openSUSE Security Announce
Threads by month
- ----- 2024 -----
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
December 2014
- 2 participants
- 36 discussions
[security-announce] openSUSE-SU-2014:1735-1: important: kernel update for Evergreen 11.4
by opensuse-security@opensuse.org 31 Dec '14
by opensuse-security@opensuse.org 31 Dec '14
31 Dec '14
openSUSE Security Update: kernel update for Evergreen 11.4
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:1735-1
Rating: important
References: #907818 #909077 #910251
Cross-References: CVE-2014-8133 CVE-2014-9090
Affected Products:
openSUSE Evergreen 11.4
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
Kernel update for Evergreen 11.4, fixes
* CVE-2014-8133
* CVE-2014-9090
* CVE-2014-9322
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Evergreen 11.4:
zypper in -t patch 2014-97
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Evergreen 11.4 (i586 x86_64):
kernel-debug-3.0.101-95.1
kernel-debug-base-3.0.101-95.1
kernel-debug-base-debuginfo-3.0.101-95.1
kernel-debug-debuginfo-3.0.101-95.1
kernel-debug-debugsource-3.0.101-95.1
kernel-debug-devel-3.0.101-95.1
kernel-debug-devel-debuginfo-3.0.101-95.1
kernel-debug-hmac-3.0.101-95.1
kernel-default-3.0.101-95.1
kernel-default-base-3.0.101-95.1
kernel-default-base-debuginfo-3.0.101-95.1
kernel-default-debuginfo-3.0.101-95.1
kernel-default-debugsource-3.0.101-95.1
kernel-default-devel-3.0.101-95.1
kernel-default-devel-debuginfo-3.0.101-95.1
kernel-default-hmac-3.0.101-95.1
kernel-desktop-3.0.101-95.1
kernel-desktop-base-3.0.101-95.1
kernel-desktop-base-debuginfo-3.0.101-95.1
kernel-desktop-debuginfo-3.0.101-95.1
kernel-desktop-debugsource-3.0.101-95.1
kernel-desktop-devel-3.0.101-95.1
kernel-desktop-devel-debuginfo-3.0.101-95.1
kernel-desktop-hmac-3.0.101-95.1
kernel-ec2-3.0.101-95.1
kernel-ec2-base-3.0.101-95.1
kernel-ec2-base-debuginfo-3.0.101-95.1
kernel-ec2-debuginfo-3.0.101-95.1
kernel-ec2-debugsource-3.0.101-95.1
kernel-ec2-devel-3.0.101-95.1
kernel-ec2-devel-debuginfo-3.0.101-95.1
kernel-ec2-extra-3.0.101-95.1
kernel-ec2-extra-debuginfo-3.0.101-95.1
kernel-ec2-hmac-3.0.101-95.1
kernel-source-3.0.101-95.1
kernel-source-vanilla-3.0.101-95.1
kernel-syms-3.0.101-95.1
kernel-trace-3.0.101-95.1
kernel-trace-base-3.0.101-95.1
kernel-trace-base-debuginfo-3.0.101-95.1
kernel-trace-debuginfo-3.0.101-95.1
kernel-trace-debugsource-3.0.101-95.1
kernel-trace-devel-3.0.101-95.1
kernel-trace-devel-debuginfo-3.0.101-95.1
kernel-trace-hmac-3.0.101-95.1
kernel-vanilla-3.0.101-95.1
kernel-vanilla-base-3.0.101-95.1
kernel-vanilla-base-debuginfo-3.0.101-95.1
kernel-vanilla-debuginfo-3.0.101-95.1
kernel-vanilla-debugsource-3.0.101-95.1
kernel-vanilla-devel-3.0.101-95.1
kernel-vanilla-devel-debuginfo-3.0.101-95.1
kernel-vanilla-hmac-3.0.101-95.1
kernel-xen-3.0.101-95.1
kernel-xen-base-3.0.101-95.1
kernel-xen-base-debuginfo-3.0.101-95.1
kernel-xen-debuginfo-3.0.101-95.1
kernel-xen-debugsource-3.0.101-95.1
kernel-xen-devel-3.0.101-95.1
kernel-xen-devel-debuginfo-3.0.101-95.1
kernel-xen-hmac-3.0.101-95.1
preload-1.2-6.73.1
preload-debuginfo-1.2-6.73.1
preload-debugsource-1.2-6.73.1
preload-kmp-default-1.2_3.0.101_95-6.73.1
preload-kmp-default-debuginfo-1.2_3.0.101_95-6.73.1
preload-kmp-desktop-1.2_3.0.101_95-6.73.1
preload-kmp-desktop-debuginfo-1.2_3.0.101_95-6.73.1
- openSUSE Evergreen 11.4 (noarch):
kernel-docs-3.0.101-95.2
- openSUSE Evergreen 11.4 (i586):
kernel-pae-3.0.101-95.1
kernel-pae-base-3.0.101-95.1
kernel-pae-base-debuginfo-3.0.101-95.1
kernel-pae-debuginfo-3.0.101-95.1
kernel-pae-debugsource-3.0.101-95.1
kernel-pae-devel-3.0.101-95.1
kernel-pae-devel-debuginfo-3.0.101-95.1
kernel-pae-hmac-3.0.101-95.1
kernel-vmi-3.0.101-95.1
kernel-vmi-base-3.0.101-95.1
kernel-vmi-base-debuginfo-3.0.101-95.1
kernel-vmi-debuginfo-3.0.101-95.1
kernel-vmi-debugsource-3.0.101-95.1
kernel-vmi-devel-3.0.101-95.1
kernel-vmi-devel-debuginfo-3.0.101-95.1
kernel-vmi-hmac-3.0.101-95.1
References:
http://support.novell.com/security/cve/CVE-2014-8133.html
http://support.novell.com/security/cve/CVE-2014-9090.html
https://bugzilla.suse.com/show_bug.cgi?id=907818
https://bugzilla.suse.com/show_bug.cgi?id=909077
https://bugzilla.suse.com/show_bug.cgi?id=910251
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:1686-3: critical: Security update for ntp
by opensuse-security@opensuse.org 24 Dec '14
by opensuse-security@opensuse.org 24 Dec '14
24 Dec '14
SUSE Security Update: Security update for ntp
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1686-3
Rating: critical
References: #910764
Cross-References: CVE-2014-9295
Affected Products:
SUSE Linux Enterprise Server 11 SP1 LTSS
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This ntp update fixes the following critical security issue:
* A potential remote code execution problem was found inside ntpd. The
functions crypto_recv() (when using autokey authentication) and
ctl_putdata() where updated to avoid buffer overflows that could
have been exploited. (CVE-2014-9295 / VU#852879)
Security Issues:
* CVE-2014-9295
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP1 LTSS:
zypper in -t patch slessp1-ntp-10119
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64):
ntp-4.2.4p8-1.28.1
ntp-doc-4.2.4p8-1.28.1
References:
http://support.novell.com/security/cve/CVE-2014-9295.html
https://bugzilla.suse.com/show_bug.cgi?id=910764
http://download.suse.com/patch/finder/?keywords=847d35fe22b8284a157febdb511…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:1693-2: important: Security update for Linux kernel
by opensuse-security@opensuse.org 24 Dec '14
by opensuse-security@opensuse.org 24 Dec '14
24 Dec '14
SUSE Security Update: Security update for Linux kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1693-2
Rating: important
References: #755743 #779488 #800255 #835839 #851603 #853040
#857643 #860441 #868049 #873228 #876633 #883724
#883948 #885077 #887418 #888607 #891211 #891368
#891790 #892782 #893758 #894058 #894895 #895387
#895468 #896382 #896390 #896391 #896392 #896415
#897502 #897694 #897708 #898295 #898375 #898554
#899192 #899574 #899843 #901638 #902346 #902349
#903331 #903653 #904013 #904358 #904700 #905100
#905522
Cross-References: CVE-2012-4398 CVE-2013-2889 CVE-2013-2893
CVE-2013-2897 CVE-2013-2899 CVE-2013-7263
CVE-2014-3181 CVE-2014-3184 CVE-2014-3185
CVE-2014-3186 CVE-2014-3601 CVE-2014-3610
CVE-2014-3646 CVE-2014-3647 CVE-2014-3673
CVE-2014-4508 CVE-2014-4608 CVE-2014-7826
CVE-2014-7841 CVE-2014-8709 CVE-2014-8884
Affected Products:
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise High Availability Extension 11 SP3
______________________________________________________________________________
An update that solves 21 vulnerabilities and has 28 fixes
is now available. It includes one version update.
Description:
The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix
various bugs and security issues.
The following security bugs have been fixed:
* CVE-2012-4398: The __request_module function in kernel/kmod.c in the
Linux kernel before 3.4 did not set a certain killable attribute,
which allowed local users to cause a denial of service (memory
consumption) via a crafted application (bnc#779488).
* CVE-2013-2889: drivers/hid/hid-zpff.c in the Human Interface Device
(HID) subsystem in the Linux kernel through 3.11, when
CONFIG_HID_ZEROPLUS is enabled, allowed physically proximate
attackers to cause a denial of service (heap-based out-of-bounds
write) via a crafted device (bnc#835839).
* CVE-2013-2893: The Human Interface Device (HID) subsystem in the
Linux kernel through 3.11, when CONFIG_LOGITECH_FF,
CONFIG_LOGIG940_FF, or CONFIG_LOGIWHEELS_FF is enabled, allowed
physically proximate attackers to cause a denial of service
(heap-based out-of-bounds write) via a crafted device, related to
(1) drivers/hid/hid-lgff.c, (2) drivers/hid/hid-lg3ff.c, and (3)
drivers/hid/hid-lg4ff.c (bnc#835839).
* CVE-2013-2897: Multiple array index errors in
drivers/hid/hid-multitouch.c in the Human Interface Device (HID)
subsystem in the Linux kernel through 3.11, when
CONFIG_HID_MULTITOUCH is enabled, allowed physically proximate
attackers to cause a denial of service (heap memory corruption, or
NULL pointer dereference and OOPS) via a crafted device (bnc#835839).
* CVE-2013-2899: drivers/hid/hid-picolcd_core.c in the Human Interface
Device (HID) subsystem in the Linux kernel through 3.11, when
CONFIG_HID_PICOLCD is enabled, allowed physically proximate
attackers to cause a denial of service (NULL pointer dereference and
OOPS) via a crafted device (bnc#835839).
* CVE-2013-7263: The Linux kernel before 3.12.4 updates certain length
values before ensuring that associated data structures have been
initialized, which allowed local users to obtain sensitive
information from kernel stack memory via a (1) recvfrom, (2)
recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c,
net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c
(bnc#853040, bnc#857643).
* CVE-2014-3181: Multiple stack-based buffer overflows in the
magicmouse_raw_event function in drivers/hid/hid-magicmouse.c in the
Magic Mouse HID driver in the Linux kernel through 3.16.3 allowed
physically proximate attackers to cause a denial of service (system
crash) or possibly execute arbitrary code via a crafted device that
provides a large amount of (1) EHCI or (2) XHCI data associated with
an event (bnc#896382).
* CVE-2014-3184: The report_fixup functions in the HID subsystem in
the Linux kernel before 3.16.2 allowed physically proximate
attackers to cause a denial of service (out-of-bounds write) via a
crafted device that provides a small report descriptor, related to
(1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3)
drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5)
drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c
(bnc#896390).
* CVE-2014-3185: Multiple buffer overflows in the
command_port_read_callback function in
drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in
the Linux kernel before 3.16.2 allowed physically proximate
attackers to execute arbitrary code or cause a denial of service
(memory corruption and system crash) via a crafted device that
provides a large amount of (1) EHCI or (2) XHCI data associated with
a bulk response (bnc#896391).
* CVE-2014-3186: Buffer overflow in the picolcd_raw_event function in
devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in
the Linux kernel through 3.16.3, as used in Android on Nexus 7
devices, allowed physically proximate attackers to cause a denial of
service (system crash) or possibly execute arbitrary code via a
crafted device that sends a large report (bnc#896392).
* CVE-2014-3601: The kvm_iommu_map_pages function in virt/kvm/iommu.c
in the Linux kernel through 3.16.1 miscalculated the number of pages
during the handling of a mapping failure, which allowed guest OS
users to (1) cause a denial of service (host OS memory corruption)
or possibly have unspecified other impact by triggering a large gfn
value or (2) cause a denial of service (host OS memory consumption)
by triggering a small gfn value that leads to permanently pinned
pages (bnc#892782).
* CVE-2014-3610: The WRMSR processing functionality in the KVM
subsystem in the Linux kernel through 3.17.2 did not properly handle
the writing of a non-canonical address to a model-specific register,
which allowed guest OS users to cause a denial of service (host OS
crash) by leveraging guest OS privileges, related to the
wrmsr_interception function in arch/x86/kvm/svm.c and the
handle_wrmsr function in arch/x86/kvm/vmx.c (bnc#899192).
* CVE-2014-3646: arch/x86/kvm/vmx.c in the KVM subsystem in the Linux
kernel through 3.17.2 did not have an exit handler for the INVVPID
instruction, which allowed guest OS users to cause a denial of
service (guest OS crash) via a crafted application (bnc#899192).
* CVE-2014-3647: arch/x86/kvm/emulate.c in the KVM subsystem in the
Linux kernel through 3.17.2 did not properly perform RIP changes,
which allowed guest OS users to cause a denial of service (guest OS
crash) via a crafted application (bnc#899192).
* CVE-2014-3673: The SCTP implementation in the Linux kernel through
3.17.2 allowed remote attackers to cause a denial of service (system
crash) via a malformed ASCONF chunk, related to
net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c (bnc#902346,
bnc#902349).
* CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel
through 3.15.1 on 32-bit x86 platforms, when syscall auditing is
enabled and the sep CPU feature flag is set, allowed local users to
cause a denial of service (OOPS and system crash) via an invalid
syscall number, as demonstrated by number 1000 (bnc#883724).
* CVE-2014-4608: * DISPUTED * Multiple integer overflows in the
lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in
the LZO decompressor in the Linux kernel before 3.15.2 allowed
context-dependent attackers to cause a denial of service (memory
corruption) via a crafted Literal Run. NOTE: the author of the LZO
algorithms says: The Linux kernel is not affected; media hype
(bnc#883948).
* CVE-2014-7826: kernel/trace/trace_syscalls.c in the Linux kernel
through 3.17.2 did not properly handle private syscall numbers
during use of the ftrace subsystem, which allowed local users to
gain privileges or cause a denial of service (invalid pointer
dereference) via a crafted application (bnc#904013).
* CVE-2014-7841: An SCTP server doing ASCONF would panic on malformed
INIT ping-of-death (bnc#905100).
* CVE-2014-8709: The ieee80211_fragment function in net/mac80211/tx.c
in the Linux kernel before 3.13.5 did not properly maintain a
certain tail pointer, which allowed remote attackers to obtain
sensitive cleartext information by reading packets (bnc#904700).
* CVE-2014-8884: A local user with write access could have used this
flaw to crash the kernel or elevate privileges (bnc#905522).
The following non-security bugs have been fixed:
* Build the KOTD against the SP3 Update project
* HID: fix kabi breakage.
* NFS: Provide stub nfs_fscache_wait_on_invalidate() for when
CONFIG_NFS_FSCACHE=n.
* NFS: fix inverted test for delegation in nfs4_reclaim_open_state
(bnc#903331).
* NFS: remove incorrect Lock reclaim failed! warning (bnc#903331).
* NFSv4: nfs4_open_done first must check that GETATTR decoded a file
type (bnc#899574).
* PCI: pciehp: Clear Data Link Layer State Changed during init
(bnc#898295).
* PCI: pciehp: Enable link state change notifications (bnc#898295).
* PCI: pciehp: Handle push button event asynchronously (bnc#898295).
* PCI: pciehp: Make check_link_active() non-static (bnc#898295).
* PCI: pciehp: Use link change notifications for hot-plug and removal
(bnc#898295).
* PCI: pciehp: Use per-slot workqueues to avoid deadlock (bnc#898295).
* PCI: pciehp: Use symbolic constants, not hard-coded bitmask
(bnc#898295).
* PM / hibernate: Iterate over set bits instead of PFNs in
swsusp_free() (bnc#860441).
* be2net: Fix invocation of be_close() after be_clear() (bnc#895468).
* block: Fix bogus partition statistics reports (bnc#885077
bnc#891211).
* block: Fix computation of merged request priority.
* btrfs: Fix wrong device size when we are resizing the device.
* btrfs: Return right extent when fiemap gives unaligned offset and
len.
* btrfs: abtract out range locking in clone ioctl().
* btrfs: always choose work from prio_head first.
* btrfs: balance delayed inode updates.
* btrfs: cache extent states in defrag code path.
* btrfs: check file extent type before anything else (bnc#897694).
* btrfs: clone, do not create invalid hole extent map.
* btrfs: correctly determine if blocks are shared in
btrfs_compare_trees.
* btrfs: do not bug_on if we try to cow a free space cache inode.
* btrfs: ensure btrfs_prev_leaf does not miss 1 item.
* btrfs: ensure readers see new data after a clone operation.
* btrfs: fill_holes: Fix slot number passed to hole_mergeable() call.
* btrfs: filter invalid arg for btrfs resize.
* btrfs: fix EINVAL checks in btrfs_clone.
* btrfs: fix EIO on reading file after ioctl clone works on it.
* btrfs: fix a crash of clone with inline extents split.
* btrfs: fix crash of compressed writes (bnc#898375).
* btrfs: fix crash when starting transaction.
* btrfs: fix deadlock with nested trans handles.
* btrfs: fix hang on error (such as ENOSPC) when writing extent pages.
* btrfs: fix leaf corruption after __btrfs_drop_extents.
* btrfs: fix race between balance recovery and root deletion.
* btrfs: fix wrong extent mapping for DirectIO.
* btrfs: handle a missing extent for the first file extent.
* btrfs: limit delalloc pages outside of find_delalloc_range
(bnc#898375).
* btrfs: read lock extent buffer while walking backrefs.
* btrfs: remove unused wait queue in struct extent_buffer.
* btrfs: replace EINVAL with ERANGE for resize when ULLONG_MAX.
* btrfs: replace error code from btrfs_drop_extents.
* btrfs: unlock extent and pages on error in cow_file_range.
* btrfs: unlock inodes in correct order in clone ioctl.
* btrfs_ioctl_clone: Move clone code into its own function.
* cifs: delay super block destruction until all cifsFileInfo objects
are gone (bnc#903653).
* drm/i915: Flush the PTEs after updating them before suspend
(bnc#901638).
* drm/i915: Undo gtt scratch pte unmapping again (bnc#901638).
* ext3: return 32/64-bit dir name hash according to usage type
(bnc#898554).
* ext4: return 32/64-bit dir name hash according to usage type
(bnc#898554).
* fix: use after free of xfs workqueues (bnc#894895).
* fs: add new FMODE flags: FMODE_32bithash and FMODE_64bithash
(bnc#898554).
* futex: Ensure get_futex_key_refs() always implies a barrier
(bnc#851603 (futex scalability series)).
* futex: Fix a race condition between REQUEUE_PI and task death
(bnc#851603 (futex scalability series)).
* ipv6: add support of peer address (bnc#896415).
* ipv6: fix a refcnt leak with peer addr (bnc#896415).
* megaraid_sas: Disable fastpath writes for non-RAID0 (bnc#897502).
* mm: change __remove_pages() to call release_mem_region_adjustable()
(bnc#891790).
* netxen: Fix link event handling (bnc#873228).
* netxen: fix link notification order (bnc#873228).
* nfsd: rename int access to int may_flags in nfsd_open() (bnc#898554).
* nfsd: vfs_llseek() with 32 or 64 bit offsets (hashes) (bnc#898554).
* ocfs2: fix NULL pointer dereference in
ocfs2_duplicate_clusters_by_page (bnc#899843).
* powerpc: Add smp_mb() to arch_spin_is_locked() (bsc#893758).
* powerpc: Add smp_mb()s to arch_spin_unlock_wait() (bsc#893758).
* powerpc: Add support for the optimised lockref implementation
(bsc#893758).
* powerpc: Implement arch_spin_is_locked() using
arch_spin_value_unlocked() (bsc#893758).
* refresh patches.xen/xen-blkback-multi-page-ring (bnc#897708)).
* remove filesize checks for sync I/O journal commit (bnc#800255).
* resource: add __adjust_resource() for internal use (bnc#891790).
* resource: add release_mem_region_adjustable() (bnc#891790).
* revert PM / Hibernate: Iterate over set bits instead of PFNs in
swsusp_free() (bnc#860441).
* rpm/mkspec: Generate specfiles according to Factory requirements.
* rpm/mkspec: Generate a per-architecture per-package _constraints file
* sched: Fix unreleased llc_shared_mask bit during CPU hotplug
(bnc#891368).
* scsi_dh_alua: disable ALUA handling for non-disk devices
(bnc#876633).
* usb: Do not re-read descriptors for wired devices in
usb_authorize_device() (bnc#904358).
* usbback: Do not access request fields in shared ring more than once.
* usbhid: add another mouse that needs QUIRK_ALWAYS_POLL (bnc#888607).
* vfs,proc: guarantee unique inodes in /proc (bnc#868049).
* x86, cpu hotplug: Fix stack frame warning
incheck_irq_vectors_for_cpu_disable() (bnc#887418).
* x86, ioremap: Speed up check for RAM pages (Boot time optimisations
(bnc#895387)).
* x86: Add check for number of available vectors before CPU down
(bnc#887418).
* x86: optimize resource lookups for ioremap (Boot time optimisations
(bnc#895387)).
* x86: use optimized ioresource lookup in ioremap function (Boot time
optimisations (bnc#895387)).
* xfs: Do not free EFIs before the EFDs are committed (bsc#755743).
* xfs: Do not reference the EFI after it is freed (bsc#755743).
* xfs: fix cil push sequence after log recovery (bsc#755743).
* zcrypt: support for extended number of ap domains (bnc#894058,
LTC#117041).
* zcrypt: toleration of new crypto adapter hardware (bnc#894058,
LTC#117041).
Security Issues:
* CVE-2012-4398
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4398>
* CVE-2013-2889
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2889>
* CVE-2013-2893
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2893>
* CVE-2013-2897
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2897>
* CVE-2013-2899
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2899>
* CVE-2013-7263
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7263>
* CVE-2014-3181
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3181>
* CVE-2014-3184
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3184>
* CVE-2014-3185
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3185>
* CVE-2014-3186
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3186>
* CVE-2014-3601
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3601>
* CVE-2014-3610
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3610>
* CVE-2014-3646
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3646>
* CVE-2014-3647
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3647>
* CVE-2014-4508
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508>
* CVE-2014-4608
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4608>
* CVE-2014-7826
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7826>
* CVE-2014-7841
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7841>
* CVE-2014-8709
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8709>
* CVE-2014-8884
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8884>
* CVE-2014-3673
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3673>
Indications:
Everyone using the Linux Kernel on s390x architecture should update.
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-kernel-10038 slessp3-kernel-10039 slessp3-kernel-10040
- SUSE Linux Enterprise High Availability Extension 11 SP3:
zypper in -t patch slehasp3-kernel-10038 slehasp3-kernel-10039 slehasp3-kernel-10040
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP3 (ia64 ppc64 s390x) [New Version: 3.0.101]:
kernel-default-3.0.101-0.42.1
kernel-default-base-3.0.101-0.42.1
kernel-default-devel-3.0.101-0.42.1
kernel-source-3.0.101-0.42.1
kernel-syms-3.0.101-0.42.1
kernel-trace-3.0.101-0.42.1
kernel-trace-base-3.0.101-0.42.1
kernel-trace-devel-3.0.101-0.42.1
- SUSE Linux Enterprise Server 11 SP3 (s390x) [New Version: 3.0.101]:
kernel-default-man-3.0.101-0.42.1
- SUSE Linux Enterprise Server 11 SP3 (ppc64) [New Version: 3.0.101]:
kernel-ppc64-3.0.101-0.42.1
kernel-ppc64-base-3.0.101-0.42.1
kernel-ppc64-devel-3.0.101-0.42.1
- SUSE Linux Enterprise High Availability Extension 11 SP3 (ia64 ppc64 s390x):
cluster-network-kmp-default-1.4_3.0.101_0.42-2.27.115
cluster-network-kmp-trace-1.4_3.0.101_0.42-2.27.115
gfs2-kmp-default-2_3.0.101_0.42-0.16.121
gfs2-kmp-trace-2_3.0.101_0.42-0.16.121
ocfs2-kmp-default-1.6_3.0.101_0.42-0.20.115
ocfs2-kmp-trace-1.6_3.0.101_0.42-0.20.115
- SUSE Linux Enterprise High Availability Extension 11 SP3 (ppc64):
cluster-network-kmp-ppc64-1.4_3.0.101_0.42-2.27.115
gfs2-kmp-ppc64-2_3.0.101_0.42-0.16.121
ocfs2-kmp-ppc64-1.6_3.0.101_0.42-0.20.115
References:
http://support.novell.com/security/cve/CVE-2012-4398.html
http://support.novell.com/security/cve/CVE-2013-2889.html
http://support.novell.com/security/cve/CVE-2013-2893.html
http://support.novell.com/security/cve/CVE-2013-2897.html
http://support.novell.com/security/cve/CVE-2013-2899.html
http://support.novell.com/security/cve/CVE-2013-7263.html
http://support.novell.com/security/cve/CVE-2014-3181.html
http://support.novell.com/security/cve/CVE-2014-3184.html
http://support.novell.com/security/cve/CVE-2014-3185.html
http://support.novell.com/security/cve/CVE-2014-3186.html
http://support.novell.com/security/cve/CVE-2014-3601.html
http://support.novell.com/security/cve/CVE-2014-3610.html
http://support.novell.com/security/cve/CVE-2014-3646.html
http://support.novell.com/security/cve/CVE-2014-3647.html
http://support.novell.com/security/cve/CVE-2014-3673.html
http://support.novell.com/security/cve/CVE-2014-4508.html
http://support.novell.com/security/cve/CVE-2014-4608.html
http://support.novell.com/security/cve/CVE-2014-7826.html
http://support.novell.com/security/cve/CVE-2014-7841.html
http://support.novell.com/security/cve/CVE-2014-8709.html
http://support.novell.com/security/cve/CVE-2014-8884.html
https://bugzilla.suse.com/show_bug.cgi?id=755743
https://bugzilla.suse.com/show_bug.cgi?id=779488
https://bugzilla.suse.com/show_bug.cgi?id=800255
https://bugzilla.suse.com/show_bug.cgi?id=835839
https://bugzilla.suse.com/show_bug.cgi?id=851603
https://bugzilla.suse.com/show_bug.cgi?id=853040
https://bugzilla.suse.com/show_bug.cgi?id=857643
https://bugzilla.suse.com/show_bug.cgi?id=860441
https://bugzilla.suse.com/show_bug.cgi?id=868049
https://bugzilla.suse.com/show_bug.cgi?id=873228
https://bugzilla.suse.com/show_bug.cgi?id=876633
https://bugzilla.suse.com/show_bug.cgi?id=883724
https://bugzilla.suse.com/show_bug.cgi?id=883948
https://bugzilla.suse.com/show_bug.cgi?id=885077
https://bugzilla.suse.com/show_bug.cgi?id=887418
https://bugzilla.suse.com/show_bug.cgi?id=888607
https://bugzilla.suse.com/show_bug.cgi?id=891211
https://bugzilla.suse.com/show_bug.cgi?id=891368
https://bugzilla.suse.com/show_bug.cgi?id=891790
https://bugzilla.suse.com/show_bug.cgi?id=892782
https://bugzilla.suse.com/show_bug.cgi?id=893758
https://bugzilla.suse.com/show_bug.cgi?id=894058
https://bugzilla.suse.com/show_bug.cgi?id=894895
https://bugzilla.suse.com/show_bug.cgi?id=895387
https://bugzilla.suse.com/show_bug.cgi?id=895468
https://bugzilla.suse.com/show_bug.cgi?id=896382
https://bugzilla.suse.com/show_bug.cgi?id=896390
https://bugzilla.suse.com/show_bug.cgi?id=896391
https://bugzilla.suse.com/show_bug.cgi?id=896392
https://bugzilla.suse.com/show_bug.cgi?id=896415
https://bugzilla.suse.com/show_bug.cgi?id=897502
https://bugzilla.suse.com/show_bug.cgi?id=897694
https://bugzilla.suse.com/show_bug.cgi?id=897708
https://bugzilla.suse.com/show_bug.cgi?id=898295
https://bugzilla.suse.com/show_bug.cgi?id=898375
https://bugzilla.suse.com/show_bug.cgi?id=898554
https://bugzilla.suse.com/show_bug.cgi?id=899192
https://bugzilla.suse.com/show_bug.cgi?id=899574
https://bugzilla.suse.com/show_bug.cgi?id=899843
https://bugzilla.suse.com/show_bug.cgi?id=901638
https://bugzilla.suse.com/show_bug.cgi?id=902346
https://bugzilla.suse.com/show_bug.cgi?id=902349
https://bugzilla.suse.com/show_bug.cgi?id=903331
https://bugzilla.suse.com/show_bug.cgi?id=903653
https://bugzilla.suse.com/show_bug.cgi?id=904013
https://bugzilla.suse.com/show_bug.cgi?id=904358
https://bugzilla.suse.com/show_bug.cgi?id=904700
https://bugzilla.suse.com/show_bug.cgi?id=905100
https://bugzilla.suse.com/show_bug.cgi?id=905522
http://download.suse.com/patch/finder/?keywords=759bd5232756bc1601d59154022…
http://download.suse.com/patch/finder/?keywords=7c8bcdf8aeebe75105e56721788…
http://download.suse.com/patch/finder/?keywords=ccd0e8b5f2fdf4059ed078e5d1f…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:1698-1: important: Security update for Linux kernel
by opensuse-security@opensuse.org 24 Dec '14
by opensuse-security@opensuse.org 24 Dec '14
24 Dec '14
SUSE Security Update: Security update for Linux kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1698-1
Rating: important
References: #907818 #909077 #910251
Cross-References: CVE-2014-8133 CVE-2014-9090 CVE-2014-9322
Affected Products:
SUSE Linux Enterprise Server 11 SP2 LTSS
SUSE Linux Enterprise Server 11 SP1 LTSS
SLE 11 SERVER Unsupported Extras
______________________________________________________________________________
An update that fixes three vulnerabilities is now
available. It includes two new package versions.
Description:
The SUSE Linux Enterprise 11 Service Pack 2 LTSS kernel has been updated
to fix security issues on kernels on the x86_64 architecture.
The following security bugs have been fixed:
*
CVE-2014-9322: A local privilege escalation in the x86_64 32bit
compatibility signal handling was fixed, which could have been used by
local attackers to crash the machine or execute code.
*
CVE-2014-9090: The do_double_fault function in
arch/x86/kernel/traps.c in the Linux kernel did not properly handle faults
associated with the Stack Segment (SS) segment register, which allowed
local users to cause a denial of service (panic) via a modify_ldt system
call, as demonstrated by sigreturn_32 in the 1
-clock-tests test suite.
*
CVE-2014-8133: Insufficient validation of TLS register usage could
have leaked information from the kernel stack to userspace.
Security Issues:
* CVE-2014-8133
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133>
* CVE-2014-9090
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9090>
* CVE-2014-9322
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322>
Indications:
Everyone using the Linux Kernel on x86_64 architecture should update.
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP2 LTSS:
zypper in -t patch slessp2-kernel-10114
- SUSE Linux Enterprise Server 11 SP1 LTSS:
zypper in -t patch slessp1-kernel-10109
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP2 LTSS (x86_64) [New Version: 3.0.101]:
kernel-default-3.0.101-0.7.27.1
kernel-default-base-3.0.101-0.7.27.1
kernel-default-devel-3.0.101-0.7.27.1
kernel-ec2-3.0.101-0.7.27.1
kernel-ec2-base-3.0.101-0.7.27.1
kernel-ec2-devel-3.0.101-0.7.27.1
kernel-source-3.0.101-0.7.27.1
kernel-syms-3.0.101-0.7.27.1
kernel-trace-3.0.101-0.7.27.1
kernel-trace-base-3.0.101-0.7.27.1
kernel-trace-devel-3.0.101-0.7.27.1
kernel-xen-3.0.101-0.7.27.1
kernel-xen-base-3.0.101-0.7.27.1
kernel-xen-devel-3.0.101-0.7.27.1
xen-kmp-default-4.1.6_08_3.0.101_0.7.27-0.5.5
xen-kmp-trace-4.1.6_08_3.0.101_0.7.27-0.5.5
- SUSE Linux Enterprise Server 11 SP1 LTSS (x86_64) [New Version: 2.6.32.59]:
kernel-default-2.6.32.59-0.17.1
kernel-default-base-2.6.32.59-0.17.1
kernel-default-devel-2.6.32.59-0.17.1
kernel-ec2-2.6.32.59-0.17.1
kernel-ec2-base-2.6.32.59-0.17.1
kernel-ec2-devel-2.6.32.59-0.17.1
kernel-source-2.6.32.59-0.17.1
kernel-syms-2.6.32.59-0.17.1
kernel-trace-2.6.32.59-0.17.1
kernel-trace-base-2.6.32.59-0.17.1
kernel-trace-devel-2.6.32.59-0.17.1
kernel-xen-2.6.32.59-0.17.1
kernel-xen-base-2.6.32.59-0.17.1
kernel-xen-devel-2.6.32.59-0.17.1
xen-kmp-default-4.0.3_21548_18_2.6.32.59_0.17-0.9.2
xen-kmp-trace-4.0.3_21548_18_2.6.32.59_0.17-0.9.2
- SLE 11 SERVER Unsupported Extras (x86_64):
ext4-writeable-kmp-default-0_3.0.101_0.7.27-0.14.132
ext4-writeable-kmp-trace-0_3.0.101_0.7.27-0.14.132
ext4-writeable-kmp-xen-0_3.0.101_0.7.27-0.14.132
kernel-default-extra-2.6.32.59-0.17.1
kernel-default-extra-3.0.101-0.7.27.1
kernel-xen-extra-2.6.32.59-0.17.1
kernel-xen-extra-3.0.101-0.7.27.1
References:
http://support.novell.com/security/cve/CVE-2014-8133.html
http://support.novell.com/security/cve/CVE-2014-9090.html
http://support.novell.com/security/cve/CVE-2014-9322.html
https://bugzilla.suse.com/show_bug.cgi?id=907818
https://bugzilla.suse.com/show_bug.cgi?id=909077
https://bugzilla.suse.com/show_bug.cgi?id=910251
http://download.suse.com/patch/finder/?keywords=17cbd241265ffb7301400d4f249…
http://download.suse.com/patch/finder/?keywords=ea18fe4b0ce01bc702a6120012e…
http://download.suse.com/patch/finder/?keywords=eb83dad7b182df22a0ec3ccf37f…
http://download.suse.com/patch/finder/?keywords=fd8795d7eb65884e7e60e637c18…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:1686-2: critical: Security update for xntp
by opensuse-security@opensuse.org 24 Dec '14
by opensuse-security@opensuse.org 24 Dec '14
24 Dec '14
SUSE Security Update: Security update for xntp
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1686-2
Rating: critical
References: #910764
Cross-References: CVE-2014-9295
Affected Products:
SUSE Linux Enterprise Server 10 SP4 LTSS
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This ntp update fixes the following critical security issue:
* A potential remote code execution problem was found inside ntpd. The
functions crypto_recv() (when using autokey authentication) and
ctl_putdata() where updated to avoid buffer overflows that could
have been exploited. (CVE-2014-9295 / VU#852879)
Security Issues:
* CVE-2014-9295
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295>
Package List:
- SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):
xntp-4.2.4p3-48.25.1
xntp-doc-4.2.4p3-48.25.1
References:
http://support.novell.com/security/cve/CVE-2014-9295.html
https://bugzilla.suse.com/show_bug.cgi?id=910764
http://download.suse.com/patch/finder/?keywords=f4d33535cb6a1f3819d1cd7bb92…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:1697-1: important: Security update for popt
by opensuse-security@opensuse.org 24 Dec '14
by opensuse-security@opensuse.org 24 Dec '14
24 Dec '14
SUSE Security Update: Security update for popt
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1697-1
Rating: important
References: #892431 #906803 #908128
Cross-References: CVE-2013-6435 CVE-2014-8118
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
This rpm update fixes the following security and non security issues.
* bnc#908128: check for bad invalid name sizes (CVE-2014-8118)
* bnc#906803: create files with mode 0 (CVE-2013-6435)
* bnc#892431: honor --noglob in install mode
Security Issues:
* CVE-2014-8118
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8118>
* CVE-2013-6435
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6435>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP3:
zypper in -t patch sdksp3-popt-10097
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-popt-10097
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-popt-10097
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-popt-10097
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):
popt-devel-1.7-37.60.2
rpm-devel-4.4.2.3-37.60.2
- SUSE Linux Enterprise Software Development Kit 11 SP3 (ppc64 s390x x86_64):
rpm-32bit-4.4.2.3-37.60.2
- SUSE Linux Enterprise Software Development Kit 11 SP3 (ppc64):
popt-devel-32bit-1.7-37.60.2
rpm-devel-32bit-4.4.2.3-37.60.2
- SUSE Linux Enterprise Software Development Kit 11 SP3 (ia64):
rpm-x86-4.4.2.3-37.60.2
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
popt-1.7-37.60.2
rpm-4.4.2.3-37.60.2
- SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):
popt-32bit-1.7-37.60.2
rpm-32bit-4.4.2.3-37.60.2
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
popt-1.7-37.60.2
rpm-4.4.2.3-37.60.2
- SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64):
popt-32bit-1.7-37.60.2
rpm-32bit-4.4.2.3-37.60.2
- SUSE Linux Enterprise Server 11 SP3 (ia64):
popt-x86-1.7-37.60.2
rpm-x86-4.4.2.3-37.60.2
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):
popt-1.7-37.60.2
rpm-4.4.2.3-37.60.2
- SUSE Linux Enterprise Desktop 11 SP3 (x86_64):
popt-32bit-1.7-37.60.2
rpm-32bit-4.4.2.3-37.60.2
References:
http://support.novell.com/security/cve/CVE-2013-6435.html
http://support.novell.com/security/cve/CVE-2014-8118.html
https://bugzilla.suse.com/show_bug.cgi?id=892431
https://bugzilla.suse.com/show_bug.cgi?id=906803
https://bugzilla.suse.com/show_bug.cgi?id=908128
http://download.suse.com/patch/finder/?keywords=25800fa95867098c22bbab2dce9…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:1695-1: important: Security update for Linux kernel
by opensuse-security@opensuse.org 23 Dec '14
by opensuse-security@opensuse.org 23 Dec '14
23 Dec '14
SUSE Security Update: Security update for Linux kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1695-1
Rating: important
References: #755743 #779488 #800255 #835839 #851603 #853040
#857643 #860441 #868049 #873228 #876633 #883724
#883948 #885077 #887418 #888607 #891211 #891368
#891790 #892782 #893758 #894058 #894895 #895387
#895468 #896382 #896390 #896391 #896392 #896415
#897502 #897694 #897708 #898295 #898375 #898554
#899192 #899574 #899843 #901638 #902346 #902349
#903331 #903653 #904013 #904358 #904700 #905100
#905522 #907818 #909077 #910251
Cross-References: CVE-2012-4398 CVE-2013-2889 CVE-2013-2893
CVE-2013-2897 CVE-2013-2899 CVE-2013-7263
CVE-2014-3181 CVE-2014-3184 CVE-2014-3185
CVE-2014-3186 CVE-2014-3601 CVE-2014-3610
CVE-2014-3646 CVE-2014-3647 CVE-2014-3673
CVE-2014-4508 CVE-2014-4608 CVE-2014-7826
CVE-2014-7841 CVE-2014-8133 CVE-2014-8709
CVE-2014-8884 CVE-2014-9090 CVE-2014-9322
Affected Products:
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise High Availability Extension 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
SLE 11 SERVER Unsupported Extras
______________________________________________________________________________
An update that solves 24 vulnerabilities and has 28 fixes
is now available. It includes one version update.
Description:
The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix
various bugs and security issues.
The following security bugs have been fixed:
* CVE-2012-4398: The __request_module function in kernel/kmod.c in the
Linux kernel before 3.4 did not set a certain killable attribute,
which allowed local users to cause a denial of service (memory
consumption) via a crafted application (bnc#779488).
* CVE-2013-2889: drivers/hid/hid-zpff.c in the Human Interface Device
(HID) subsystem in the Linux kernel through 3.11, when
CONFIG_HID_ZEROPLUS is enabled, allowed physically proximate
attackers to cause a denial of service (heap-based out-of-bounds
write) via a crafted device (bnc#835839).
* CVE-2013-2893: The Human Interface Device (HID) subsystem in the
Linux kernel through 3.11, when CONFIG_LOGITECH_FF,
CONFIG_LOGIG940_FF, or CONFIG_LOGIWHEELS_FF is enabled, allowed
physically proximate attackers to cause a denial of service
(heap-based out-of-bounds write) via a crafted device, related to
(1) drivers/hid/hid-lgff.c, (2) drivers/hid/hid-lg3ff.c, and (3)
drivers/hid/hid-lg4ff.c (bnc#835839).
* CVE-2013-2897: Multiple array index errors in
drivers/hid/hid-multitouch.c in the Human Interface Device (HID)
subsystem in the Linux kernel through 3.11, when
CONFIG_HID_MULTITOUCH is enabled, allowed physically proximate
attackers to cause a denial of service (heap memory corruption, or
NULL pointer dereference and OOPS) via a crafted device (bnc#835839).
* CVE-2013-2899: drivers/hid/hid-picolcd_core.c in the Human Interface
Device (HID) subsystem in the Linux kernel through 3.11, when
CONFIG_HID_PICOLCD is enabled, allowed physically proximate
attackers to cause a denial of service (NULL pointer dereference and
OOPS) via a crafted device (bnc#835839).
* CVE-2013-7263: The Linux kernel before 3.12.4 updates certain length
values before ensuring that associated data structures have been
initialized, which allowed local users to obtain sensitive
information from kernel stack memory via a (1) recvfrom, (2)
recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c,
net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c
(bnc#853040, bnc#857643).
* CVE-2014-3181: Multiple stack-based buffer overflows in the
magicmouse_raw_event function in drivers/hid/hid-magicmouse.c in the
Magic Mouse HID driver in the Linux kernel through 3.16.3 allowed
physically proximate attackers to cause a denial of service (system
crash) or possibly execute arbitrary code via a crafted device that
provides a large amount of (1) EHCI or (2) XHCI data associated with
an event (bnc#896382).
* CVE-2014-3184: The report_fixup functions in the HID subsystem in
the Linux kernel before 3.16.2 allowed physically proximate
attackers to cause a denial of service (out-of-bounds write) via a
crafted device that provides a small report descriptor, related to
(1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3)
drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5)
drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c
(bnc#896390).
* CVE-2014-3185: Multiple buffer overflows in the
command_port_read_callback function in
drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in
the Linux kernel before 3.16.2 allowed physically proximate
attackers to execute arbitrary code or cause a denial of service
(memory corruption and system crash) via a crafted device that
provides a large amount of (1) EHCI or (2) XHCI data associated with
a bulk response (bnc#896391).
* CVE-2014-3186: Buffer overflow in the picolcd_raw_event function in
devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in
the Linux kernel through 3.16.3, as used in Android on Nexus 7
devices, allowed physically proximate attackers to cause a denial of
service (system crash) or possibly execute arbitrary code via a
crafted device that sends a large report (bnc#896392).
* CVE-2014-3601: The kvm_iommu_map_pages function in virt/kvm/iommu.c
in the Linux kernel through 3.16.1 miscalculated the number of pages
during the handling of a mapping failure, which allowed guest OS
users to (1) cause a denial of service (host OS memory corruption)
or possibly have unspecified other impact by triggering a large gfn
value or (2) cause a denial of service (host OS memory consumption)
by triggering a small gfn value that leads to permanently pinned
pages (bnc#892782).
* CVE-2014-3610: The WRMSR processing functionality in the KVM
subsystem in the Linux kernel through 3.17.2 did not properly handle
the writing of a non-canonical address to a model-specific register,
which allowed guest OS users to cause a denial of service (host OS
crash) by leveraging guest OS privileges, related to the
wrmsr_interception function in arch/x86/kvm/svm.c and the
handle_wrmsr function in arch/x86/kvm/vmx.c (bnc#899192).
* CVE-2014-3646: arch/x86/kvm/vmx.c in the KVM subsystem in the Linux
kernel through 3.17.2 did not have an exit handler for the INVVPID
instruction, which allowed guest OS users to cause a denial of
service (guest OS crash) via a crafted application (bnc#899192).
* CVE-2014-3647: arch/x86/kvm/emulate.c in the KVM subsystem in the
Linux kernel through 3.17.2 did not properly perform RIP changes,
which allowed guest OS users to cause a denial of service (guest OS
crash) via a crafted application (bnc#899192).
* CVE-2014-3673: The SCTP implementation in the Linux kernel through
3.17.2 allowed remote attackers to cause a denial of service (system
crash) via a malformed ASCONF chunk, related to
net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c (bnc#902346,
bnc#902349).
* CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel
through 3.15.1 on 32-bit x86 platforms, when syscall auditing is
enabled and the sep CPU feature flag is set, allowed local users to
cause a denial of service (OOPS and system crash) via an invalid
syscall number, as demonstrated by number 1000 (bnc#883724).
* CVE-2014-4608: * DISPUTED * Multiple integer overflows in the
lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in
the LZO decompressor in the Linux kernel before 3.15.2 allowed
context-dependent attackers to cause a denial of service (memory
corruption) via a crafted Literal Run. NOTE: the author of the LZO
algorithms says: The Linux kernel is not affected; media hype
(bnc#883948).
* CVE-2014-7826: kernel/trace/trace_syscalls.c in the Linux kernel
through 3.17.2 did not properly handle private syscall numbers
during use of the ftrace subsystem, which allowed local users to
gain privileges or cause a denial of service (invalid pointer
dereference) via a crafted application (bnc#904013).
* CVE-2014-7841: An SCTP server doing ASCONF would panic on malformed
INIT ping-of-death (bnc#905100).
* CVE-2014-8709: The ieee80211_fragment function in net/mac80211/tx.c
in the Linux kernel before 3.13.5 did not properly maintain a
certain tail pointer, which allowed remote attackers to obtain
sensitive cleartext information by reading packets (bnc#904700).
* CVE-2014-8884: A local user with write access could have used this
flaw to crash the kernel or elevate privileges (bnc#905522).
The following non-security bugs have been fixed:
* Build the KOTD against the SP3 Update project
* HID: fix kabi breakage.
* NFS: Provide stub nfs_fscache_wait_on_invalidate() for when
CONFIG_NFS_FSCACHE=n.
* NFS: fix inverted test for delegation in nfs4_reclaim_open_state
(bnc#903331).
* NFS: remove incorrect Lock reclaim failed! warning (bnc#903331).
* NFSv4: nfs4_open_done first must check that GETATTR decoded a file
type (bnc#899574).
* PCI: pciehp: Clear Data Link Layer State Changed during init
(bnc#898295).
* PCI: pciehp: Enable link state change notifications (bnc#898295).
* PCI: pciehp: Handle push button event asynchronously (bnc#898295).
* PCI: pciehp: Make check_link_active() non-static (bnc#898295).
* PCI: pciehp: Use link change notifications for hot-plug and removal
(bnc#898295).
* PCI: pciehp: Use per-slot workqueues to avoid deadlock (bnc#898295).
* PCI: pciehp: Use symbolic constants, not hard-coded bitmask
(bnc#898295).
* PM / hibernate: Iterate over set bits instead of PFNs in
swsusp_free() (bnc#860441).
* be2net: Fix invocation of be_close() after be_clear() (bnc#895468).
* block: Fix bogus partition statistics reports (bnc#885077
bnc#891211).
* block: Fix computation of merged request priority.
* btrfs: Fix wrong device size when we are resizing the device.
* btrfs: Return right extent when fiemap gives unaligned offset and
len.
* btrfs: abtract out range locking in clone ioctl().
* btrfs: always choose work from prio_head first.
* btrfs: balance delayed inode updates.
* btrfs: cache extent states in defrag code path.
* btrfs: check file extent type before anything else (bnc#897694).
* btrfs: clone, do not create invalid hole extent map.
* btrfs: correctly determine if blocks are shared in
btrfs_compare_trees.
* btrfs: do not bug_on if we try to cow a free space cache inode.
* btrfs: ensure btrfs_prev_leaf does not miss 1 item.
* btrfs: ensure readers see new data after a clone operation.
* btrfs: fill_holes: Fix slot number passed to hole_mergeable() call.
* btrfs: filter invalid arg for btrfs resize.
* btrfs: fix EINVAL checks in btrfs_clone.
* btrfs: fix EIO on reading file after ioctl clone works on it.
* btrfs: fix a crash of clone with inline extents split.
* btrfs: fix crash of compressed writes (bnc#898375).
* btrfs: fix crash when starting transaction.
* btrfs: fix deadlock with nested trans handles.
* btrfs: fix hang on error (such as ENOSPC) when writing extent pages.
* btrfs: fix leaf corruption after __btrfs_drop_extents.
* btrfs: fix race between balance recovery and root deletion.
* btrfs: fix wrong extent mapping for DirectIO.
* btrfs: handle a missing extent for the first file extent.
* btrfs: limit delalloc pages outside of find_delalloc_range
(bnc#898375).
* btrfs: read lock extent buffer while walking backrefs.
* btrfs: remove unused wait queue in struct extent_buffer.
* btrfs: replace EINVAL with ERANGE for resize when ULLONG_MAX.
* btrfs: replace error code from btrfs_drop_extents.
* btrfs: unlock extent and pages on error in cow_file_range.
* btrfs: unlock inodes in correct order in clone ioctl.
* btrfs_ioctl_clone: Move clone code into its own function.
* cifs: delay super block destruction until all cifsFileInfo objects
are gone (bnc#903653).
* drm/i915: Flush the PTEs after updating them before suspend
(bnc#901638).
* drm/i915: Undo gtt scratch pte unmapping again (bnc#901638).
* ext3: return 32/64-bit dir name hash according to usage type
(bnc#898554).
* ext4: return 32/64-bit dir name hash according to usage type
(bnc#898554).
* fix: use after free of xfs workqueues (bnc#894895).
* fs: add new FMODE flags: FMODE_32bithash and FMODE_64bithash
(bnc#898554).
* futex: Ensure get_futex_key_refs() always implies a barrier
(bnc#851603 (futex scalability series)).
* futex: Fix a race condition between REQUEUE_PI and task death
(bnc#851603 (futex scalability series)).
* ipv6: add support of peer address (bnc#896415).
* ipv6: fix a refcnt leak with peer addr (bnc#896415).
* megaraid_sas: Disable fastpath writes for non-RAID0 (bnc#897502).
* mm: change __remove_pages() to call release_mem_region_adjustable()
(bnc#891790).
* netxen: Fix link event handling (bnc#873228).
* netxen: fix link notification order (bnc#873228).
* nfsd: rename int access to int may_flags in nfsd_open() (bnc#898554).
* nfsd: vfs_llseek() with 32 or 64 bit offsets (hashes) (bnc#898554).
* ocfs2: fix NULL pointer dereference in
ocfs2_duplicate_clusters_by_page (bnc#899843).
* powerpc: Add smp_mb() to arch_spin_is_locked() (bsc#893758).
* powerpc: Add smp_mb()s to arch_spin_unlock_wait() (bsc#893758).
* powerpc: Add support for the optimised lockref implementation
(bsc#893758).
* powerpc: Implement arch_spin_is_locked() using
arch_spin_value_unlocked() (bsc#893758).
* refresh patches.xen/xen-blkback-multi-page-ring (bnc#897708)).
* remove filesize checks for sync I/O journal commit (bnc#800255).
* resource: add __adjust_resource() for internal use (bnc#891790).
* resource: add release_mem_region_adjustable() (bnc#891790).
* revert PM / Hibernate: Iterate over set bits instead of PFNs in
swsusp_free() (bnc#860441).
* rpm/mkspec: Generate specfiles according to Factory requirements.
* rpm/mkspec: Generate a per-architecture per-package _constraints file
* sched: Fix unreleased llc_shared_mask bit during CPU hotplug
(bnc#891368).
* scsi_dh_alua: disable ALUA handling for non-disk devices
(bnc#876633).
* usb: Do not re-read descriptors for wired devices in
usb_authorize_device() (bnc#904358).
* usbback: Do not access request fields in shared ring more than once.
* usbhid: add another mouse that needs QUIRK_ALWAYS_POLL (bnc#888607).
* vfs,proc: guarantee unique inodes in /proc (bnc#868049).
* x86, cpu hotplug: Fix stack frame warning
incheck_irq_vectors_for_cpu_disable() (bnc#887418).
* x86, ioremap: Speed up check for RAM pages (Boot time optimisations
(bnc#895387)).
* x86: Add check for number of available vectors before CPU down
(bnc#887418).
* x86: optimize resource lookups for ioremap (Boot time optimisations
(bnc#895387)).
* x86: use optimized ioresource lookup in ioremap function (Boot time
optimisations (bnc#895387)).
* xfs: Do not free EFIs before the EFDs are committed (bsc#755743).
* xfs: Do not reference the EFI after it is freed (bsc#755743).
* xfs: fix cil push sequence after log recovery (bsc#755743).
* zcrypt: support for extended number of ap domains (bnc#894058,
LTC#117041).
* zcrypt: toleration of new crypto adapter hardware (bnc#894058,
LTC#117041).
Security Issues:
* CVE-2012-4398
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4398>
* CVE-2013-2889
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2889>
* CVE-2013-2893
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2893>
* CVE-2013-2897
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2897>
* CVE-2013-2899
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2899>
* CVE-2013-7263
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7263>
* CVE-2014-3181
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3181>
* CVE-2014-3184
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3184>
* CVE-2014-3185
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3185>
* CVE-2014-3186
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3186>
* CVE-2014-3601
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3601>
* CVE-2014-3610
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3610>
* CVE-2014-3646
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3646>
* CVE-2014-3647
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3647>
* CVE-2014-4508
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508>
* CVE-2014-4608
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4608>
* CVE-2014-7826
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7826>
* CVE-2014-7841
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7841>
* CVE-2014-8709
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8709>
* CVE-2014-8884
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8884>
* CVE-2014-3673
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3673>
Indications:
Everyone using the Linux Kernel on x86_64 architecture should update.
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-kernel-10103
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-kernel-10103
- SUSE Linux Enterprise High Availability Extension 11 SP3:
zypper in -t patch slehasp3-kernel-10103
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-kernel-10103
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64) [New Version: 3.0.101]:
kernel-bigsmp-devel-3.0.101-0.46.1
kernel-default-3.0.101-0.46.1
kernel-default-base-3.0.101-0.46.1
kernel-default-devel-3.0.101-0.46.1
kernel-source-3.0.101-0.46.1
kernel-syms-3.0.101-0.46.1
kernel-trace-3.0.101-0.46.1
kernel-trace-base-3.0.101-0.46.1
kernel-trace-devel-3.0.101-0.46.1
kernel-xen-devel-3.0.101-0.46.1
- SUSE Linux Enterprise Server 11 SP3 (x86_64) [New Version: 3.0.101]:
kernel-bigsmp-3.0.101-0.46.1
kernel-bigsmp-base-3.0.101-0.46.1
kernel-bigsmp-devel-3.0.101-0.46.1
kernel-default-3.0.101-0.46.1
kernel-default-base-3.0.101-0.46.1
kernel-default-devel-3.0.101-0.46.1
kernel-ec2-3.0.101-0.46.1
kernel-ec2-base-3.0.101-0.46.1
kernel-ec2-devel-3.0.101-0.46.1
kernel-source-3.0.101-0.46.1
kernel-syms-3.0.101-0.46.1
kernel-trace-3.0.101-0.46.1
kernel-trace-base-3.0.101-0.46.1
kernel-trace-devel-3.0.101-0.46.1
kernel-xen-3.0.101-0.46.1
kernel-xen-base-3.0.101-0.46.1
kernel-xen-devel-3.0.101-0.46.1
xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9
- SUSE Linux Enterprise High Availability Extension 11 SP3 (x86_64):
cluster-network-kmp-bigsmp-1.4_3.0.101_0.46-2.27.120
cluster-network-kmp-default-1.4_3.0.101_0.46-2.27.120
cluster-network-kmp-trace-1.4_3.0.101_0.46-2.27.120
cluster-network-kmp-xen-1.4_3.0.101_0.46-2.27.120
gfs2-kmp-bigsmp-2_3.0.101_0.46-0.16.126
gfs2-kmp-default-2_3.0.101_0.46-0.16.126
gfs2-kmp-trace-2_3.0.101_0.46-0.16.126
gfs2-kmp-xen-2_3.0.101_0.46-0.16.126
ocfs2-kmp-bigsmp-1.6_3.0.101_0.46-0.20.120
ocfs2-kmp-default-1.6_3.0.101_0.46-0.20.120
ocfs2-kmp-trace-1.6_3.0.101_0.46-0.20.120
ocfs2-kmp-xen-1.6_3.0.101_0.46-0.20.120
- SUSE Linux Enterprise Desktop 11 SP3 (x86_64) [New Version: 3.0.101]:
kernel-bigsmp-devel-3.0.101-0.46.1
kernel-default-3.0.101-0.46.1
kernel-default-base-3.0.101-0.46.1
kernel-default-devel-3.0.101-0.46.1
kernel-default-extra-3.0.101-0.46.1
kernel-source-3.0.101-0.46.1
kernel-syms-3.0.101-0.46.1
kernel-trace-devel-3.0.101-0.46.1
kernel-xen-3.0.101-0.46.1
kernel-xen-base-3.0.101-0.46.1
kernel-xen-devel-3.0.101-0.46.1
kernel-xen-extra-3.0.101-0.46.1
xen-kmp-default-4.2.5_02_3.0.101_0.46-0.7.9
- SLE 11 SERVER Unsupported Extras (x86_64):
kernel-bigsmp-extra-3.0.101-0.46.1
kernel-default-extra-3.0.101-0.46.1
kernel-xen-extra-3.0.101-0.46.1
References:
http://support.novell.com/security/cve/CVE-2012-4398.html
http://support.novell.com/security/cve/CVE-2013-2889.html
http://support.novell.com/security/cve/CVE-2013-2893.html
http://support.novell.com/security/cve/CVE-2013-2897.html
http://support.novell.com/security/cve/CVE-2013-2899.html
http://support.novell.com/security/cve/CVE-2013-7263.html
http://support.novell.com/security/cve/CVE-2014-3181.html
http://support.novell.com/security/cve/CVE-2014-3184.html
http://support.novell.com/security/cve/CVE-2014-3185.html
http://support.novell.com/security/cve/CVE-2014-3186.html
http://support.novell.com/security/cve/CVE-2014-3601.html
http://support.novell.com/security/cve/CVE-2014-3610.html
http://support.novell.com/security/cve/CVE-2014-3646.html
http://support.novell.com/security/cve/CVE-2014-3647.html
http://support.novell.com/security/cve/CVE-2014-3673.html
http://support.novell.com/security/cve/CVE-2014-4508.html
http://support.novell.com/security/cve/CVE-2014-4608.html
http://support.novell.com/security/cve/CVE-2014-7826.html
http://support.novell.com/security/cve/CVE-2014-7841.html
http://support.novell.com/security/cve/CVE-2014-8133.html
http://support.novell.com/security/cve/CVE-2014-8709.html
http://support.novell.com/security/cve/CVE-2014-8884.html
http://support.novell.com/security/cve/CVE-2014-9090.html
http://support.novell.com/security/cve/CVE-2014-9322.html
https://bugzilla.suse.com/show_bug.cgi?id=755743
https://bugzilla.suse.com/show_bug.cgi?id=779488
https://bugzilla.suse.com/show_bug.cgi?id=800255
https://bugzilla.suse.com/show_bug.cgi?id=835839
https://bugzilla.suse.com/show_bug.cgi?id=851603
https://bugzilla.suse.com/show_bug.cgi?id=853040
https://bugzilla.suse.com/show_bug.cgi?id=857643
https://bugzilla.suse.com/show_bug.cgi?id=860441
https://bugzilla.suse.com/show_bug.cgi?id=868049
https://bugzilla.suse.com/show_bug.cgi?id=873228
https://bugzilla.suse.com/show_bug.cgi?id=876633
https://bugzilla.suse.com/show_bug.cgi?id=883724
https://bugzilla.suse.com/show_bug.cgi?id=883948
https://bugzilla.suse.com/show_bug.cgi?id=885077
https://bugzilla.suse.com/show_bug.cgi?id=887418
https://bugzilla.suse.com/show_bug.cgi?id=888607
https://bugzilla.suse.com/show_bug.cgi?id=891211
https://bugzilla.suse.com/show_bug.cgi?id=891368
https://bugzilla.suse.com/show_bug.cgi?id=891790
https://bugzilla.suse.com/show_bug.cgi?id=892782
https://bugzilla.suse.com/show_bug.cgi?id=893758
https://bugzilla.suse.com/show_bug.cgi?id=894058
https://bugzilla.suse.com/show_bug.cgi?id=894895
https://bugzilla.suse.com/show_bug.cgi?id=895387
https://bugzilla.suse.com/show_bug.cgi?id=895468
https://bugzilla.suse.com/show_bug.cgi?id=896382
https://bugzilla.suse.com/show_bug.cgi?id=896390
https://bugzilla.suse.com/show_bug.cgi?id=896391
https://bugzilla.suse.com/show_bug.cgi?id=896392
https://bugzilla.suse.com/show_bug.cgi?id=896415
https://bugzilla.suse.com/show_bug.cgi?id=897502
https://bugzilla.suse.com/show_bug.cgi?id=897694
https://bugzilla.suse.com/show_bug.cgi?id=897708
https://bugzilla.suse.com/show_bug.cgi?id=898295
https://bugzilla.suse.com/show_bug.cgi?id=898375
https://bugzilla.suse.com/show_bug.cgi?id=898554
https://bugzilla.suse.com/show_bug.cgi?id=899192
https://bugzilla.suse.com/show_bug.cgi?id=899574
https://bugzilla.suse.com/show_bug.cgi?id=899843
https://bugzilla.suse.com/show_bug.cgi?id=901638
https://bugzilla.suse.com/show_bug.cgi?id=902346
https://bugzilla.suse.com/show_bug.cgi?id=902349
https://bugzilla.suse.com/show_bug.cgi?id=903331
https://bugzilla.suse.com/show_bug.cgi?id=903653
https://bugzilla.suse.com/show_bug.cgi?id=904013
https://bugzilla.suse.com/show_bug.cgi?id=904358
https://bugzilla.suse.com/show_bug.cgi?id=904700
https://bugzilla.suse.com/show_bug.cgi?id=905100
https://bugzilla.suse.com/show_bug.cgi?id=905522
https://bugzilla.suse.com/show_bug.cgi?id=907818
https://bugzilla.suse.com/show_bug.cgi?id=909077
https://bugzilla.suse.com/show_bug.cgi?id=910251
http://download.suse.com/patch/finder/?keywords=862382a71da04b8618cfe4076b0…
http://download.suse.com/patch/finder/?keywords=f5de0855dbf77afed3873613996…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:1694-1: important: Security update for openvpn
by opensuse-security@opensuse.org 23 Dec '14
by opensuse-security@opensuse.org 23 Dec '14
23 Dec '14
SUSE Security Update: Security update for openvpn
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1694-1
Rating: important
References: #907764
Cross-References: CVE-2014-8104
Affected Products:
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Desktop 12
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
A remote denial of service attack against openvpn was fixed, where a
authenticated client cloud stop the server by triggering a server-side
ASSERT (CVE-2014-8104),
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 12:
zypper in -t patch SUSE-SLE-SERVER-12-2014-120
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2014-120
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
openvpn-2.3.2-11.1
openvpn-auth-pam-plugin-2.3.2-11.1
openvpn-auth-pam-plugin-debuginfo-2.3.2-11.1
openvpn-debuginfo-2.3.2-11.1
openvpn-debugsource-2.3.2-11.1
- SUSE Linux Enterprise Desktop 12 (x86_64):
openvpn-2.3.2-11.1
openvpn-debuginfo-2.3.2-11.1
openvpn-debugsource-2.3.2-11.1
References:
http://support.novell.com/security/cve/CVE-2014-8104.html
https://bugzilla.suse.com/show_bug.cgi?id=907764
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:1693-1: important: Security update for Linux kernel
by opensuse-security@opensuse.org 23 Dec '14
by opensuse-security@opensuse.org 23 Dec '14
23 Dec '14
SUSE Security Update: Security update for Linux kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1693-1
Rating: important
References: #755743 #779488 #800255 #835839 #851603 #853040
#857643 #860441 #868049 #873228 #876633 #883724
#883948 #885077 #887418 #888607 #891211 #891368
#891790 #892782 #893758 #894058 #894895 #895387
#895468 #896382 #896390 #896391 #896392 #896415
#897502 #897694 #897708 #898295 #898375 #898554
#899192 #899574 #899843 #901638 #902346 #902349
#903331 #903653 #904013 #904358 #904700 #905100
#905522
Cross-References: CVE-2012-4398 CVE-2013-2889 CVE-2013-2893
CVE-2013-2897 CVE-2013-2899 CVE-2013-7263
CVE-2014-3181 CVE-2014-3184 CVE-2014-3185
CVE-2014-3186 CVE-2014-3601 CVE-2014-3610
CVE-2014-3646 CVE-2014-3647 CVE-2014-3673
CVE-2014-4508 CVE-2014-4608 CVE-2014-7826
CVE-2014-7841 CVE-2014-8709 CVE-2014-8884
Affected Products:
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise High Availability Extension 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
SLE 11 SERVER Unsupported Extras
______________________________________________________________________________
An update that solves 21 vulnerabilities and has 28 fixes
is now available. It includes one version update.
Description:
The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix
various bugs and security issues.
The following security bugs have been fixed:
* CVE-2012-4398: The __request_module function in kernel/kmod.c in the
Linux kernel before 3.4 did not set a certain killable attribute,
which allowed local users to cause a denial of service (memory
consumption) via a crafted application (bnc#779488).
* CVE-2013-2889: drivers/hid/hid-zpff.c in the Human Interface Device
(HID) subsystem in the Linux kernel through 3.11, when
CONFIG_HID_ZEROPLUS is enabled, allowed physically proximate
attackers to cause a denial of service (heap-based out-of-bounds
write) via a crafted device (bnc#835839).
* CVE-2013-2893: The Human Interface Device (HID) subsystem in the
Linux kernel through 3.11, when CONFIG_LOGITECH_FF,
CONFIG_LOGIG940_FF, or CONFIG_LOGIWHEELS_FF is enabled, allowed
physically proximate attackers to cause a denial of service
(heap-based out-of-bounds write) via a crafted device, related to
(1) drivers/hid/hid-lgff.c, (2) drivers/hid/hid-lg3ff.c, and (3)
drivers/hid/hid-lg4ff.c (bnc#835839).
* CVE-2013-2897: Multiple array index errors in
drivers/hid/hid-multitouch.c in the Human Interface Device (HID)
subsystem in the Linux kernel through 3.11, when
CONFIG_HID_MULTITOUCH is enabled, allowed physically proximate
attackers to cause a denial of service (heap memory corruption, or
NULL pointer dereference and OOPS) via a crafted device (bnc#835839).
* CVE-2013-2899: drivers/hid/hid-picolcd_core.c in the Human Interface
Device (HID) subsystem in the Linux kernel through 3.11, when
CONFIG_HID_PICOLCD is enabled, allowed physically proximate
attackers to cause a denial of service (NULL pointer dereference and
OOPS) via a crafted device (bnc#835839).
* CVE-2013-7263: The Linux kernel before 3.12.4 updates certain length
values before ensuring that associated data structures have been
initialized, which allowed local users to obtain sensitive
information from kernel stack memory via a (1) recvfrom, (2)
recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c,
net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c
(bnc#853040, bnc#857643).
* CVE-2014-3181: Multiple stack-based buffer overflows in the
magicmouse_raw_event function in drivers/hid/hid-magicmouse.c in the
Magic Mouse HID driver in the Linux kernel through 3.16.3 allowed
physically proximate attackers to cause a denial of service (system
crash) or possibly execute arbitrary code via a crafted device that
provides a large amount of (1) EHCI or (2) XHCI data associated with
an event (bnc#896382).
* CVE-2014-3184: The report_fixup functions in the HID subsystem in
the Linux kernel before 3.16.2 allowed physically proximate
attackers to cause a denial of service (out-of-bounds write) via a
crafted device that provides a small report descriptor, related to
(1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3)
drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5)
drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c
(bnc#896390).
* CVE-2014-3185: Multiple buffer overflows in the
command_port_read_callback function in
drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in
the Linux kernel before 3.16.2 allowed physically proximate
attackers to execute arbitrary code or cause a denial of service
(memory corruption and system crash) via a crafted device that
provides a large amount of (1) EHCI or (2) XHCI data associated with
a bulk response (bnc#896391).
* CVE-2014-3186: Buffer overflow in the picolcd_raw_event function in
devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in
the Linux kernel through 3.16.3, as used in Android on Nexus 7
devices, allowed physically proximate attackers to cause a denial of
service (system crash) or possibly execute arbitrary code via a
crafted device that sends a large report (bnc#896392).
* CVE-2014-3601: The kvm_iommu_map_pages function in virt/kvm/iommu.c
in the Linux kernel through 3.16.1 miscalculated the number of pages
during the handling of a mapping failure, which allowed guest OS
users to (1) cause a denial of service (host OS memory corruption)
or possibly have unspecified other impact by triggering a large gfn
value or (2) cause a denial of service (host OS memory consumption)
by triggering a small gfn value that leads to permanently pinned
pages (bnc#892782).
* CVE-2014-3610: The WRMSR processing functionality in the KVM
subsystem in the Linux kernel through 3.17.2 did not properly handle
the writing of a non-canonical address to a model-specific register,
which allowed guest OS users to cause a denial of service (host OS
crash) by leveraging guest OS privileges, related to the
wrmsr_interception function in arch/x86/kvm/svm.c and the
handle_wrmsr function in arch/x86/kvm/vmx.c (bnc#899192).
* CVE-2014-3646: arch/x86/kvm/vmx.c in the KVM subsystem in the Linux
kernel through 3.17.2 did not have an exit handler for the INVVPID
instruction, which allowed guest OS users to cause a denial of
service (guest OS crash) via a crafted application (bnc#899192).
* CVE-2014-3647: arch/x86/kvm/emulate.c in the KVM subsystem in the
Linux kernel through 3.17.2 did not properly perform RIP changes,
which allowed guest OS users to cause a denial of service (guest OS
crash) via a crafted application (bnc#899192).
* CVE-2014-3673: The SCTP implementation in the Linux kernel through
3.17.2 allowed remote attackers to cause a denial of service (system
crash) via a malformed ASCONF chunk, related to
net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c (bnc#902346,
bnc#902349).
* CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel
through 3.15.1 on 32-bit x86 platforms, when syscall auditing is
enabled and the sep CPU feature flag is set, allowed local users to
cause a denial of service (OOPS and system crash) via an invalid
syscall number, as demonstrated by number 1000 (bnc#883724).
* CVE-2014-4608: * DISPUTED * Multiple integer overflows in the
lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in
the LZO decompressor in the Linux kernel before 3.15.2 allowed
context-dependent attackers to cause a denial of service (memory
corruption) via a crafted Literal Run. NOTE: the author of the LZO
algorithms says: The Linux kernel is not affected; media hype
(bnc#883948).
* CVE-2014-7826: kernel/trace/trace_syscalls.c in the Linux kernel
through 3.17.2 did not properly handle private syscall numbers
during use of the ftrace subsystem, which allowed local users to
gain privileges or cause a denial of service (invalid pointer
dereference) via a crafted application (bnc#904013).
* CVE-2014-7841: An SCTP server doing ASCONF would panic on malformed
INIT ping-of-death (bnc#905100).
* CVE-2014-8709: The ieee80211_fragment function in net/mac80211/tx.c
in the Linux kernel before 3.13.5 did not properly maintain a
certain tail pointer, which allowed remote attackers to obtain
sensitive cleartext information by reading packets (bnc#904700).
* CVE-2014-8884: A local user with write access could have used this
flaw to crash the kernel or elevate privileges (bnc#905522).
The following non-security bugs have been fixed:
* Build the KOTD against the SP3 Update project
* HID: fix kabi breakage.
* NFS: Provide stub nfs_fscache_wait_on_invalidate() for when
CONFIG_NFS_FSCACHE=n.
* NFS: fix inverted test for delegation in nfs4_reclaim_open_state
(bnc#903331).
* NFS: remove incorrect Lock reclaim failed! warning (bnc#903331).
* NFSv4: nfs4_open_done first must check that GETATTR decoded a file
type (bnc#899574).
* PCI: pciehp: Clear Data Link Layer State Changed during init
(bnc#898295).
* PCI: pciehp: Enable link state change notifications (bnc#898295).
* PCI: pciehp: Handle push button event asynchronously (bnc#898295).
* PCI: pciehp: Make check_link_active() non-static (bnc#898295).
* PCI: pciehp: Use link change notifications for hot-plug and removal
(bnc#898295).
* PCI: pciehp: Use per-slot workqueues to avoid deadlock (bnc#898295).
* PCI: pciehp: Use symbolic constants, not hard-coded bitmask
(bnc#898295).
* PM / hibernate: Iterate over set bits instead of PFNs in
swsusp_free() (bnc#860441).
* be2net: Fix invocation of be_close() after be_clear() (bnc#895468).
* block: Fix bogus partition statistics reports (bnc#885077
bnc#891211).
* block: Fix computation of merged request priority.
* btrfs: Fix wrong device size when we are resizing the device.
* btrfs: Return right extent when fiemap gives unaligned offset and
len.
* btrfs: abtract out range locking in clone ioctl().
* btrfs: always choose work from prio_head first.
* btrfs: balance delayed inode updates.
* btrfs: cache extent states in defrag code path.
* btrfs: check file extent type before anything else (bnc#897694).
* btrfs: clone, do not create invalid hole extent map.
* btrfs: correctly determine if blocks are shared in
btrfs_compare_trees.
* btrfs: do not bug_on if we try to cow a free space cache inode.
* btrfs: ensure btrfs_prev_leaf does not miss 1 item.
* btrfs: ensure readers see new data after a clone operation.
* btrfs: fill_holes: Fix slot number passed to hole_mergeable() call.
* btrfs: filter invalid arg for btrfs resize.
* btrfs: fix EINVAL checks in btrfs_clone.
* btrfs: fix EIO on reading file after ioctl clone works on it.
* btrfs: fix a crash of clone with inline extents split.
* btrfs: fix crash of compressed writes (bnc#898375).
* btrfs: fix crash when starting transaction.
* btrfs: fix deadlock with nested trans handles.
* btrfs: fix hang on error (such as ENOSPC) when writing extent pages.
* btrfs: fix leaf corruption after __btrfs_drop_extents.
* btrfs: fix race between balance recovery and root deletion.
* btrfs: fix wrong extent mapping for DirectIO.
* btrfs: handle a missing extent for the first file extent.
* btrfs: limit delalloc pages outside of find_delalloc_range
(bnc#898375).
* btrfs: read lock extent buffer while walking backrefs.
* btrfs: remove unused wait queue in struct extent_buffer.
* btrfs: replace EINVAL with ERANGE for resize when ULLONG_MAX.
* btrfs: replace error code from btrfs_drop_extents.
* btrfs: unlock extent and pages on error in cow_file_range.
* btrfs: unlock inodes in correct order in clone ioctl.
* btrfs_ioctl_clone: Move clone code into its own function.
* cifs: delay super block destruction until all cifsFileInfo objects
are gone (bnc#903653).
* drm/i915: Flush the PTEs after updating them before suspend
(bnc#901638).
* drm/i915: Undo gtt scratch pte unmapping again (bnc#901638).
* ext3: return 32/64-bit dir name hash according to usage type
(bnc#898554).
* ext4: return 32/64-bit dir name hash according to usage type
(bnc#898554).
* fix: use after free of xfs workqueues (bnc#894895).
* fs: add new FMODE flags: FMODE_32bithash and FMODE_64bithash
(bnc#898554).
* futex: Ensure get_futex_key_refs() always implies a barrier
(bnc#851603 (futex scalability series)).
* futex: Fix a race condition between REQUEUE_PI and task death
(bnc#851603 (futex scalability series)).
* ipv6: add support of peer address (bnc#896415).
* ipv6: fix a refcnt leak with peer addr (bnc#896415).
* megaraid_sas: Disable fastpath writes for non-RAID0 (bnc#897502).
* mm: change __remove_pages() to call release_mem_region_adjustable()
(bnc#891790).
* netxen: Fix link event handling (bnc#873228).
* netxen: fix link notification order (bnc#873228).
* nfsd: rename int access to int may_flags in nfsd_open() (bnc#898554).
* nfsd: vfs_llseek() with 32 or 64 bit offsets (hashes) (bnc#898554).
* ocfs2: fix NULL pointer dereference in
ocfs2_duplicate_clusters_by_page (bnc#899843).
* powerpc: Add smp_mb() to arch_spin_is_locked() (bsc#893758).
* powerpc: Add smp_mb()s to arch_spin_unlock_wait() (bsc#893758).
* powerpc: Add support for the optimised lockref implementation
(bsc#893758).
* powerpc: Implement arch_spin_is_locked() using
arch_spin_value_unlocked() (bsc#893758).
* refresh patches.xen/xen-blkback-multi-page-ring (bnc#897708)).
* remove filesize checks for sync I/O journal commit (bnc#800255).
* resource: add __adjust_resource() for internal use (bnc#891790).
* resource: add release_mem_region_adjustable() (bnc#891790).
* revert PM / Hibernate: Iterate over set bits instead of PFNs in
swsusp_free() (bnc#860441).
* rpm/mkspec: Generate specfiles according to Factory requirements.
* rpm/mkspec: Generate a per-architecture per-package _constraints file
* sched: Fix unreleased llc_shared_mask bit during CPU hotplug
(bnc#891368).
* scsi_dh_alua: disable ALUA handling for non-disk devices
(bnc#876633).
* usb: Do not re-read descriptors for wired devices in
usb_authorize_device() (bnc#904358).
* usbback: Do not access request fields in shared ring more than once.
* usbhid: add another mouse that needs QUIRK_ALWAYS_POLL (bnc#888607).
* vfs,proc: guarantee unique inodes in /proc (bnc#868049).
* x86, cpu hotplug: Fix stack frame warning
incheck_irq_vectors_for_cpu_disable() (bnc#887418).
* x86, ioremap: Speed up check for RAM pages (Boot time optimisations
(bnc#895387)).
* x86: Add check for number of available vectors before CPU down
(bnc#887418).
* x86: optimize resource lookups for ioremap (Boot time optimisations
(bnc#895387)).
* x86: use optimized ioresource lookup in ioremap function (Boot time
optimisations (bnc#895387)).
* xfs: Do not free EFIs before the EFDs are committed (bsc#755743).
* xfs: Do not reference the EFI after it is freed (bsc#755743).
* xfs: fix cil push sequence after log recovery (bsc#755743).
* zcrypt: support for extended number of ap domains (bnc#894058,
LTC#117041).
* zcrypt: toleration of new crypto adapter hardware (bnc#894058,
LTC#117041).
Security Issues:
* CVE-2012-4398
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4398>
* CVE-2013-2889
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2889>
* CVE-2013-2893
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2893>
* CVE-2013-2897
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2897>
* CVE-2013-2899
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2899>
* CVE-2013-7263
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7263>
* CVE-2014-3181
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3181>
* CVE-2014-3184
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3184>
* CVE-2014-3185
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3185>
* CVE-2014-3186
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3186>
* CVE-2014-3601
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3601>
* CVE-2014-3610
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3610>
* CVE-2014-3646
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3646>
* CVE-2014-3647
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3647>
* CVE-2014-4508
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508>
* CVE-2014-4608
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4608>
* CVE-2014-7826
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7826>
* CVE-2014-7841
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7841>
* CVE-2014-8709
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8709>
* CVE-2014-8884
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8884>
* CVE-2014-3673
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3673>
Indications:
Everyone using the Linux Kernel on x86 architecture should update.
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-kernel-10037
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-kernel-10037
- SUSE Linux Enterprise High Availability Extension 11 SP3:
zypper in -t patch slehasp3-kernel-10037
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-kernel-10037
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586) [New Version: 3.0.101]:
kernel-default-3.0.101-0.42.1
kernel-default-base-3.0.101-0.42.1
kernel-default-devel-3.0.101-0.42.1
kernel-pae-3.0.101-0.42.1
kernel-pae-base-3.0.101-0.42.1
kernel-pae-devel-3.0.101-0.42.1
kernel-source-3.0.101-0.42.1
kernel-syms-3.0.101-0.42.1
kernel-trace-3.0.101-0.42.1
kernel-trace-base-3.0.101-0.42.1
kernel-trace-devel-3.0.101-0.42.1
kernel-xen-devel-3.0.101-0.42.1
- SUSE Linux Enterprise Server 11 SP3 (i586) [New Version: 3.0.101]:
kernel-default-3.0.101-0.42.1
kernel-default-base-3.0.101-0.42.1
kernel-default-devel-3.0.101-0.42.1
kernel-ec2-3.0.101-0.42.1
kernel-ec2-base-3.0.101-0.42.1
kernel-ec2-devel-3.0.101-0.42.1
kernel-pae-3.0.101-0.42.1
kernel-pae-base-3.0.101-0.42.1
kernel-pae-devel-3.0.101-0.42.1
kernel-source-3.0.101-0.42.1
kernel-syms-3.0.101-0.42.1
kernel-trace-3.0.101-0.42.1
kernel-trace-base-3.0.101-0.42.1
kernel-trace-devel-3.0.101-0.42.1
kernel-xen-3.0.101-0.42.1
kernel-xen-base-3.0.101-0.42.1
kernel-xen-devel-3.0.101-0.42.1
xen-kmp-default-4.2.5_02_3.0.101_0.42-0.7.2
xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2
- SUSE Linux Enterprise High Availability Extension 11 SP3 (i586):
cluster-network-kmp-default-1.4_3.0.101_0.42-2.27.115
cluster-network-kmp-pae-1.4_3.0.101_0.42-2.27.115
cluster-network-kmp-trace-1.4_3.0.101_0.42-2.27.115
cluster-network-kmp-xen-1.4_3.0.101_0.42-2.27.115
gfs2-kmp-default-2_3.0.101_0.42-0.16.121
gfs2-kmp-pae-2_3.0.101_0.42-0.16.121
gfs2-kmp-trace-2_3.0.101_0.42-0.16.121
gfs2-kmp-xen-2_3.0.101_0.42-0.16.121
ocfs2-kmp-default-1.6_3.0.101_0.42-0.20.115
ocfs2-kmp-pae-1.6_3.0.101_0.42-0.20.115
ocfs2-kmp-trace-1.6_3.0.101_0.42-0.20.115
ocfs2-kmp-xen-1.6_3.0.101_0.42-0.20.115
- SUSE Linux Enterprise Desktop 11 SP3 (i586) [New Version: 3.0.101]:
kernel-default-3.0.101-0.42.1
kernel-default-base-3.0.101-0.42.1
kernel-default-devel-3.0.101-0.42.1
kernel-default-extra-3.0.101-0.42.1
kernel-pae-3.0.101-0.42.1
kernel-pae-base-3.0.101-0.42.1
kernel-pae-devel-3.0.101-0.42.1
kernel-pae-extra-3.0.101-0.42.1
kernel-source-3.0.101-0.42.1
kernel-syms-3.0.101-0.42.1
kernel-trace-devel-3.0.101-0.42.1
kernel-xen-3.0.101-0.42.1
kernel-xen-base-3.0.101-0.42.1
kernel-xen-devel-3.0.101-0.42.1
kernel-xen-extra-3.0.101-0.42.1
xen-kmp-default-4.2.5_02_3.0.101_0.42-0.7.2
xen-kmp-pae-4.2.5_02_3.0.101_0.42-0.7.2
- SLE 11 SERVER Unsupported Extras (i586 ia64 ppc64 s390x):
kernel-default-extra-3.0.101-0.42.1
- SLE 11 SERVER Unsupported Extras (ppc64):
kernel-ppc64-extra-3.0.101-0.42.1
- SLE 11 SERVER Unsupported Extras (i586):
kernel-pae-extra-3.0.101-0.42.1
kernel-xen-extra-3.0.101-0.42.1
References:
http://support.novell.com/security/cve/CVE-2012-4398.html
http://support.novell.com/security/cve/CVE-2013-2889.html
http://support.novell.com/security/cve/CVE-2013-2893.html
http://support.novell.com/security/cve/CVE-2013-2897.html
http://support.novell.com/security/cve/CVE-2013-2899.html
http://support.novell.com/security/cve/CVE-2013-7263.html
http://support.novell.com/security/cve/CVE-2014-3181.html
http://support.novell.com/security/cve/CVE-2014-3184.html
http://support.novell.com/security/cve/CVE-2014-3185.html
http://support.novell.com/security/cve/CVE-2014-3186.html
http://support.novell.com/security/cve/CVE-2014-3601.html
http://support.novell.com/security/cve/CVE-2014-3610.html
http://support.novell.com/security/cve/CVE-2014-3646.html
http://support.novell.com/security/cve/CVE-2014-3647.html
http://support.novell.com/security/cve/CVE-2014-3673.html
http://support.novell.com/security/cve/CVE-2014-4508.html
http://support.novell.com/security/cve/CVE-2014-4608.html
http://support.novell.com/security/cve/CVE-2014-7826.html
http://support.novell.com/security/cve/CVE-2014-7841.html
http://support.novell.com/security/cve/CVE-2014-8709.html
http://support.novell.com/security/cve/CVE-2014-8884.html
https://bugzilla.suse.com/show_bug.cgi?id=755743
https://bugzilla.suse.com/show_bug.cgi?id=779488
https://bugzilla.suse.com/show_bug.cgi?id=800255
https://bugzilla.suse.com/show_bug.cgi?id=835839
https://bugzilla.suse.com/show_bug.cgi?id=851603
https://bugzilla.suse.com/show_bug.cgi?id=853040
https://bugzilla.suse.com/show_bug.cgi?id=857643
https://bugzilla.suse.com/show_bug.cgi?id=860441
https://bugzilla.suse.com/show_bug.cgi?id=868049
https://bugzilla.suse.com/show_bug.cgi?id=873228
https://bugzilla.suse.com/show_bug.cgi?id=876633
https://bugzilla.suse.com/show_bug.cgi?id=883724
https://bugzilla.suse.com/show_bug.cgi?id=883948
https://bugzilla.suse.com/show_bug.cgi?id=885077
https://bugzilla.suse.com/show_bug.cgi?id=887418
https://bugzilla.suse.com/show_bug.cgi?id=888607
https://bugzilla.suse.com/show_bug.cgi?id=891211
https://bugzilla.suse.com/show_bug.cgi?id=891368
https://bugzilla.suse.com/show_bug.cgi?id=891790
https://bugzilla.suse.com/show_bug.cgi?id=892782
https://bugzilla.suse.com/show_bug.cgi?id=893758
https://bugzilla.suse.com/show_bug.cgi?id=894058
https://bugzilla.suse.com/show_bug.cgi?id=894895
https://bugzilla.suse.com/show_bug.cgi?id=895387
https://bugzilla.suse.com/show_bug.cgi?id=895468
https://bugzilla.suse.com/show_bug.cgi?id=896382
https://bugzilla.suse.com/show_bug.cgi?id=896390
https://bugzilla.suse.com/show_bug.cgi?id=896391
https://bugzilla.suse.com/show_bug.cgi?id=896392
https://bugzilla.suse.com/show_bug.cgi?id=896415
https://bugzilla.suse.com/show_bug.cgi?id=897502
https://bugzilla.suse.com/show_bug.cgi?id=897694
https://bugzilla.suse.com/show_bug.cgi?id=897708
https://bugzilla.suse.com/show_bug.cgi?id=898295
https://bugzilla.suse.com/show_bug.cgi?id=898375
https://bugzilla.suse.com/show_bug.cgi?id=898554
https://bugzilla.suse.com/show_bug.cgi?id=899192
https://bugzilla.suse.com/show_bug.cgi?id=899574
https://bugzilla.suse.com/show_bug.cgi?id=899843
https://bugzilla.suse.com/show_bug.cgi?id=901638
https://bugzilla.suse.com/show_bug.cgi?id=902346
https://bugzilla.suse.com/show_bug.cgi?id=902349
https://bugzilla.suse.com/show_bug.cgi?id=903331
https://bugzilla.suse.com/show_bug.cgi?id=903653
https://bugzilla.suse.com/show_bug.cgi?id=904013
https://bugzilla.suse.com/show_bug.cgi?id=904358
https://bugzilla.suse.com/show_bug.cgi?id=904700
https://bugzilla.suse.com/show_bug.cgi?id=905100
https://bugzilla.suse.com/show_bug.cgi?id=905522
http://download.suse.com/patch/finder/?keywords=2969b6fb6821f3c1c5779cb35e3…
http://download.suse.com/patch/finder/?keywords=9da207bd70d4d6642d94fe87580…
http://download.suse.com/patch/finder/?keywords=a2d767013b3d89848dc24f9f8e9…
http://download.suse.com/patch/finder/?keywords=ac39209a595f41dfe7246b4c02e…
http://download.suse.com/patch/finder/?keywords=d7fb7c9ea045657cf163753ab42…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:1690-1: critical: Security update for ntp
by opensuse-security@opensuse.org 23 Dec '14
by opensuse-security@opensuse.org 23 Dec '14
23 Dec '14
SUSE Security Update: Security update for ntp
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1690-1
Rating: critical
References: #910764
Cross-References: CVE-2014-9295 CVE-2014-9296
Affected Products:
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Desktop 12
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
The network timeservice ntp was updated to fix critical security issues
(bnc#910764, CERT VU#852879)
* A potential remote code execution problem was found inside ntpd. The
functions crypto_recv() (when using autokey authentication),
ctl_putdata(), and configure() where updated to avoid buffer overflows
that could be exploited. (CVE-2014-9295)
* Furthermore a problem inside the ntpd error handling was found that is
missing a return statement. This could also lead to a potentially attack
vector. (CVE-2014-9296)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 12:
zypper in -t patch SUSE-SLE-SERVER-12-2014-118
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2014-118
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
ntp-4.2.6p5-31.1
ntp-debuginfo-4.2.6p5-31.1
ntp-debugsource-4.2.6p5-31.1
ntp-doc-4.2.6p5-31.1
- SUSE Linux Enterprise Desktop 12 (x86_64):
ntp-4.2.6p5-31.1
ntp-debuginfo-4.2.6p5-31.1
ntp-debugsource-4.2.6p5-31.1
ntp-doc-4.2.6p5-31.1
References:
http://support.novell.com/security/cve/CVE-2014-9295.html
http://support.novell.com/security/cve/CVE-2014-9296.html
https://bugzilla.suse.com/show_bug.cgi?id=910764
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0