Mailinglist Archive: opensuse-security-announce (21 mails)

< Previous Next >
[security-announce] openSUSE-SU-2013:1043-1: critical: kernel
openSUSE Security Update: kernel
______________________________________________________________________________

Announcement ID: openSUSE-SU-2013:1043-1
Rating: critical
References: #790920 #821560 #822722
Cross-References: CVE-2013-2850
Affected Products:
openSUSE 12.3
______________________________________________________________________________

An update that solves one vulnerability and has two fixes
is now available.

Description:


The openSUSE 12.3 kernel was updated to fix a critical
security issue and two reiserfs bugs.

CVE-2013-2850: Incorrect strncpy usage in the network
listening part of the iscsi target driver could have been
used by remote attackers to crash the kernel or execute
code.

This required the iscsi target running on the machine and
the attacker able to make a network connection to it (aka
not filtered by firewalls).

Bugs fixed:
- reiserfs: fix spurious multiple-fill in
reiserfs_readdir_dentry (bnc#822722).

- reiserfs: fix problems with chowning setuid file w/
xattrs (bnc#790920).

- iscsi-target: fix heap buffer overflow on error
(CVE-2013-2850, bnc#821560).


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 12.3:

zypper in -t patch openSUSE-2013-513

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 12.3 (i586 x86_64):

kernel-default-3.7.10-1.16.1
kernel-default-base-3.7.10-1.16.1
kernel-default-devel-3.7.10-1.16.1
kernel-syms-3.7.10-1.16.1

- openSUSE 12.3 (i686 x86_64):

kernel-debug-3.7.10-1.16.1
kernel-debug-base-3.7.10-1.16.1
kernel-debug-devel-3.7.10-1.16.1
kernel-desktop-3.7.10-1.16.1
kernel-desktop-base-3.7.10-1.16.1
kernel-desktop-devel-3.7.10-1.16.1
kernel-ec2-3.7.10-1.16.1
kernel-ec2-base-3.7.10-1.16.1
kernel-ec2-base-debuginfo-3.7.10-1.16.1
kernel-ec2-debuginfo-3.7.10-1.16.1
kernel-ec2-debugsource-3.7.10-1.16.1
kernel-ec2-devel-3.7.10-1.16.1
kernel-ec2-devel-debuginfo-3.7.10-1.16.1
kernel-trace-3.7.10-1.16.1
kernel-trace-base-3.7.10-1.16.1
kernel-trace-devel-3.7.10-1.16.1
kernel-vanilla-3.7.10-1.16.1
kernel-vanilla-devel-3.7.10-1.16.1
kernel-xen-3.7.10-1.16.1
kernel-xen-base-3.7.10-1.16.1
kernel-xen-devel-3.7.10-1.16.1

- openSUSE 12.3 (noarch):

kernel-devel-3.7.10-1.16.1
kernel-docs-3.7.10-1.16.1
kernel-source-3.7.10-1.16.1
kernel-source-vanilla-3.7.10-1.16.1

- openSUSE 12.3 (i686):

kernel-debug-base-debuginfo-3.7.10-1.16.1
kernel-debug-debuginfo-3.7.10-1.16.1
kernel-debug-debugsource-3.7.10-1.16.1
kernel-debug-devel-debuginfo-3.7.10-1.16.1
kernel-desktop-base-debuginfo-3.7.10-1.16.1
kernel-desktop-debuginfo-3.7.10-1.16.1
kernel-desktop-debugsource-3.7.10-1.16.1
kernel-desktop-devel-debuginfo-3.7.10-1.16.1
kernel-pae-3.7.10-1.16.1
kernel-pae-base-3.7.10-1.16.1
kernel-pae-base-debuginfo-3.7.10-1.16.1
kernel-pae-debuginfo-3.7.10-1.16.1
kernel-pae-debugsource-3.7.10-1.16.1
kernel-pae-devel-3.7.10-1.16.1
kernel-pae-devel-debuginfo-3.7.10-1.16.1
kernel-trace-base-debuginfo-3.7.10-1.16.1
kernel-trace-debuginfo-3.7.10-1.16.1
kernel-trace-debugsource-3.7.10-1.16.1
kernel-trace-devel-debuginfo-3.7.10-1.16.1
kernel-vanilla-debuginfo-3.7.10-1.16.1
kernel-vanilla-debugsource-3.7.10-1.16.1
kernel-vanilla-devel-debuginfo-3.7.10-1.16.1
kernel-xen-base-debuginfo-3.7.10-1.16.1
kernel-xen-debuginfo-3.7.10-1.16.1
kernel-xen-debugsource-3.7.10-1.16.1
kernel-xen-devel-debuginfo-3.7.10-1.16.1

- openSUSE 12.3 (i586):

kernel-default-base-debuginfo-3.7.10-1.16.1
kernel-default-debuginfo-3.7.10-1.16.1
kernel-default-debugsource-3.7.10-1.16.1
kernel-default-devel-debuginfo-3.7.10-1.16.1


References:

http://support.novell.com/security/cve/CVE-2013-2850.html
https://bugzilla.novell.com/790920
https://bugzilla.novell.com/821560
https://bugzilla.novell.com/822722

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx

< Previous Next >
This Thread
  • No further messages