SUSE SLED11 / SLES11 Security Update : kernel (SUSE-SU-2016:0911-1)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote SUSE host is missing one or more security updates.

Description :

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various
security and bugfixes.

Following feature was added to kernel-xen :

- A improved XEN blkfront module was added, which allows
more I/O bandwidth. (FATE#320200) It is called
xen-blkfront in PV, and xen-vbd-upstream in HVM mode.

The following security bugs were fixed :

- CVE-2013-7446: Use-after-free vulnerability in
net/unix/af_unix.c in the Linux kernel allowed local
users to bypass intended AF_UNIX socket permissions or
cause a denial of service (panic) via crafted epoll_ctl
calls (bnc#955654).

- CVE-2015-7515: An out of bounds memory access in the
aiptek USB driver could be used by physical local
attackers to crash the kernel (bnc#956708).

- CVE-2015-7550: The keyctl_read_key function in
security/keys/keyctl.c in the Linux kernel did not
properly use a semaphore, which allowed local users to
cause a denial of service (NULL pointer dereference and
system crash) or possibly have unspecified other impact
via a crafted application that leverages a race
condition between keyctl_revoke and keyctl_read calls
(bnc#958951).

- CVE-2015-8539: The KEYS subsystem in the Linux kernel
allowed local users to gain privileges or cause a denial
of service (BUG) via crafted keyctl commands that
negatively instantiate a key, related to
security/keys/encrypted-keys/encrypted.c,
security/keys/trusted.c, and
security/keys/user_defined.c (bnc#958463).

- CVE-2015-8543: The networking implementation in the
Linux kernel did not validate protocol identifiers for
certain protocol families, which allowed local users to
cause a denial of service (NULL function pointer
dereference and system crash) or possibly gain
privileges by leveraging CLONE_NEWUSER support to
execute a crafted SOCK_RAW application (bnc#958886).

- CVE-2015-8550: Compiler optimizations in the XEN PV
backend drivers could have lead to double fetch
vulnerabilities, causing denial of service or arbitrary
code execution (depending on the configuration)
(bsc#957988).

- CVE-2015-8551, CVE-2015-8552: xen/pciback: For
XEN_PCI_OP_disable_msi[|x] only disable if device has
MSI(X) enabled (bsc#957990).

- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect
functions in drivers/net/ppp/pptp.c in the Linux kernel
did not verify an address length, which allowed local
users to obtain sensitive information from kernel memory
and bypass the KASLR protection mechanism via a crafted
application (bnc#959190).

- CVE-2015-8575: The sco_sock_bind function in
net/bluetooth/sco.c in the Linux kernel did not verify
an address length, which allowed local users to obtain
sensitive information from kernel memory and bypass the
KASLR protection mechanism via a crafted application
(bnc#959190 bnc#959399).

- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux
kernel did not properly manage the relationship between
a lock and a socket, which allowed local users to cause
a denial of service (deadlock) via a crafted sctp_accept
call (bnc#961509).

- CVE-2015-8785: The fuse_fill_write_pages function in
fs/fuse/file.c in the Linux kernel allowed local users
to cause a denial of service (infinite loop) via a
writev system call that triggers a zero length for the
first segment of an iov (bnc#963765).

- CVE-2015-8812: A use-after-free flaw was found in the
CXGB3 kernel driver when the network was considered to
be congested. This could be used by local attackers to
cause machine crashes or potentially code execution
(bsc#966437).

- CVE-2016-0723: Race condition in the tty_ioctl function
in drivers/tty/tty_io.c in the Linux kernel allowed
local users to obtain sensitive information from kernel
memory or cause a denial of service (use-after-free and
system crash) by making a TIOCGETD ioctl call during
processing of a TIOCSETD ioctl call (bnc#961500).

- CVE-2016-2069: Race conditions in TLB syncing was fixed
which could leak to information leaks (bnc#963767).

- CVE-2016-2384: Removed a double free in the ALSA
usb-audio driver in the umidi object which could lead to
crashes (bsc#966693).

- CVE-2016-2543: Added a missing NULL check at
remove_events ioctl in ALSA that could lead to crashes.
(bsc#967972).

- CVE-2016-2544, CVE-2016-2545, CVE-2016-2546,
CVE-2016-2547, CVE-2016-2548, CVE-2016-2549: Various
race conditions in ALSAs timer handling were fixed.
(bsc#967975, bsc#967974, bsc#967973, bsc#968011,
bsc#968012, bsc#968013).

The following non-security bugs were fixed :

- alsa: hda - Add one more node in the EAPD supporting
candidate list (bsc#963561).

- alsa: hda - Apply clock gate workaround to Skylake, too
(bsc#966137).

- alsa: hda - Fix playback noise with 24/32 bit sample
size on BXT (bsc#966137).

- alsa: hda - disable dynamic clock gating on Broxton
before reset (bsc#966137).

- Add /etc/modprobe.d/50-xen.conf selecting Xen frontend
driver implementation (bsc#957986, bsc#956084,
bsc#961658).

- Fix handling of re-write-before-commit for mmapped NFS
pages (bsc#964201).

- nfsv4: Recovery of recalled read delegations is broken
(bsc#956514).

- nvme: default to 4k device page size (bsc#967042).

- pci: leave MEM and IO decoding disabled during 64-bit
BAR sizing, too (bsc#951815).

- Refresh
patches.xen/xen3-08-x86-ldt-make-modify_ldt-synchronous.
patch (bsc#959705).

- Refresh patches.xen/xen-vscsi-large-requests (refine fix
and also address bsc#966094).

- sunrpc: restore fair scheduling to priority queues
(bsc#955308).

- usb: ftdi_sio: fix race condition in TIOCMIWAIT, and
abort of TIOCMIWAIT when the device is removed
(bnc#956375).

- usb: ftdi_sio: fix status line change handling for
TIOCMIWAIT and TIOCGICOUNT (bnc#956375).

- usb: ftdi_sio: fix tiocmget and tiocmset return values
(bnc#956375).

- usb: ftdi_sio: fix tiocmget indentation (bnc#956375).

- usb: ftdi_sio: optimise chars_in_buffer (bnc#956375).

- usb: ftdi_sio: refactor modem-control status retrieval
(bnc#956375).

- usb: ftdi_sio: remove unnecessary memset (bnc#956375).

- usb: ftdi_sio: use ftdi_get_modem_status in
chars_in_buffer (bnc#956375).

- usb: ftdi_sio: use generic chars_in_buffer (bnc#956375).

- usb: pl2303: clean up line-status handling (bnc#959649).

- usb: pl2303: only wake up MSR queue on changes
(bnc#959649).

- usb: pl2303: remove bogus delta_msr_wait wake up
(bnc#959649).

- usb: serial: export usb_serial_generic_chars_in_buffer
(bnc#956375).

- Update
patches.fixes/mm-exclude-reserved-pages-from-dirtyable-m
emory-fix.patch (bnc#940017, bnc#949298, bnc#947128).

- xen: Update Xen config files (enable upstream block
frontend).

- ec2: Update kabi files and start tracking ec2

- xen: consolidate and simplify struct xenbus_driver
instantiation (bsc#961658 fate#320200).

- blktap: also call blkif_disconnect() when frontend
switched to closed (bsc#952976).

- blktap: refine mm tracking (bsc#952976).

- block: Always check queue limits for cloned requests
(bsc#933782).

- block: xen-blkfront: Fix possible NULL ptr dereference
(bsc#961658 fate#320200).

- bnx2x: Add new device ids under the Qlogic vendor
(bsc#964818).

- bnx2x: Alloc 4k fragment for each rx ring buffer element
(bsc#953369).

- bnx2x: fix DMA API usage (bsc#953369).

- driver core: Add BUS_NOTIFY_REMOVED_DEVICE event
(bnc#962965).

- driver: xen-blkfront: move talk_to_blkback to a more
suitable place (bsc#961658 fate#320200).

- drivers: xen-blkfront: only talk_to_blkback() when in
XenbusStateInitialising (bsc#961658 fate#320200).

- drm/i915: Change semantics of hw_contexts_disabled
(bsc#963276).

- drm/i915: Evict CS TLBs between batches (bsc#758040).

- drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040).

- e1000e: Do not read ICR in Other interrupt (bsc#924919).

- e1000e: Do not write lsc to ics in msi-x mode
(bsc#924919).

- e1000e: Fix msi-x interrupt automask (bsc#924919).

- e1000e: Remove unreachable code (bsc#924919).

- ext3: NULL dereference in ext3_evict_inode()
(bsc#942082).

- ext3: fix data=journal fast mount/umount hang
(bsc#942082).

- firmware: Create directories for external firmware
(bsc#959312).

- firmware: Simplify directory creation (bsc#959312).

- ftdi_sio: private backport of TIOCMIWAIT (bnc#956375).

- iommu/vt-d: Do not change dma domain on dma-mask change
(bsc#955925).

- jbd: Fix unreclaimed pages after truncate in
data=journal mode (bsc#961516).

- kabi/severities: Add exception for
bnx2x_schedule_sp_rtnl() There is no external, 3rd party
modules use the symbol and the bnx2x_schedule_sp_rtnl
symbol is only used in the bnx2x driver. (bsc#953369)

- kbuild: create directory for dir/file.o (bsc#959312).

- llist/xen-blkfront: implement safe version of
llist_for_each_entry (bsc#961658 fate#320200).

- lpfc: Fix null ndlp dereference in target_reset_handler
(bsc#951392).

- mm-memcg-print-statistics-from-live-counters-fix
(bnc#969307).

- nvme: Clear BIO_SEG_VALID flag in nvme_bio_split()
(bsc#954992).

- pci: Update VPD size with correct length (bsc#958906).

- pl2303: fix TIOCMIWAIT (bnc#959649).

- pl2303: introduce private disconnect method
(bnc#959649).

- qeth: initialize net_device with carrier off
(bnc#958000, LTC#136514).

- s390/cio: collect format 1 channel-path description data
(bnc#958000, LTC#136434).

- s390/cio: ensure consistent measurement state
(bnc#958000, LTC#136434).

- s390/cio: fix measurement characteristics memleak
(bnc#958000, LTC#136434).

- s390/cio: update measurement characteristics
(bnc#958000, LTC#136434).

- s390/dasd: fix failfast for disconnected devices
(bnc#958000, LTC#135138).

- s390/sclp: Determine HSA size dynamically for zfcpdump
(bnc#958000, LTC#136143).

- s390/sclp: Move declarations for sclp_sdias into
separate header file (bnc#958000, LTC#136143).

- scsi_dh_rdac: always retry MODE SELECT on command lock
violation (bsc#956949).

- supported.conf: Add xen-blkfront.

- tg3: 5715 does not link up when autoneg off
(bsc#904035).

- usb: serial: ftdi_sio: Add missing chars_in_buffer
function (bnc#956375).

- vmxnet3: fix building without CONFIG_PCI_MSI
(bsc#958912).

- vmxnet3: fix netpoll race condition (bsc#958912).

- xen, blkfront: factor out flush-related checks from
do_blkif_request() (bsc#961658 fate#320200).

- xen-blkfront: Handle discard requests (bsc#961658
fate#320200).

- xen-blkfront: If no barrier or flush is supported, use
invalid operation (bsc#961658 fate#320200).

- xen-blkfront: Introduce a 'max' module parameter to
alter the amount of indirect segments (bsc#961658
fate#320200).

- xen-blkfront: Silence pfn maybe-uninitialized warning
(bsc#961658 fate#320200).

- xen-blkfront: allow building in our Xen environment
(bsc#961658 fate#320200).

- xen-blkfront: check for null drvdata in blkback_changed
(XenbusStateClosing) (bsc#961658 fate#320200).

- xen-blkfront: do not add indirect pages to list when
!feature_persistent (bsc#961658 fate#320200).

- xen-blkfront: drop the use of llist_for_each_entry_safe
(bsc#961658 fate#320200).

- xen-blkfront: fix a deadlock while handling discard
response (bsc#961658 fate#320200).

- xen-blkfront: fix accounting of reqs when migrating
(bsc#961658 fate#320200).

- xen-blkfront: free allocated page (bsc#961658
fate#320200).

- xen-blkfront: handle backend CLOSED without CLOSING
(bsc#961658 fate#320200).

- xen-blkfront: handle bvecs with partial data (bsc#961658
fate#320200).

- xen-blkfront: improve aproximation of required grants
per request (bsc#961658 fate#320200).

- xen-blkfront: make blkif_io_lock spinlock per-device
(bsc#961658 fate#320200).

- xen-blkfront: plug device number leak in xlblk_init()
error path (bsc#961658 fate#320200).

- xen-blkfront: pre-allocate pages for requests
(bsc#961658 fate#320200).

- xen-blkfront: remove frame list from blk_shadow
(bsc#961658 fate#320200).

- xen-blkfront: remove type check from
blkfront_setup_discard (bsc#961658 fate#320200).

- xen-blkfront: restore the non-persistent data path
(bsc#961658 fate#320200).

- xen-blkfront: revoke foreign access for grants not
mapped by the backend (bsc#961658 fate#320200).

- xen-blkfront: set blk_queue_max_hw_sectors correctly
(bsc#961658 fate#320200).

- xen-blkfront: switch from llist to list (bsc#961658
fate#320200).

- xen-blkfront: use a different scatterlist for each
request (bsc#961658 fate#320200).

- xen-block: implement indirect descriptors (bsc#961658
fate#320200).

- xen/blk[front|back]: Enhance discard support with secure
erasing support (bsc#961658 fate#320200).

- xen/blk[front|back]: Squash blkif_request_rw and
blkif_request_discard together (bsc#961658 fate#320200).

- xen/blkback: Persistent grant maps for xen blk drivers
(bsc#961658 fate#320200).

- xen/blkback: persistent-grants fixes (bsc#961658
fate#320200).

- xen/blkfront: Fix crash if backend does not follow the
right states (bsc#961658 fate#320200).

- xen/blkfront: do not put bdev right after getting it
(bsc#961658 fate#320200).

- xen/blkfront: improve protection against issuing
unsupported REQ_FUA (bsc#961658 fate#320200).

- xen/blkfront: remove redundant flush_op (bsc#961658
fate#320200).

- xen/panic/x86: Allow cpus to save registers even if they
(bnc#940946).

- xen/panic/x86: Fix re-entrance problem due to panic on
(bnc#937444).

- xen/pvhvm: If xen_platform_pci=0 is set do not blow up
(v4) (bsc#961658 fate#320200).

- xen/x86/mm: Add barriers and document
switch_mm()-vs-flush synchronization (bnc#963767).

- xen: x86: mm: drop TLB flush from ptep_set_access_flags
(bsc#948330).

- xen: x86: mm: only do a local tlb flush in
ptep_set_access_flags() (bsc#948330).

- xfs: Skip dirty pages in ->releasepage (bnc#912738,
bnc#915183).

- zfcp: fix fc_host port_type with NPIV (bnc#958000,
LTC#132479).

Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

https://bugzilla.suse.com/758040
https://bugzilla.suse.com/904035
https://bugzilla.suse.com/912738
https://bugzilla.suse.com/915183
https://bugzilla.suse.com/924919
https://bugzilla.suse.com/933782
https://bugzilla.suse.com/937444
https://bugzilla.suse.com/940017
https://bugzilla.suse.com/940946
https://bugzilla.suse.com/942082
https://bugzilla.suse.com/947128
https://bugzilla.suse.com/948330
https://bugzilla.suse.com/949298
https://bugzilla.suse.com/951392
https://bugzilla.suse.com/951815
https://bugzilla.suse.com/952976
https://bugzilla.suse.com/953369
https://bugzilla.suse.com/954992
https://bugzilla.suse.com/955308
https://bugzilla.suse.com/955654
https://bugzilla.suse.com/955837
https://bugzilla.suse.com/955925
https://bugzilla.suse.com/956084
https://bugzilla.suse.com/956375
https://bugzilla.suse.com/956514
https://bugzilla.suse.com/956708
https://bugzilla.suse.com/956949
https://bugzilla.suse.com/957986
https://bugzilla.suse.com/957988
https://bugzilla.suse.com/957990
https://bugzilla.suse.com/958000
https://bugzilla.suse.com/958463
https://bugzilla.suse.com/958886
https://bugzilla.suse.com/958906
https://bugzilla.suse.com/958912
https://bugzilla.suse.com/958951
https://bugzilla.suse.com/959190
https://bugzilla.suse.com/959312
https://bugzilla.suse.com/959399
https://bugzilla.suse.com/959649
https://bugzilla.suse.com/959705
https://bugzilla.suse.com/961500
https://bugzilla.suse.com/961509
https://bugzilla.suse.com/961516
https://bugzilla.suse.com/961658
https://bugzilla.suse.com/962965
https://bugzilla.suse.com/963276
https://bugzilla.suse.com/963561
https://bugzilla.suse.com/963765
https://bugzilla.suse.com/963767
https://bugzilla.suse.com/964201
https://bugzilla.suse.com/964818
https://bugzilla.suse.com/966094
https://bugzilla.suse.com/966137
https://bugzilla.suse.com/966437
https://bugzilla.suse.com/966693
https://bugzilla.suse.com/967042
https://bugzilla.suse.com/967972
https://bugzilla.suse.com/967973
https://bugzilla.suse.com/967974
https://bugzilla.suse.com/967975
https://bugzilla.suse.com/968011
https://bugzilla.suse.com/968012
https://bugzilla.suse.com/968013
https://bugzilla.suse.com/969307
https://www.suse.com/security/cve/CVE-2013-7446.html
https://www.suse.com/security/cve/CVE-2015-7515.html
https://www.suse.com/security/cve/CVE-2015-7550.html
https://www.suse.com/security/cve/CVE-2015-8539.html
https://www.suse.com/security/cve/CVE-2015-8543.html
https://www.suse.com/security/cve/CVE-2015-8550.html
https://www.suse.com/security/cve/CVE-2015-8551.html
https://www.suse.com/security/cve/CVE-2015-8552.html
https://www.suse.com/security/cve/CVE-2015-8569.html
https://www.suse.com/security/cve/CVE-2015-8575.html
https://www.suse.com/security/cve/CVE-2015-8767.html
https://www.suse.com/security/cve/CVE-2015-8785.html
https://www.suse.com/security/cve/CVE-2015-8812.html
https://www.suse.com/security/cve/CVE-2016-0723.html
https://www.suse.com/security/cve/CVE-2016-2069.html
https://www.suse.com/security/cve/CVE-2016-2384.html
https://www.suse.com/security/cve/CVE-2016-2543.html
https://www.suse.com/security/cve/CVE-2016-2544.html
https://www.suse.com/security/cve/CVE-2016-2545.html
https://www.suse.com/security/cve/CVE-2016-2546.html
https://www.suse.com/security/cve/CVE-2016-2547.html
https://www.suse.com/security/cve/CVE-2016-2548.html
https://www.suse.com/security/cve/CVE-2016-2549.html
http://www.nessus.org/u?81a9d365

Solution :

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Software Development Kit 11-SP4 :

zypper in -t patch sdksp4-kernel-201603-12480=1

SUSE Linux Enterprise Server 11-SP4 :

zypper in -t patch slessp4-kernel-201603-12480=1

SUSE Linux Enterprise Server 11-EXTRA :

zypper in -t patch slexsp3-kernel-201603-12480=1

SUSE Linux Enterprise Desktop 11-SP4 :

zypper in -t patch sledsp4-kernel-201603-12480=1

SUSE Linux Enterprise Debuginfo 11-SP4 :

zypper in -t patch dbgsp4-kernel-201603-12480=1

To bring your system up-to-date, use 'zypper patch'.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.8
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true