openSUSE Security Announce
Threads by month
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
July 2013
- 1 participants
- 35 discussions
[security-announce] SUSE-SU-2013:1238-1: important: Security update for java-1_6_0-openjdk
by opensuse-security@opensuse.org 23 Jul '13
by opensuse-security@opensuse.org 23 Jul '13
23 Jul '13
SUSE Security Update: Security update for java-1_6_0-openjdk
______________________________________________________________________________
Announcement ID: SUSE-SU-2013:1238-1
Rating: important
References: #829708
Cross-References: CVE-2013-1500 CVE-2013-1571 CVE-2013-2407
CVE-2013-2412 CVE-2013-2443 CVE-2013-2444
CVE-2013-2445 CVE-2013-2446 CVE-2013-2447
CVE-2013-2448 CVE-2013-2450 CVE-2013-2451
CVE-2013-2452 CVE-2013-2453 CVE-2013-2455
CVE-2013-2456 CVE-2013-2457 CVE-2013-2459
CVE-2013-2461 CVE-2013-2463 CVE-2013-2465
CVE-2013-2469 CVE-2013-2470 CVE-2013-2471
CVE-2013-2472 CVE-2013-2473
Affected Products:
SUSE Linux Enterprise Desktop 11 SP2
______________________________________________________________________________
An update that fixes 26 vulnerabilities is now available.
Description:
java-1_6_0-openjdk has been updated to Icedtea6-1.12.6
version.
Security fixes:
* S6741606, CVE-2013-2407: Integrate Apache Santuario
* S7158805, CVE-2013-2445: Better rewriting of nested
subroutine calls
* S7170730, CVE-2013-2451: Improve Windows network
stack support.
* S8000638, CVE-2013-2450: Improve deserialization
* S8000642, CVE-2013-2446: Better handling of objects
for transportation
* S8001032: Restrict object access
* S8001033, CVE-2013-2452: Refactor network address
handling in virtual machine identifiers
* S8001034, CVE-2013-1500: Memory management
improvements
* S8001038, CVE-2013-2444: Resourcefully handle
resources
* S8001043: Clarify definition restrictions
* S8001309: Better handling of annotation interfaces
* S8001318, CVE-2013-2447: Socket.getLocalAddress not
consistent with InetAddress.getLocalHost
* S8001330, CVE-2013-2443: Improve on checking order
* S8003703, CVE-2013-2412: Update RMI connection dialog
box
* S8004584: Augment applet contextualization
* S8005007: Better glyph processing
* S8006328, CVE-2013-2448: Improve robustness of sound
classes
* S8006611: Improve scripting
* S8007467: Improve robustness of JMX internal APIs
* S8007471: Improve MBean notifications
* S8007812, CVE-2013-2455: (reflect)
Class.getEnclosingMethod problematic for some classes
* S8008120, CVE-2013-2457: Improve JMX class checking
* S8008124, CVE-2013-2453: Better compliance testing
* S8008128: Better API coherence for JMX
* S8008132, CVE-2013-2456: Better serialization support
* S8008585: Better JMX data handling
* S8008593: Better URLClassLoader resource management
* S8008603: Improve provision of JMX providers
Security Issue references:
* CVE-2013-2407
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2407
>
* CVE-2013-2445
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2445
>
* CVE-2013-2451
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2451
>
* CVE-2013-2450
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450
>
* CVE-2013-2446
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446
>
* CVE-2013-2452
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452
>
* CVE-2013-1500
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500
>
* CVE-2013-2444
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2444
>
* CVE-2013-2447
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447
>
* CVE-2013-2443
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2443
>
* CVE-2013-2412
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2412
>
* CVE-2013-2448
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2448
>
* CVE-2013-2455
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2455
>
* CVE-2013-2457
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2457
>
* CVE-2013-2453
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2453
>
* CVE-2013-2456
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456
>
* CVE-2013-2459
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459
>
* CVE-2013-2470
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470
>
* CVE-2013-2471
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471
>
* CVE-2013-2472
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472
>
* CVE-2013-2473
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473
>
* CVE-2013-1571
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1571
>
* CVE-2013-2463
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463
>
* CVE-2013-2465
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465
>
* CVE-2013-2469
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469
>
* CVE-2013-2461
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2461
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Desktop 11 SP2:
zypper in -t patch sledsp2-java-1_6_0-openjdk-8084
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):
java-1_6_0-openjdk-1.6.0.0_b27.1.12.6-0.2.1
java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.6-0.2.1
java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.6-0.2.1
References:
http://support.novell.com/security/cve/CVE-2013-1500.html
http://support.novell.com/security/cve/CVE-2013-1571.html
http://support.novell.com/security/cve/CVE-2013-2407.html
http://support.novell.com/security/cve/CVE-2013-2412.html
http://support.novell.com/security/cve/CVE-2013-2443.html
http://support.novell.com/security/cve/CVE-2013-2444.html
http://support.novell.com/security/cve/CVE-2013-2445.html
http://support.novell.com/security/cve/CVE-2013-2446.html
http://support.novell.com/security/cve/CVE-2013-2447.html
http://support.novell.com/security/cve/CVE-2013-2448.html
http://support.novell.com/security/cve/CVE-2013-2450.html
http://support.novell.com/security/cve/CVE-2013-2451.html
http://support.novell.com/security/cve/CVE-2013-2452.html
http://support.novell.com/security/cve/CVE-2013-2453.html
http://support.novell.com/security/cve/CVE-2013-2455.html
http://support.novell.com/security/cve/CVE-2013-2456.html
http://support.novell.com/security/cve/CVE-2013-2457.html
http://support.novell.com/security/cve/CVE-2013-2459.html
http://support.novell.com/security/cve/CVE-2013-2461.html
http://support.novell.com/security/cve/CVE-2013-2463.html
http://support.novell.com/security/cve/CVE-2013-2465.html
http://support.novell.com/security/cve/CVE-2013-2469.html
http://support.novell.com/security/cve/CVE-2013-2470.html
http://support.novell.com/security/cve/CVE-2013-2471.html
http://support.novell.com/security/cve/CVE-2013-2472.html
http://support.novell.com/security/cve/CVE-2013-2473.html
https://bugzilla.novell.com/829708
http://download.novell.com/patch/finder/?keywords=15c3233f1a27346b71f59d90b…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2013:1219-1: important: Security update for nagios-nrpe, nagios-plugins-nrpe
by opensuse-security@opensuse.org 18 Jul '13
by opensuse-security@opensuse.org 18 Jul '13
18 Jul '13
SUSE Security Update: Security update for nagios-nrpe, nagios-plugins-nrpe
______________________________________________________________________________
Announcement ID: SUSE-SU-2013:1219-1
Rating: important
References: #807241
Cross-References: CVE-2013-1362
Affected Products:
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Server 11 SP2 for VMware
SUSE Linux Enterprise Server 11 SP2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
Nagios NRPE was updated to add more blacklisting to avoid
shell injection via nagios request packets (CVE-2013-1362).
Security Issues:
* CVE-2013-1362
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1362
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-nagios-nrpe-8033
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-nagios-nrpe-8033
- SUSE Linux Enterprise Server 11 SP2 for VMware:
zypper in -t patch slessp2-nagios-nrpe-8032
- SUSE Linux Enterprise Server 11 SP2:
zypper in -t patch slessp2-nagios-nrpe-8032
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
nagios-nrpe-2.12-24.4.8.1
nagios-nrpe-doc-2.12-24.4.8.1
nagios-plugins-nrpe-2.12-24.4.8.1
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
nagios-nrpe-2.12-24.4.8.1
nagios-nrpe-doc-2.12-24.4.8.1
nagios-plugins-nrpe-2.12-24.4.8.1
- SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):
nagios-nrpe-2.12-24.4.8.1
nagios-nrpe-doc-2.12-24.4.8.1
nagios-plugins-nrpe-2.12-24.4.8.1
- SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64):
nagios-nrpe-2.12-24.4.8.1
nagios-nrpe-doc-2.12-24.4.8.1
nagios-plugins-nrpe-2.12-24.4.8.1
References:
http://support.novell.com/security/cve/CVE-2013-1362.html
https://bugzilla.novell.com/807241
http://download.novell.com/patch/finder/?keywords=c4f6ad63a4915b3a42859f58b…
http://download.novell.com/patch/finder/?keywords=efb6b86f270013cd431764d84…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2013:1213-1: important: Security update for flash-player
by opensuse-security@opensuse.org 18 Jul '13
by opensuse-security@opensuse.org 18 Jul '13
18 Jul '13
SUSE Security Update: Security update for flash-player
______________________________________________________________________________
Announcement ID: SUSE-SU-2013:1213-1
Rating: important
References: #828810
Cross-References: CVE-2013-3344 CVE-2013-3345 CVE-2013-3347
Affected Products:
SUSE Linux Enterprise Desktop 11 SP3
SUSE Linux Enterprise Desktop 11 SP2
SUSE Linux Enterprise Desktop 10 SP4
______________________________________________________________________________
An update that fixes three vulnerabilities is now
available. It includes one version update.
Description:
Adobe flash-player has been updated to version 11.2.202.291
(ABSP13-17) which fixes bugs and security issues.
This update fixes the following security issues:
*
a heap buffer overflow vulnerability that could have
lead to code execution (CVE-2013-3344).
*
a memory corruption vulnerability that could have
lead to code execution (CVE-2013-3345).
*
an integer overflow when resampling a user-supplied
PCM buffer (CVE-2013-3347).
Official advisory can be found on
http://www.adobe.com/support/security/bulletins/apsb13-17.ht
ml
<http://www.adobe.com/support/security/bulletins/apsb13-17.h
tml>
Security Issue references:
* CVE-2013-3344
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3344
>
* CVE-2013-3345
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3345
>
* CVE-2013-3347
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3347
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-flash-player-8039
- SUSE Linux Enterprise Desktop 11 SP2:
zypper in -t patch sledsp2-flash-player-8038
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 11.2.202.297]:
flash-player-11.2.202.297-0.3.1
flash-player-gnome-11.2.202.297-0.3.1
flash-player-kde4-11.2.202.297-0.3.1
- SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 11.2.202.297]:
flash-player-11.2.202.297-0.3.1
flash-player-gnome-11.2.202.297-0.3.1
flash-player-kde4-11.2.202.297-0.3.1
- SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 11.2.202.297]:
flash-player-11.2.202.297-0.5.2
References:
http://support.novell.com/security/cve/CVE-2013-3344.html
http://support.novell.com/security/cve/CVE-2013-3345.html
http://support.novell.com/security/cve/CVE-2013-3347.html
https://bugzilla.novell.com/828810
http://download.novell.com/patch/finder/?keywords=2a99ce6c544e43d5065f403d4…
http://download.novell.com/patch/finder/?keywords=a62a96037c69a861417e569c4…
http://download.novell.com/patch/finder/?keywords=bda18521b2a6248c706df2f3b…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2013:1192-1: important: flash-player for APSB13-17
by opensuse-security@opensuse.org 12 Jul '13
by opensuse-security@opensuse.org 12 Jul '13
12 Jul '13
openSUSE Security Update: flash-player for APSB13-17
______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:1192-1
Rating: important
References: #828810
Cross-References: CVE-2013-3344 CVE-2013-3345 CVE-2013-3347
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update fixes APSB13-17, several security problems in
the Adobe Flash Player: CVE-2013-3344, CVE-2013-3345,
CVE-2013-3347
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch 2013-110
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
flash-player-11.2.202.297-71.1
flash-player-gnome-11.2.202.297-71.1
flash-player-kde4-11.2.202.297-71.1
References:
http://support.novell.com/security/cve/CVE-2013-3344.html
http://support.novell.com/security/cve/CVE-2013-3345.html
http://support.novell.com/security/cve/CVE-2013-3347.html
https://bugzilla.novell.com/828810
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2013:1191-1: important: flash-player for APSB13-17
by opensuse-security@opensuse.org 12 Jul '13
by opensuse-security@opensuse.org 12 Jul '13
12 Jul '13
openSUSE Security Update: flash-player for APSB13-17
______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:1191-1
Rating: important
References: #828810
Cross-References: CVE-2013-3344 CVE-2013-3345 CVE-2013-3347
Affected Products:
openSUSE 12.3:NonFree
openSUSE 12.2:NonFree
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update fixes APSB13-17, several security problems in
the Adobe Flash Player: CVE-2013-3344, CVE-2013-3345,
CVE-2013-3347 For more see
https://bugzilla.novell.com/show_bug.cgi?id=828810
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.3:NonFree:
zypper in -t patch openSUSE-2013-578
- openSUSE 12.2:NonFree:
zypper in -t patch openSUSE-2013-578
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.3:NonFree (i586 x86_64):
flash-player-11.2.202.297-2.32.1
flash-player-gnome-11.2.202.297-2.32.1
flash-player-kde4-11.2.202.297-2.32.1
- openSUSE 12.2:NonFree (i586 x86_64):
flash-player-11.2.202.297-1.56.1
flash-player-gnome-11.2.202.297-1.56.1
flash-player-kde4-11.2.202.297-1.56.1
References:
http://support.novell.com/security/cve/CVE-2013-3344.html
http://support.novell.com/security/cve/CVE-2013-3345.html
http://support.novell.com/security/cve/CVE-2013-3347.html
https://bugzilla.novell.com/828810
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2013:1188-1: important: Mesa: security fixes for Intel drivers
by opensuse-security@opensuse.org 12 Jul '13
by opensuse-security@opensuse.org 12 Jul '13
12 Jul '13
openSUSE Security Update: Mesa: security fixes for Intel drivers
______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:1188-1
Rating: important
References: #828007
Cross-References: CVE-2013-1872
Affected Products:
openSUSE 12.3
openSUSE 12.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
Mesa was updated to fix a security problem in the Intel
drivers, where potentially remote attackers via 3D models
could inject code.
(CVE-2013-1872 - i965: fix problem with constant out of
bounds access (bnc #828007).)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.3:
zypper in -t patch openSUSE-2013-577
- openSUSE 12.2:
zypper in -t patch openSUSE-2013-577
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.3 (i586 x86_64):
Mesa-9.0.2-34.20.1
Mesa-debuginfo-9.0.2-34.20.1
Mesa-debugsource-9.0.2-34.20.1
Mesa-devel-9.0.2-34.20.1
Mesa-libEGL-devel-9.0.2-34.20.1
Mesa-libEGL1-9.0.2-34.20.1
Mesa-libEGL1-debuginfo-9.0.2-34.20.1
Mesa-libGL-devel-9.0.2-34.20.1
Mesa-libGL1-9.0.2-34.20.1
Mesa-libGL1-debuginfo-9.0.2-34.20.1
Mesa-libGLESv1_CM-devel-9.0.2-34.20.1
Mesa-libGLESv1_CM1-9.0.2-34.20.1
Mesa-libGLESv1_CM1-debuginfo-9.0.2-34.20.1
Mesa-libGLESv2-2-9.0.2-34.20.1
Mesa-libGLESv2-2-debuginfo-9.0.2-34.20.1
Mesa-libGLESv2-devel-9.0.2-34.20.1
Mesa-libIndirectGL-devel-9.0.2-34.20.1
Mesa-libIndirectGL1-9.0.2-34.20.1
Mesa-libIndirectGL1-debuginfo-9.0.2-34.20.1
Mesa-libglapi-devel-9.0.2-34.20.1
Mesa-libglapi0-9.0.2-34.20.1
Mesa-libglapi0-debuginfo-9.0.2-34.20.1
libOSMesa-devel-9.0.2-34.20.1
libOSMesa9-9.0.2-34.20.1
libOSMesa9-debuginfo-9.0.2-34.20.1
libXvMC_nouveau-9.0.2-34.20.1
libXvMC_nouveau-debuginfo-9.0.2-34.20.1
libXvMC_r300-9.0.2-34.20.1
libXvMC_r300-debuginfo-9.0.2-34.20.1
libXvMC_r600-9.0.2-34.20.1
libXvMC_r600-debuginfo-9.0.2-34.20.1
libXvMC_softpipe-9.0.2-34.20.1
libXvMC_softpipe-debuginfo-9.0.2-34.20.1
libgbm-devel-0.0.0-34.20.1
libgbm1-0.0.0-34.20.1
libgbm1-debuginfo-0.0.0-34.20.1
libvdpau_nouveau-9.0.2-34.20.1
libvdpau_nouveau-debuginfo-9.0.2-34.20.1
libvdpau_r300-9.0.2-34.20.1
libvdpau_r300-debuginfo-9.0.2-34.20.1
libvdpau_r600-9.0.2-34.20.1
libvdpau_r600-debuginfo-9.0.2-34.20.1
libvdpau_softpipe-9.0.2-34.20.1
libvdpau_softpipe-debuginfo-9.0.2-34.20.1
libxatracker-devel-1.0.0-34.20.1
libxatracker1-1.0.0-34.20.1
libxatracker1-debuginfo-1.0.0-34.20.1
- openSUSE 12.3 (x86_64):
Mesa-32bit-9.0.2-34.20.1
Mesa-debuginfo-32bit-9.0.2-34.20.1
Mesa-devel-32bit-9.0.2-34.20.1
Mesa-libEGL-devel-32bit-9.0.2-34.20.1
Mesa-libEGL1-32bit-9.0.2-34.20.1
Mesa-libEGL1-debuginfo-32bit-9.0.2-34.20.1
Mesa-libGL-devel-32bit-9.0.2-34.20.1
Mesa-libGL1-32bit-9.0.2-34.20.1
Mesa-libGL1-debuginfo-32bit-9.0.2-34.20.1
Mesa-libGLESv1_CM-devel-32bit-9.0.2-34.20.1
Mesa-libGLESv1_CM1-32bit-9.0.2-34.20.1
Mesa-libGLESv1_CM1-debuginfo-32bit-9.0.2-34.20.1
Mesa-libGLESv2-2-32bit-9.0.2-34.20.1
Mesa-libGLESv2-2-debuginfo-32bit-9.0.2-34.20.1
Mesa-libGLESv2-devel-32bit-9.0.2-34.20.1
Mesa-libIndirectGL-devel-32bit-9.0.2-34.20.1
Mesa-libIndirectGL1-32bit-9.0.2-34.20.1
Mesa-libIndirectGL1-debuginfo-32bit-9.0.2-34.20.1
Mesa-libglapi-devel-32bit-9.0.2-34.20.1
Mesa-libglapi0-32bit-9.0.2-34.20.1
Mesa-libglapi0-debuginfo-32bit-9.0.2-34.20.1
libOSMesa-devel-32bit-9.0.2-34.20.1
libOSMesa9-32bit-9.0.2-34.20.1
libOSMesa9-debuginfo-32bit-9.0.2-34.20.1
libXvMC_nouveau-32bit-9.0.2-34.20.1
libXvMC_nouveau-debuginfo-32bit-9.0.2-34.20.1
libXvMC_r300-32bit-9.0.2-34.20.1
libXvMC_r300-debuginfo-32bit-9.0.2-34.20.1
libXvMC_r600-32bit-9.0.2-34.20.1
libXvMC_r600-debuginfo-32bit-9.0.2-34.20.1
libXvMC_softpipe-32bit-9.0.2-34.20.1
libXvMC_softpipe-debuginfo-32bit-9.0.2-34.20.1
libgbm-devel-32bit-0.0.0-34.20.1
libgbm1-32bit-0.0.0-34.20.1
libgbm1-debuginfo-32bit-0.0.0-34.20.1
libvdpau_nouveau-32bit-9.0.2-34.20.1
libvdpau_nouveau-debuginfo-32bit-9.0.2-34.20.1
libvdpau_r300-32bit-9.0.2-34.20.1
libvdpau_r300-debuginfo-32bit-9.0.2-34.20.1
libvdpau_r600-32bit-9.0.2-34.20.1
libvdpau_r600-debuginfo-32bit-9.0.2-34.20.1
libvdpau_softpipe-32bit-9.0.2-34.20.1
libvdpau_softpipe-debuginfo-32bit-9.0.2-34.20.1
- openSUSE 12.2 (i586 x86_64):
Mesa-8.0.4-20.27.1
Mesa-debuginfo-8.0.4-20.27.1
Mesa-debugsource-8.0.4-20.27.1
Mesa-devel-8.0.4-20.27.1
Mesa-libEGL-devel-8.0.4-20.27.1
Mesa-libEGL1-8.0.4-20.27.1
Mesa-libEGL1-debuginfo-8.0.4-20.27.1
Mesa-libGL-devel-8.0.4-20.27.1
Mesa-libGL1-8.0.4-20.27.1
Mesa-libGL1-debuginfo-8.0.4-20.27.1
Mesa-libGLESv1_CM-devel-8.0.4-20.27.1
Mesa-libGLESv1_CM1-8.0.4-20.27.1
Mesa-libGLESv1_CM1-debuginfo-8.0.4-20.27.1
Mesa-libGLESv2-2-8.0.4-20.27.1
Mesa-libGLESv2-2-debuginfo-8.0.4-20.27.1
Mesa-libGLESv2-devel-8.0.4-20.27.1
Mesa-libGLU-devel-8.0.4-20.27.1
Mesa-libGLU1-8.0.4-20.27.1
Mesa-libGLU1-debuginfo-8.0.4-20.27.1
Mesa-libIndirectGL1-8.0.4-20.27.1
Mesa-libIndirectGL1-debuginfo-8.0.4-20.27.1
Mesa-libglapi0-8.0.4-20.27.1
Mesa-libglapi0-debuginfo-8.0.4-20.27.1
libOSMesa8-8.0.4-20.27.1
libOSMesa8-debuginfo-8.0.4-20.27.1
libXvMC_nouveau-8.0.4-20.27.1
libXvMC_nouveau-debuginfo-8.0.4-20.27.1
libXvMC_r300-8.0.4-20.27.1
libXvMC_r300-debuginfo-8.0.4-20.27.1
libXvMC_r600-8.0.4-20.27.1
libXvMC_r600-debuginfo-8.0.4-20.27.1
libXvMC_softpipe-8.0.4-20.27.1
libXvMC_softpipe-debuginfo-8.0.4-20.27.1
libgbm-devel-0.0.0-20.27.1
libgbm1-0.0.0-20.27.1
libgbm1-debuginfo-0.0.0-20.27.1
libvdpau_nouveau-8.0.4-20.27.1
libvdpau_nouveau-debuginfo-8.0.4-20.27.1
libvdpau_r300-8.0.4-20.27.1
libvdpau_r300-debuginfo-8.0.4-20.27.1
libvdpau_r600-8.0.4-20.27.1
libvdpau_r600-debuginfo-8.0.4-20.27.1
libvdpau_softpipe-8.0.4-20.27.1
libvdpau_softpipe-debuginfo-8.0.4-20.27.1
libxatracker-devel-1.0.0-20.27.1
libxatracker1-1.0.0-20.27.1
libxatracker1-debuginfo-1.0.0-20.27.1
- openSUSE 12.2 (x86_64):
Mesa-32bit-8.0.4-20.27.1
Mesa-debuginfo-32bit-8.0.4-20.27.1
Mesa-devel-32bit-8.0.4-20.27.1
Mesa-libEGL-devel-32bit-8.0.4-20.27.1
Mesa-libEGL1-32bit-8.0.4-20.27.1
Mesa-libEGL1-debuginfo-32bit-8.0.4-20.27.1
Mesa-libGL-devel-32bit-8.0.4-20.27.1
Mesa-libGL1-32bit-8.0.4-20.27.1
Mesa-libGL1-debuginfo-32bit-8.0.4-20.27.1
Mesa-libGLESv1_CM-devel-32bit-8.0.4-20.27.1
Mesa-libGLESv1_CM1-32bit-8.0.4-20.27.1
Mesa-libGLESv1_CM1-debuginfo-32bit-8.0.4-20.27.1
Mesa-libGLESv2-2-32bit-8.0.4-20.27.1
Mesa-libGLESv2-2-debuginfo-32bit-8.0.4-20.27.1
Mesa-libGLESv2-devel-32bit-8.0.4-20.27.1
Mesa-libGLU-devel-32bit-8.0.4-20.27.1
Mesa-libGLU1-32bit-8.0.4-20.27.1
Mesa-libGLU1-debuginfo-32bit-8.0.4-20.27.1
Mesa-libIndirectGL1-32bit-8.0.4-20.27.1
Mesa-libIndirectGL1-debuginfo-32bit-8.0.4-20.27.1
Mesa-libglapi0-32bit-8.0.4-20.27.1
Mesa-libglapi0-debuginfo-32bit-8.0.4-20.27.1
libOSMesa8-32bit-8.0.4-20.27.1
libOSMesa8-debuginfo-32bit-8.0.4-20.27.1
libXvMC_nouveau-32bit-8.0.4-20.27.1
libXvMC_nouveau-debuginfo-32bit-8.0.4-20.27.1
libXvMC_r300-32bit-8.0.4-20.27.1
libXvMC_r300-debuginfo-32bit-8.0.4-20.27.1
libXvMC_r600-32bit-8.0.4-20.27.1
libXvMC_r600-debuginfo-32bit-8.0.4-20.27.1
libXvMC_softpipe-32bit-8.0.4-20.27.1
libXvMC_softpipe-debuginfo-32bit-8.0.4-20.27.1
libgbm-devel-32bit-0.0.0-20.27.1
libgbm1-32bit-0.0.0-20.27.1
libgbm1-debuginfo-32bit-0.0.0-20.27.1
libvdpau_nouveau-32bit-8.0.4-20.27.1
libvdpau_nouveau-debuginfo-32bit-8.0.4-20.27.1
libvdpau_r300-32bit-8.0.4-20.27.1
libvdpau_r300-debuginfo-32bit-8.0.4-20.27.1
libvdpau_r600-32bit-8.0.4-20.27.1
libvdpau_r600-debuginfo-32bit-8.0.4-20.27.1
libvdpau_softpipe-32bit-8.0.4-20.27.1
libvdpau_softpipe-debuginfo-32bit-8.0.4-20.27.1
References:
http://support.novell.com/security/cve/CVE-2013-1872.html
https://bugzilla.novell.com/828007
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2013:1187-1: important: 3.0.80 kernel update
by opensuse-security@opensuse.org 12 Jul '13
by opensuse-security@opensuse.org 12 Jul '13
12 Jul '13
openSUSE Security Update: 3.0.80 kernel update
______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:1187-1
Rating: important
References: #763968 #769685 #788590 #789359 #792584 #797175
#800907 #802642 #804609 #804656 #805804 #805945
#806238 #806980 #808358 #808647 #808827 #809122
#809895 #809902 #809903 #810473 #810580 #810624
#810722 #812281 #814719 #815356 #815444 #815745
#816443 #816451 #816586 #817010 #817339 #818053
#818327 #818371 #818514 #818516 #818798 #819295
#819519 #819655 #820434 #821930 #822431 #822722
Cross-References: CVE-2012-6548 CVE-2012-6549 CVE-2013-0160
CVE-2013-0268 CVE-2013-0311 CVE-2013-0914
CVE-2013-1772 CVE-2013-1792 CVE-2013-1796
CVE-2013-1797 CVE-2013-1798 CVE-2013-2634
CVE-2013-2635
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that solves 13 vulnerabilities and has 35 fixes
is now available.
Description:
The kernel was updated to Linux kernel 3.0.80, fixing
various bugs and security issues.
Following security issues were fixed: CVE-2013-0160:
Timing side channel on attacks were possible on /dev/ptmx
that could allow local attackers to predict keypresses like
e.g. passwords. This has been fixed again by updating
accessed/modified time on the pty devices in resolution of
8 seconds, so that idle time detection can still work.
CVE-2013-3222: The vcc_recvmsg function in
net/atm/common.c in the Linux kernel did not initialize a
certain length variable, which allowed local users to
obtain sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call.
CVE-2013-3223: The ax25_recvmsg function in
net/ax25/af_ax25.c in the Linux kernel did not initialize a
certain data structure, which allowed local users to obtain
sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call.
CVE-2013-3224: The bt_sock_recvmsg function in
net/bluetooth/af_bluetooth.c in the Linux kernel did not
properly initialize a certain length variable, which
allowed local users to obtain sensitive information from
kernel stack memory via a crafted recvmsg or recvfrom
system call.
CVE-2013-3225: The rfcomm_sock_recvmsg function in
net/bluetooth/rfcomm/sock.c in the Linux kernel did not
initialize a certain length variable, which allowed local
users to obtain sensitive information from kernel stack
memory via a crafted recvmsg or recvfrom system call.
CVE-2013-3227: The caif_seqpkt_recvmsg function in
net/caif/caif_socket.c in the Linux kernel did not
initialize a certain length variable, which allowed local
users to obtain sensitive information from kernel stack
memory via a crafted recvmsg or recvfrom system call.
CVE-2013-3228: The irda_recvmsg_dgram function in
net/irda/af_irda.c in the Linux kernel did not initialize a
certain length variable, which allowed local users to
obtain sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call.
CVE-2013-3229: The iucv_sock_recvmsg function in
net/iucv/af_iucv.c in the Linux kernel did not initialize a
certain length variable, which allowed local users to
obtain sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call.
CVE-2013-3231: The llc_ui_recvmsg function in
net/llc/af_llc.c in the Linux kernel did not initialize a
certain length variable, which allowed local users to
obtain sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call.
CVE-2013-3232: The nr_recvmsg function in
net/netrom/af_netrom.c in the Linux kernel did not
initialize a certain data structure, which allowed local
users to obtain sensitive information from kernel stack
memory via a crafted recvmsg or recvfrom system call.
CVE-2013-3234: The rose_recvmsg function in
net/rose/af_rose.c in the Linux kernel did not initialize a
certain data structure, which allowed local users to obtain
sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call.
CVE-2013-3235: net/tipc/socket.c in the Linux kernel did
not initialize a certain data structure and a certain
length variable, which allowed local users to obtain
sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call.
CVE-2013-3076: The crypto API in the Linux kernel did
not initialize certain length variables, which allowed
local users to obtain sensitive information from kernel
stack memory via a crafted recvmsg or recvfrom system call,
related to the hash_recvmsg function in crypto/algif_hash.c
and the skcipher_recvmsg function in
crypto/algif_skcipher.c.
CVE-2013-1979: The scm_set_cred function in
include/net/scm.h in the Linux kernel used incorrect uid
and gid values during credentials passing, which allowed
local users to gain privileges via a crafted application.
A kernel information leak via tkill/tgkill was fixed.
Following bugs were fixed:
- reiserfs: fix spurious multiple-fill in
reiserfs_readdir_dentry (bnc#822722).
- libfc: do not exch_done() on invalid sequence ptr
(bnc#810722).
- netfilter: ip6t_LOG: fix logging of packet mark
(bnc#821930).
- hyperv: use 3.4 as LIC version string (bnc#822431).
- virtio_net: introduce VIRTIO_NET_HDR_F_DATA_VALID
(bnc#819655).
- xen/netback: do not disconnect frontend when seeing
oversize packet.
- xen/netfront: reduce gso_max_size to account for max
TCP header.
- xen/netfront: fix kABI after "reduce gso_max_size to
account for max TCP header".
- xfs: Fix kABI due to change in xfs_buf (bnc#815356).
- xfs: fix race while discarding buffers [V4]
(bnc#815356 (comment 36)).
- xfs: Serialize file-extending direct IO (bnc#818371).
- xhci: Do not switch webcams in some HP ProBooks to
XHCI (bnc#805804).
- bluetooth: Do not switch BT on HP ProBook 4340
(bnc#812281).
- s390/ftrace: fix mcount adjustment (bnc#809895).
- mm: memory_dev_init make sure nmi watchdog does not
trigger while registering memory sections (bnc#804609,
bnc#820434).
- patches.fixes/xfs-backward-alloc-fix.diff: xfs: Avoid
pathological backwards allocation (bnc#805945).
- mm: compaction: Restart compaction from near where it
left off
- mm: compaction: cache if a pageblock was scanned and
no pages were isolated
- mm: compaction: clear PG_migrate_skip based on
compaction and reclaim activity
- mm: compaction: Scan PFN caching KABI workaround
- mm: page_allocator: Remove first_pass guard
- mm: vmscan: do not stall on writeback during memory
compaction Cache compaction restart points for faster
compaction cycles (bnc#816451)
- qlge: fix dma map leak when the last chunk is not
allocated (bnc#819519).
- SUNRPC: Get rid of the redundant xprt->shutdown bit
field (bnc#800907).
- SUNRPC: Ensure that we grab the XPRT_LOCK before
calling xprt_alloc_slot (bnc#800907).
- SUNRPC: Fix a UDP transport regression (bnc#800907).
- SUNRPC: Allow caller of rpc_sleep_on() to select
priority levels (bnc#800907).
- SUNRPC: Replace xprt->resend and xprt->sending with a
priority queue (bnc#800907).
- SUNRPC: Fix potential races in xprt_lock_write_next()
(bnc#800907).
- md: cannot re-add disks after recovery (bnc#808647).
- fs/xattr.c:getxattr(): improve handling of allocation
failures (bnc#818053).
- fs/xattr.c:listxattr(): fall back to vmalloc() if
kmalloc() failed (bnc#818053).
- fs/xattr.c:setxattr(): improve handling of allocation
failures (bnc#818053).
- fs/xattr.c: suppress page allocation failure warnings
from sys_listxattr() (bnc#818053).
- virtio-blk: Call revalidate_disk() upon online disk
resize (bnc#817339).
- usb-storage: CY7C68300A chips do not support Cypress
ATACB (bnc#819295).
- patches.kernel.org/patch-3.0.60-61: Update references
(add bnc#810580).
- usb: Using correct way to clear usb3.0 devices remote
wakeup feature (bnc#818516).
- xhci: Fix TD size for isochronous URBs (bnc#818514).
- ALSA: hda - fixup D3 pin and right channel mute on
Haswell HDMI audio (bnc#818798).
- ALSA: hda - Apply pin-enablement workaround to all
Haswell HDMI codecs (bnc#818798).
- xfs: fallback to vmalloc for large buffers in
xfs_attrmulti_attr_get (bnc#818053).
- xfs: fallback to vmalloc for large buffers in
xfs_attrlist_by_handle (bnc#818053).
- xfs: xfs: fallback to vmalloc for large buffers in
xfs_compat_attrlist_by_handle (bnc#818053).
- xHCI: store rings type.
- xhci: Fix hang on back-to-back Set TR Deq Ptr commands.
- xHCI: check enqueue pointer advance into dequeue seg.
- xHCI: store rings last segment and segment numbers.
- xHCI: Allocate 2 segments for transfer ring.
- xHCI: count free TRBs on transfer ring.
- xHCI: factor out segments allocation and free function.
- xHCI: update sg tablesize.
- xHCI: set cycle state when allocate rings.
- xhci: Reserve one command for USB3 LPM disable.
- xHCI: dynamic ring expansion.
- xhci: Do not warn on empty ring for suspended devices.
- md/raid1: Do not release reference to device while
handling read error (bnc#809122, bnc#814719).
- rpm/mkspec: Stop generating the get_release_number.sh
file.
- rpm/kernel-spec-macros: Properly handle KOTD release
numbers with .g<commit> suffix.
- rpm/kernel-spec-macros: Drop the %release_num macro We
no longer put the -rcX tag into the release string.
- rpm/kernel-*.spec.in, rpm/mkspec: Do not force the
"<RELEASE>" string in specfiles.
- mm/mmap: check for RLIMIT_AS before unmapping
(bnc#818327).
- mm: Fix add_page_wait_queue() to work for PG_Locked
bit waiters (bnc#792584).
- mm: Fix add_page_wait_queue() to work for PG_Locked
bit waiters (bnc#792584).
- bonding: only use primary address for ARP (bnc#815444).
- bonding: remove entries for master_ip and vlan_ip and
query devices instead (bnc#815444).
- mm: speedup in __early_pfn_to_nid (bnc#810624).
- TTY: fix atime/mtime regression (bnc#815745).
- sd_dif: problem with verify of type 1 protection
information (PI) (bnc#817010).
- sched: harden rq rt usage accounting (bnc#769685,
bnc#788590).
- rcu: Avoid spurious RCU CPU stall warnings
(bnc#816586).
- rcu: Dump local stack if cannot dump all CPUs stacks
(bnc#816586).
- rcu: Fix detection of abruptly-ending stall
(bnc#816586).
- rcu: Suppress NMI backtraces when stall ends before
dump (bnc#816586).
- Update Xen patches to 3.0.74.
- btrfs: do not re-enter when allocating a chunk.
- btrfs: save us a read_lock.
- btrfs: Check CAP_DAC_READ_SEARCH for
BTRFS_IOC_INO_PATHS.
- btrfs: remove unused fs_info from btrfs_decode_error().
- btrfs: handle null fs_info in btrfs_panic().
- btrfs: fix varargs in __btrfs_std_error.
- btrfs: fix the race between bio and btrfs_stop_workers.
- btrfs: fix NULL pointer after aborting a transaction.
- btrfs: fix infinite loop when we abort on mount.
- xfs: Do not allocate new buffers on every call to
_xfs_buf_find (bnc#763968).
- xfs: fix buffer lookup race on allocation failure
(bnc#763968).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch 2013-109
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
kernel-debug-3.0.80-52.1
kernel-debug-base-3.0.80-52.1
kernel-debug-base-debuginfo-3.0.80-52.1
kernel-debug-debuginfo-3.0.80-52.1
kernel-debug-debugsource-3.0.80-52.1
kernel-debug-devel-3.0.80-52.1
kernel-debug-devel-debuginfo-3.0.80-52.1
kernel-debug-hmac-3.0.80-52.1
kernel-default-3.0.80-52.1
kernel-default-base-3.0.80-52.1
kernel-default-base-debuginfo-3.0.80-52.1
kernel-default-debuginfo-3.0.80-52.1
kernel-default-debugsource-3.0.80-52.1
kernel-default-devel-3.0.80-52.1
kernel-default-devel-debuginfo-3.0.80-52.1
kernel-default-hmac-3.0.80-52.1
kernel-desktop-3.0.80-52.1
kernel-desktop-base-3.0.80-52.1
kernel-desktop-base-debuginfo-3.0.80-52.1
kernel-desktop-debuginfo-3.0.80-52.1
kernel-desktop-debugsource-3.0.80-52.1
kernel-desktop-devel-3.0.80-52.1
kernel-desktop-devel-debuginfo-3.0.80-52.1
kernel-desktop-hmac-3.0.80-52.1
kernel-ec2-3.0.80-52.1
kernel-ec2-base-3.0.80-52.1
kernel-ec2-base-debuginfo-3.0.80-52.1
kernel-ec2-debuginfo-3.0.80-52.1
kernel-ec2-debugsource-3.0.80-52.1
kernel-ec2-devel-3.0.80-52.1
kernel-ec2-devel-debuginfo-3.0.80-52.1
kernel-ec2-extra-3.0.80-52.1
kernel-ec2-extra-debuginfo-3.0.80-52.1
kernel-ec2-hmac-3.0.80-52.1
kernel-source-3.0.80-52.1
kernel-source-vanilla-3.0.80-52.1
kernel-syms-3.0.80-52.1
kernel-trace-3.0.80-52.1
kernel-trace-base-3.0.80-52.1
kernel-trace-base-debuginfo-3.0.80-52.1
kernel-trace-debuginfo-3.0.80-52.1
kernel-trace-debugsource-3.0.80-52.1
kernel-trace-devel-3.0.80-52.1
kernel-trace-devel-debuginfo-3.0.80-52.1
kernel-trace-hmac-3.0.80-52.1
kernel-vanilla-3.0.80-52.1
kernel-vanilla-base-3.0.80-52.1
kernel-vanilla-base-debuginfo-3.0.80-52.1
kernel-vanilla-debuginfo-3.0.80-52.1
kernel-vanilla-debugsource-3.0.80-52.1
kernel-vanilla-devel-3.0.80-52.1
kernel-vanilla-devel-debuginfo-3.0.80-52.1
kernel-vanilla-hmac-3.0.80-52.1
kernel-xen-3.0.80-52.1
kernel-xen-base-3.0.80-52.1
kernel-xen-base-debuginfo-3.0.80-52.1
kernel-xen-debuginfo-3.0.80-52.1
kernel-xen-debugsource-3.0.80-52.1
kernel-xen-devel-3.0.80-52.1
kernel-xen-devel-debuginfo-3.0.80-52.1
kernel-xen-hmac-3.0.80-52.1
preload-1.2-6.35.1
preload-debuginfo-1.2-6.35.1
preload-debugsource-1.2-6.35.1
preload-kmp-default-1.2_3.0.80_52-6.35.1
preload-kmp-default-debuginfo-1.2_3.0.80_52-6.35.1
preload-kmp-desktop-1.2_3.0.80_52-6.35.1
preload-kmp-desktop-debuginfo-1.2_3.0.80_52-6.35.1
- openSUSE 11.4 (noarch):
kernel-docs-3.0.80-52.2
- openSUSE 11.4 (i586):
kernel-pae-3.0.80-52.1
kernel-pae-base-3.0.80-52.1
kernel-pae-base-debuginfo-3.0.80-52.1
kernel-pae-debuginfo-3.0.80-52.1
kernel-pae-debugsource-3.0.80-52.1
kernel-pae-devel-3.0.80-52.1
kernel-pae-devel-debuginfo-3.0.80-52.1
kernel-pae-hmac-3.0.80-52.1
kernel-vmi-3.0.80-52.1
kernel-vmi-base-3.0.80-52.1
kernel-vmi-base-debuginfo-3.0.80-52.1
kernel-vmi-debuginfo-3.0.80-52.1
kernel-vmi-debugsource-3.0.80-52.1
kernel-vmi-devel-3.0.80-52.1
kernel-vmi-devel-debuginfo-3.0.80-52.1
kernel-vmi-hmac-3.0.80-52.1
References:
http://support.novell.com/security/cve/CVE-2012-6548.html
http://support.novell.com/security/cve/CVE-2012-6549.html
http://support.novell.com/security/cve/CVE-2013-0160.html
http://support.novell.com/security/cve/CVE-2013-0268.html
http://support.novell.com/security/cve/CVE-2013-0311.html
http://support.novell.com/security/cve/CVE-2013-0914.html
http://support.novell.com/security/cve/CVE-2013-1772.html
http://support.novell.com/security/cve/CVE-2013-1792.html
http://support.novell.com/security/cve/CVE-2013-1796.html
http://support.novell.com/security/cve/CVE-2013-1797.html
http://support.novell.com/security/cve/CVE-2013-1798.html
http://support.novell.com/security/cve/CVE-2013-2634.html
http://support.novell.com/security/cve/CVE-2013-2635.html
https://bugzilla.novell.com/763968
https://bugzilla.novell.com/769685
https://bugzilla.novell.com/788590
https://bugzilla.novell.com/789359
https://bugzilla.novell.com/792584
https://bugzilla.novell.com/797175
https://bugzilla.novell.com/800907
https://bugzilla.novell.com/802642
https://bugzilla.novell.com/804609
https://bugzilla.novell.com/804656
https://bugzilla.novell.com/805804
https://bugzilla.novell.com/805945
https://bugzilla.novell.com/806238
https://bugzilla.novell.com/806980
https://bugzilla.novell.com/808358
https://bugzilla.novell.com/808647
https://bugzilla.novell.com/808827
https://bugzilla.novell.com/809122
https://bugzilla.novell.com/809895
https://bugzilla.novell.com/809902
https://bugzilla.novell.com/809903
https://bugzilla.novell.com/810473
https://bugzilla.novell.com/810580
https://bugzilla.novell.com/810624
https://bugzilla.novell.com/810722
https://bugzilla.novell.com/812281
https://bugzilla.novell.com/814719
https://bugzilla.novell.com/815356
https://bugzilla.novell.com/815444
https://bugzilla.novell.com/815745
https://bugzilla.novell.com/816443
https://bugzilla.novell.com/816451
https://bugzilla.novell.com/816586
https://bugzilla.novell.com/817010
https://bugzilla.novell.com/817339
https://bugzilla.novell.com/818053
https://bugzilla.novell.com/818327
https://bugzilla.novell.com/818371
https://bugzilla.novell.com/818514
https://bugzilla.novell.com/818516
https://bugzilla.novell.com/818798
https://bugzilla.novell.com/819295
https://bugzilla.novell.com/819519
https://bugzilla.novell.com/819655
https://bugzilla.novell.com/820434
https://bugzilla.novell.com/821930
https://bugzilla.novell.com/822431
https://bugzilla.novell.com/822722
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2013:1182-2: important: Security update for Linux kernel
by opensuse-security@opensuse.org 12 Jul '13
by opensuse-security@opensuse.org 12 Jul '13
12 Jul '13
SUSE Security Update: Security update for Linux kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2013:1182-2
Rating: important
References: #763968 #773837 #785901 #797090 #797727 #801427
#803320 #804482 #804609 #805804 #806976 #808015
#808136 #808837 #808855 #809130 #809895 #809975
#810722 #812281 #812332 #812526 #812974 #813604
#813922 #815356 #816451 #817035 #817377 #818047
#818371 #818465 #819018 #819195 #819523 #819610
#819655 #820172 #820434 #821052 #821070 #821235
#821799 #821859 #821930 #822066 #822077 #822080
#822164 #822340 #822431 #822722 #822825 #823082
#823223 #823342 #823386 #823597 #823795 #824159
#825037 #825591 #825657 #825696 #826186
Cross-References: CVE-2013-0160 CVE-2013-1774 CVE-2013-1979
CVE-2013-3076 CVE-2013-3222 CVE-2013-3223
CVE-2013-3224 CVE-2013-3225 CVE-2013-3227
CVE-2013-3228 CVE-2013-3229 CVE-2013-3231
CVE-2013-3232 CVE-2013-3234 CVE-2013-3235
Affected Products:
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise High Availability Extension 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
SLE 11 SERVER Unsupported Extras
______________________________________________________________________________
An update that solves 15 vulnerabilities and has 50 fixes
is now available. It includes one version update.
Description:
The SUSE Linux Enterprise 11 Service Pack 3 kernel has been
updated to 3.0.82 and to fix various bugs and security
issues.
The following security issues have been fixed:
*
CVE-2013-1774: The chase_port function in
drivers/usb/serial/io_ti.c in the Linux kernel allowed
local users to cause a denial of service (NULL pointer
dereference and system crash) via an attempted /dev/ttyUSB
read or write operation on a disconnected Edgeport USB
serial converter.
*
CVE-2013-0160: Timing side channel on attacks were
possible on /dev/ptmx that could allow local attackers to
predict keypresses like e.g. passwords. This has been fixed
again by updating accessed/modified time on the pty devices
in resolution of 8 seconds, so that idle time detection can
still work.
*
CVE-2013-3222: The vcc_recvmsg function in
net/atm/common.c in the Linux kernel did not initialize a
certain length variable, which allowed local users to
obtain sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call.
*
CVE-2013-3223: The ax25_recvmsg function in
net/ax25/af_ax25.c in the Linux kernel did not initialize a
certain data structure, which allowed local users to obtain
sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call.
*
CVE-2013-3224: The bt_sock_recvmsg function in
net/bluetooth/af_bluetooth.c in the Linux kernel did not
properly initialize a certain length variable, which
allowed local users to obtain sensitive information from
kernel stack memory via a crafted recvmsg or recvfrom
system call.
*
CVE-2013-3225: The rfcomm_sock_recvmsg function in
net/bluetooth/rfcomm/sock.c in the Linux kernel did not
initialize a certain length variable, which allowed local
users to obtain sensitive information from kernel stack
memory via a crafted recvmsg or recvfrom system call.
*
CVE-2013-3227: The caif_seqpkt_recvmsg function in
net/caif/caif_socket.c in the Linux kernel did not
initialize a certain length variable, which allowed local
users to obtain sensitive information from kernel stack
memory via a crafted recvmsg or recvfrom system call.
*
CVE-2013-3228: The irda_recvmsg_dgram function in
net/irda/af_irda.c in the Linux kernel did not initialize a
certain length variable, which allowed local users to
obtain sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call.
*
CVE-2013-3229: The iucv_sock_recvmsg function in
net/iucv/af_iucv.c in the Linux kernel did not initialize a
certain length variable, which allowed local users to
obtain sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call.
*
CVE-2013-3231: The llc_ui_recvmsg function in
net/llc/af_llc.c in the Linux kernel did not initialize a
certain length variable, which allowed local users to
obtain sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call.
*
CVE-2013-3232: The nr_recvmsg function in
net/netrom/af_netrom.c in the Linux kernel did not
initialize a certain data structure, which allowed local
users to obtain sensitive information from kernel stack
memory via a crafted recvmsg or recvfrom system call.
*
CVE-2013-3234: The rose_recvmsg function in
net/rose/af_rose.c in the Linux kernel did not initialize a
certain data structure, which allowed local users to obtain
sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call.
*
CVE-2013-3235: net/tipc/socket.c in the Linux kernel
did not initialize a certain data structure and a certain
length variable, which allowed local users to obtain
sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call.
*
CVE-2013-3076: The crypto API in the Linux kernel did
not initialize certain length variables, which allowed
local users to obtain sensitive information from kernel
stack memory via a crafted recvmsg or recvfrom system call,
related to the hash_recvmsg function in crypto/algif_hash.c
and the skcipher_recvmsg function in
crypto/algif_skcipher.c.
*
CVE-2013-1979: The scm_set_cred function in
include/net/scm.h in the Linux kernel used incorrect uid
and gid values during credentials passing, which allowed
local users to gain privileges via a crafted application.
*
A kernel information leak via tkill/tgkill was fixed.
The following non-security bugs have been fixed:
S/390:
* af_iucv: Missing man page (bnc#825037, LTC#94825).
* iucv: fix kernel panic at reboot (bnc#825037,
LTC#93803).
* kernel: lost IPIs on CPU hotplug (bnc#825037,
LTC#94784).
* dasd: Add missing descriptions for dasd timeout
messages (bnc#825037, LTC#94762).
* dasd: Fix hanging device after resume with internal
error 13 (bnc#825037, LTC#94554).
* cio: Suppress 2nd path verification during resume
(bnc#825037, LTC#94554).
* vmcp: Missing man page (bnc#825037, LTC#94453).
* kernel: 3215 console crash (bnc#825037, LTC#94302).
* netiucv: Hold rtnl between name allocation and device
registration (bnc#824159).
* s390/ftrace: fix mcount adjustment (bnc#809895).
HyperV:
* Drivers: hv: Fix a bug in get_vp_index().
* hyperv: Fix a compiler warning in netvsc_send().
* Tools: hv: Fix a checkpatch warning.
* tools: hv: skip iso9660 mounts in hv_vss_daemon.
* tools: hv: use FIFREEZE/FITHAW in hv_vss_daemon.
* tools: hv: use getmntent in hv_vss_daemon.
* Tools: hv: Fix a checkpatch warning.
* tools: hv: fix checks for origin of netlink message
in hv_vss_daemon.
* Tools: hv: fix warnings in hv_vss_daemon.
* x86, hyperv: Handle Xen emulation of Hyper-V more
gracefully.
* hyperv: Fix a kernel warning from
netvsc_linkstatus_callback().
* Drivers: hv: balloon: make local functions static.
* tools: hv: daemon should check type of received
Netlink msg.
* tools: hv: daemon setsockopt should use options
macros.
* tools: hv: daemon should subscribe only to CN_KVP_IDX
group.
* driver: hv: remove cast for kmalloc return value.
* hyperv: use 3.4 as LIC version string (bnc#822431).
BTRFS:
* btrfs: flush delayed inodes if we are short on space
(bnc#801427).
* btrfs: rework shrink_delalloc (bnc#801427).
* btrfs: fix our overcommit math (bnc#801427).
* btrfs: delay block group item insertion (bnc#801427).
* btrfs: remove bytes argument from do_chunk_alloc
(bnc#801427).
* btrfs: run delayed refs first when out of space
(bnc#801427).
* btrfs: do not commit instead of overcommitting
(bnc#801427).
* btrfs: do not take inode delalloc mutex if we are a
free space inode (bnc#801427).
* btrfs: fix chunk allocation error handling
(bnc#801427).
* btrfs: remove extent mapping if we fail to add chunk
(bnc#801427).
* btrfs: do not overcommit if we do not have enough
space for global rsv (bnc#801427).
* btrfs: rework the overcommit logic to be based on the
total size (bnc#801427).
* btrfs: steal from global reserve if we are cleaning
up orphans (bnc#801427).
* btrfs: clear chunk_alloc flag on retryable failure
(bnc#801427).
* btrfs: use reserved space for creating a snapshot
(bnc#801427).
* btrfs: cleanup to make the function
btrfs_delalloc_reserve_metadata more logic (bnc#801427).
* btrfs: fix space leak when we fail to reserve
metadata space (bnc#801427).
* btrfs: fix space accounting for unlink and rename
(bnc#801427).
* btrfs: allocate new chunks if the space is not enough
for global rsv (bnc#801427).
* btrfs: various abort cleanups (bnc#812526 bnc#801427).
* btrfs: simplify unlink reservations (bnc#801427).
XFS:
* xfs: Move allocation stack switch up to xfs_bmapi
(bnc#815356).
* xfs: introduce XFS_BMAPI_STACK_SWITCH (bnc#815356).
* xfs: zero allocation_args on the kernel stack
(bnc#815356).
* xfs: fix debug_object WARN at xfs_alloc_vextent()
(bnc#815356).
* xfs: do not defer metadata allocation to the
workqueue (bnc#815356).
* xfs: introduce an allocation workqueue (bnc#815356).
* xfs: fix race while discarding buffers [V4]
(bnc#815356 (comment 36)).
* xfs: Serialize file-extending direct IO (bnc#818371).
* xfs: Do not allocate new buffers on every call to
_xfs_buf_find (bnc#763968).
* xfs: fix buffer lookup race on allocation failure
(bnc#763968).
ALSA:
* Fix VT1708 jack detection on SLEPOS machines
(bnc#813922).
* ALSA: hda - Avoid choose same converter for unused
pins (bnc#826186).
* ALSA: hda - Cache the MUX selection for generic HDMI
(bnc#826186).
* ALSA: hda - Haswell converter power state D0 verify
(bnc#826186).
* ALSA: hda - Do not take unresponsive D3 transition
too serious (bnc#823597).
* ALSA: hda - Introduce bit flags to
snd_hda_codec_read/write() (bnc#823597).
* ALSA: hda - Check CORB overflow (bnc#823597).
* ALSA: hda - Check validity of CORB/RIRB WP reads
(bnc#823597).
* ALSA: hda - Fix system panic when DMA > 40 bits for
Nvidia audio controllers (bnc#818465).
* ALSA: hda - Add hint for suppressing lower cap for
IDT codecs (bnc#812332).
* ALSA: hda - Enable mic-mute LED on more HP laptops
(bnc#821859).
Direct Rendering Manager (DRM):
* drm/i915: Add wait_for in init_ring_common
(bnc#813604).
* drm/i915: Mark the ringbuffers as being in the GTT
domain (bnc#813604).
* drm/edid: Do not print messages regarding stereo or
csync by default (bnc #821235).
* drm/i915: force full modeset if the connector is in
DPMS OFF mode (bnc #809975).
* drm/i915/sdvo: Use &intel_sdvo->ddc instead of
intel_sdvo->i2c for DDC (bnc #808855).
* drm/mm: fix dump table BUG. (bnc#808837)
* drm/i915: Clear the stolen fb before enabling
(bnc#808015).
XEN:
* xen/netback: Update references (bnc#823342).
* xen: Check for insane amounts of requests on the ring.
* Update Xen patches to 3.0.82.
* netback: do not disconnect frontend when seeing
oversize packet.
* netfront: reduce gso_max_size to account for max TCP
header.
* netfront: fix kABI after "reduce gso_max_size to
account for max TCP header".
Other:
* x86, efi: retry ExitBootServices() on failure
(bnc#823386).
* x86/efi: Fix dummy variable buffer allocation
(bnc#822080).
* ext4: avoid hang when mounting non-journal
filesystems with orphan list (bnc#817377).
* mm: compaction: Scan PFN caching KABI workaround (Fix
KABI breakage (bnc#825657)).
* autofs4 - fix get_next_positive_subdir() (bnc#819523).
* ocfs2: Add bits_wanted while calculating credits in
ocfs2_calc_extend_credits (bnc#822077).
* writeback: Avoid needless scanning of b_dirty list
(bnc#819018).
* writeback: Do not sort b_io list only because of
block device inode (bnc#819018).
* re-enable io tracing (bnc#785901).
* pciehp: Corrected the old mismatching DMI strings.
* SUNRPC: Prevent an rpc_task wakeup race (bnc#825591).
* tg3: Prevent system hang during repeated EEH errors
(bnc#822066).
* scsi_dh_alua: multipath failover fails with error 15
(bnc#825696).
* Do not switch camera on HP EB 8780 (bnc#797090).
* Do not switch webcam for HP EB 8580w (bnc#797090).
* mm: fixup compilation error due to an asm write
through a const pointer. (bnc#823795)
* do not switch cam port on HP EliteBook 840
(bnc#822164).
* net/sunrpc: xpt_auth_cache should be ignored when
expired (bnc#803320).
* sunrpc/cache: ensure items removed from cache do not
have pending upcalls (bnc#803320).
* sunrpc/cache: remove races with queuing an upcall
(bnc#803320).
* sunrpc/cache: use cache_fresh_unlocked consistently
and correctly (bnc#803320).
* KVM: x86: emulate movdqa (bnc#821070).
* KVM: x86: emulator: add support for vector alignment
(bnc#821070).
* KVM: x86: emulator: expand decode flags to 64 bits
(bnc#821070).
* xhci - correct comp_mode_recovery_timer on return
from hibernate (bnc#808136).
* md/raid10 enough fixes (bnc#773837).
* lib/Makefile: Fix oid_registry build dependency
(bnc#823223).
* Update config files: disable IP_PNP (bnc#822825)
* Fix kABI breakage for addition of
snd_hda_bus.no_response_fallback (bnc#823597).
* Disable efi pstore by default (bnc#804482 bnc#820172).
* md: Fix problem with GET_BITMAP_FILE returning wrong
status (bnc#812974).
* bnx2x: Fix bridged GSO for 57710/57711 chips
(bnc#819610).
* USB: xHCI: override bogus bulk wMaxPacketSize values
(bnc#823082).
* BTUSB: Add MediaTek bluetooth MT76x0E support
(bnc#797727 bnc#822340).
* qlge: Update version to 1.00.00.32 (bnc#819195).
* qlge: Fix ethtool autoneg advertising (bnc#819195).
* qlge: Fix receive path to drop error frames
(bnc#819195).
* qlge: remove NETIF_F_TSO6 flag (bnc#819195).
* remove init of dev->perm_addr in drivers (bnc#819195).
* drivers/net: fix up function prototypes after __dev*
removals (bnc#819195).
* qlge: remove __dev* attributes (bnc#819195).
* drivers: ethernet: qlogic: qlge_dbg.c: Fixed a coding
style issue (bnc#819195).
* cxgb4: Force uninitialized state if FW_ON_ADAPTER is
< FW_VERSION and we are the MASTER_PF (bnc#809130).
* USB: UHCI: fix for suspend of virtual HP controller
(bnc#817035).
* timer_list: Convert timer list to be a proper
seq_file (bnc#818047).
* timer_list: Split timer_list_show_tickdevices
(bnc#818047).
* sched: Fix /proc/sched_debug failure on very very
large systems (bnc#818047).
* sched: Fix /proc/sched_stat failure on very very
large systems (bnc#818047).
* reiserfs: fix spurious multiple-fill in
reiserfs_readdir_dentry (bnc#822722).
* libfc: do not exch_done() on invalid sequence ptr
(bnc#810722).
* netfilter: ip6t_LOG: fix logging of packet mark
(bnc#821930).
* virtio_net: introduce VIRTIO_NET_HDR_F_DATA_VALID
(bnc#819655).
* HWPOISON: fix misjudgement of page_action() for
errors on mlocked pages (Memory failure RAS (bnc#821799)).
* HWPOISON: check dirty flag to match against clean
page (Memory failure RAS (bnc#821799)).
* HWPOISON: change order of error_states elements
(Memory failure RAS (bnc#821799)).
* mm: hwpoison: fix action_result() to print out
dirty/clean (Memory failure RAS (bnc#821799)).
* mm: mmu_notifier: re-fix freed page still mapped in
secondary MMU (bnc#821052).
* Do not switch webcams in some HP ProBooks to XHCI
(bnc#805804).
* Do not switch BT on HP ProBook 4340 (bnc#812281).
* mm: memory_dev_init make sure nmi watchdog does not
trigger while registering memory sections (bnc#804609,
bnc#820434).
* mm: compaction: Restart compaction from near where it
left off
* mm: compaction: cache if a pageblock was scanned and
no pages were isolated
* mm: compaction: clear PG_migrate_skip based on
compaction and reclaim activity
* mm: compaction: Scan PFN caching KABI workaround
* mm: page_allocator: Remove first_pass guard
* mm: vmscan: do not stall on writeback during memory
compaction Cache compaction restart points for faster
compaction cycles (bnc#816451)
Security Issue references:
* CVE-2013-0160
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0160
>
* CVE-2013-1774
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1774
>
* CVE-2013-1979
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979
>
* CVE-2013-3076
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3076
>
* CVE-2013-3222
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3222
>
* CVE-2013-3223
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3223
>
* CVE-2013-3224
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3224
>
* CVE-2013-3225
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3225
>
* CVE-2013-3227
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3227
>
* CVE-2013-3228
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3228
>
* CVE-2013-3229
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3229
>
* CVE-2013-3231
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3231
>
* CVE-2013-3232
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3232
>
* CVE-2013-3234
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3234
>
* CVE-2013-3235
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3235
>
Indications:
Everyone using the Linux Kernel on x86_64 architecture should update.
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-kernel-7991 slessp3-kernel-7992
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-kernel-7991 slessp3-kernel-7992 slessp3-kernel-7993 slessp3-kernel-7994 slessp3-kernel-8000
- SUSE Linux Enterprise High Availability Extension 11 SP3:
zypper in -t patch slehasp3-kernel-7991 slehasp3-kernel-7992 slehasp3-kernel-7993 slehasp3-kernel-7994 slehasp3-kernel-8000
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-kernel-7991 sledsp3-kernel-7992
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 3.0.82]:
kernel-default-3.0.82-0.7.9
kernel-default-base-3.0.82-0.7.9
kernel-default-devel-3.0.82-0.7.9
kernel-source-3.0.82-0.7.9
kernel-syms-3.0.82-0.7.9
kernel-trace-3.0.82-0.7.9
kernel-trace-base-3.0.82-0.7.9
kernel-trace-devel-3.0.82-0.7.9
kernel-xen-devel-3.0.82-0.7.9
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586) [New Version: 3.0.82]:
kernel-pae-3.0.82-0.7.9
kernel-pae-base-3.0.82-0.7.9
kernel-pae-devel-3.0.82-0.7.9
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 3.0.82]:
kernel-default-3.0.82-0.7.9
kernel-default-base-3.0.82-0.7.9
kernel-default-devel-3.0.82-0.7.9
kernel-source-3.0.82-0.7.9
kernel-syms-3.0.82-0.7.9
kernel-trace-3.0.82-0.7.9
kernel-trace-base-3.0.82-0.7.9
kernel-trace-devel-3.0.82-0.7.9
- SUSE Linux Enterprise Server 11 SP3 (i586 x86_64) [New Version: 3.0.82]:
kernel-ec2-3.0.82-0.7.9
kernel-ec2-base-3.0.82-0.7.9
kernel-ec2-devel-3.0.82-0.7.9
kernel-xen-3.0.82-0.7.9
kernel-xen-base-3.0.82-0.7.9
kernel-xen-devel-3.0.82-0.7.9
- SUSE Linux Enterprise Server 11 SP3 (x86_64):
xen-kmp-default-4.2.2_04_3.0.82_0.7-0.9.3
- SUSE Linux Enterprise Server 11 SP3 (s390x) [New Version: 3.0.82]:
kernel-default-man-3.0.82-0.7.9
- SUSE Linux Enterprise Server 11 SP3 (ppc64) [New Version: 3.0.82]:
kernel-ppc64-3.0.82-0.7.9
kernel-ppc64-base-3.0.82-0.7.9
kernel-ppc64-devel-3.0.82-0.7.9
- SUSE Linux Enterprise Server 11 SP3 (i586) [New Version: 3.0.82]:
kernel-pae-3.0.82-0.7.9
kernel-pae-base-3.0.82-0.7.9
kernel-pae-devel-3.0.82-0.7.9
- SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 ia64 ppc64 s390x x86_64):
cluster-network-kmp-default-1.4_3.0.82_0.7-2.25.3
cluster-network-kmp-trace-1.4_3.0.82_0.7-2.25.3
gfs2-kmp-default-2_3.0.82_0.7-0.16.3
gfs2-kmp-trace-2_3.0.82_0.7-0.16.3
ocfs2-kmp-default-1.6_3.0.82_0.7-0.18.3
ocfs2-kmp-trace-1.6_3.0.82_0.7-0.18.3
- SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 x86_64):
cluster-network-kmp-xen-1.4_3.0.82_0.7-2.25.3
gfs2-kmp-xen-2_3.0.82_0.7-0.16.3
ocfs2-kmp-xen-1.6_3.0.82_0.7-0.18.3
- SUSE Linux Enterprise High Availability Extension 11 SP3 (ppc64):
cluster-network-kmp-ppc64-1.4_3.0.82_0.7-2.25.3
gfs2-kmp-ppc64-2_3.0.82_0.7-0.16.3
ocfs2-kmp-ppc64-1.6_3.0.82_0.7-0.18.3
- SUSE Linux Enterprise High Availability Extension 11 SP3 (i586):
cluster-network-kmp-pae-1.4_3.0.82_0.7-2.25.3
gfs2-kmp-pae-2_3.0.82_0.7-0.16.3
ocfs2-kmp-pae-1.6_3.0.82_0.7-0.18.3
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 3.0.82]:
kernel-default-3.0.82-0.7.9
kernel-default-base-3.0.82-0.7.9
kernel-default-devel-3.0.82-0.7.9
kernel-default-extra-3.0.82-0.7.9
kernel-source-3.0.82-0.7.9
kernel-syms-3.0.82-0.7.9
kernel-trace-devel-3.0.82-0.7.9
kernel-xen-3.0.82-0.7.9
kernel-xen-base-3.0.82-0.7.9
kernel-xen-devel-3.0.82-0.7.9
kernel-xen-extra-3.0.82-0.7.9
- SUSE Linux Enterprise Desktop 11 SP3 (x86_64):
xen-kmp-default-4.2.2_04_3.0.82_0.7-0.9.3
- SUSE Linux Enterprise Desktop 11 SP3 (i586) [New Version: 3.0.82]:
kernel-pae-3.0.82-0.7.9
kernel-pae-base-3.0.82-0.7.9
kernel-pae-devel-3.0.82-0.7.9
kernel-pae-extra-3.0.82-0.7.9
- SLE 11 SERVER Unsupported Extras (i586 ia64):
kernel-default-extra-3.0.82-0.7.9
- SLE 11 SERVER Unsupported Extras (i586):
kernel-pae-extra-3.0.82-0.7.9
kernel-xen-extra-3.0.82-0.7.9
References:
http://support.novell.com/security/cve/CVE-2013-0160.html
http://support.novell.com/security/cve/CVE-2013-1774.html
http://support.novell.com/security/cve/CVE-2013-1979.html
http://support.novell.com/security/cve/CVE-2013-3076.html
http://support.novell.com/security/cve/CVE-2013-3222.html
http://support.novell.com/security/cve/CVE-2013-3223.html
http://support.novell.com/security/cve/CVE-2013-3224.html
http://support.novell.com/security/cve/CVE-2013-3225.html
http://support.novell.com/security/cve/CVE-2013-3227.html
http://support.novell.com/security/cve/CVE-2013-3228.html
http://support.novell.com/security/cve/CVE-2013-3229.html
http://support.novell.com/security/cve/CVE-2013-3231.html
http://support.novell.com/security/cve/CVE-2013-3232.html
http://support.novell.com/security/cve/CVE-2013-3234.html
http://support.novell.com/security/cve/CVE-2013-3235.html
https://bugzilla.novell.com/763968
https://bugzilla.novell.com/773837
https://bugzilla.novell.com/785901
https://bugzilla.novell.com/797090
https://bugzilla.novell.com/797727
https://bugzilla.novell.com/801427
https://bugzilla.novell.com/803320
https://bugzilla.novell.com/804482
https://bugzilla.novell.com/804609
https://bugzilla.novell.com/805804
https://bugzilla.novell.com/806976
https://bugzilla.novell.com/808015
https://bugzilla.novell.com/808136
https://bugzilla.novell.com/808837
https://bugzilla.novell.com/808855
https://bugzilla.novell.com/809130
https://bugzilla.novell.com/809895
https://bugzilla.novell.com/809975
https://bugzilla.novell.com/810722
https://bugzilla.novell.com/812281
https://bugzilla.novell.com/812332
https://bugzilla.novell.com/812526
https://bugzilla.novell.com/812974
https://bugzilla.novell.com/813604
https://bugzilla.novell.com/813922
https://bugzilla.novell.com/815356
https://bugzilla.novell.com/816451
https://bugzilla.novell.com/817035
https://bugzilla.novell.com/817377
https://bugzilla.novell.com/818047
https://bugzilla.novell.com/818371
https://bugzilla.novell.com/818465
https://bugzilla.novell.com/819018
https://bugzilla.novell.com/819195
https://bugzilla.novell.com/819523
https://bugzilla.novell.com/819610
https://bugzilla.novell.com/819655
https://bugzilla.novell.com/820172
https://bugzilla.novell.com/820434
https://bugzilla.novell.com/821052
https://bugzilla.novell.com/821070
https://bugzilla.novell.com/821235
https://bugzilla.novell.com/821799
https://bugzilla.novell.com/821859
https://bugzilla.novell.com/821930
https://bugzilla.novell.com/822066
https://bugzilla.novell.com/822077
https://bugzilla.novell.com/822080
https://bugzilla.novell.com/822164
https://bugzilla.novell.com/822340
https://bugzilla.novell.com/822431
https://bugzilla.novell.com/822722
https://bugzilla.novell.com/822825
https://bugzilla.novell.com/823082
https://bugzilla.novell.com/823223
https://bugzilla.novell.com/823342
https://bugzilla.novell.com/823386
https://bugzilla.novell.com/823597
https://bugzilla.novell.com/823795
https://bugzilla.novell.com/824159
https://bugzilla.novell.com/825037
https://bugzilla.novell.com/825591
https://bugzilla.novell.com/825657
https://bugzilla.novell.com/825696
https://bugzilla.novell.com/826186
http://download.novell.com/patch/finder/?keywords=49f7874a175529c59329baae0…
http://download.novell.com/patch/finder/?keywords=791cb1bb4aba7ca75e2e47859…
http://download.novell.com/patch/finder/?keywords=7cb18c7bcebceb94dd2514f7f…
http://download.novell.com/patch/finder/?keywords=b2cd3e34903a77d5b7bee3e29…
http://download.novell.com/patch/finder/?keywords=befc91a3baffe1e8ef34f3ebd…
http://download.novell.com/patch/finder/?keywords=d52cf2180c196dd33a4180877…
http://download.novell.com/patch/finder/?keywords=febfa3d8532573af9a9f2671f…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2013:1182-1: important: kernel update for SLE11 SP3
by opensuse-security@opensuse.org 11 Jul '13
by opensuse-security@opensuse.org 11 Jul '13
11 Jul '13
SUSE Security Update: kernel update for SLE11 SP3
______________________________________________________________________________
Announcement ID: SUSE-SU-2013:1182-1
Rating: important
References: #763968 #773837 #785901 #797090 #797727 #801427
#803320 #804482 #804609 #805804 #806976 #808015
#808136 #808837 #808855 #809130 #809895 #809975
#810722 #812281 #812332 #812526 #812974 #813604
#813922 #815356 #816451 #817035 #817377 #818047
#818371 #818465 #819018 #819195 #819523 #819610
#819655 #820172 #820434 #821052 #821070 #821235
#821799 #821859 #821930 #822066 #822077 #822080
#822164 #822340 #822431 #822722 #822825 #823082
#823223 #823342 #823386 #823597 #823795 #824159
#825037 #825591 #825657 #825696 #826186
Cross-References: CVE-2013-0160 CVE-2013-1774 CVE-2013-1979
CVE-2013-3076 CVE-2013-3222 CVE-2013-3223
CVE-2013-3224 CVE-2013-3225 CVE-2013-3227
CVE-2013-3228 CVE-2013-3229 CVE-2013-3231
CVE-2013-3232 CVE-2013-3234 CVE-2013-3235
Affected Products:
SLE 11 SERVER Unsupported Extras
______________________________________________________________________________
An update that solves 15 vulnerabilities and has 50 fixes
is now available.
Description:
The SUSE Linux Enterprise 11 Service Pack 3 kernel was
updated to 3.0.82 and to fix various bugs and security
issues.
Following security issues were fixed: CVE-2013-1774: The
chase_port function in drivers/usb/serial/io_ti.c in the
Linux kernel allowed local users to cause a denial of
service (NULL pointer dereference and system crash) via an
attempted /dev/ttyUSB read or write operation on a
disconnected Edgeport USB serial converter.
CVE-2013-0160: Timing side channel on attacks were possible
on /dev/ptmx that could allow local attackers to predict
keypresses like e.g. passwords. This has been fixed again
by updating accessed/modified time on the pty devices in
resolution of 8 seconds, so that idle time detection can
still work.
CVE-2013-3222: The vcc_recvmsg function in net/atm/common.c
in the Linux kernel did not initialize a certain length
variable, which allowed local users to obtain sensitive
information from kernel stack memory via a crafted recvmsg
or recvfrom system call.
CVE-2013-3223: The ax25_recvmsg function in
net/ax25/af_ax25.c in the Linux kernel did not initialize a
certain data structure, which allowed local users to obtain
sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call.
CVE-2013-3224: The bt_sock_recvmsg function in
net/bluetooth/af_bluetooth.c in the Linux kernel did not
properly initialize a certain length variable, which
allowed local users to obtain sensitive information from
kernel stack memory via a crafted recvmsg or recvfrom
system call.
CVE-2013-3225: The rfcomm_sock_recvmsg function in
net/bluetooth/rfcomm/sock.c in the Linux kernel did not
initialize a certain length variable, which allowed local
users to obtain sensitive information from kernel stack
memory via a crafted recvmsg or recvfrom system call.
CVE-2013-3227: The caif_seqpkt_recvmsg function in
net/caif/caif_socket.c in the Linux kernel did not
initialize a certain length variable, which allowed local
users to obtain sensitive information from kernel stack
memory via a crafted recvmsg or recvfrom system call.
CVE-2013-3228: The irda_recvmsg_dgram function in
net/irda/af_irda.c in the Linux kernel did not initialize a
certain length variable, which allowed local users to
obtain sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call.
CVE-2013-3229: The iucv_sock_recvmsg function in
net/iucv/af_iucv.c in the Linux kernel did not initialize a
certain length variable, which allowed local users to
obtain sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call.
CVE-2013-3231: The llc_ui_recvmsg function in
net/llc/af_llc.c in the Linux kernel did not initialize a
certain length variable, which allowed local users to
obtain sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call.
CVE-2013-3232: The nr_recvmsg function in
net/netrom/af_netrom.c in the Linux kernel did not
initialize a certain data structure, which allowed local
users to obtain sensitive information from kernel stack
memory via a crafted recvmsg or recvfrom system call.
CVE-2013-3234: The rose_recvmsg function in
net/rose/af_rose.c in the Linux kernel did not initialize a
certain data structure, which allowed local users to obtain
sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call.
CVE-2013-3235: net/tipc/socket.c in the Linux kernel did
not initialize a certain data structure and a certain
length variable, which allowed local users to obtain
sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call.
CVE-2013-3076: The crypto API in the Linux kernel did not
initialize certain length variables, which allowed local
users to obtain sensitive information from kernel stack
memory via a crafted recvmsg or recvfrom system call,
related to the hash_recvmsg function in crypto/algif_hash.c
and the skcipher_recvmsg function in
crypto/algif_skcipher.c.
CVE-2013-1979: The scm_set_cred function in
include/net/scm.h in the Linux kernel used incorrect uid
and gid values during credentials passing, which allowed
local users to gain privileges via a crafted application.
A kernel information leak via tkill/tgkill was fixed.
Following non security bugs were fixed: S/390:
- af_iucv: Missing man page (bnc#825037, LTC#94825).
- iucv: fix kernel panic at reboot (bnc#825037, LTC#93803).
- kernel: lost IPIs on CPU hotplug (bnc#825037, LTC#94784).
- dasd: Add missing descriptions for dasd timeout messages
(bnc#825037, LTC#94762).
- dasd: Fix hanging device after resume with internal error
13 (bnc#825037, LTC#94554).
- cio: Suppress 2nd path verification during resume
(bnc#825037, LTC#94554).
- vmcp: Missing man page (bnc#825037, LTC#94453).
- kernel: 3215 console crash (bnc#825037, LTC#94302).
- netiucv: Hold rtnl between name allocation and device
registration (bnc#824159).
- s390/ftrace: fix mcount adjustment (bnc#809895).
HyperV:
- Drivers: hv: Fix a bug in get_vp_index().
- hyperv: Fix a compiler warning in netvsc_send().
- Tools: hv: Fix a checkpatch warning.
- tools: hv: skip iso9660 mounts in hv_vss_daemon.
- tools: hv: use FIFREEZE/FITHAW in hv_vss_daemon.
- tools: hv: use getmntent in hv_vss_daemon.
- Tools: hv: Fix a checkpatch warning.
- tools: hv: fix checks for origin of netlink message in
hv_vss_daemon.
- Tools: hv: fix warnings in hv_vss_daemon.
- x86, hyperv: Handle Xen emulation of Hyper-V more
gracefully.
- hyperv: Fix a kernel warning from
netvsc_linkstatus_callback().
- Drivers: hv: balloon: make local functions static.
- tools: hv: daemon should check type of received Netlink
msg.
- tools: hv: daemon setsockopt should use options macros.
- tools: hv: daemon should subscribe only to CN_KVP_IDX
group.
- driver: hv: remove cast for kmalloc return value.
- hyperv: use 3.4 as LIC version string (bnc#822431).
BTRFS:
- btrfs: flush delayed inodes if we are short on space
(bnc#801427).
- btrfs: rework shrink_delalloc (bnc#801427).
- btrfs: fix our overcommit math (bnc#801427).
- btrfs: delay block group item insertion (bnc#801427).
- btrfs: remove bytes argument from do_chunk_alloc
(bnc#801427).
- btrfs: run delayed refs first when out of space
(bnc#801427).
- btrfs: do not commit instead of overcommitting
(bnc#801427).
- btrfs: do not take inode delalloc mutex if we are a free
space inode (bnc#801427).
- btrfs: fix chunk allocation error handling (bnc#801427).
- btrfs: remove extent mapping if we fail to add chunk
(bnc#801427).
- btrfs: do not overcommit if we do not have enough space
for global rsv (bnc#801427).
- btrfs: rework the overcommit logic to be based on the
total size (bnc#801427).
- btrfs: steal from global reserve if we are cleaning up
orphans (bnc#801427).
- btrfs: clear chunk_alloc flag on retryable failure
(bnc#801427).
- btrfs: use reserved space for creating a snapshot
(bnc#801427).
- btrfs: cleanup to make the function
btrfs_delalloc_reserve_metadata more logic (bnc#801427).
- btrfs: fix space leak when we fail to reserve metadata
space (bnc#801427).
- btrfs: fix space accounting for unlink and rename
(bnc#801427).
- btrfs: allocate new chunks if the space is not enough for
global rsv (bnc#801427).
- btrfs: various abort cleanups (bnc#812526 bnc#801427).
- btrfs: simplify unlink reservations (bnc#801427).
XFS:
- xfs: Move allocation stack switch up to xfs_bmapi
(bnc#815356).
- xfs: introduce XFS_BMAPI_STACK_SWITCH (bnc#815356).
- xfs: zero allocation_args on the kernel stack
(bnc#815356).
- xfs: fix debug_object WARN at xfs_alloc_vextent()
(bnc#815356).
- xfs: do not defer metadata allocation to the workqueue
(bnc#815356).
- xfs: introduce an allocation workqueue (bnc#815356).
- xfs: fix race while discarding buffers [V4] (bnc#815356
(comment 36)).
- xfs: Serialize file-extending direct IO (bnc#818371).
- xfs: Do not allocate new buffers on every call to
_xfs_buf_find (bnc#763968).
- xfs: fix buffer lookup race on allocation failure
(bnc#763968).
ALSA:
- Fix VT1708 jack detection on SLEPOS machines (bnc#813922).
- ALSA: hda - Avoid choose same converter for unused pins
(bnc#826186).
- ALSA: hda - Cache the MUX selection for generic HDMI
(bnc#826186).
- ALSA: hda - Haswell converter power state D0 verify
(bnc#826186).
- ALSA: hda - Do not take unresponsive D3 transition too
serious (bnc#823597).
- ALSA: hda - Introduce bit flags to
snd_hda_codec_read/write() (bnc#823597).
- ALSA: hda - Check CORB overflow (bnc#823597).
- ALSA: hda - Check validity of CORB/RIRB WP reads
(bnc#823597).
- ALSA: hda - Fix system panic when DMA > 40 bits for
Nvidia audio controllers (bnc#818465).
- ALSA: hda - Add hint for suppressing lower cap for IDT
codecs (bnc#812332).
- ALSA: hda - Enable mic-mute LED on more HP laptops
(bnc#821859).
Direct Rendering Manager (DRM):
- drm/i915: Add wait_for in init_ring_common (bnc#813604).
- drm/i915: Mark the ringbuffers as being in the GTT domain
(bnc#813604).
- drm/edid: Do not print messages regarding stereo or csync
by default (bnc #821235).
- drm/i915: force full modeset if the connector is in DPMS
OFF mode (bnc #809975).
- drm/i915/sdvo: Use &intel_sdvo->ddc instead of
intel_sdvo->i2c for DDC (bnc #808855).
- drm/mm: fix dump table BUG. (bnc#808837)
- drm/i915: Clear the stolen fb before enabling
(bnc#808015).
XEN:
- xen/netback: Update references (bnc#823342).
- xen: Check for insane amounts of requests on the ring.
- Update Xen patches to 3.0.82.
- netback: do not disconnect frontend when seeing oversize
packet.
- netfront: reduce gso_max_size to account for max TCP
header.
- netfront: fix kABI after "reduce gso_max_size to account
for max TCP header".
Other:
- x86, efi: retry ExitBootServices() on failure
(bnc#823386).
- x86/efi: Fix dummy variable buffer allocation
(bnc#822080).
- ext4: avoid hang when mounting non-journal filesystems
with orphan list (bnc#817377).
- mm: compaction: Scan PFN caching KABI workaround (Fix
KABI breakage (bnc#825657)).
- autofs4 - fix get_next_positive_subdir() (bnc#819523).
- ocfs2: Add bits_wanted while calculating credits in
ocfs2_calc_extend_credits (bnc#822077).
- writeback: Avoid needless scanning of b_dirty list
(bnc#819018).
- writeback: Do not sort b_io list only because of block
device inode (bnc#819018).
- re-enable io tracing (bnc#785901).
- pciehp: Corrected the old mismatching DMI strings.
- SUNRPC: Prevent an rpc_task wakeup race (bnc#825591).
- tg3: Prevent system hang during repeated EEH errors
(bnc#822066).
- scsi_dh_alua: multipath failover fails with error 15
(bnc#825696).
- Do not switch camera on HP EB 8780 (bnc#797090).
- Do not switch webcam for HP EB 8580w (bnc#797090).
- mm: fixup compilation error due to an asm write through a
const pointer. (bnc#823795)
- do not switch cam port on HP EliteBook 840 (bnc#822164).
- net/sunrpc: xpt_auth_cache should be ignored when expired
(bnc#803320).
- sunrpc/cache: ensure items removed from cache do not have
pending upcalls (bnc#803320).
- sunrpc/cache: remove races with queuing an upcall
(bnc#803320).
- sunrpc/cache: use cache_fresh_unlocked consistently and
correctly (bnc#803320).
- KVM: x86: emulate movdqa (bnc#821070).
- KVM: x86: emulator: add support for vector alignment
(bnc#821070).
- KVM: x86: emulator: expand decode flags to 64 bits
(bnc#821070).
- xhci - correct comp_mode_recovery_timer on return from
hibernate (bnc#808136).
- md/raid10 enough fixes (bnc#773837).
- lib/Makefile: Fix oid_registry build dependency
(bnc#823223).
- Update config files: disable IP_PNP (bnc#822825)
- Fix kABI breakage for addition of
snd_hda_bus.no_response_fallback (bnc#823597).
- Disable efi pstore by default (bnc#804482 bnc#820172).
- md: Fix problem with GET_BITMAP_FILE returning wrong
status (bnc#812974).
- bnx2x: Fix bridged GSO for 57710/57711 chips (bnc#819610).
- USB: xHCI: override bogus bulk wMaxPacketSize values
(bnc#823082).
- BTUSB: Add MediaTek bluetooth MT76x0E support (bnc#797727
bnc#822340).
- qlge: Update version to 1.00.00.32 (bnc#819195).
- qlge: Fix ethtool autoneg advertising (bnc#819195).
- qlge: Fix receive path to drop error frames (bnc#819195).
- qlge: remove NETIF_F_TSO6 flag (bnc#819195).
- remove init of dev->perm_addr in drivers (bnc#819195).
- drivers/net: fix up function prototypes after __dev*
removals (bnc#819195).
- qlge: remove __dev* attributes (bnc#819195).
- drivers: ethernet: qlogic: qlge_dbg.c: Fixed a coding
style issue (bnc#819195).
- cxgb4: Force uninitialized state if FW_ON_ADAPTER is <
FW_VERSION and we are the MASTER_PF (bnc#809130).
- USB: UHCI: fix for suspend of virtual HP controller
(bnc#817035).
- timer_list: Convert timer list to be a proper seq_file
(bnc#818047).
- timer_list: Split timer_list_show_tickdevices
(bnc#818047).
- sched: Fix /proc/sched_debug failure on very very large
systems (bnc#818047).
- sched: Fix /proc/sched_stat failure on very very large
systems (bnc#818047).
- reiserfs: fix spurious multiple-fill in
reiserfs_readdir_dentry (bnc#822722).
- libfc: do not exch_done() on invalid sequence ptr
(bnc#810722).
- netfilter: ip6t_LOG: fix logging of packet mark
(bnc#821930).
- virtio_net: introduce VIRTIO_NET_HDR_F_DATA_VALID
(bnc#819655).
- HWPOISON: fix misjudgement of page_action() for errors on
mlocked pages (Memory failure RAS (bnc#821799)).
- HWPOISON: check dirty flag to match against clean page
(Memory failure RAS (bnc#821799)).
- HWPOISON: change order of error_states elements (Memory
failure RAS (bnc#821799)).
- mm: hwpoison: fix action_result() to print out
dirty/clean (Memory failure RAS (bnc#821799)).
- mm: mmu_notifier: re-fix freed page still mapped in
secondary MMU (bnc#821052).
- Do not switch webcams in some HP ProBooks to XHCI
(bnc#805804).
- Do not switch BT on HP ProBook 4340 (bnc#812281).
- mm: memory_dev_init make sure nmi watchdog does not
trigger while registering memory sections (bnc#804609,
bnc#820434).
- mm: compaction: Restart compaction from near where it
left off
- mm: compaction: cache if a pageblock was scanned and no
pages were isolated
- mm: compaction: clear PG_migrate_skip based on compaction
and reclaim activity
- mm: compaction: Scan PFN caching KABI workaround
- mm: page_allocator: Remove first_pass guard
- mm: vmscan: do not stall on writeback during memory
compaction Cache compaction restart points for faster
compaction cycles (bnc#816451)
Special Instructions and Notes:
Please reboot the system after installing this update.
Package List:
- SLE 11 SERVER Unsupported Extras (ppc64 s390x x86_64):
kernel-default-extra-3.0.82-0.7.9
- SLE 11 SERVER Unsupported Extras (x86_64):
kernel-xen-extra-3.0.82-0.7.9
- SLE 11 SERVER Unsupported Extras (ppc64):
kernel-ppc64-extra-3.0.82-0.7.9
References:
http://support.novell.com/security/cve/CVE-2013-0160.html
http://support.novell.com/security/cve/CVE-2013-1774.html
http://support.novell.com/security/cve/CVE-2013-1979.html
http://support.novell.com/security/cve/CVE-2013-3076.html
http://support.novell.com/security/cve/CVE-2013-3222.html
http://support.novell.com/security/cve/CVE-2013-3223.html
http://support.novell.com/security/cve/CVE-2013-3224.html
http://support.novell.com/security/cve/CVE-2013-3225.html
http://support.novell.com/security/cve/CVE-2013-3227.html
http://support.novell.com/security/cve/CVE-2013-3228.html
http://support.novell.com/security/cve/CVE-2013-3229.html
http://support.novell.com/security/cve/CVE-2013-3231.html
http://support.novell.com/security/cve/CVE-2013-3232.html
http://support.novell.com/security/cve/CVE-2013-3234.html
http://support.novell.com/security/cve/CVE-2013-3235.html
https://bugzilla.novell.com/763968
https://bugzilla.novell.com/773837
https://bugzilla.novell.com/785901
https://bugzilla.novell.com/797090
https://bugzilla.novell.com/797727
https://bugzilla.novell.com/801427
https://bugzilla.novell.com/803320
https://bugzilla.novell.com/804482
https://bugzilla.novell.com/804609
https://bugzilla.novell.com/805804
https://bugzilla.novell.com/806976
https://bugzilla.novell.com/808015
https://bugzilla.novell.com/808136
https://bugzilla.novell.com/808837
https://bugzilla.novell.com/808855
https://bugzilla.novell.com/809130
https://bugzilla.novell.com/809895
https://bugzilla.novell.com/809975
https://bugzilla.novell.com/810722
https://bugzilla.novell.com/812281
https://bugzilla.novell.com/812332
https://bugzilla.novell.com/812526
https://bugzilla.novell.com/812974
https://bugzilla.novell.com/813604
https://bugzilla.novell.com/813922
https://bugzilla.novell.com/815356
https://bugzilla.novell.com/816451
https://bugzilla.novell.com/817035
https://bugzilla.novell.com/817377
https://bugzilla.novell.com/818047
https://bugzilla.novell.com/818371
https://bugzilla.novell.com/818465
https://bugzilla.novell.com/819018
https://bugzilla.novell.com/819195
https://bugzilla.novell.com/819523
https://bugzilla.novell.com/819610
https://bugzilla.novell.com/819655
https://bugzilla.novell.com/820172
https://bugzilla.novell.com/820434
https://bugzilla.novell.com/821052
https://bugzilla.novell.com/821070
https://bugzilla.novell.com/821235
https://bugzilla.novell.com/821799
https://bugzilla.novell.com/821859
https://bugzilla.novell.com/821930
https://bugzilla.novell.com/822066
https://bugzilla.novell.com/822077
https://bugzilla.novell.com/822080
https://bugzilla.novell.com/822164
https://bugzilla.novell.com/822340
https://bugzilla.novell.com/822431
https://bugzilla.novell.com/822722
https://bugzilla.novell.com/822825
https://bugzilla.novell.com/823082
https://bugzilla.novell.com/823223
https://bugzilla.novell.com/823342
https://bugzilla.novell.com/823386
https://bugzilla.novell.com/823597
https://bugzilla.novell.com/823795
https://bugzilla.novell.com/824159
https://bugzilla.novell.com/825037
https://bugzilla.novell.com/825591
https://bugzilla.novell.com/825657
https://bugzilla.novell.com/825696
https://bugzilla.novell.com/826186
http://download.novell.com/patch/finder/?keywords=9deafe882b5e3b5f0df9f5075…
http://download.novell.com/patch/finder/?keywords=bdd1cc737ed1a109b28b07718…
http://download.novell.com/patch/finder/?keywords=ddd472e1f756fe2a224c4a247…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2013:1176-1: important: update to SeaMonkey 2.19
by opensuse-security@opensuse.org 11 Jul '13
by opensuse-security@opensuse.org 11 Jul '13
11 Jul '13
openSUSE Security Update: update to SeaMonkey 2.19
______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:1176-1
Rating: important
References: #825935
Cross-References: CVE-2013-1682 CVE-2013-1683 CVE-2013-1684
CVE-2013-1685 CVE-2013-1686 CVE-2013-1687
CVE-2013-1688 CVE-2013-1690 CVE-2013-1692
CVE-2013-1693 CVE-2013-1694 CVE-2013-1695
CVE-2013-1696 CVE-2013-1697 CVE-2013-1698
Affected Products:
openSUSE 11.4
______________________________________________________________________________
An update that fixes 15 vulnerabilities is now available.
Description:
Seamonkey was updated to version 2.19
* MFSA 2013-49/CVE-2013-1682/CVE-2013-1683 Miscellaneous
memory safety hazards
* MFSA 2013-50/CVE-2013-1684/CVE-2013-1685/CVE-2013-1686
Memory corruption found using Address Sanitizer
* MFSA 2013-51/CVE-2013-1687 (bmo#863933, bmo#866823)
Privileged content access and execution via XBL
* MFSA 2013-52/CVE-2013-1688 (bmo#873966) Arbitrary code
execution within Profiler
* MFSA 2013-53/CVE-2013-1690 (bmo#857883) Execution of
unmapped memory through onreadystatechange event
* MFSA 2013-54/CVE-2013-1692 (bmo#866915) Data in the
body of XHR HEAD requests leads to CSRF attacks
* MFSA 2013-55/CVE-2013-1693 (bmo#711043) SVG filters can
lead to information disclosure
* MFSA 2013-56/CVE-2013-1694 (bmo#848535) PreserveWrapper
has inconsistent behavior
* MFSA 2013-57/CVE-2013-1695 (bmo#849791) Sandbox
restrictions not applied to nested frame elements
* MFSA 2013-58/CVE-2013-1696 (bmo#761667) X-Frame-Options
ignored when using server push with multi-part responses
* MFSA 2013-59/CVE-2013-1697 (bmo#858101) XrayWrappers
can be bypassed to run user defined methods in a
privileged context
* MFSA 2013-60/CVE-2013-1698 (bmo#876044)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch 2013-105
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
seamonkey-2.19-69.1
seamonkey-debuginfo-2.19-69.1
seamonkey-debugsource-2.19-69.1
seamonkey-dom-inspector-2.19-69.1
seamonkey-irc-2.19-69.1
seamonkey-translations-common-2.19-69.1
seamonkey-translations-other-2.19-69.1
seamonkey-venkman-2.19-69.1
References:
http://support.novell.com/security/cve/CVE-2013-1682.html
http://support.novell.com/security/cve/CVE-2013-1683.html
http://support.novell.com/security/cve/CVE-2013-1684.html
http://support.novell.com/security/cve/CVE-2013-1685.html
http://support.novell.com/security/cve/CVE-2013-1686.html
http://support.novell.com/security/cve/CVE-2013-1687.html
http://support.novell.com/security/cve/CVE-2013-1688.html
http://support.novell.com/security/cve/CVE-2013-1690.html
http://support.novell.com/security/cve/CVE-2013-1692.html
http://support.novell.com/security/cve/CVE-2013-1693.html
http://support.novell.com/security/cve/CVE-2013-1694.html
http://support.novell.com/security/cve/CVE-2013-1695.html
http://support.novell.com/security/cve/CVE-2013-1696.html
http://support.novell.com/security/cve/CVE-2013-1697.html
http://support.novell.com/security/cve/CVE-2013-1698.html
https://bugzilla.novell.com/825935
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0