File _patchinfo of Package patchinfo.2789
<patchinfo incident="2789">
<issue id="971770" tracker="bnc">kvm guest does not show the cpu flag nonstop_tsc which is needed by SAP HANA certification on KVM</issue>
<issue id="972124" tracker="bnc">blk_cloned_rq_check_limits: over max size limit - after security update ppc64le lpar doesn't boot.</issue>
<issue id="981143" tracker="bnc">L3: kernel memory corruption due to double-free of ceph_snap_context</issue>
<issue id="983394" tracker="bnc">Crash while writing to unallocated range of a layered RBD image</issue>
<issue id="986362" tracker="bnc">VUL-0: CVE-2016-4997: kernel: Linux local privilege escalation in compat_setsockopt</issue>
<issue id="2016-4998" tracker="cve">VUL-0: CVE-2016-4997: kernel: Linux local privilege escalation in compat_setsockopt</issue>
<category>security</category>
<rating>important</rating>
<packager>michal-m</packager>
<reboot_needed/>
<description>
The SUSE Linux Enterprise 12 kernel was updated to receive critical security and bugfixes.
Security issue fixed:
- CVE-2016-4997: A buffer overflow in 32bit compat_setsockopt iptables handling could lead to a local privilege escalation. (bsc#986362)
The following non-security bugs were fixed:
- KVM: x86: expose invariant tsc cpuid bit (v2) (bsc#971770).
- block: do not check request size in blk_cloned_rq_check_limits() (bsc#972124).
- rbd: handle OBJ_REQUEST_SG types for copyup (bsc#983394).
- target/rbd: do not put snap_context twice (bsc#981143).
- target/rbd: remove caw_mutex usage (bsc#981143).
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>