The SUSE Linux Enterprise 12 GA LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).
The previous fix using CPU Microcode has been complemented by building the Linux Kernel with return trampolines aka 'retpolines'.
CVE-2017-18079: drivers/input/serio/i8042.c allowed attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port->exists value can change after it is validated (bnc#1077922)
The following non-security bugs were fixed:
{ "binaries": [ { "kernel-macros": "3.12.61-52.119.1", "kernel-devel": "3.12.61-52.119.1", "kernel-default-base": "3.12.61-52.119.1", "kernel-default-man": "3.12.61-52.119.1", "kernel-xen-devel": "3.12.61-52.119.1", "kernel-default": "3.12.61-52.119.1", "kernel-source": "3.12.61-52.119.1", "kernel-xen-base": "3.12.61-52.119.1", "kernel-syms": "3.12.61-52.119.1", "kgraft-patch-3_12_61-52_119-xen": "1-1.7.1", "kernel-default-devel": "3.12.61-52.119.1", "kernel-xen": "3.12.61-52.119.1", "kgraft-patch-3_12_61-52_119-default": "1-1.7.1" } ] }
{ "binaries": [ { "kernel-macros": "3.12.61-52.119.1", "kernel-devel": "3.12.61-52.119.1", "kernel-default-base": "3.12.61-52.119.1", "kernel-default-man": "3.12.61-52.119.1", "kernel-xen-devel": "3.12.61-52.119.1", "kernel-default": "3.12.61-52.119.1", "kernel-source": "3.12.61-52.119.1", "kernel-xen-base": "3.12.61-52.119.1", "kernel-syms": "3.12.61-52.119.1", "kgraft-patch-3_12_61-52_119-xen": "1-1.7.1", "kernel-default-devel": "3.12.61-52.119.1", "kernel-xen": "3.12.61-52.119.1", "kgraft-patch-3_12_61-52_119-default": "1-1.7.1" } ] }
{ "binaries": [ { "kernel-macros": "3.12.61-52.119.1", "kernel-devel": "3.12.61-52.119.1", "kernel-default-base": "3.12.61-52.119.1", "kernel-default-man": "3.12.61-52.119.1", "kernel-xen-devel": "3.12.61-52.119.1", "kernel-default": "3.12.61-52.119.1", "kernel-source": "3.12.61-52.119.1", "kernel-xen-base": "3.12.61-52.119.1", "kernel-syms": "3.12.61-52.119.1", "kgraft-patch-3_12_61-52_119-xen": "1-1.7.1", "kernel-default-devel": "3.12.61-52.119.1", "kernel-xen": "3.12.61-52.119.1", "kgraft-patch-3_12_61-52_119-default": "1-1.7.1" } ] }
{ "binaries": [ { "kernel-macros": "3.12.61-52.119.1", "kernel-devel": "3.12.61-52.119.1", "kernel-default-base": "3.12.61-52.119.1", "kernel-default-man": "3.12.61-52.119.1", "kernel-xen-devel": "3.12.61-52.119.1", "kernel-default": "3.12.61-52.119.1", "kernel-source": "3.12.61-52.119.1", "kernel-xen-base": "3.12.61-52.119.1", "kernel-syms": "3.12.61-52.119.1", "kgraft-patch-3_12_61-52_119-xen": "1-1.7.1", "kernel-default-devel": "3.12.61-52.119.1", "kernel-xen": "3.12.61-52.119.1", "kgraft-patch-3_12_61-52_119-default": "1-1.7.1" } ] }
{ "binaries": [ { "kernel-macros": "3.12.61-52.119.1", "kernel-devel": "3.12.61-52.119.1", "kernel-default-base": "3.12.61-52.119.1", "kernel-default-man": "3.12.61-52.119.1", "kernel-xen-devel": "3.12.61-52.119.1", "kernel-default": "3.12.61-52.119.1", "kernel-source": "3.12.61-52.119.1", "kernel-xen-base": "3.12.61-52.119.1", "kernel-syms": "3.12.61-52.119.1", "kgraft-patch-3_12_61-52_119-xen": "1-1.7.1", "kernel-default-devel": "3.12.61-52.119.1", "kernel-xen": "3.12.61-52.119.1", "kgraft-patch-3_12_61-52_119-default": "1-1.7.1" } ] }