SUSE Security Update: Security update for openssl
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0679-1
Rating: important
References: #749735 #761838
Cross-References: CVE-2012-2333
Affected Products:
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Desktop 10 SP4
SLE SDK 10 SP4
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update of openssl fixes the following denial of
service vulnerabilities:
* Denial of Service via CBC mode handling.
(CVE-2012-2333
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2333
> )
* A deadlock condition introduced by the previous
memory leak fix due to entering a lock twice. This would
only happen in multithreaded programs.
In addition, openssl's cms subcommand (Crypthographic
Message Syntax) has been enabled.
Package List:
- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):
openssl-0.9.8a-18.70.5
openssl-devel-0.9.8a-18.70.5
openssl-doc-0.9.8a-18.70.5
- SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):
openssl-32bit-0.9.8a-18.70.5
openssl-devel-32bit-0.9.8a-18.70.5
- SUSE Linux Enterprise Server 10 SP4 (ia64):
openssl-x86-0.9.8a-18.70.5
- SUSE Linux Enterprise Server 10 SP4 (ppc):
openssl-64bit-0.9.8a-18.70.5
openssl-devel-64bit-0.9.8a-18.70.5
- SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):
openssl-0.9.8a-18.70.5
openssl-devel-0.9.8a-18.70.5
- SUSE Linux Enterprise Desktop 10 SP4 (x86_64):
openssl-32bit-0.9.8a-18.70.5
openssl-devel-32bit-0.9.8a-18.70.5
- SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):
openssl-doc-0.9.8a-18.70.5
References:
http://support.novell.com/security/cve/CVE-2012-2333.htmlhttps://bugzilla.novell.com/749735https://bugzilla.novell.com/761838http://download.novell.com/patch/finder/?keywords=72e4e6bb5a3e9c48dd5cb873c…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for openssl
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0678-1
Rating: important
References: #749735 #761324 #761838
Cross-References: CVE-2012-2333
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Software Development Kit 11 SP1
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 11 SP1 for VMware
SUSE Linux Enterprise Server 11 SP1
SUSE Linux Enterprise Desktop 11 SP2
SUSE Linux Enterprise Desktop 11 SP1
______________________________________________________________________________
An update that solves one vulnerability and has two fixes
is now available. It includes one version update.
Description:
This update of openssl fixes the following denial of
service vulnerabilities:
* Denial of Service via CBC mode handling.
(CVE-2012-2333
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2333
> )
* A deadlock condition introduced by the previous
memory leak fix due to entering a lock twice. This would
only happen in multithreaded programs.
In addition, openssl's cms subcommand (Crypthographic
Message Syntax) has been enabled.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP2:
zypper in -t patch sdksp1-libopenssl-devel-6350
- SUSE Linux Enterprise Software Development Kit 11 SP1:
zypper in -t patch sdksp1-libopenssl-devel-6350
- SUSE Linux Enterprise Server 11 SP2:
zypper in -t patch slessp1-libopenssl-devel-6350
- SUSE Linux Enterprise Server 11 SP1 for VMware:
zypper in -t patch slessp1-libopenssl-devel-6350
- SUSE Linux Enterprise Server 11 SP1:
zypper in -t patch slessp1-libopenssl-devel-6350
- SUSE Linux Enterprise Desktop 11 SP2:
zypper in -t patch sledsp1-libopenssl-devel-6350
- SUSE Linux Enterprise Desktop 11 SP1:
zypper in -t patch sledsp1-libopenssl-devel-6350
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.9.8j]:
libopenssl-devel-0.9.8j-0.38.1
- SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.9.8j]:
libopenssl-devel-0.9.8j-0.38.1
- SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-0.9.8j-0.38.1
openssl-0.9.8j-0.38.1
openssl-doc-0.9.8j-0.38.1
- SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-32bit-0.9.8j-0.38.1
- SUSE Linux Enterprise Server 11 SP2 (ia64) [New Version: 0.9.8j]:
libopenssl0_9_8-x86-0.9.8j-0.38.1
- SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-0.9.8j-0.38.1
openssl-0.9.8j-0.38.1
openssl-doc-0.9.8j-0.38.1
- SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-32bit-0.9.8j-0.38.1
- SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-0.9.8j-0.38.1
openssl-0.9.8j-0.38.1
openssl-doc-0.9.8j-0.38.1
- SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-32bit-0.9.8j-0.38.1
- SUSE Linux Enterprise Server 11 SP1 (ia64) [New Version: 0.9.8j]:
libopenssl0_9_8-x86-0.9.8j-0.38.1
- SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-0.9.8j-0.38.1
openssl-0.9.8j-0.38.1
- SUSE Linux Enterprise Desktop 11 SP2 (x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-32bit-0.9.8j-0.38.1
- SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-0.9.8j-0.38.1
openssl-0.9.8j-0.38.1
- SUSE Linux Enterprise Desktop 11 SP1 (x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-32bit-0.9.8j-0.38.1
References:
http://support.novell.com/security/cve/CVE-2012-2333.htmlhttps://bugzilla.novell.com/749735https://bugzilla.novell.com/761324https://bugzilla.novell.com/761838http://download.novell.com/patch/finder/?keywords=6a3dc7cf4062c03f840c24ec2…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: update for cobbler
______________________________________________________________________________
Announcement ID: openSUSE-SU-2012:0655-1
Rating: important
References: #763610
Cross-References: CVE-2012-2395
Affected Products:
openSUSE 12.1
openSUSE 11.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
The xmlrpc interface of cobbler was prone to command
injectoin
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.1:
zypper in -t patch openSUSE-2012-296
- openSUSE 11.4:
zypper in -t patch openSUSE-2012-296
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.1 (i586 x86_64):
cobbler-2.2.1-7.13.1
cobbler-web-2.2.1-7.13.1
koan-2.2.1-7.13.1
- openSUSE 11.4 (i586 x86_64):
cobbler-2.2.1-45.1
cobbler-web-2.2.1-45.1
koan-2.2.1-45.1
References:
http://support.novell.com/security/cve/CVE-2012-2395.htmlhttps://bugzilla.novell.com/763610
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for openssl
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0637-1
Rating: important
References: #749735 #758060
Cross-References: CVE-2012-2110
Affected Products:
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Desktop 10 SP4
SLE SDK 10 SP4
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update of openssl fixes an integer conversation issue
which could cause a heap-based memory corruption
(CVE-2012-2110
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110
> ).
Additionally, a check for negative buffer length values was
added ( CVE-2012-2131
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2131
> ) and a memory leak when creating public keys fixed.
Package List:
- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):
openssl-0.9.8a-18.68.1
openssl-devel-0.9.8a-18.68.1
openssl-doc-0.9.8a-18.68.1
- SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):
openssl-32bit-0.9.8a-18.68.1
openssl-devel-32bit-0.9.8a-18.68.1
- SUSE Linux Enterprise Server 10 SP4 (ia64):
openssl-x86-0.9.8a-18.68.1
- SUSE Linux Enterprise Server 10 SP4 (ppc):
openssl-64bit-0.9.8a-18.68.1
openssl-devel-64bit-0.9.8a-18.68.1
- SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):
openssl-0.9.8a-18.68.1
openssl-devel-0.9.8a-18.68.1
- SUSE Linux Enterprise Desktop 10 SP4 (x86_64):
openssl-32bit-0.9.8a-18.68.1
openssl-devel-32bit-0.9.8a-18.68.1
- SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):
openssl-doc-0.9.8a-18.68.1
References:
http://support.novell.com/security/cve/CVE-2012-2110.htmlhttps://bugzilla.novell.com/749735https://bugzilla.novell.com/758060http://download.novell.com/patch/finder/?keywords=d67d562e97a943fd087f8fa61…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for flash-player
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0592-1
Rating: critical
References: #757428 #758645 #760777
Cross-References: CVE-2012-0779
Affected Products:
SUSE Linux Enterprise Desktop 11 SP2
SUSE Linux Enterprise Desktop 11 SP1
______________________________________________________________________________
An update that solves one vulnerability and has two fixes
is now available. It includes one version update.
Description:
Flash Player was updated to version 11.2.202.233, fixing a
critical security problem.
This update also fixes a problem with NVIDIA accelerated
drivers and swapped blue/red colors, and also a printing
regression introduced by a previous update.
Security Issue reference:
* CVE-2012-0779
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0779
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Desktop 11 SP2:
zypper in -t patch sledsp1-flash-player-6253
- SUSE Linux Enterprise Desktop 11 SP1:
zypper in -t patch sledsp1-flash-player-6253
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 11.2.202.235]:
flash-player-11.2.202.235-0.3.1
- SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 11.2.202.235]:
flash-player-11.2.202.235-0.3.1
References:
http://support.novell.com/security/cve/CVE-2012-0779.htmlhttps://bugzilla.novell.com/757428https://bugzilla.novell.com/758645https://bugzilla.novell.com/760777http://download.novell.com/patch/finder/?keywords=29ba5e8ed6a94441fe290e408…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for openssl
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0623-1
Rating: important
References: #755395 #758060
Cross-References: CVE-2012-2110
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Software Development Kit 11 SP1
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 11 SP1 for VMware
SUSE Linux Enterprise Server 11 SP1
SUSE Linux Enterprise Desktop 11 SP2
SUSE Linux Enterprise Desktop 11 SP1
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available. It includes one version update.
Description:
This update of openssl fixes an integer conversation issue
which could cause a heap-based memory corruption
(CVE-2012-2110
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110
> ).
Additionally, a check for negative buffer length values was
added ( CVE-2012-2131
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2131
> ) and the stack made non-executable by marking the
enhanced Intel SSSE3 assembler code as not needing
executable stack.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP2:
zypper in -t patch sdksp1-libopenssl-devel-6245
- SUSE Linux Enterprise Software Development Kit 11 SP1:
zypper in -t patch sdksp1-libopenssl-devel-6245
- SUSE Linux Enterprise Server 11 SP2:
zypper in -t patch slessp1-libopenssl-devel-6245
- SUSE Linux Enterprise Server 11 SP1 for VMware:
zypper in -t patch slessp1-libopenssl-devel-6245
- SUSE Linux Enterprise Server 11 SP1:
zypper in -t patch slessp1-libopenssl-devel-6245
- SUSE Linux Enterprise Desktop 11 SP2:
zypper in -t patch sledsp1-libopenssl-devel-6245
- SUSE Linux Enterprise Desktop 11 SP1:
zypper in -t patch sledsp1-libopenssl-devel-6245
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.9.8j]:
libopenssl-devel-0.9.8j-0.36.1
- SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.9.8j]:
libopenssl-devel-0.9.8j-0.36.1
- SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-0.9.8j-0.36.1
openssl-0.9.8j-0.36.1
openssl-doc-0.9.8j-0.36.1
- SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-32bit-0.9.8j-0.36.1
- SUSE Linux Enterprise Server 11 SP2 (ia64) [New Version: 0.9.8j]:
libopenssl0_9_8-x86-0.9.8j-0.36.1
- SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-0.9.8j-0.36.1
openssl-0.9.8j-0.36.1
openssl-doc-0.9.8j-0.36.1
- SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-32bit-0.9.8j-0.36.1
- SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-0.9.8j-0.36.1
openssl-0.9.8j-0.36.1
openssl-doc-0.9.8j-0.36.1
- SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-32bit-0.9.8j-0.36.1
- SUSE Linux Enterprise Server 11 SP1 (ia64) [New Version: 0.9.8j]:
libopenssl0_9_8-x86-0.9.8j-0.36.1
- SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-0.9.8j-0.36.1
openssl-0.9.8j-0.36.1
- SUSE Linux Enterprise Desktop 11 SP2 (x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-32bit-0.9.8j-0.36.1
- SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-0.9.8j-0.36.1
openssl-0.9.8j-0.36.1
- SUSE Linux Enterprise Desktop 11 SP1 (x86_64) [New Version: 0.9.8j]:
libopenssl0_9_8-32bit-0.9.8j-0.36.1
References:
http://support.novell.com/security/cve/CVE-2012-2110.htmlhttps://bugzilla.novell.com/755395https://bugzilla.novell.com/758060http://download.novell.com/patch/finder/?keywords=0878d39a7efb9cd5f0980f947…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for Linux kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0616-1
Rating: important
References: #611264 #617344 #624072 #652942 #668194 #676204
#688079 #693639 #697920 #700449 #704280 #713148
#714507 #716850 #717994 #719793 #720374 #721366
#727834 #729247 #731809 #733761 #734300 #734900
#737326 #738210 #738503 #738528 #738679 #740180
#740895 #740969 #742210 #742358 #743209 #743619
#744163 #744658 #745422 #745699 #745832 #745929
#746980 #747028 #747430 #747445 #748112 #748279
#748812 #749342 #749569 #749886 #750079 #750171
#751322 #751844 #751880 #752491 #752634 #752972
#755178 #755537 #756448 #756840 #757917 #758532
#758813 #759544
Cross-References: CVE-2011-1083 CVE-2011-4086 CVE-2011-4622
CVE-2012-0045 CVE-2012-0879 CVE-2012-1090
CVE-2012-1097 CVE-2012-2133
Affected Products:
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 11 SP1 for VMware
SUSE Linux Enterprise Server 11 SP1
SUSE Linux Enterprise High Availability Extension 11 SP1
SUSE Linux Enterprise Desktop 11 SP2
SUSE Linux Enterprise Desktop 11 SP1
SLE 11 SERVER Unsupported Extras
______________________________________________________________________________
An update that solves 8 vulnerabilities and has 60 fixes is
now available. It includes one version update.
Description:
The SUSE Linux Enterprise 11 SP1 kernel have been updated
to the 2.6.32.59 stable release to fix a lot of bugs and
security issues.
The following security issues have been fixed:
* CVE-2012-2133: A use after free bug in hugetlb
support could be used by local attackers to crash the
system.
* CVE-2012-1097: A null pointer dereference bug in the
regsets proc file could be used by local attackers to
perhaps crash the system. With mmap_min_addr is set and
enabled, exploitation is unlikely.
* CVE-2012-0879: A reference counting issue in CLONE_IO
could be used by local attackers to cause a denial of
service (out of memory).
* CVE-2012-1090: A file handle leak in CIFS code could
be used by local attackers to crash the system.
* CVE-2011-1083: Large nested epoll chains could be
used by local attackers to cause a denial of service
(excessive CPU consumption).
* CVE-2011-4622: When using KVM, programming a PIT
timer without a irqchip configuration, can be used to crash
the kvm guest. This likely can be done only by a privileged
guest user.
* CVE-2012-0045: A KVM 32bit guest crash in "syscall"
opcode handling was fixed that could be caused by local
attackers.
* CVE-2011-4086: Fixed a oops in jbd/jbd2 that could be
caused by specific filesystem access patterns.
The following non-security issues have been fixed:
X86:
* x86: fix the initialization of physnode_map
(bnc#748112).
* x86: Allow bootmem reserves at greater than 8G node
offset within a node (bnc#740895).
* x86, tsc: Fix SMI induced variation in
quick_pit_calibrate(). (bnc#751322)
* x86, efi: Work around broken firmware. (bnc#714507)
BONDING:
* bonding: update speed/duplex for NETDEV_CHANGE
(bnc#752634).
* bonding: comparing a u8 with -1 is always false
(bnc#752634).
* bonding: start slaves with link down for ARP monitor
(bnc#752634).
* bonding: send gratuitous ARP for all addresses
(bnc#752491).
XFS:
* xfs: Fix excessive inode syncing when project quota
is exceeded (bnc#756448).
* xfs: Fix oops on IO error during
xlog_recover_process_iunlinks() (bnc#716850).
SCSI:
* scsi/ses: Handle non-unique element descriptors
(bnc#749342, bnc#617344).
* scsi/sd: mark busy sd majors as allocated
(bug#744658).
* scsi: Check for invalid sdev in
scsi_prep_state_check() (bnc#734300).
MD/RAID:
* md: fix possible corruption of array metadata on
shutdown.
* md: ensure changes to write-mostly are reflected in
metadata (bnc#755178).
* md: do not set md arrays to readonly on shutdown
(bnc#740180, bnc#713148, bnc#734900).
XEN:
* smpboot: adjust ordering of operations.
* x86-64: provide a memset() that can deal with 4Gb or
above at a time (bnc#738528).
* blkfront: properly fail packet requests (bnc#745929).
* Update Xen patches to 2.6.32.57.
* xenbus: Reject replies with payload >
XENSTORE_PAYLOAD_MAX.
* xenbus_dev: add missing error checks to watch
handling.
* Refresh other Xen patches (bnc#652942, bnc#668194,
bnc#688079).
* fix Xen-specific kABI issue in Linux 2.6.19.
NFS:
* NFSD: Fill in WCC data for REMOVE, RMDIR, MKNOD, and
MKDIR (bnc#751880).
* nfs: Include SYNC flag when comparing mount options
with NOAC flag (bnc#745422).
* NFS returns EIO for EDQUOT and others (bnc#747028).
* lockd: fix arg parsing for grace_period and timeout
(bnc#733761).
* nfs: allow nfs4leasetime to be set before starting
servers (bnc#733761).
* nfs: handle d_revalidate of dot correctly
(bnc#731809).
S/390:
* ctcmpc: use correct idal word list for ctcmpc
(bnc#750171,LTC#79264).
* qeth: synchronize discipline module loading
(bnc#747430,LTC#78788).
* qdio: avoid race leading to stall when tolerating CQ
(bnc#737326,LTC#76599).
* kernel: no storage key operations for invalid page
table entries (bnc#737326,LTC#77697).
OTHER:
* tlan: add cast needed for proper 64 bit operation
(bnc#756840).
* dl2k: Tighten ioctl permissions (bnc#758813).
* tg3: Fix RSS ring refill race condition (bnc#757917).
* usbhid: fix error handling of not enough bandwidth
(bnc#704280).
* pagecache limit: Fix the shmem deadlock (bnc#755537).
* tty_audit: fix tty_audit_add_data live lock on audit
disabled (bnc#721366).
* ixgbe: driver sets all WOL flags upon initialization
so that machine is powered on as soon at it is switched off
(bnc#693639)
* PCI: Set device power state to PCI_D0 for device
without native PM support (bnc#752972).
* dlm: Do not allocate a fd for peeloff (bnc#729247).
* sctp: Export sctp_do_peeloff (bnc#729247).
* epoll: Do not limit non-nested epoll paths
(bnc#676204).
* mlx4: Limit MSI-X vector allocation (bnc#624072).
* mlx4: Changing interrupt scheme (bnc#624072).
* mlx4_en: Assigning TX irq per ring (bnc#624072).
* mlx4_en: Restoring RX buffer pointer in case of
failure (bnc#624072).
* mlx4_en: using new mlx4 interrupt scheme (bnc#624072).
* igb: Fix for Alt MAC Address feature on 82580 and
later devices (bnc#746980).
* igb: Power down link when interface is down
(bnc#745699).
* igb: use correct bits to identify if managability is
enabled (bnc#743209).
* intel_agp: Do not oops with zero stolen memory
(bnc#738679).
* agp: fix scratch page cleanup (bnc#738679).
* hugetlb: add generic definition of NUMA_NO_NODE
(bnc#751844).
* sched: Fix proc_sched_set_task() (bnc#717994).
* PM: Print a warning if firmware is requested when
tasks are frozen (bnc#749886).
* PM / Sleep: Fix freezer failures due to racy
usermodehelper_is_disabled() (bnc#749886).
* PM / Sleep: Fix read_unlock_usermodehelper() call
(bnc#749886).
* firmware loader: allow builtin firmware load even if
usermodehelper is disabled (bnc#749886).
* PM / Hibernate: Enable usermodehelpers in
software_resume() error path (bnc#744163).
* ipv6: Allow inet6_dump_addr() to handle more than 64
addresses (bnc#748279).
* ipv6: fix refcnt problem related to POSTDAD state
(bnc#743619).
* be2net: change to show correct physical link status
(bnc#727834).
* be2net: changes to properly provide phy details
(bnc#727834).
* aio: fix race between io_destroy() and io_submit()
(bnc#747445 bnc#611264).
* intel-iommu: Check for identity mapping candidate
using system dma mask (bnc#700449).
* intel-iommu: Dont cache iova above 32bit (bnc#700449).
* intel-iommu: Add domain check in
domain_remove_one_dev_info (bnc#700449).
* intel-iommu: Provide option to enable 64-bit IOMMU
pass through mode (bnc#700449).
* intel-iommu: Remove Host Bridge devices from identity
mapping (bnc#700449).
* intel-iommu: Speed up processing of the
identity_mapping function (bnc#700449).
* intel-iommu: Use coherent DMA mask when requested
(bnc#700449).
* 1: Fix accounting of softirq time when idle
(bnc#719793).
* driver-core: fix race between device_register and
driver_register (bnc#742358).
* dcache:
patches.fixes/large-hash-dcache_init-fix.patch: Fix oops
when initializing large hash on > 16TB machine (bnc#742210).
* kdump: Save PG_compound or PG_head value in
VMCOREINFO (bnc#738503).
* Update config files: disable NET_9P_RDMA (bnc#720374).
* cdc-wdm: fix race leading leading to memory
corruption (bnc#759544).
Security Issue references:
* CVE-2011-1083
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1083
>
* CVE-2011-4086
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4086
>
* CVE-2011-4622
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4622
>
* CVE-2012-0045
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0045
>
* CVE-2012-0879
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0879
>
* CVE-2012-1090
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1090
>
* CVE-2012-1097
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1097
>
* CVE-2012-2133
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2133
>
Indications:
Everyone using the Linux Kernel on x86_64 architecture should update.
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP2:
zypper in -t patch slessp1-kernel-6227 slessp1-kernel-6228 slessp1-kernel-6229 slessp1-kernel-6238
- SUSE Linux Enterprise Server 11 SP1 for VMware:
zypper in -t patch slessp1-kernel-6227 slessp1-kernel-6230
- SUSE Linux Enterprise Server 11 SP1:
zypper in -t patch slessp1-kernel-6227 slessp1-kernel-6228 slessp1-kernel-6229 slessp1-kernel-6230 slessp1-kernel-6238
- SUSE Linux Enterprise High Availability Extension 11 SP1:
zypper in -t patch sleshasp1-kernel-6227 sleshasp1-kernel-6228 sleshasp1-kernel-6229 sleshasp1-kernel-6230 sleshasp1-kernel-6238
- SUSE Linux Enterprise Desktop 11 SP2:
zypper in -t patch sledsp1-kernel-6227
- SUSE Linux Enterprise Desktop 11 SP1:
zypper in -t patch sledsp1-kernel-6227 sledsp1-kernel-6230
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x):
btrfs-kmp-default-0_2.6.32.59_0.3-0.3.92
ext4dev-kmp-default-0_2.6.32.59_0.3-7.9.59
ext4dev-kmp-trace-0_2.6.32.59_0.3-7.9.59
- SUSE Linux Enterprise Server 11 SP2 (ppc64):
ext4dev-kmp-ppc64-0_2.6.32.59_0.3-7.9.59
- SUSE Linux Enterprise Server 11 SP2 (i586) [New Version: 2.6.32.59]:
btrfs-kmp-pae-0_2.6.32.59_0.3-0.3.92
btrfs-kmp-xen-0_2.6.32.59_0.3-0.3.92
ext4dev-kmp-pae-0_2.6.32.59_0.3-7.9.59
ext4dev-kmp-xen-0_2.6.32.59_0.3-7.9.59
hyper-v-kmp-default-0_2.6.32.59_0.3-0.18.16
hyper-v-kmp-pae-0_2.6.32.59_0.3-0.18.16
hyper-v-kmp-trace-0_2.6.32.59_0.3-0.18.16
kernel-ec2-2.6.32.59-0.3.1
kernel-ec2-base-2.6.32.59-0.3.1
- SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 2.6.32.59]:
btrfs-kmp-default-0_2.6.32.59_0.3-0.3.92
ext4dev-kmp-default-0_2.6.32.59_0.3-7.9.59
ext4dev-kmp-trace-0_2.6.32.59_0.3-7.9.59
hyper-v-kmp-default-0_2.6.32.59_0.3-0.18.16
hyper-v-kmp-trace-0_2.6.32.59_0.3-0.18.16
kernel-default-2.6.32.59-0.3.1
kernel-default-base-2.6.32.59-0.3.1
kernel-default-devel-2.6.32.59-0.3.1
kernel-source-2.6.32.59-0.3.1
kernel-syms-2.6.32.59-0.3.1
kernel-trace-2.6.32.59-0.3.1
kernel-trace-base-2.6.32.59-0.3.1
kernel-trace-devel-2.6.32.59-0.3.1
- SUSE Linux Enterprise Server 11 SP1 for VMware (i586) [New Version: 2.6.32.59]:
btrfs-kmp-pae-0_2.6.32.59_0.3-0.3.92
ext4dev-kmp-pae-0_2.6.32.59_0.3-7.9.59
hyper-v-kmp-pae-0_2.6.32.59_0.3-0.18.16
kernel-pae-2.6.32.59-0.3.1
kernel-pae-base-2.6.32.59-0.3.1
kernel-pae-devel-2.6.32.59-0.3.1
- SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.6.32.59]:
btrfs-kmp-default-0_2.6.32.59_0.3-0.3.92
ext4dev-kmp-default-0_2.6.32.59_0.3-7.9.59
ext4dev-kmp-trace-0_2.6.32.59_0.3-7.9.59
kernel-default-2.6.32.59-0.3.1
kernel-default-base-2.6.32.59-0.3.1
kernel-default-devel-2.6.32.59-0.3.1
kernel-source-2.6.32.59-0.3.1
kernel-syms-2.6.32.59-0.3.1
kernel-trace-2.6.32.59-0.3.1
kernel-trace-base-2.6.32.59-0.3.1
kernel-trace-devel-2.6.32.59-0.3.1
- SUSE Linux Enterprise Server 11 SP1 (i586 x86_64) [New Version: 2.6.32.59]:
btrfs-kmp-xen-0_2.6.32.59_0.3-0.3.92
ext4dev-kmp-xen-0_2.6.32.59_0.3-7.9.59
hyper-v-kmp-default-0_2.6.32.59_0.3-0.18.16
hyper-v-kmp-trace-0_2.6.32.59_0.3-0.18.16
kernel-ec2-2.6.32.59-0.3.1
kernel-ec2-base-2.6.32.59-0.3.1
kernel-ec2-devel-2.6.32.59-0.3.1
kernel-xen-2.6.32.59-0.3.1
kernel-xen-base-2.6.32.59-0.3.1
kernel-xen-devel-2.6.32.59-0.3.1
- SUSE Linux Enterprise Server 11 SP1 (s390x) [New Version: 2.6.32.59]:
kernel-default-man-2.6.32.59-0.3.1
- SUSE Linux Enterprise Server 11 SP1 (ppc64) [New Version: 2.6.32.59]:
ext4dev-kmp-ppc64-0_2.6.32.59_0.3-7.9.59
kernel-ppc64-2.6.32.59-0.3.1
kernel-ppc64-base-2.6.32.59-0.3.1
kernel-ppc64-devel-2.6.32.59-0.3.1
- SUSE Linux Enterprise Server 11 SP1 (i586) [New Version: 2.6.32.59]:
btrfs-kmp-pae-0_2.6.32.59_0.3-0.3.92
ext4dev-kmp-pae-0_2.6.32.59_0.3-7.9.59
hyper-v-kmp-pae-0_2.6.32.59_0.3-0.18.16
kernel-pae-2.6.32.59-0.3.1
kernel-pae-base-2.6.32.59-0.3.1
kernel-pae-devel-2.6.32.59-0.3.1
- SUSE Linux Enterprise High Availability Extension 11 SP1 (i586 ia64 ppc64 s390x x86_64):
cluster-network-kmp-default-1.4_2.6.32.59_0.3-2.5.45
cluster-network-kmp-trace-1.4_2.6.32.59_0.3-2.5.45
gfs2-kmp-default-2_2.6.32.59_0.3-0.2.91
gfs2-kmp-trace-2_2.6.32.59_0.3-0.2.91
ocfs2-kmp-default-1.6_2.6.32.59_0.3-0.4.2.45
ocfs2-kmp-trace-1.6_2.6.32.59_0.3-0.4.2.45
- SUSE Linux Enterprise High Availability Extension 11 SP1 (i586 x86_64):
cluster-network-kmp-xen-1.4_2.6.32.59_0.3-2.5.45
gfs2-kmp-xen-2_2.6.32.59_0.3-0.2.91
ocfs2-kmp-xen-1.6_2.6.32.59_0.3-0.4.2.45
- SUSE Linux Enterprise High Availability Extension 11 SP1 (ppc64):
cluster-network-kmp-ppc64-1.4_2.6.32.59_0.3-2.5.45
gfs2-kmp-ppc64-2_2.6.32.59_0.3-0.2.91
ocfs2-kmp-ppc64-1.6_2.6.32.59_0.3-0.4.2.45
- SUSE Linux Enterprise High Availability Extension 11 SP1 (i586):
cluster-network-kmp-pae-1.4_2.6.32.59_0.3-2.5.45
gfs2-kmp-pae-2_2.6.32.59_0.3-0.2.91
ocfs2-kmp-pae-1.6_2.6.32.59_0.3-0.4.2.45
- SUSE Linux Enterprise Desktop 11 SP2 (i586) [New Version: 2.6.32.59]:
btrfs-kmp-default-0_2.6.32.59_0.3-0.3.92
btrfs-kmp-pae-0_2.6.32.59_0.3-0.3.92
btrfs-kmp-xen-0_2.6.32.59_0.3-0.3.92
hyper-v-kmp-default-0_2.6.32.59_0.3-0.18.16
hyper-v-kmp-pae-0_2.6.32.59_0.3-0.18.16
kernel-desktop-devel-2.6.32.59-0.3.1
- SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 2.6.32.59]:
btrfs-kmp-default-0_2.6.32.59_0.3-0.3.92
btrfs-kmp-xen-0_2.6.32.59_0.3-0.3.92
hyper-v-kmp-default-0_2.6.32.59_0.3-0.18.16
kernel-default-2.6.32.59-0.3.1
kernel-default-base-2.6.32.59-0.3.1
kernel-default-devel-2.6.32.59-0.3.1
kernel-default-extra-2.6.32.59-0.3.1
kernel-desktop-devel-2.6.32.59-0.3.1
kernel-source-2.6.32.59-0.3.1
kernel-syms-2.6.32.59-0.3.1
kernel-trace-devel-2.6.32.59-0.3.1
kernel-xen-2.6.32.59-0.3.1
kernel-xen-base-2.6.32.59-0.3.1
kernel-xen-devel-2.6.32.59-0.3.1
kernel-xen-extra-2.6.32.59-0.3.1
- SUSE Linux Enterprise Desktop 11 SP1 (i586) [New Version: 2.6.32.59]:
btrfs-kmp-pae-0_2.6.32.59_0.3-0.3.92
hyper-v-kmp-pae-0_2.6.32.59_0.3-0.18.16
kernel-pae-2.6.32.59-0.3.1
kernel-pae-base-2.6.32.59-0.3.1
kernel-pae-devel-2.6.32.59-0.3.1
kernel-pae-extra-2.6.32.59-0.3.1
- SLE 11 SERVER Unsupported Extras (i586 ia64 ppc64 s390x x86_64):
kernel-default-extra-2.6.32.59-0.3.1
- SLE 11 SERVER Unsupported Extras (i586 x86_64):
kernel-xen-extra-2.6.32.59-0.3.1
- SLE 11 SERVER Unsupported Extras (ppc64):
kernel-ppc64-extra-2.6.32.59-0.3.1
- SLE 11 SERVER Unsupported Extras (i586):
kernel-pae-extra-2.6.32.59-0.3.1
References:
http://support.novell.com/security/cve/CVE-2011-1083.htmlhttp://support.novell.com/security/cve/CVE-2011-4086.htmlhttp://support.novell.com/security/cve/CVE-2011-4622.htmlhttp://support.novell.com/security/cve/CVE-2012-0045.htmlhttp://support.novell.com/security/cve/CVE-2012-0879.htmlhttp://support.novell.com/security/cve/CVE-2012-1090.htmlhttp://support.novell.com/security/cve/CVE-2012-1097.htmlhttp://support.novell.com/security/cve/CVE-2012-2133.htmlhttps://bugzilla.novell.com/611264https://bugzilla.novell.com/617344https://bugzilla.novell.com/624072https://bugzilla.novell.com/652942https://bugzilla.novell.com/668194https://bugzilla.novell.com/676204https://bugzilla.novell.com/688079https://bugzilla.novell.com/693639https://bugzilla.novell.com/697920https://bugzilla.novell.com/700449https://bugzilla.novell.com/704280https://bugzilla.novell.com/713148https://bugzilla.novell.com/714507https://bugzilla.novell.com/716850https://bugzilla.novell.com/717994https://bugzilla.novell.com/719793https://bugzilla.novell.com/720374https://bugzilla.novell.com/721366https://bugzilla.novell.com/727834https://bugzilla.novell.com/729247https://bugzilla.novell.com/731809https://bugzilla.novell.com/733761https://bugzilla.novell.com/734300https://bugzilla.novell.com/734900https://bugzilla.novell.com/737326https://bugzilla.novell.com/738210https://bugzilla.novell.com/738503https://bugzilla.novell.com/738528https://bugzilla.novell.com/738679https://bugzilla.novell.com/740180https://bugzilla.novell.com/740895https://bugzilla.novell.com/740969https://bugzilla.novell.com/742210https://bugzilla.novell.com/742358https://bugzilla.novell.com/743209https://bugzilla.novell.com/743619https://bugzilla.novell.com/744163https://bugzilla.novell.com/744658https://bugzilla.novell.com/745422https://bugzilla.novell.com/745699https://bugzilla.novell.com/745832https://bugzilla.novell.com/745929https://bugzilla.novell.com/746980https://bugzilla.novell.com/747028https://bugzilla.novell.com/747430https://bugzilla.novell.com/747445https://bugzilla.novell.com/748112https://bugzilla.novell.com/748279https://bugzilla.novell.com/748812https://bugzilla.novell.com/749342https://bugzilla.novell.com/749569https://bugzilla.novell.com/749886https://bugzilla.novell.com/750079https://bugzilla.novell.com/750171https://bugzilla.novell.com/751322https://bugzilla.novell.com/751844https://bugzilla.novell.com/751880https://bugzilla.novell.com/752491https://bugzilla.novell.com/752634https://bugzilla.novell.com/752972https://bugzilla.novell.com/755178https://bugzilla.novell.com/755537https://bugzilla.novell.com/756448https://bugzilla.novell.com/756840https://bugzilla.novell.com/757917https://bugzilla.novell.com/758532https://bugzilla.novell.com/758813https://bugzilla.novell.com/759544http://download.novell.com/patch/finder/?keywords=1e4adcc13979f6e0edae89a1f…http://download.novell.com/patch/finder/?keywords=53329dfb9cc84e6d2bc6d1f41…http://download.novell.com/patch/finder/?keywords=58369efceea971820d4fcd4d5…http://download.novell.com/patch/finder/?keywords=59f23e0836e0df248ae14c769…http://download.novell.com/patch/finder/?keywords=763d59c2691aa9de51f489118…http://download.novell.com/patch/finder/?keywords=a1f901b5aa53a2ebe1c8ee72b…http://download.novell.com/patch/finder/?keywords=aec0b832ae76838da3b2076f7…http://download.novell.com/patch/finder/?keywords=c9182ab9f8793390d72833660…http://download.novell.com/patch/finder/?keywords=eb828a35b91422d320f8c3f2f…http://download.novell.com/patch/finder/?keywords=efd514eca66da8be4a95dffed…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org