation (bsc#1009682).
   - NFS: do not try to cross a mountpount when there isn't one there
     (bsc#1028041).
   - NFS: Expedite unmount of NFS auto-mounts (bnc#1025802).
   - NFS: Fix a performance regression in readdir (bsc#857926).
   - NFS: flush out dirty data on file fput() (bsc#1021762).
   - ocfs2: do not write error flag to user structure we cannot copy from/to
     (bsc#1012985).
   - powerpc: Blacklist GCC 5.4 6.1 and 6.2 (boo#1028895).
   - powerpc: Create a helper for getting the kernel toc value (FATE#322421).
   - powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971).
   - powerpc/fadump: Reserve memory at an offset closer to bottom of RAM
     (bsc#1032141).
   - powerpc/fadump: Update fadump documentation (bsc#1032141).
   - powerpc/ftrace: Add Kconfig & Make glue for mprofile-kernel
     (FATE#322421).
   - powerpc/ftrace: Add support for -mprofile-kernel ftrace ABI
     (FATE#322421).
   - powerpc/ftrace: Use $(CC_FLAGS_FTRACE) when disabling ftrace
     (FATE#322421).
   - powerpc/ftrace: Use generic ftrace_modify_all_code() (FATE#322421).
   - powerpc: introduce TIF_KGR_IN_PROGRESS thread flag (FATE#322421).
   - powerpc/kgraft: Add kgraft header (FATE#322421).
   - powerpc/kgraft: Add kgraft stack to struct thread_info (FATE#322421).
   - powerpc/kgraft: Add live patching support on ppc64le (FATE#322421).
   - powerpc/module: Create a special stub for ftrace_caller() (FATE#322421).
   - powerpc/module: Mark module stubs with a magic value (FATE#322421).
   - powerpc/module: Only try to generate the ftrace_caller() stub once
     (FATE#322421).
   - powerpc/modules: Never restore r2 for a mprofile-kernel style mcount()
     call (FATE#322421).
   - powerpc/prom: Increase minimum RMA size to 512MB (bsc#984530).
   - powerpc/pseries/cpuidle: Remove MAX_IDLE_STATE macro (bnc#1023164).
   - powerpc/pseries/cpuidle: Use cpuidle_register() for initialisation
     (bnc#1023164).
   - powerpc: Reject binutils 2.24 when building little endian (boo#1028895).
   - RAID1: avoid unnecessary spin locks in I/O barrier code
     (bsc#982783,bsc#1020048).
   - raid1: include bio_end_io_list in nr_queued to prevent freeze_array hang
   - remove mpath patches from dmcache backport, for bsc#1035738
   - revert "procfs: mark thread stack correctly in proc/PID/maps"
     (bnc#1030901).
   - Revert "RDMA/core: Fix incorrect structure packing for booleans" (kabi).
   - rtnetlink: allow to register ops without ops->setup set (bsc#1021374).
   - s390/zcrypt: Introduce CEX6 toleration (FATE#321783, LTC#147506,
     bsc#1019514).
   - sched/loadavg: Avoid loadavg spikes caused by delayed NO_HZ accounting
     (bsc#1018419).
   - scsi_error: count medium access timeout only once per EH run
     (bsc#993832, bsc#1032345).
   - scsi: libiscsi: add lock around task lists to fix list corruption
     regression (bsc#1034700).
   - scsi: storvsc: fix SRB_STATUS_ABORTED handling
   - sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).
   - svcrpc: fix gss-proxy NULL dereference in some error cases (bsc#1024309).
   - taint/module: Clean up global and module taint flags handling
   - tcp: abort orphan sockets stalling on zero window probes (bsc#1021913).
   - thp: fix MADV_DONTNEED vs. numa balancing race (bnc#1027974).
   - thp: reduce indentation level in change_huge_pmd() (bnc#1027974).
   - treewide: fix "distingush" typo (bsc#1020795).
   - tree-wide: use reinit_completion instead of INIT_COMPLETION
     (bsc#1020795).
   - usb: dwc3: gadget: Fix incorrect DEPCMD and DGCMD status macros
     (bsc#1035699).
   - usb: host: xhci: print correct command ring address (bnc#1035699).
   - USB: serial: kl5kusb105: fix line-state error handling (bsc#1021256).
   - vfs: Do not exchange "short" filenames unconditionally (bsc#1012985).
   - vfs: split generic splice code from i_mutex locking (bsc#1024788).
   - vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).
   - VSOCK: Detach QP check should filter out non matching QPs (bsc#1036752).
   - vxlan: cancel sock_work in vxlan_dellink() (bsc#1031567).
   - vxlan: Checksum fixes (bsc#1009682).
   - vxlan: GRO support at tunnel layer (bsc#1009682).
   - xen-blkfront: correct maximum segment accounting (bsc#1018263).
   - xen-blkfront: do not call talk_to_blkback when already connected to
     blkback.
   - xen-blkfront: free resources if xlvbd_alloc_gendisk fails.
   - xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).
   - xfs: do not allow di_size with high bit set (bsc#1024234).
   - xfs: do not assert fail on non-async buffers on ioacct decrement
     (bsc#1024508).
   - xfs: exclude never-released buffers from buftarg I/O accounting
     (bsc#1024508).
   - xfs: fix broken multi-fsb buffer logging (bsc#1024081).
   - xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).
   - xfs: Fix lock ordering in splice write (bsc#1024788).
   - xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).
   - xfs: Make xfs_icdinode->di_dmstate atomic_t (bsc#1024788).
   - xfs: pass total block res. as total xfs_bmapi_write() parameter
     (bsc#1029470).
   - xfs: replace global xfslogd wq with per-mount wq (bsc#1024508).
   - xfs: track and serialize in-flight async buffers against unmount
     (bsc#1024508).


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 12-SP1:

      zypper in -t patch SUSE-SLE-WE-12-SP1-2017-831=1

   - SUSE Linux Enterprise Software Development Kit 12-SP1:

      zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-831=1

   - SUSE Linux Enterprise Server 12-SP1:

      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-831=1

   - SUSE Linux Enterprise Module for Public Cloud 12:

      zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2017-831=1

   - SUSE Linux Enterprise Live Patching 12:

      zypper in -t patch SUSE-SLE-Live-Patching-12-2017-831=1

   - SUSE Linux Enterprise Desktop 12-SP1:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-831=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):

      kernel-default-debuginfo-3.12.74-60.64.40.1
      kernel-default-debugsource-3.12.74-60.64.40.1
      kernel-default-extra-3.12.74-60.64.40.1
      kernel-default-extra-debuginfo-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):

      kernel-obs-build-3.12.74-60.64.40.1
      kernel-obs-build-debugsource-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Software Development Kit 12-SP1 (noarch):

      kernel-docs-3.12.74-60.64.40.4

   - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):

      kernel-default-3.12.74-60.64.40.1
      kernel-default-base-3.12.74-60.64.40.1
      kernel-default-base-debuginfo-3.12.74-60.64.40.1
      kernel-default-debuginfo-3.12.74-60.64.40.1
      kernel-default-debugsource-3.12.74-60.64.40.1
      kernel-default-devel-3.12.74-60.64.40.1
      kernel-syms-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Server 12-SP1 (noarch):

      kernel-devel-3.12.74-60.64.40.1
      kernel-macros-3.12.74-60.64.40.1
      kernel-source-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Server 12-SP1 (x86_64):

      kernel-xen-3.12.74-60.64.40.1
      kernel-xen-base-3.12.74-60.64.40.1
      kernel-xen-base-debuginfo-3.12.74-60.64.40.1
      kernel-xen-debuginfo-3.12.74-60.64.40.1
      kernel-xen-debugsource-3.12.74-60.64.40.1
      kernel-xen-devel-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Server 12-SP1 (s390x):

      kernel-default-man-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64):

      kernel-ec2-3.12.74-60.64.40.1
      kernel-ec2-debuginfo-3.12.74-60.64.40.1
      kernel-ec2-debugsource-3.12.74-60.64.40.1
      kernel-ec2-devel-3.12.74-60.64.40.1
      kernel-ec2-extra-3.12.74-60.64.40.1
      kernel-ec2-extra-debuginfo-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Live Patching 12 (x86_64):

      kgraft-patch-3_12_74-60_64_40-default-1-4.1
      kgraft-patch-3_12_74-60_64_40-xen-1-4.1

   - SUSE Linux Enterprise Desktop 12-SP1 (x86_64):

      kernel-default-3.12.74-60.64.40.1
      kernel-default-debuginfo-3.12.74-60.64.40.1
      kernel-default-debugsource-3.12.74-60.64.40.1
      kernel-default-devel-3.12.74-60.64.40.1
      kernel-default-extra-3.12.74-60.64.40.1
      kernel-default-extra-debuginfo-3.12.74-60.64.40.1
      kernel-syms-3.12.74-60.64.40.1
      kernel-xen-3.12.74-60.64.40.1
      kernel-xen-debuginfo-3.12.74-60.64.40.1
      kernel-xen-debugsource-3.12.74-60.64.40.1
      kernel-xen-devel-3.12.74-60.64.40.1

   - SUSE Linux Enterprise Desktop 12-SP1 (noarch):

      kernel-devel-3.12.74-60.64.40.1
      kernel-macros-3.12.74-60.64.40.1
      kernel-source-3.12.74-60.64.40.1


References:

   https://www.suse.com/security/cve/CVE-2015-1350.html
   https://www.suse.com/security/cve/CVE-2016-10044.html
   https://www.suse.com/security/cve/CVE-2016-10200.html
   https://www.suse.com/security/cve/CVE-2016-10208.html
   https://www.suse.com/security/cve/CVE-2016-2117.html
   https://www.suse.com/security/cve/CVE-2016-3070.html
   https://www.suse.com/security/cve/CVE-2016-5243.html
   https://www.suse.com/security/cve/CVE-2016-7117.html
   https://www.suse.com/security/cve/CVE-2016-9191.html
   https://www.suse.com/security/cve/CVE-2016-9588.html
   https://www.suse.com/security/cve/CVE-2016-9604.html
   https://www.suse.com/security/cve/CVE-2017-2647.html
   https://www.suse.com/security/cve/CVE-2017-2671.html
   https://www.suse.com/security/cve/CVE-2017-5669.html
   https://www.suse.com/security/cve/CVE-2017-5897.html
   https://www.suse.com/security/cve/CVE-2017-5986.html
   https://www.suse.com/security/cve/CVE-2017-6074.html
   https://www.suse.com/security/cve/CVE-2017-6214.html
   https://www.suse.com/security/cve/CVE-2017-6345.html
   https://www.suse.com/security/cve/CVE-2017-6346.html
   https://www.suse.com/security/cve/CVE-2017-6348.html
   https://www.suse.com/security/cve/CVE-2017-6353.html
   https://www.suse.com/security/cve/CVE-2017-6951.html
   https://www.suse.com/security/cve/CVE-2017-7187.html
   https://www.suse.com/security/cve/CVE-2017-7261.html
   https://www.suse.com/security/cve/CVE-2017-7294.html
   https://www.suse.com/security/cve/CVE-2017-7308.html
   https://www.suse.com/security/cve/CVE-2017-7616.html
   https://www.suse.com/security/cve/CVE-2017-7645.html
   https://www.suse.com/security/cve/CVE-2017-8106.html
   https://bugzilla.suse.com/1003077
   https://bugzilla.suse.com/1008842
   https://bugzilla.suse.com/1009682
   https://bugzilla.suse.com/1012620
   https://bugzilla.suse.com/1012985
   https://bugzilla.suse.com/1015703
   https://bugzilla.suse.com/1015787
   https://bugzilla.suse.com/1015821
   https://bugzilla.suse.com/1017512
   https://bugzilla.suse.com/1018100
   https://bugzilla.suse.com/1018263
   https://bugzilla.suse.com/1018419
   https://bugzilla.suse.com/1018446
   https://bugzilla.suse.com/1019168
   https://bugzilla.suse.com/1019514
   https://bugzilla.suse.com/1020048
   https://bugzilla.suse.com/1020795
   https://bugzilla.suse.com/1021256
   https://bugzilla.suse.com/1021374
   https://bugzilla.suse.com/1021762
   https://bugzilla.suse.com/1021913
   https://bugzilla.suse.com/1022559
   https://bugzilla.suse.com/1022971
   https://bugzilla.suse.com/1023164
   https://bugzilla.suse.com/1023207
   https://bugzilla.suse.com/1023377
   https://bugzilla.suse.com/1023762
   https://bugzilla.suse.com/1023824
   https://bugzilla.suse.com/1023888
   https://bugzilla.suse.com/1023992
   https://bugzilla.suse.com/1024081
   https://bugzilla.suse.com/1024234
   https://bugzilla.suse.com/1024309
   https://bugzilla.suse.com/1024508
   https://bugzilla.suse.com/1024788
   https://bugzilla.suse.com/1025039
   https://bugzilla.suse.com/1025235
   https://bugzilla.suse.com/1025354
   https://bugzilla.suse.com/1025802
   https://bugzilla.suse.com/1026024
   https://bugzilla.suse.com/1026722
   https://bugzilla.suse.com/1026914
   https://bugzilla.suse.com/1027066
   https://bugzilla.suse.com/1027178
   https://bugzilla.suse.com/1027189
   https://bugzilla.suse.com/1027190
   https://bugzilla.suse.com/1027974
   https://bugzilla.suse.com/1028041
   https://bugzilla.suse.com/1028415
   https://bugzilla.suse.com/1028595
   https://bugzilla.suse.com/1028648
   https://bugzilla.suse.com/1028895
   https://bugzilla.suse.com/1029470
   https://bugzilla.suse.com/1029850
   https://bugzilla.suse.com/1029986
   https://bugzilla.suse.com/1030118
   https://bugzilla.suse.com/1030213
   https://bugzilla.suse.com/1030593
   https://bugzilla.suse.com/1030901
   https://bugzilla.suse.com/1031003
   https://bugzilla.suse.com/1031052
   https://bugzilla.suse.com/1031080
   https://bugzilla.suse.com/1031440
   https://bugzilla.suse.com/1031567
   https://bugzilla.suse.com/1031579
   https://bugzilla.suse.com/1031662
   https://bugzilla.suse.com/1031842
   https://bugzilla.suse.com/1032125
   https://bugzilla.suse.com/1032141
   https://bugzilla.suse.com/1032344
   https://bugzilla.suse.com/1032345
   https://bugzilla.suse.com/1033336
   https://bugzilla.suse.com/1034670
   https://bugzilla.suse.com/103470
   https://bugzilla.suse.com/1034700
   https://bugzilla.suse.com/1035576
   https://bugzilla.suse.com/1035699
   https://bugzilla.suse.com/1035738
   https://bugzilla.suse.com/1035877
   https://bugzilla.suse.com/1036752
   https://bugzilla.suse.com/1038261
   https://bugzilla.suse.com/799133
   https://bugzilla.suse.com/857926
   https://bugzilla.suse.com/914939
   https://bugzilla.suse.com/917630
   https://bugzilla.suse.com/922853
   https://bugzilla.suse.com/930399
   https://bugzilla.suse.com/931620
   https://bugzilla.suse.com/937444
   https://bugzilla.suse.com/940946
   https://bugzilla.suse.com/954763
   https://bugzilla.suse.com/968697
   https://bugzilla.suse.com/970083
   https://bugzilla.suse.com/971933
   https://bugzilla.suse.com/979215
   https://bugzilla.suse.com/982783
   https://bugzilla.suse.com/983212
   https://bugzilla.suse.com/984530
   https://bugzilla.suse.com/985561
   https://bugzilla.suse.com/988065
   https://bugzilla.suse.com/989056
   https://bugzilla.suse.com/993832

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=N3Vw
-----END PGP SIGNATURE-----