Security update for kernel-source
Announcement ID: | SUSE-RU-2018:2989-1 |
---|---|
Rating: | important |
References: | |
Affected Products: |
|
An update that has 21 fixes can now be installed.
Description:
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive the following bug fixes:
- selinux/nlmsg: add XFRM_MSG_MIGRATE [bsc#1109946].
- selinux/nlmsg: add XFRM_MSG_REPORT [bsc#1109945].
- selinux/nlmsg: add XFRM_MSG_MAPPING [bsc#1109944].
- selinux/nlmsg: add XFRM_MSG_[NEW|GET]SADINFO [bsc#1109943].
- selinux/nlmsg: add XFRM_MSG_GETSPDINFO [bsc#1109942].
- selinux/nlmsg: add XFRM_MSG_NEWSPDINFO [bsc#1109941].
- bnx2x: use the right constant [bsc#1109922].
- btrfs: fix missing error return in btrfs_drop_snapshot
- ubifs: Check for name being NULL while mounting [bsc#1109913].
- hostfs: Freeing an ERR_PTR in hostfs_fill_sb_common() [bsc#1109901].
- fscache: Fix reference overput in fscache_attach_object() error handling [bsc#1109751].
- fscache: Allow cancelled operations to be enqueued [bsc#1109750].
- cachefiles: Wait rather than BUG'ing on "Unexpected object collision" [bsc#1109749].
- cachefiles: Fix refcounting bug in backing-file read monitoring [bsc#1109748].
- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag [bsc#1109747].
- fs/binfmt_misc.c: do not allow offset overflow [bsc#1109746].
- binfmt_elf: Respect error return from `regset->active' [bsc#1109740].
- reiserfs: fix broken xattr handling (heap corruption, bad retval) [bsc#1109734].
- reiserfs: fix buffer overflow with long warning messages [bsc#1109733].
- x86/fpu: fix signal handling with eager FPU switching (ia32) [bsc#1108227].
- epoll: fix race between ep_poll_callback(POLLFREE) and ep_free()/ep_remove() [bsc#1109517].
- asm/sections: add helpers to check for section data [bsc#1107735].
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Software Development Kit 11 SP4
zypper in -t patch sdksp4-kernel-source-13802=1
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch slessp4-kernel-source-13802=1
-
SLES for SAP Applications 11-SP4
zypper in -t patch slessp4-kernel-source-13802=1
Package List:
-
SUSE Linux Enterprise Software Development Kit 11 SP4 (noarch nosrc)
- kernel-docs-3.0.101-108.74.1
-
SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 ia64 nosrc)
- kernel-default-3.0.101-108.74.1
- kernel-trace-3.0.101-108.74.1
-
SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 ia64)
- kernel-trace-base-3.0.101-108.74.1
- kernel-source-3.0.101-108.74.1
- kernel-default-base-3.0.101-108.74.1
- kernel-default-devel-3.0.101-108.74.1
- kernel-syms-3.0.101-108.74.1
- kernel-trace-devel-3.0.101-108.74.1
-
SUSE Linux Enterprise Server 11 SP4 (nosrc x86_64 i586)
- kernel-ec2-3.0.101-108.74.1
- kernel-xen-3.0.101-108.74.1
-
SUSE Linux Enterprise Server 11 SP4 (x86_64 i586)
- kernel-xen-base-3.0.101-108.74.1
- kernel-ec2-base-3.0.101-108.74.1
- kernel-xen-devel-3.0.101-108.74.1
- kernel-ec2-devel-3.0.101-108.74.1
-
SUSE Linux Enterprise Server 11 SP4 (nosrc i586)
- kernel-pae-3.0.101-108.74.1
-
SUSE Linux Enterprise Server 11 SP4 (i586)
- kernel-pae-devel-3.0.101-108.74.1
- kernel-pae-base-3.0.101-108.74.1
-
SUSE Linux Enterprise Server 11 SP4 (ppc64 nosrc)
- kernel-ppc64-3.0.101-108.74.1
- kernel-bigmem-3.0.101-108.74.1
-
SUSE Linux Enterprise Server 11 SP4 (ppc64)
- kernel-ppc64-base-3.0.101-108.74.1
- kernel-bigmem-base-3.0.101-108.74.1
- kernel-bigmem-devel-3.0.101-108.74.1
- kernel-ppc64-devel-3.0.101-108.74.1
-
SUSE Linux Enterprise Server 11 SP4 (s390x)
- kernel-default-man-3.0.101-108.74.1
-
SLES for SAP Applications 11-SP4 (ppc64 nosrc)
- kernel-ppc64-3.0.101-108.74.1
- kernel-bigmem-3.0.101-108.74.1
-
SLES for SAP Applications 11-SP4 (ppc64)
- kernel-ppc64-base-3.0.101-108.74.1
- kernel-bigmem-base-3.0.101-108.74.1
- kernel-bigmem-devel-3.0.101-108.74.1
- kernel-ppc64-devel-3.0.101-108.74.1
-
SLES for SAP Applications 11-SP4 (ppc64 nosrc x86_64)
- kernel-default-3.0.101-108.74.1
- kernel-trace-3.0.101-108.74.1
-
SLES for SAP Applications 11-SP4 (ppc64 x86_64)
- kernel-trace-base-3.0.101-108.74.1
- kernel-source-3.0.101-108.74.1
- kernel-default-base-3.0.101-108.74.1
- kernel-default-devel-3.0.101-108.74.1
- kernel-syms-3.0.101-108.74.1
- kernel-trace-devel-3.0.101-108.74.1
-
SLES for SAP Applications 11-SP4 (nosrc x86_64)
- kernel-ec2-3.0.101-108.74.1
- kernel-xen-3.0.101-108.74.1
-
SLES for SAP Applications 11-SP4 (x86_64)
- kernel-xen-base-3.0.101-108.74.1
- kernel-ec2-base-3.0.101-108.74.1
- kernel-xen-devel-3.0.101-108.74.1
- kernel-ec2-devel-3.0.101-108.74.1
References:
- https://bugzilla.suse.com/show_bug.cgi?id=1107735
- https://bugzilla.suse.com/show_bug.cgi?id=1108227
- https://bugzilla.suse.com/show_bug.cgi?id=1109517
- https://bugzilla.suse.com/show_bug.cgi?id=1109733
- https://bugzilla.suse.com/show_bug.cgi?id=1109734
- https://bugzilla.suse.com/show_bug.cgi?id=1109740
- https://bugzilla.suse.com/show_bug.cgi?id=1109746
- https://bugzilla.suse.com/show_bug.cgi?id=1109747
- https://bugzilla.suse.com/show_bug.cgi?id=1109748
- https://bugzilla.suse.com/show_bug.cgi?id=1109749
- https://bugzilla.suse.com/show_bug.cgi?id=1109750
- https://bugzilla.suse.com/show_bug.cgi?id=1109751
- https://bugzilla.suse.com/show_bug.cgi?id=1109901
- https://bugzilla.suse.com/show_bug.cgi?id=1109913
- https://bugzilla.suse.com/show_bug.cgi?id=1109922
- https://bugzilla.suse.com/show_bug.cgi?id=1109941
- https://bugzilla.suse.com/show_bug.cgi?id=1109942
- https://bugzilla.suse.com/show_bug.cgi?id=1109943
- https://bugzilla.suse.com/show_bug.cgi?id=1109944
- https://bugzilla.suse.com/show_bug.cgi?id=1109945
- https://bugzilla.suse.com/show_bug.cgi?id=1109946