Security update for the Linux Kernel

The openSUSE 13.2 kernel was updated to receive security and bugfixes.

It also fixes a regression that caused the Chromium sandbox to no longer work (bsc#965356).

Following security bugs were fixed:
- CVE-2016-2069: A flaw was discovered in a way the Linux deals with
paging structures. When Linux invalidates a paging structure that is
not in use locally, it could, in principle, race against another CPU
that is switching to a process that uses the paging structure in question, causing
a local denial service (machine crash). (bnc#963767).
- CVE-2016-0723: Race condition in the tty_ioctl function in
drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain
sensitive information from kernel memory or cause a denial of service
(use-after-free and system crash) by making a TIOCGETD ioctl
call during processing of a TIOCSETD ioctl call (bnc#961500).

The following non-security bugs were fixed:
- Bluetooth: ath3k: workaround the compatibility issue with xHCI controller (bnc#907378).
- kABI fix for addition of user_namespace.flags field (bnc#965308, bnc#965356).
- userns: Add a knob to disable setgroups on a per user namespace basis (bnc#965308, bnc#965356).
- userns: Allow setting gid_maps without privilege when setgroups is disabled (bnc#965308, bnc#965356).
- userns: Rename id_map_mutex to userns_state_mutex (bnc#965308, bnc#965356).

Fixed bugs
bnc#907378
ath3k bluetooth probe of 3-7:1.0 failed with error -110 from time to time
bnc#961500
VUL-0: CVE-2016-0723: kernel: Use-after-free in TIOCGETD ioctl
bnc#963767
VUL-0: CVE-2016-2069 : kernel: race condition in the TLB flush logic
bnc#965308
chromium doesn't start after kernel update, Check failed: NamespaceUtils::WriteToIdMapFile("/proc/self/gid_map", gid_)
bnc#965356
Chromium: Check failed: NamespaceUtils::WriteToIdMapFile("/proc/self/gid_map", gid_)
Selected Binaries
openSUSE Build Service is sponsored by