File _patchinfo of Package patchinfo.6421

<patchinfo incident="6421">
  <issue id="1018100" tracker="bnc">btrfs: Compat FS_IOC_GETFLAGS/FS_IOC_SETFLAGS ioctls() does not work</issue>
  <issue id="1019168" tracker="bnc">[SLES-12-SP2] sfc driver reports few errors during boot.</issue>
  <issue id="1020048" tracker="bnc">[SLES12 SP2]  "Data miscompare on a read" is observed during the rebuilding of degraded MDRAID VDs</issue>
  <issue id="1021082" tracker="bnc">NET installer not picking up WiFi connection</issue>
  <issue id="1022304" tracker="bnc">System panic in get_disk() after removing associated kernel modules</issue>
  <issue id="1023762" tracker="bnc">VUL-0: CVE-2017-5897: kernel-source: ip6_gre:invalid reads in ip6gre_err()</issue>
  <issue id="1023884" tracker="bnc">Intel 3168 Wifi card doesn't work on boot, but does after module reload</issue>
  <issue id="1023888" tracker="bnc">xfstests xfs/118 triggers null pointer deref in xfs_trans_log_inode</issue>
  <issue id="1024081" tracker="bnc">xfstests xfs/306 causes null pointer dereference</issue>
  <issue id="1024234" tracker="bnc">xfstests xfs/133 and xfs/134 trigger hangup on unmount</issue>
  <issue id="1024508" tracker="bnc">xfstests xfs/311 causes null pointer dereference</issue>
  <issue id="1024938" tracker="bnc">VUL-0: CVE-2017-5970: kernel-source: ipv4: keep skb-&gt;dst around in presence of IP options</issue>
  <issue id="1025235" tracker="bnc">VUL-1: CVE-2017-5986: kernel-source: Reachable BUG_ON from userspace in sctp_wait_for_sndbuf()</issue>
  <issue id="969479" tracker="bnc">FATE 320634 Intel fm10k update for SLE12SP2</issue>
  <issue id="982783" tracker="bnc">SLES 11 SP4 - Severe performance degradation with RAID1 configuration (using NVMe on POWER)</issue>
  <issue id="989056" tracker="bnc">xfs_dmapi: dm_filldir(2) counts directory entry name twice</issue>
  <issue id="998106" tracker="bnc">[Intel SLES 12 SP2 BUG] Patrol read gets stuck for RAID1 array</issue>
  <issue id="1012382" tracker="bnc">Continuous stable update tracker for 4.4</issue>
  <issue id="1022181" tracker="bnc">kernel OOPS @ 'pcie_aspm_init_link_state' after upgrade from @Kernel:Stable 4.9.5-3.1.g9bb1a8a-default -> 4.9.6-1.1.gd1207ac-default</issue>
  <issue id="1026024" tracker="bnc">VUL-0: CVE-2017-6074: kernel-source: local privilege escalation due to double free in dccp code</issue>
  <issue id="2017-5986" tracker="cve" />
  <issue id="2017-5970" tracker="cve" />
  <issue id="2017-5897" tracker="cve" />
  <issue id="2017-6074" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>tiwai</packager>
  <reboot_needed/>
  <description>

The openSUSE Leap 42.2 kernel was updated to 4.4.49 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-5986: A userlevel triggerable BUG_ON on sctp_wait_for_sndbuf was fixed. (bsc#1025235)
- CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bnc#1024938).
- CVE-2017-5897: A potential remote denial of service within the IPv6 GRE protocol was fixed. (bsc#1023762)
- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to cause a denial of service (invalid free) or possibly have unspecified other impact via an application that makes an IPV6_RECVPKTINFO setsockopt system call. (bsc#1026024).

The following non-security bugs were fixed:

- btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls (bsc#1018100).
- iwlwifi: Expose the default fallback ucode API to module info (boo#1021082, boo#1023884).
- kabi: protect struct tcp_fastopen_cookie (kabi).
- md: ensure md devices are freed before module is unloaded (bsc#1022304).
- md: Fix a regression reported by bsc#1020048 in patches.fixes/0003-md-lockless-I-O-submission-for-RAID1.patch (bsc#982783,bsc#998106,bsc#1020048).
- net: ethtool: Initialize buffer when querying device channel settings (bsc#969479 FATE#320634).
- net: implement netif_cond_dbg macro (bsc#1019168).
- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).
- sfc: refactor debug-or-warnings printks (bsc#1019168).
- xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).
- xfs: do not allow di_size with high bit set (bsc#1024234).
- xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508).
- xfs: fix broken multi-fsb buffer logging (bsc#1024081).
- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).
- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).
- xfs: track and serialize in-flight async buffers against unmount (bsc#1024508).
- xfs: track and serialize in-flight async buffers against unmount - kABI (bsc#1024508).
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>
openSUSE Build Service is sponsored by