openSUSE Security Update: kernel: security and bugfix release ______________________________________________________________________________ Announcement ID: openSUSE-SU-2014:0856-1 Rating: important References: #869563 #870173 #870576 #871561 #873374 #876102 #878274 #880892 Cross-References: CVE-2013-7339 CVE-2014-0055 CVE-2014-0077 CVE-2014-2678 CVE-2014-2851 CVE-2014-3122 CVE-2014-3153 Affected Products: openSUSE 12.3 ______________________________________________________________________________ An update that solves 7 vulnerabilities and has one errata is now available. Description: The Linux kernel was updated to fix security issues and bugs: Security issues fixed: CVE-2014-3153: The futex_requeue function in kernel/futex.c in the Linux kernel did not ensure that calls have two different futex addresses, which allowed local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification. CVE-2014-0077: drivers/vhost/net.c in the Linux kernel, when mergeable buffers are disabled, did not properly validate packet lengths, which allowed guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions. CVE-2014-0055: The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package did not properly handle vhost_get_vq_desc errors, which allowed guest OS users to cause a denial of service (host OS crash) via unspecified vectors. CVE-2014-2678: The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports. CVE-2013-7339: The rds_ib_laddr_check function in net/rds/ib.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports. CVE-2014-2851: Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter. CVE-2014-3122: The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel did not properly consider which pages must be locked, which allowed local users to cause a denial of service (system crash) by triggering a memory-usage pattern that requires removal of page-table mappings. Bugs fixed: - memcg: deprecate memory.force_empty knob (bnc#878274). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 12.3: zypper in -t patch openSUSE-2014-451 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 12.3 (i586 x86_64): kernel-default-3.7.10-1.36.1 kernel-default-base-3.7.10-1.36.1 kernel-default-base-debuginfo-3.7.10-1.36.1 kernel-default-debuginfo-3.7.10-1.36.1 kernel-default-debugsource-3.7.10-1.36.1 kernel-default-devel-3.7.10-1.36.1 kernel-default-devel-debuginfo-3.7.10-1.36.1 kernel-syms-3.7.10-1.36.1 - openSUSE 12.3 (i686 x86_64): kernel-debug-3.7.10-1.36.1 kernel-debug-base-3.7.10-1.36.1 kernel-debug-base-debuginfo-3.7.10-1.36.1 kernel-debug-debuginfo-3.7.10-1.36.1 kernel-debug-debugsource-3.7.10-1.36.1 kernel-debug-devel-3.7.10-1.36.1 kernel-debug-devel-debuginfo-3.7.10-1.36.1 kernel-desktop-3.7.10-1.36.1 kernel-desktop-base-3.7.10-1.36.1 kernel-desktop-base-debuginfo-3.7.10-1.36.1 kernel-desktop-debuginfo-3.7.10-1.36.1 kernel-desktop-debugsource-3.7.10-1.36.1 kernel-desktop-devel-3.7.10-1.36.1 kernel-desktop-devel-debuginfo-3.7.10-1.36.1 kernel-ec2-3.7.10-1.36.1 kernel-ec2-base-3.7.10-1.36.1 kernel-ec2-base-debuginfo-3.7.10-1.36.1 kernel-ec2-debuginfo-3.7.10-1.36.1 kernel-ec2-debugsource-3.7.10-1.36.1 kernel-ec2-devel-3.7.10-1.36.1 kernel-ec2-devel-debuginfo-3.7.10-1.36.1 kernel-trace-3.7.10-1.36.1 kernel-trace-base-3.7.10-1.36.1 kernel-trace-base-debuginfo-3.7.10-1.36.1 kernel-trace-debuginfo-3.7.10-1.36.1 kernel-trace-debugsource-3.7.10-1.36.1 kernel-trace-devel-3.7.10-1.36.1 kernel-trace-devel-debuginfo-3.7.10-1.36.1 kernel-vanilla-3.7.10-1.36.1 kernel-vanilla-debuginfo-3.7.10-1.36.1 kernel-vanilla-debugsource-3.7.10-1.36.1 kernel-vanilla-devel-3.7.10-1.36.1 kernel-vanilla-devel-debuginfo-3.7.10-1.36.1 kernel-xen-3.7.10-1.36.1 kernel-xen-base-3.7.10-1.36.1 kernel-xen-base-debuginfo-3.7.10-1.36.1 kernel-xen-debuginfo-3.7.10-1.36.1 kernel-xen-debugsource-3.7.10-1.36.1 kernel-xen-devel-3.7.10-1.36.1 kernel-xen-devel-debuginfo-3.7.10-1.36.1 - openSUSE 12.3 (noarch): kernel-devel-3.7.10-1.36.1 kernel-docs-3.7.10-1.36.2 kernel-source-3.7.10-1.36.1 kernel-source-vanilla-3.7.10-1.36.1 - openSUSE 12.3 (i686): kernel-pae-3.7.10-1.36.1 kernel-pae-base-3.7.10-1.36.1 kernel-pae-base-debuginfo-3.7.10-1.36.1 kernel-pae-debuginfo-3.7.10-1.36.1 kernel-pae-debugsource-3.7.10-1.36.1 kernel-pae-devel-3.7.10-1.36.1 kernel-pae-devel-debuginfo-3.7.10-1.36.1 References: http://support.novell.com/security/cve/CVE-2013-7339.html http://support.novell.com/security/cve/CVE-2014-0055.html http://support.novell.com/security/cve/CVE-2014-0077.html http://support.novell.com/security/cve/CVE-2014-2678.html http://support.novell.com/security/cve/CVE-2014-2851.html http://support.novell.com/security/cve/CVE-2014-3122.html http://support.novell.com/security/cve/CVE-2014-3153.html https://bugzilla.novell.com/869563 https://bugzilla.novell.com/870173 https://bugzilla.novell.com/870576 https://bugzilla.novell.com/871561 https://bugzilla.novell.com/873374 https://bugzilla.novell.com/876102 https://bugzilla.novell.com/878274 https://bugzilla.novell.com/880892 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org