Mailinglist Archive: opensuse-security-announce (18 mails)

< Previous Next >
[security-announce] openSUSE-SU-2014:0204-1: important: kernel: security and bugfix update
openSUSE Security Update: kernel: security and bugfix update
______________________________________________________________________________

Announcement ID: openSUSE-SU-2014:0204-1
Rating: important
References: #804950 #805226 #808358 #811746 #825006 #831836
#838024 #840226 #840656 #844513 #848079 #848255
#849021 #849023 #849029 #849034 #849362 #852373
#852558 #852559 #853050 #853051 #853052 #853053
#854173 #854634 #854722 #860993
Cross-References: CVE-2013-0343 CVE-2013-1792 CVE-2013-4348
CVE-2013-4511 CVE-2013-4513 CVE-2013-4514
CVE-2013-4515 CVE-2013-4587 CVE-2013-6367
CVE-2013-6368 CVE-2013-6376 CVE-2013-6378
CVE-2013-6380 CVE-2013-6431 CVE-2013-7027
CVE-2014-0038
Affected Products:
openSUSE 12.3
______________________________________________________________________________

An update that solves 16 vulnerabilities and has 12 fixes
is now available.

Description:


The Linux kernel was updated to fix various bugs and
security issues:

- mm/page-writeback.c: do not count anon pages as dirtyable
memory (reclaim stalls).
- mm/page-writeback.c: fix dirty_balance_reserve
subtraction from dirtyable memory (reclaim stalls).

- compat_sys_recvmmsg X32 fix (bnc#860993 CVE-2014-0038).

- hwmon: (coretemp) Fix truncated name of alarm attributes

- net: fib: fib6_add: fix potential NULL pointer
dereference (bnc#854173 CVE-2013-6431).

- keys: fix race with concurrent install_user_keyrings()
(bnc#808358)(CVE-2013-1792).

- KVM: x86: Convert vapic synchronization to _cached
functions (CVE-2013-6368) (bnc#853052 CVE-2013-6368).

- wireless: radiotap: fix parsing buffer overrun
(bnc#854634 CVE-2013-7027).

- KVM: x86: fix guest-initiated crash with x2apic
(CVE-2013-6376) (bnc#853053 CVE-2013-6376).

- KVM: x86: Fix potential divide by 0 in lapic
(CVE-2013-6367) (bnc#853051 CVE-2013-6367).

- KVM: Improve create VCPU parameter (CVE-2013-4587)
(bnc#853050 CVE-2013-4587).

- staging: ozwpan: prevent overflow in oz_cdev_write()
(bnc#849023 CVE-2013-4513).

- perf/x86: Fix offcore_rsp valid mask for SNB/IVB
(bnc#825006).
- perf/x86: Add Intel IvyBridge event scheduling
constraints (bnc#825006).

- libertas: potential oops in debugfs (bnc#852559
CVE-2013-6378).

- aacraid: prevent invalid pointer dereference (bnc#852373
CVE-2013-6380).

- staging: wlags49_h2: buffer overflow setting station name
(bnc#849029 CVE-2013-4514).

- net: flow_dissector: fail on evil iph->ihl (bnc#848079
CVE-2013-4348).

- Staging: bcm: info leak in ioctl (bnc#849034
CVE-2013-4515).

- Refresh
patches.fixes/net-rework-recvmsg-handler-msg_name-and-msg_na
melen-logic.patch.

- ipv6: remove max_addresses check from
ipv6_create_tempaddr (bnc#805226, CVE-2013-0343).

- net: rework recvmsg handler msg_name and msg_namelen
logic (bnc#854722).

- crypto: ansi_cprng - Fix off by one error in non-block
size request (bnc#840226).

- x6: Fix reserve_initrd so that acpi_initrd_override is
reached (bnc#831836).
- Refresh other Xen patches.

- aacraid: missing capable() check in compat ioctl
(bnc#852558).

-
patches.fixes/gpio-ich-fix-ichx_gpio_check_available-return.
patch: Update upstream reference

- perf/ftrace: Fix paranoid level for enabling function
tracer (bnc#849362).

- xhci: fix null pointer dereference on
ring_doorbell_for_active_rings (bnc#848255).
- xhci: Fix oops happening after address device timeout
(bnc#848255).
- xhci: Ensure a command structure points to the correct
trb on the command ring (bnc#848255).

-
patches.arch/iommu-vt-d-remove-stack-trace-from-broken-irq-r
emapping-warning.patch: Update upstream reference.

- Allow NFSv4 username mapping to work properly
(bnc#838024).

- Refresh btrfs attribute publishing patchset to match
openSUSE-13.1 No user-visible changes, but uses
kobj_sysfs_ops and better kobject lifetime management.

- Fix a few incorrectly checked [io_]remap_pfn_range()
calls (bnc#849021, CVE-2013-4511).

- drm/radeon: don't set hpd, afmt interrupts when
interrupts are disabled.

-
patches.fixes/cifs-fill-TRANS2_QUERY_FILE_INFO-ByteCount-fie
lds.patch: Fix TRANS2_QUERY_FILE_INFO ByteCount fields
(bnc#804950).

- iommu: Remove stack trace from broken irq remapping
warning (bnc#844513).

- Disable patches related to bnc#840656
patches.suse/btrfs-cleanup-don-t-check-the-same-thing-twice
patches.suse/btrfs-0220-fix-for-patch-cleanup-don-t-check-th
e-same-thi.patch

- btrfs: use feature attribute names to print better error
messages.
- btrfs: add ability to change features via sysfs.
- btrfs: add publishing of unknown features in sysfs.
- btrfs: publish per-super features to sysfs.
- btrfs: add per-super attributes to sysfs.
- btrfs: export supported featured to sysfs.
- kobject: introduce kobj_completion.
- btrfs: add ioctls to query/change feature bits online.
- btrfs: use btrfs_commit_transaction when setting fslabel.

- x86/iommu/vt-d: Expand interrupt remapping quirk to cover
x58 chipset (bnc#844513).

- NFSv4: Fix issues in nfs4_discover_server_trunking
(bnc#811746).

- iommu/vt-d: add quirk for broken interrupt remapping on
55XX chipsets (bnc#844513).


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 12.3:

zypper in -t patch openSUSE-2014-113

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 12.3 (i586 x86_64):

kernel-default-3.7.10-1.28.1
kernel-default-base-3.7.10-1.28.1
kernel-default-base-debuginfo-3.7.10-1.28.1
kernel-default-debuginfo-3.7.10-1.28.1
kernel-default-debugsource-3.7.10-1.28.1
kernel-default-devel-3.7.10-1.28.1
kernel-default-devel-debuginfo-3.7.10-1.28.1
kernel-syms-3.7.10-1.28.1

- openSUSE 12.3 (i686 x86_64):

kernel-debug-3.7.10-1.28.1
kernel-debug-base-3.7.10-1.28.1
kernel-debug-base-debuginfo-3.7.10-1.28.1
kernel-debug-debuginfo-3.7.10-1.28.1
kernel-debug-debugsource-3.7.10-1.28.1
kernel-debug-devel-3.7.10-1.28.1
kernel-debug-devel-debuginfo-3.7.10-1.28.1
kernel-desktop-3.7.10-1.28.1
kernel-desktop-base-3.7.10-1.28.1
kernel-desktop-base-debuginfo-3.7.10-1.28.1
kernel-desktop-debuginfo-3.7.10-1.28.1
kernel-desktop-debugsource-3.7.10-1.28.1
kernel-desktop-devel-3.7.10-1.28.1
kernel-desktop-devel-debuginfo-3.7.10-1.28.1
kernel-ec2-3.7.10-1.28.1
kernel-ec2-base-3.7.10-1.28.1
kernel-ec2-base-debuginfo-3.7.10-1.28.1
kernel-ec2-debuginfo-3.7.10-1.28.1
kernel-ec2-debugsource-3.7.10-1.28.1
kernel-ec2-devel-3.7.10-1.28.1
kernel-ec2-devel-debuginfo-3.7.10-1.28.1
kernel-trace-3.7.10-1.28.1
kernel-trace-base-3.7.10-1.28.1
kernel-trace-base-debuginfo-3.7.10-1.28.1
kernel-trace-debuginfo-3.7.10-1.28.1
kernel-trace-debugsource-3.7.10-1.28.1
kernel-trace-devel-3.7.10-1.28.1
kernel-trace-devel-debuginfo-3.7.10-1.28.1
kernel-vanilla-3.7.10-1.28.1
kernel-vanilla-debuginfo-3.7.10-1.28.1
kernel-vanilla-debugsource-3.7.10-1.28.1
kernel-vanilla-devel-3.7.10-1.28.1
kernel-vanilla-devel-debuginfo-3.7.10-1.28.1
kernel-xen-3.7.10-1.28.1
kernel-xen-base-3.7.10-1.28.1
kernel-xen-base-debuginfo-3.7.10-1.28.1
kernel-xen-debuginfo-3.7.10-1.28.1
kernel-xen-debugsource-3.7.10-1.28.1
kernel-xen-devel-3.7.10-1.28.1
kernel-xen-devel-debuginfo-3.7.10-1.28.1

- openSUSE 12.3 (noarch):

kernel-devel-3.7.10-1.28.1
kernel-docs-3.7.10-1.28.2
kernel-source-3.7.10-1.28.1
kernel-source-vanilla-3.7.10-1.28.1

- openSUSE 12.3 (i686):

kernel-pae-3.7.10-1.28.1
kernel-pae-base-3.7.10-1.28.1
kernel-pae-base-debuginfo-3.7.10-1.28.1
kernel-pae-debuginfo-3.7.10-1.28.1
kernel-pae-debugsource-3.7.10-1.28.1
kernel-pae-devel-3.7.10-1.28.1
kernel-pae-devel-debuginfo-3.7.10-1.28.1


References:

http://support.novell.com/security/cve/CVE-2013-0343.html
http://support.novell.com/security/cve/CVE-2013-1792.html
http://support.novell.com/security/cve/CVE-2013-4348.html
http://support.novell.com/security/cve/CVE-2013-4511.html
http://support.novell.com/security/cve/CVE-2013-4513.html
http://support.novell.com/security/cve/CVE-2013-4514.html
http://support.novell.com/security/cve/CVE-2013-4515.html
http://support.novell.com/security/cve/CVE-2013-4587.html
http://support.novell.com/security/cve/CVE-2013-6367.html
http://support.novell.com/security/cve/CVE-2013-6368.html
http://support.novell.com/security/cve/CVE-2013-6376.html
http://support.novell.com/security/cve/CVE-2013-6378.html
http://support.novell.com/security/cve/CVE-2013-6380.html
http://support.novell.com/security/cve/CVE-2013-6431.html
http://support.novell.com/security/cve/CVE-2013-7027.html
http://support.novell.com/security/cve/CVE-2014-0038.html
https://bugzilla.novell.com/804950
https://bugzilla.novell.com/805226
https://bugzilla.novell.com/808358
https://bugzilla.novell.com/811746
https://bugzilla.novell.com/825006
https://bugzilla.novell.com/831836
https://bugzilla.novell.com/838024
https://bugzilla.novell.com/840226
https://bugzilla.novell.com/840656
https://bugzilla.novell.com/844513
https://bugzilla.novell.com/848079
https://bugzilla.novell.com/848255
https://bugzilla.novell.com/849021
https://bugzilla.novell.com/849023
https://bugzilla.novell.com/849029
https://bugzilla.novell.com/849034
https://bugzilla.novell.com/849362
https://bugzilla.novell.com/852373
https://bugzilla.novell.com/852558
https://bugzilla.novell.com/852559
https://bugzilla.novell.com/853050
https://bugzilla.novell.com/853051
https://bugzilla.novell.com/853052
https://bugzilla.novell.com/853053
https://bugzilla.novell.com/854173
https://bugzilla.novell.com/854634
https://bugzilla.novell.com/854722
https://bugzilla.novell.com/860993

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx

< Previous Next >
This Thread
  • No further messages