File _patchinfo of Package patchinfo.2789
<patchinfo incident="2789"> <issue id="971770" tracker="bnc">kvm guest does not show the cpu flag nonstop_tsc which is needed by SAP HANA certification on KVM</issue> <issue id="972124" tracker="bnc">blk_cloned_rq_check_limits: over max size limit - after security update ppc64le lpar doesn't boot.</issue> <issue id="981143" tracker="bnc">L3: kernel memory corruption due to double-free of ceph_snap_context</issue> <issue id="983394" tracker="bnc">Crash while writing to unallocated range of a layered RBD image</issue> <issue id="986362" tracker="bnc">VUL-0: CVE-2016-4997: kernel: Linux local privilege escalation in compat_setsockopt</issue> <issue id="2016-4998" tracker="cve">VUL-0: CVE-2016-4997: kernel: Linux local privilege escalation in compat_setsockopt</issue> <category>security</category> <rating>important</rating> <packager>michal-m</packager> <reboot_needed/> <description> The SUSE Linux Enterprise 12 kernel was updated to receive critical security and bugfixes. Security issue fixed: - CVE-2016-4997: A buffer overflow in 32bit compat_setsockopt iptables handling could lead to a local privilege escalation. (bsc#986362) The following non-security bugs were fixed: - KVM: x86: expose invariant tsc cpuid bit (v2) (bsc#971770). - block: do not check request size in blk_cloned_rq_check_limits() (bsc#972124). - rbd: handle OBJ_REQUEST_SG types for copyup (bsc#983394). - target/rbd: do not put snap_context twice (bsc#981143). - target/rbd: remove caw_mutex usage (bsc#981143). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>