File _patchinfo of Package patchinfo.5312
<patchinfo incident="5312"> <issue id="970114" tracker="bnc"></issue> <issue id="970275" tracker="bnc">xenbus deadlock</issue> <issue id="978469" tracker="bnc">L3: kernel BUG at ../drivers/xen/netback/netback.c:658</issue> <issue id="980265" tracker="bnc">VUL-0: CVE-2016-4794: kernel: Use after free in array_map_alloc</issue> <issue id="983977" tracker="bnc">[rmmod] rmmod of saa7146 in D state infinitely</issue> <issue id="984755" tracker="bnc">VUL-0: CVE-2016-4470: kernel-source: Uninitialized variable in request_key handling causes kernel crash in error handling path</issue> <issue id="986362" tracker="bnc">VUL-0: CVE-2016-4997: kernel: Linux local privilege escalation in compat_setsockopt</issue> <issue id="986530" tracker="bnc">Network on Cavium HW does not get initialized at boot</issue> <issue id="986572" tracker="bnc">VUL-0: CVE-2016-5829: kernel-source: HID: hiddev buffer overflows</issue> <issue id="2016-5829" tracker="cve" /> <issue id="2016-4997" tracker="cve" /> <issue id="2016-4470" tracker="cve" /> <issue id="2016-4794" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>tiwai</packager> <reboot_needed/> <description> The openSUSE Leap 42.1 was updated to 4.1.27 to receive various security and bugfixes. The following security bugs were fixed: - CVE-2016-4997: A buffer overflow in 32bit compat_setsockopt iptables handling could lead to a local privilege escalation. (bsc#986362) - CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572). - CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755). - CVE-2016-4794: Use-after-free vulnerability in mm/percpu.c in the Linux kernel allowed local users to cause a denial of service (BUG) or possibly have unspecified other impact via crafted use of the mmap and bpf system calls (bnc#980265). The following non-security bugs were fixed: - Refresh patches.xen/xen-netback-coalesce: Restore copying of SKBs with head exceeding page size (bsc#978469). - Refresh patches.xen/xen3-patch-2.6.26 (fix PAT initialization). - Refresh patches.xen/xen3-patch-2.6.39 (fix ia32_compat inheritance). - Refresh patches.xen/xen3-patch-3.14: Suppress atomic file position updates for /proc/xen/xenbus (bsc#970275). - Refresh patches.xen/xen3-patch-3.16 (drop redundant addition of a comment). - Refresh patches.xen/xen3-patch-4.1.7-8. - base: make module_create_drivers_dir race-free (bnc#983977). - ipvs: count pre-established TCP states as active (bsc#970114). - net: thunderx: Fix TL4 configuration for secondary Qsets (bsc#986530). - net: thunderx: Fix link status reporting (bsc#986530). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>