openSUSE Security Announce
Threads by month
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
October 2014
- 2 participants
- 11 discussions
[security-announce] SUSE-SU-2014:1342-1: important: Security update for spacewalk-java
by opensuse-security@opensuse.org 31 Oct '14
by opensuse-security@opensuse.org 31 Oct '14
31 Oct '14
SUSE Security Update: Security update for spacewalk-java
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1342-1
Rating: important
References: #902182
Cross-References: CVE-2014-3654
Affected Products:
SUSE Manager Server
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update fixes various cross-site scripting (XSS) issues in
spacewalk-java. CVE-2014-3654 has been assigned to this issue.
Security Issues:
* CVE-2014-3654
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3654>
Indications:
Everybody should update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Manager Server:
zypper in -t patch sleman21-spacewalk-java-9910
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Manager Server (noarch):
spacewalk-java-2.1.165.6-0.13.1
spacewalk-java-config-2.1.165.6-0.13.1
spacewalk-java-lib-2.1.165.6-0.13.1
spacewalk-java-oracle-2.1.165.6-0.13.1
spacewalk-java-postgresql-2.1.165.6-0.13.1
spacewalk-taskomatic-2.1.165.6-0.13.1
References:
http://support.novell.com/security/cve/CVE-2014-3654.html
https://bugzilla.suse.com/show_bug.cgi?id=902182
http://download.suse.com/patch/finder/?keywords=2ce4e2b73960b7af5ee0784875a…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:1339-1: important: Security update for spacewalk-java
by opensuse-security@opensuse.org 31 Oct '14
by opensuse-security@opensuse.org 31 Oct '14
31 Oct '14
SUSE Security Update: Security update for spacewalk-java
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1339-1
Rating: important
References: #896012 #902182
Cross-References: CVE-2014-3595 CVE-2014-3654
Affected Products:
SUSE Manager 1.7 for SLE 11 SP2
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
It includes one version update.
Description:
This update fixes various cross-site scripting (XSS) issues in
spacewalk-java. CVE-2014-3654 and CVE-2014-3595 have been assigned to
these issues.
Security Issues:
* CVE-2014-3654
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3654>
* CVE-2014-3595
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3595>
Indications:
Everybody should update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Manager 1.7 for SLE 11 SP2:
zypper in -t patch sleman17sp2-spacewalk-java-9909
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Manager 1.7 for SLE 11 SP2 (noarch) [New Version: 1.7.54.33]:
spacewalk-java-1.7.54.33-0.5.1
spacewalk-java-config-1.7.54.33-0.5.1
spacewalk-java-lib-1.7.54.33-0.5.1
spacewalk-java-oracle-1.7.54.33-0.5.1
spacewalk-java-postgresql-1.7.54.33-0.5.1
spacewalk-taskomatic-1.7.54.33-0.5.1
References:
http://support.novell.com/security/cve/CVE-2014-3595.html
http://support.novell.com/security/cve/CVE-2014-3654.html
https://bugzilla.suse.com/show_bug.cgi?id=896012
https://bugzilla.suse.com/show_bug.cgi?id=902182
http://download.suse.com/patch/finder/?keywords=93c795b3574d176f0dde9827573…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2014:1331-1: important: update for openssl
by opensuse-security@opensuse.org 29 Oct '14
by opensuse-security@opensuse.org 29 Oct '14
29 Oct '14
openSUSE Security Update: update for openssl
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:1331-1
Rating: important
References: #901223 #901277
Cross-References: CVE-2014-3513 CVE-2014-3566 CVE-2014-3567
CVE-2014-3568
Affected Products:
openSUSE 13.1
openSUSE 12.3
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
The following issues were fixed in this release:
CVE-2014-3566: SSLv3 POODLE attack (bnc#901223) CVE-2014-3513,
CVE-2014-3567: DTLS memory leak and session ticket memory leak
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-605
- openSUSE 12.3:
zypper in -t patch openSUSE-2014-605
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
libopenssl-devel-1.0.1j-11.56.1
libopenssl1_0_0-1.0.1j-11.56.1
libopenssl1_0_0-debuginfo-1.0.1j-11.56.1
openssl-1.0.1j-11.56.1
openssl-debuginfo-1.0.1j-11.56.1
openssl-debugsource-1.0.1j-11.56.1
- openSUSE 13.1 (x86_64):
libopenssl-devel-32bit-1.0.1j-11.56.1
libopenssl1_0_0-32bit-1.0.1j-11.56.1
libopenssl1_0_0-debuginfo-32bit-1.0.1j-11.56.1
- openSUSE 13.1 (noarch):
openssl-doc-1.0.1j-11.56.1
- openSUSE 12.3 (i586 x86_64):
libopenssl-devel-1.0.1j-1.68.1
libopenssl1_0_0-1.0.1j-1.68.1
libopenssl1_0_0-debuginfo-1.0.1j-1.68.1
openssl-1.0.1j-1.68.1
openssl-debuginfo-1.0.1j-1.68.1
openssl-debugsource-1.0.1j-1.68.1
- openSUSE 12.3 (x86_64):
libopenssl-devel-32bit-1.0.1j-1.68.1
libopenssl1_0_0-32bit-1.0.1j-1.68.1
libopenssl1_0_0-debuginfo-32bit-1.0.1j-1.68.1
- openSUSE 12.3 (noarch):
openssl-doc-1.0.1j-1.68.1
References:
http://support.novell.com/security/cve/CVE-2014-3513.html
http://support.novell.com/security/cve/CVE-2014-3566.html
http://support.novell.com/security/cve/CVE-2014-3567.html
http://support.novell.com/security/cve/CVE-2014-3568.html
https://bugzilla.suse.com/show_bug.cgi?id=901223
https://bugzilla.suse.com/show_bug.cgi?id=901277
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:1319-1: important: Security update for Linux kernel
by opensuse-security@opensuse.org 22 Oct '14
by opensuse-security@opensuse.org 22 Oct '14
22 Oct '14
SUSE Security Update: Security update for Linux kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1319-1
Rating: important
References: #774818 #806990 #816708 #826486 #832309 #833820
#849123 #855657 #859840 #860441 #860593 #863586
#866130 #866615 #866864 #866911 #869055 #869934
#870161 #871134 #871797 #876017 #876055 #876114
#876590 #879304 #879921 #880344 #880370 #880892
#881051 #881759 #882317 #882639 #882804 #882900
#883096 #883376 #883518 #883724 #884333 #884582
#884725 #884767 #885262 #885382 #885422 #885509
#886840 #887082 #887418 #887503 #887608 #887645
#887680 #888058 #888105 #888591 #888607 #888847
#888849 #888968 #889061 #889173 #889451 #889614
#889727 #890297 #890426 #890513 #890526 #891087
#891259 #891281 #891619 #891746 #892200 #892490
#892723 #893064 #893496 #893596 #894200 #895221
#895608 #895680 #895983 #896689
Cross-References: CVE-2013-1979 CVE-2014-1739 CVE-2014-2706
CVE-2014-3153 CVE-2014-4027 CVE-2014-4171
CVE-2014-4508 CVE-2014-4667 CVE-2014-4943
CVE-2014-5077 CVE-2014-5471 CVE-2014-5472
CVE-2014-6410
Affected Products:
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Real Time Extension 11 SP3
SUSE Linux Enterprise High Availability Extension 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
SLE 11 SERVER Unsupported Extras
______________________________________________________________________________
An update that solves 13 vulnerabilities and has 75 fixes
is now available. It includes two new package versions.
Description:
The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix
various bugs and security issues.
The following security bugs have been fixed:
*
CVE-2014-1739: The media_device_enum_entities function in
drivers/media/media-device.c in the Linux kernel before 3.14.6 does not
initialize a certain data structure, which allows local users to
obtain sensitive information from kernel memory by leveraging
/dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call
(bnc#882804).
*
CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does
not properly implement the interaction between range notification and hole
punching, which allows local users to cause a denial of service (i_mutex
hold) by using the mmap system call to access a hole, as demonstrated by
interfering with intended shmem activity by blocking completion of (1) an
MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call
(bnc#883518).
*
CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel
through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled
and the sep CPU feature flag is set, allows local users to cause a denial
of service (OOPS and system crash) via an invalid syscall number, as
demonstrated by number 1000 (bnc#883724).
*
CVE-2014-4667: The sctp_association_free function in
net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly
manage a certain backlog value, which allows remote attackers to cause a
denial of service (socket outage) via a crafted SCTP packet (bnc#885422).
*
CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the
Linux kernel through 3.15.6 allows local users to gain privileges by
leveraging data-structure differences between an l2tp socket and an inet
socket (bnc#887082).
*
CVE-2014-5077: The sctp_assoc_update function in
net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP
authentication is enabled, allows remote attackers to cause a denial of
service (NULL pointer dereference and OOPS) by starting to establish an
association between two endpoints immediately after an exchange of INIT
and INIT ACK chunks to establish an earlier association between these
endpoints in the opposite direction (bnc#889173).
*
CVE-2014-5471: Stack consumption vulnerability in the
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux
kernel through 3.16.1 allows local users to cause a denial of service
(uncontrolled recursion, and system crash or reboot) via a crafted iso9660
image with a CL entry referring to a directory entry that has a CL entry.
(bnc#892490)
*
CVE-2014-5472: The parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to
cause a denial of service (unkillable mount process) via a crafted iso9660
image with a self-referential CL entry. (bnc#892490)
*
CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux
kernel before 3.13.7 allows remote attackers to cause a denial of service
(system crash) via network traffic that improperly interacts with the
WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and
tx.c. (bnc#871797)
*
CVE-2014-4027: The rd_build_device_space function in
drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not
properly initialize a certain data structure, which allows local users to
obtain sensitive information from ramdisk_mcp memory by leveraging access
to a SCSI initiator. (bnc#882639)
*
CVE-2014-3153 The futex_requeue function in kernel/futex.c in the
Linux kernel through 3.14.5 does not ensure that calls have two different
futex addresses, which allows local users to gain privileges via a crafted
FUTEX_REQUEUE command that facilitates unsafe waiter modification.
(bnc#880892)
*
CVE-2014-6410: Avoid infinite loop when processing indirect ICBs
(bnc#896689)
The following non-security bugs have been fixed:
* ACPI / PAD: call schedule() when need_resched() is true (bnc#866911).
* ACPI: Fix bug when ACPI reset register is implemented in system
memory (bnc#882900).
* ACPI: Limit access to custom_method (bnc#884333).
* ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746).
* Add option to automatically enforce module signatures when in Secure
Boot mode (bnc#884333).
* Add secure_modules() call (bnc#884333).
* Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344).
* Backported new patches of Lock down functions for UEFI secure boot
Also updated series.conf and removed old patches.
* Btrfs: Return EXDEV for cross file system snapshot.
* Btrfs: abort the transaction when we does not find our extent ref.
* Btrfs: avoid warning bomb of btrfs_invalidate_inodes.
* Btrfs: cancel scrub on transaction abortion.
* Btrfs: correctly set profile flags on seqlock retry.
* Btrfs: does not check nodes for extent items.
* Btrfs: fix a possible deadlock between scrub and transaction
committing.
* Btrfs: fix corruption after write/fsync failure + fsync + log
recovery (bnc#894200).
* Btrfs: fix csum tree corruption, duplicate and outdated checksums
(bnc#891619).
* Btrfs: fix double free in find_lock_delalloc_range.
* Btrfs: fix possible memory leak in btrfs_create_tree().
* Btrfs: fix use of uninit "ret" in end_extent_writepage().
* Btrfs: free delayed node outside of root->inode_lock (bnc#866864).
* Btrfs: make DEV_INFO ioctl available to anyone.
* Btrfs: make FS_INFO ioctl available to anyone.
* Btrfs: make device scan less noisy.
* Btrfs: make sure there are not any read requests before stopping
workers.
* Btrfs: more efficient io tree navigation on wait_extent_bit.
* Btrfs: output warning instead of error when loading free space cache
failed.
* Btrfs: retrieve more info from FS_INFO ioctl.
* Btrfs: return EPERM when deleting a default subvolume (bnc#869934).
* Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol
(bnc#866615).
* Btrfs: use right type to get real comparison.
* Btrfs: wake up @scrub_pause_wait as much as we can.
* Btrfs: wake up transaction thread upon remount.
* CacheFiles: Add missing retrieval completions (bnc#880344).
* CacheFiles: Does not try to dump the index key if the cookie has
been cleared (bnc#880344).
* CacheFiles: Downgrade the requirements passed to the allocator
(bnc#880344).
* CacheFiles: Fix the marking of cached pages (bnc#880344).
* CacheFiles: Implement invalidation (bnc#880344).
* CacheFiles: Make some debugging statements conditional (bnc#880344).
* Drivers: hv: util: Fix a bug in the KVP code (bnc#886840).
* Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code
(bnc#886840).
* FS-Cache: Add transition to handle invalidate immediately after
lookup (bnc#880344).
* FS-Cache: Check that there are no read ops when cookie relinquished
(bnc#880344).
* FS-Cache: Clear remaining page count on retrieval cancellation
(bnc#880344).
* FS-Cache: Convert the object event ID #defines into an enum
(bnc#880344).
* FS-Cache: Does not sleep in page release if __GFP_FS is not set
(bnc#880344).
* FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344).
* FS-Cache: Exclusive op submission can BUG if there is been an I/O
error (bnc#880344).
* FS-Cache: Fix __wait_on_atomic_t() to call the action func if the
counter != 0 (bnc#880344).
* FS-Cache: Fix object state machine to have separate work and wait
states (bnc#880344).
* FS-Cache: Fix operation state management and accounting (bnc#880344).
* FS-Cache: Fix signal handling during waits (bnc#880344).
* FS-Cache: Initialise the object event mask with the calculated mask
(bnc#880344).
* FS-Cache: Limit the number of I/O error reports for a cache
(bnc#880344).
* FS-Cache: Make cookie relinquishment wait for outstanding reads
(bnc#880344).
* FS-Cache: Mark cancellation of in-progress operation (bnc#880344).
* FS-Cache: One of the write operation paths doeses not set the object
state (bnc#880344).
* FS-Cache: Provide proper invalidation (bnc#880344).
* FS-Cache: Simplify cookie retention for fscache_objects, fixing oops
(bnc#880344).
* FS-Cache: The retrieval remaining-pages counter needs to be atomic_t
(bnc#880344).
* FS-Cache: Uninline fscache_object_init() (bnc#880344).
* FS-Cache: Wrap checks on object state (bnc#880344).
* HID: usbhid: add always-poll quirk (bnc#888607).
* HID: usbhid: enable always-poll quirk for Elan Touchscreen
(bnc#888607).
* IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297).
* Ignore "flags" change to event_constraint (bnc#876114).
* Ignore data_src/weight changes to perf_sample_data (bnc#876114).
* NFS: Allow more operations in an NFSv4.1 request (bnc#890513).
* NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968).
* NFS: Does not copy read delegation stateids in setattr (bnc#888968).
* NFS: Does not use a delegation to open a file when returning that
delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496)
* NFS: Fixes for NFS RCU-walk support in line with code going upstream
* NFS: Use FS-Cache invalidation (bnc#880344).
* NFS: allow lockless access to access_cache (bnc#866130).
* NFS: avoid mountpoint being displayed as " (deleted)" in
/proc/mounts (bnc#888591).
* NFS: nfs4_do_open should add negative results to the dcache
(bnc#866130).
* NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a
page (bnc#880344).
* NFS: nfs_open_revalidate: only evaluate parent if it will be used
(bnc#866130).
* NFS: prepare for RCU-walk support but pushing tests later in code
(bnc#866130).
* NFS: support RCU_WALK in nfs_permission() (bnc#866130).
* NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130).
* NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130).
* NFSD: Does not hand out delegations for 30 seconds after recalling
them (bnc#880370).
* NFSv4 set open access operation call flag in nfs4_init_opendata_res
(bnc#888968, bnc#892200, bnc#893596, bnc#893496).
* NFSv4: Add a helper for encoding opaque data (bnc#888968).
* NFSv4: Add a helper for encoding stateids (bnc#888968).
* NFSv4: Add helpers for basic copying of stateids (bnc#888968).
* NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968).
* NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968).
* NFSv4: Rename nfs4_copy_stateid() (bnc#888968).
* NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an
error (bnc#888968).
* NFSv4: Simplify the struct nfs4_stateid (bnc#888968).
* NFSv4: The stateid must remain the same for replayed RPC calls
(bnc#888968).
* NFSv4: nfs4_stateid_is_current should return "true" for an invalid
stateid (bnc#888968).
* One more fix for kABI breakage.
* PCI: Lock down BAR access when module security is enabled
(bnc#884333).
* PCI: enable MPS "performance" setting to properly handle bridge MPS
(bnc#883376).
* PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441).
* PM / Hibernate: Create a Radix-Tree to store memory bitmap
(bnc#860441).
* PM / Hibernate: Implement position keeping in radix tree
(bnc#860441).
* PM / Hibernate: Iterate over set bits instead of PFNs in
swsusp_free() (bnc#860441).
* PM / Hibernate: Remove the old memory-bitmap implementation
(bnc#860441).
* PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node
(bnc#860441).
* Restrict /dev/mem and /dev/kmem when module loading is restricted
(bnc#884333).
* Reuse existing "state" field to indicate PERF_X86_EVENT_PEBS_LDLAT
(bnc#876114).
* USB: handle LPM errors during device suspend correctly (bnc#849123).
* Update kabi files to reflect fscache change (bnc#880344)
* Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281)
* VFS: Make more complete truncate operation available to CacheFiles
(bnc#880344).
* [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366,
ltc#83367).
* acpi: Ignore acpi_rsdp kernel parameter when module loading is
restricted (bnc#884333).
* af_iucv: correct cleanup if listen backlog is full (bnc#885262,
LTC#111728).
* asus-wmi: Restrict debugfs interface when module loading is
restricted (bnc#884333).
* autofs4: allow RCU-walk to walk through autofs4 (bnc#866130).
* autofs4: avoid taking fs_lock during rcu-walk (bnc#866130).
* autofs4: does not take spinlock when not needed in
autofs4_lookup_expiring (bnc#866130).
* autofs4: factor should_expire() out of autofs4_expire_indirect
(bnc#866130).
* autofs4: make "autofs4_can_expire" idempotent (bnc#866130).
* autofs4: remove a redundant assignment (bnc#866130).
* autofs: fix lockref lookup (bnc#888591).
* be2net: add dma_mapping_error() check for dma_map_page()
(bnc#881759).
* block: add cond_resched() to potentially long running ioctl discard
loop (bnc#884725).
* block: fix race between request completion and timeout handling
(bnc#881051).
* cdc-ether: clean packet filter upon probe (bnc#876017).
* cpuset: Fix memory allocator deadlock (bnc#876590).
* crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs
have them, but some are FIPS certified, with some kernel support.
* crypto: fips - only panic on bad/missing crypto mod signatures
(bnc#887503).
* crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips
mode (bnc#889451).
* dasd: validate request size before building CCW/TCW (bnc#891087,
LTC#114068).
* dm mpath: fix race condition between multipath_dtr and pg_init_done
(bnc#826486).
* dm-mpath: fix panic on deleting sg device (bnc#870161).
* drm/ast: AST2000 cannot be detected correctly (bnc#895983).
* drm/ast: Actually load DP501 firmware when required (bnc#895608
bnc#871134).
* drm/ast: Add missing entry to dclk_table[].
* drm/ast: Add reduced non reduced mode parsing for wide screen mode
(bnc#892723).
* drm/ast: initial DP501 support (v0.2) (bnc#871134).
* drm/ast: open key before detect chips (bnc#895983).
* drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304).
* drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064).
* drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init
(bnc#869055).
* drm/i915: create functions for the "unclaimed register" checks
(bnc#869055).
* drm/i915: use FPGA_DBG for the "unclaimed register" checks
(bnc#869055).
* drm/mgag200: Initialize data needed to map fbdev memory (bnc
#806990).
* e1000e: enable support for new device IDs (bnc#885509).
* fs/fscache: remove spin_lock() from the condition in while()
(bnc#880344).
* hibernate: Disable in a signed modules environment (bnc#884333).
* hugetlb: does not use ERR_PTR with VM_FAULT* values
* ibmvscsi: Abort init sequence during error recovery (bnc#885382).
* ibmvscsi: Add memory barriers for send / receive (bnc#885382).
* inet: add a redirect generation id in inetpeer (bnc#860593).
* inetpeer: initialize ->redirect_genid in inet_getpeer() (bnc#860593).
* ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645).
* kabi: hide bnc#860593 changes of struct inetpeer_addr_base
(bnc#860593).
* kernel: 3215 tty hang (bnc#891087, LTC#114562).
* kernel: fix data corruption when reading /proc/sysinfo (bnc#891087,
LTC#114480).
* kernel: fix kernel oops with load of fpc register (bnc#889061,
LTC#113596).
* kernel: sclp console tty reference counting (bnc#891087, LTC#115466).
* kexec: Disable at runtime if the kernel enforces module loading
restrictions (bnc#884333).
* md/raid6: avoid data corruption during recovery of double-degraded
RAID6.
* memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim
fix).
* memcg: do not expose uninitialized mem_cgroup_per_node to world
(bnc#883096).
* mm, hugetlb: add VM_NORESERVE check in vma_has_reserves()
* mm, hugetlb: change variable name reservations to resv
* mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache
* mm, hugetlb: defer freeing pages when gathering surplus pages
* mm, hugetlb: do not use a page in page cache for cow optimization
* mm, hugetlb: fix and clean-up node iteration code to alloc or free
* mm, hugetlb: fix race in region tracking
* mm, hugetlb: fix subpool accounting handling
* mm, hugetlb: improve page-fault scalability
* mm, hugetlb: improve, cleanup resv_map parameters
* mm, hugetlb: move up the code which check availability of free huge
page
* mm, hugetlb: protect reserved pages when soft offlining a hugepage
* mm, hugetlb: remove decrement_hugepage_resv_vma()
* mm, hugetlb: remove redundant list_empty check in
gather_surplus_pages()
* mm, hugetlb: remove resv_map_put
* mm, hugetlb: remove useless check about mapping type
* mm, hugetlb: return a reserved page to a reserved pool if failed
* mm, hugetlb: trivial commenting fix
* mm, hugetlb: unify region structure handling
* mm, hugetlb: unify region structure handling kabi
* mm, hugetlb: use long vars instead of int in region_count() (Hugetlb
Fault Scalability).
* mm, hugetlb: use vma_resv_map() map types
* mm, oom: fix badness score underflow (bnc#884582, bnc#884767).
* mm, oom: normalize oom scores to oom_score_adj scale only for
userspace (bnc#884582, bnc#884767).
* mm, thp: do not allow thp faults to avoid cpuset restrictions
(bnc#888849).
* net/mlx4_core: Load higher level modules according to ports type
(bnc#887680).
* net/mlx4_core: Load the IB driver when the device supports IBoE
(bnc#887680).
* net/mlx4_en: Fix a race between napi poll function and RX ring
cleanup (bnc#863586).
* net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058).
* net: fix checksumming features handling in output path (bnc#891259).
* pagecache_limit: batch large nr_to_scan targets (bnc#895221).
* pagecachelimit: reduce lru_lock congestion for heavy parallel
reclaim fix (bnc#895680).
* perf/core: Add weighted samples (bnc#876114).
* perf/x86: Add flags to event constraints (bnc#876114).
* perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114).
* perf: Add generic memory sampling interface (bnc#876114).
* qla2xxx: Avoid escalating the SCSI error handler if the command is
not found in firmware (bnc#859840).
* qla2xxx: Clear loop_id for ports that are marked lost during fabric
scanning (bnc#859840).
* qla2xxx: Does not check for firmware hung during the reset context
for ISP82XX (bnc#859840).
* qla2xxx: Issue abort command for outstanding commands during cleanup
when only firmware is alive (bnc#859840).
* qla2xxx: Reduce the time we wait for a command to complete during
SCSI error handling (bnc#859840).
* qla2xxx: Set host can_queue value based on available resources
(bnc#859840).
* restore smp_mb() in unlock_new_inode() (bnc#890526).
* s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061,
LTC#113725).
* sched: fix the theoretical signal_wake_up() vs schedule() race
(bnc#876055).
* sclp_vt220: Enable integrated ASCII console per default (bnc#885262,
LTC#112035).
* scsi_dh: use missing accessor "scsi_device_from_queue" (bnc#889614).
* scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608).
* scsiback: correct grant page unmapping.
* scsiback: fix retry handling in __report_luns().
* scsiback: free resources after error.
* sunrpc/auth: allow lockless (rcu) lookup of credential cache
(bnc#866130).
* supported.conf: remove external from drivers/net/veth (bnc#889727)
* supported.conf: support net/sched/act_police.ko (bnc#890426)
* tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921).
* tg3: Change nvram command timeout value to 50ms (bnc#855657).
* tg3: Override clock, link aware and link idle mode during NVRAM dump
(bnc#855657).
* tg3: Set the MAC clock to the fastest speed during boot code load
(bnc#855657).
* usb: Does not enable LPM if the exit latency is zero (bnc#832309).
* usbcore: Does not log on consecutive debounce failures of the same
port (bnc#888105).
* usbhid: fix PIXART optical mouse (bnc#888607).
* uswsusp: Disable when module loading is restricted (bnc#884333).
* vscsi: support larger transfer sizes (bnc#774818).
* writeback: Do not sync data dirtied after sync start (bnc#833820).
* x86 thermal: Delete power-limit-notification console messages
(bnc#882317).
* x86 thermal: Disable power limit notification interrupt by default
(bnc#882317).
* x86 thermal: Re-enable power limit notification interrupt by default
(bnc#882317).
* x86, cpu hotplug: Fix stack frame warning in
check_irq_vectors_for_cpu_disable() (bnc#887418).
* x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847).
* x86/UV: Add kdump to UV NMI handler (bnc#888847).
* x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847).
* x86/UV: Move NMI support (bnc#888847).
* x86/UV: Update UV support for external NMI signals (bnc#888847).
* x86/uv/nmi: Fix Sparse warnings (bnc#888847).
* x86: Add check for number of available vectors before CPU down
(bnc#887418).
* x86: Lock down IO port access when module security is enabled
(bnc#884333).
* x86: Restrict MSR access when module loading is restricted
(bnc#884333).
Security Issues:
* CVE-2013-1979
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979>
* CVE-2014-1739
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739>
* CVE-2014-2706
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706>
* CVE-2014-4027
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027>
* CVE-2014-4171
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171>
* CVE-2014-4508
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508>
* CVE-2014-4667
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667>
* CVE-2014-4943
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943>
* CVE-2014-5077
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077>
* CVE-2014-5471
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471>
* CVE-2014-5472
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472>
* CVE-2014-3153
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153>
* CVE-2014-6410
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410>
The SUSE Linux Enterprise 11 Service Pack 3 RealTime Extension kernel was
updated to fix various bugs and security issues.
Following security bugs were fixed: CVE-2013-1979: The scm_set_cred
function in include/net/scm.h in the Linux kernel before 3.8.11 uses
incorrect uid and gid values during credentials passing, which allows
local users to gain privileges via a crafted application (bnc#816708).
CVE-2014-1739: The media_device_enum_entities function in
drivers/media/media-device.c in the Linux kernel before 3.14.6 does not
initialize a certain data structure, which allows local users to obtain
sensitive information from kernel memory by leveraging /dev/media0 read
access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).
CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not
properly implement the interaction between range notification and hole
punching, which allows local users to cause a denial of service (i_mutex
hold) by using the mmap system call to access a hole, as demonstrated by
interfering with intended shmem activity by blocking completion of (1) an
MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call
(bnc#883518).
CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through
3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the
sep CPU feature flag is set, allows local users to cause a denial of
service (OOPS and system crash) via an invalid syscall number, as
demonstrated by number 1000 (bnc#883724).
CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c
in the Linux kernel before 3.15.2 does not properly manage a certain
backlog value, which allows remote attackers to cause a denial of service
(socket outage) via a crafted SCTP packet (bnc#885422).
CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux
kernel through 3.15.6 allows local users to gain privileges by leveraging
data-structure differences between an l2tp socket and an inet socket
(bnc#887082).
CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in
the Linux kernel through 3.15.8, when SCTP authentication is enabled,
allows remote attackers to cause a denial of service (NULL pointer
dereference and OOPS) by starting to establish an association between two
endpoints immediately after an exchange of INIT and INIT ACK chunks to
establish an earlier association between these endpoints in the opposite
direction (bnc#889173).
CVE-2014-5471: Stack consumption vulnerability in the
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux
kernel through 3.16.1 allows local users to cause a denial of service
(uncontrolled recursion, and system crash or reboot) via a crafted iso9660
image with a CL entry referring to a directory entry that has a CL entry.
(bnc#892490)
CVE-2014-5472: The parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to
cause a denial of service (unkillable mount process) via a crafted iso9660
image with a self-referential CL entry. (bnc#892490)
CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux
kernel before 3.13.7 allows remote attackers to cause a denial of service
(system crash) via network traffic that improperly interacts with the
WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and
tx.c. (bnc#871797)
CVE-2014-4027: The rd_build_device_space function in
drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not
properly initialize a certain data structure, which allows local users to
obtain sensitive information from ramdisk_mcp memory by leveraging access
to a SCSI initiator. (bnc#882639)
CVE-2014-3153 The futex_requeue function in kernel/futex.c in the Linux
kernel through 3.14.5 does not ensure that calls have two different futex
addresses, which allows local users to gain privileges via a crafted
FUTEX_REQUEUE command that facilitates unsafe waiter modification.
(bnc#880892)
CVE-2014-6410: Avoid infinite loop when processing indirect ICBs
(bnc#896689)
The following non-security bugs were fixed: - ACPI / PAD: call schedule()
when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset
register is implemented in system memory (bnc#882900). - ACPI: Limit
access to custom_method (bnc#884333). - ALSA: hda - Enabling Realtek ALC
671 codec (bnc#891746). - Add option to automatically enforce module
signatures when in Secure Boot mode (bnc#884333). - Add secure_modules()
call (bnc#884333).
- Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344). - Backported
new patches of Lock down functions for UEFI secure boot Also updated
series.conf and removed old patches. - Btrfs: Return EXDEV for cross
file system snapshot. - Btrfs: abort the transaction when we does not
find our extent ref. - Btrfs: avoid warning bomb of
btrfs_invalidate_inodes. - Btrfs: cancel scrub on transaction abortion.
- Btrfs: correctly set profile flags on seqlock retry. - Btrfs: does not
check nodes for extent items. - Btrfs: fix a possible deadlock between
scrub and transaction committing. - Btrfs: fix corruption after
write/fsync failure + fsync + log recovery (bnc#894200). - Btrfs: fix
csum tree corruption, duplicate and outdated checksums (bnc#891619). -
Btrfs: fix double free in find_lock_delalloc_range. - Btrfs: fix
possible memory leak in btrfs_create_tree(). - Btrfs: fix use of uninit
"ret" in end_extent_writepage(). - Btrfs: free delayed node outside of
root->inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to
anyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make
device scan less noisy. - Btrfs: make sure there are not any read
requests before stopping workers. - Btrfs: more efficient io tree
navigation on wait_extent_bit. - Btrfs: output warning instead of error
when loading free space cache failed. - Btrfs: retrieve more info from
FS_INFO ioctl. - Btrfs: return EPERM when deleting a default subvolume
(bnc#869934). - Btrfs: unset DCACHE_DISCONNECTED when mounting default
subvol (bnc#866615).
- Btrfs: use right type to get real comparison. - Btrfs: wake up
@scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread
upon remount. - CacheFiles: Add missing retrieval completions
(bnc#880344).
- CacheFiles: Does not try to dump the index key if the cookie has been
cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to
the allocator (bnc#880344). - CacheFiles: Fix the marking of cached
pages (bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). -
CacheFiles: Make some debugging statements conditional (bnc#880344). -
Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers:
hv: vmbus: Fix a bug in the channel callback dispatch code (bnc#886840).
- FS-Cache: Add transition to handle invalidate immediately after lookup
(bnc#880344). - FS-Cache: Check that there are no read ops when cookie
relinquished (bnc#880344). - FS-Cache: Clear remaining page count on
retrieval cancellation (bnc#880344). - FS-Cache: Convert the object
event ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep
in page release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does
not use spin_is_locked() in assertions (bnc#880344). - FS-Cache:
Exclusive op submission can BUG if there is been an I/O error
(bnc#880344). - FS-Cache: Fix __wait_on_atomic_t() to call the action
func if the counter != 0 (bnc#880344). - FS-Cache: Fix object state
machine to have separate work and wait states (bnc#880344). - FS-Cache:
Fix operation state management and accounting (bnc#880344). - FS-Cache:
Fix signal handling during waits (bnc#880344). - FS-Cache: Initialise
the object event mask with the calculated mask (bnc#880344). - FS-Cache:
Limit the number of I/O error reports for a cache (bnc#880344). -
FS-Cache: Make cookie relinquishment wait for outstanding reads
(bnc#880344). - FS-Cache: Mark cancellation of in-progress operation
(bnc#880344). - FS-Cache: One of the write operation paths doeses not
set the object state (bnc#880344). - FS-Cache: Provide proper
invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for
fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval
remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache:
Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on
object state (bnc#880344). - HID: usbhid: add always-poll quirk
(bnc#888607). - HID: usbhid: enable always-poll quirk for Elan
Touchscreen (bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling
(bnc#890297). - Ignore "flags" change to event_constraint (bnc#876114). -
Ignore data_src/weight changes to perf_sample_data (bnc#876114). - NFS:
Allow more
operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper
function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read
delegation stateids in setattr (bnc#888968). - NFS: Does not use a
delegation to open a file when returning that delegation (bnc#888968,
bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support
in line with code going upstream - NFS: Use FS-Cache invalidation
(bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130).
- NFS: avoid mountpoint being displayed as " (deleted)" in /proc/mounts
(bnc#888591). - NFS: nfs4_do_open should add negative results to the
dcache (bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache
to finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only
evaluate parent if it will be used (bnc#866130). - NFS: prepare for
RCU-walk support but pushing tests later in code (bnc#866130). - NFS:
support RCU_WALK in nfs_permission() (bnc#866130). - NFS: teach
nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130). - NFS: teach
nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130). - NFSD: Does
not hand out delegations for 30 seconds after recalling them
(bnc#880370). - NFSv4 set open access
operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200,
bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data
(bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). -
NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4:
Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return
value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename
nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call
if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the
struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the
same for replayed RPC calls (bnc#888968). - NFSv4:
nfs4_stateid_is_current should return "true" for an invalid stateid
(bnc#888968). - One more fix for kABI breakage. - PCI: Lock down BAR
access when module security is enabled (bnc#884333). - PCI: enable MPS
"performance" setting to properly handle bridge MPS (bnc#883376). - PM /
Hibernate: Add memory_rtree_find_bit function (bnc#860441). - PM /
Hibernate: Create a Radix-Tree to store memory bitmap (bnc#860441). - PM
/ Hibernate: Implement position keeping in radix tree (bnc#860441). - PM
/ Hibernate: Iterate over set bits instead of PFNs in swsusp_free()
(bnc#860441). - PM / Hibernate: Remove the old memory-bitmap
implementation (bnc#860441). - PM / Hibernate: Touch Soft Lockup Watchdog
in rtree_next_node (bnc#860441). - Restrict /dev/mem and /dev/kmem when
module loading is restricted (bnc#884333). - Reuse existing "state" field
to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: handle LPM
errors during device suspend correctly (bnc#849123). - Update kabi files
to reflect fscache change (bnc#880344) - Update x86_64 config files:
re-enable SENSORS_W83627EHF (bnc#891281) - VFS: Make more complete
truncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222]
ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi:
Ignore acpi_rsdp kernel parameter when module loading is restricted
(bnc#884333). - af_iucv: correct cleanup if listen backlog is full
(bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when
module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to
walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during
rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed
in autofs4_lookup_expiring (bnc#866130). - autofs4: factor
should_expire() out
of autofs4_expire_indirect (bnc#866130). - autofs4: make
"autofs4_can_expire" idempotent (bnc#866130). - autofs4: remove a
redundant assignment (bnc#866130). - autofs: fix lockref lookup
(bnc#888591). - be2net: add dma_mapping_error() check for dma_map_page()
(bnc#881759). - block: add cond_resched() to potentially long running
ioctl discard loop (bnc#884725). - block: fix race between request
completion and timeout handling (bnc#881051). - cdc-ether: clean packet
filter upon probe (bnc#876017). - cpuset: Fix memory allocator deadlock
(bnc#876590). - crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not
all archs have them, but some are FIPS certified, with some kernel
support. - crypto: fips
- only panic on bad/missing crypto mod signatures (bnc#887503). - crypto:
testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode
(bnc#889451). - dasd: validate request size before building CCW/TCW
(bnc#891087, LTC#114068). - dm mpath: fix race condition between
multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on
deleting sg device (bnc#870161). - drm/ast: AST2000 cannot be detected
correctly (bnc#895983). - drm/ast: Actually load DP501 firmware when
required (bnc#895608 bnc#871134). - drm/ast: Add missing entry to
dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide
screen mode (bnc#892723). - drm/ast: initial DP501 support (v0.2)
(bnc#871134). - drm/ast: open key before detect chips (bnc#895983). -
drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304). -
drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064). -
drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init (bnc#869055).
- drm/i915: create functions for the "unclaimed register" checks
(bnc#869055). - drm/i915: use FPGA_DBG for the "unclaimed register"
checks (bnc#869055). - drm/mgag200: Initialize data needed to map fbdev
memory (bnc #806990). - e1000e: enable support for new device IDs
(bnc#885509). - fs/fscache: remove spin_lock() from the condition in
while() (bnc#880344).
- hibernate: Disable in a signed modules environment (bnc#884333). -
hugetlb: does not use ERR_PTR with VM_FAULT* values - ibmvscsi: Abort
init sequence during error recovery (bnc#885382). - ibmvscsi: Add memory
barriers for send / receive (bnc#885382). - inet: add a redirect
generation id in inetpeer (bnc#860593). - inetpeer: initialize
->redirect_genid in inet_getpeer() (bnc#860593). - ipv6: tcp: fix
tcp_v6_conn_request() (bnc#887645). - kabi: hide bnc#860593 changes of
struct inetpeer_addr_base (bnc#860593). - kernel: 3215 tty hang
(bnc#891087, LTC#114562). - kernel: fix data corruption when reading
/proc/sysinfo (bnc#891087, LTC#114480). - kernel: fix kernel oops with
load of fpc register (bnc#889061, LTC#113596).
- kernel: sclp console tty reference counting (bnc#891087, LTC#115466). -
kexec: Disable at runtime if the kernel enforces module loading
restrictions (bnc#884333). - md/raid6: avoid data corruption during
recovery of double-degraded RAID6. - memcg, vmscan: Fix forced scan of
anonymous pages (memory reclaim fix). - memcg: do not expose
uninitialized mem_cgroup_per_node to world (bnc#883096). - mm, hugetlb:
add VM_NORESERVE check in vma_has_reserves() - mm, hugetlb: change
variable name reservations to resv - mm, hugetlb: decrement reserve
count if VM_NORESERVE alloc page cache - mm, hugetlb: defer freeing
pages when gathering surplus pages - mm, hugetlb: do not use a page in
page cache for cow optimization - mm, hugetlb: fix and clean-up node
iteration code to alloc or free - mm, hugetlb: fix race in region
tracking - mm, hugetlb: fix subpool accounting handling - mm, hugetlb:
improve page-fault scalability - mm, hugetlb: improve, cleanup resv_map
parameters - mm, hugetlb: move up the code which check availability of
free huge page - mm, hugetlb: protect reserved pages when soft offlining
a hugepage - mm, hugetlb: remove decrement_hugepage_resv_vma() - mm,
hugetlb: remove redundant list_empty check in gather_surplus_pages() -
mm, hugetlb: remove resv_map_put - mm, hugetlb: remove useless check
about mapping type - mm, hugetlb: return a reserved page to a reserved
pool if failed - mm, hugetlb: trivial commenting fix - mm, hugetlb:
unify region structure handling - mm, hugetlb: unify region structure
handling kabi - mm, hugetlb: use long vars instead of int in
region_count() (Hugetlb Fault Scalability). - mm, hugetlb: use
vma_resv_map() map types - mm, oom: fix badness score underflow
(bnc#884582, bnc#884767). - mm, oom: normalize oom scores to
oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm,
thp: do not allow thp faults to avoid cpuset restrictions (bnc#888849). -
net/mlx4_core: Load higher level modules according to ports type
(bnc#887680). - net/mlx4_core: Load the IB driver when the device
supports IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll
function and RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest
failing on non 10G link speed (bnc#888058). - net: fix checksumming
features handling in
output path (bnc#891259). - pagecache_limit: batch large nr_to_scan
targets (bnc#895221). - pagecachelimit: reduce lru_lock congestion for
heavy parallel reclaim fix (bnc#895680). - perf/core: Add weighted
samples (bnc#876114). - perf/x86: Add flags to event constraints
(bnc#876114). - perf/x86: Add memory profiling via PEBS Load Latency
(bnc#876114). - perf: Add generic memory sampling interface (bnc#876114).
- qla2xxx: Avoid escalating the SCSI error handler if the command is not
found in firmware (bnc#859840). - qla2xxx: Clear loop_id for ports that
are marked lost during fabric scanning (bnc#859840). - qla2xxx: Does not
check for firmware hung during the reset context for ISP82XX
(bnc#859840). - qla2xxx: Issue abort command for outstanding commands
during cleanup when only firmware is alive (bnc#859840). - qla2xxx:
Reduce the time we wait for a command to complete during SCSI error
handling (bnc#859840). - qla2xxx: Set host can_queue value based on
available resources (bnc#859840). - restore smp_mb() in
unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy IOTLB
flushing for DMA unmap (bnc#889061, LTC#113725). - sched: fix the
theoretical signal_wake_up() vs schedule() race (bnc#876055). -
sclp_vt220: Enable integrated ASCII console per default (bnc#885262,
LTC#112035). - scsi_dh: use missing accessor "scsi_device_from_queue"
(bnc#889614). - scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail
(bnc#887608). - scsiback: correct grant page unmapping. - scsiback: fix
retry handling in __report_luns(). - scsiback: free resources after
error. - sunrpc/auth: allow lockless (rcu) lookup of credential cache
(bnc#866130). - supported.conf: remove external from drivers/net/veth
(bnc#889727) - supported.conf: support net/sched/act_police.ko
(bnc#890426) - tcp: adapt selected parts of RFC 5682 and PRR logic
(bnc#879921). - tg3: Change nvram command timeout value to 50ms
(bnc#855657). - tg3: Override clock, link aware and link idle mode during
NVRAM dump (bnc#855657). - tg3: Set the MAC clock to the fastest speed
during boot code load (bnc#855657). - usb: Does not enable LPM if the
exit latency is zero (bnc#832309). - usbcore: Does not log on consecutive
debounce failures of the same port (bnc#888105). - usbhid: fix PIXART
optical mouse (bnc#888607). - uswsusp: Disable when module loading is
restricted (bnc#884333). - vscsi: support larger transfer sizes
(bnc#774818). - writeback: Do not sync data dirtied after sync start
(bnc#833820). - x86 thermal: Delete power-limit-notification console
messages (bnc#882317). - x86 thermal: Disable power limit notification
interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit
notification interrupt by default (bnc#882317). - x86, cpu hotplug: Fix
stack frame warning in check_irq_vectors_for_cpu_disable() (bnc#887418).
- x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847). - x86/UV:
Add kdump to UV NMI handler (bnc#888847). - x86/UV: Add summary of cpu
activity to UV NMI handler (bnc#888847). - x86/UV: Move NMI support
(bnc#888847). - x86/UV: Update UV support for external NMI signals
(bnc#888847). - x86/uv/nmi: Fix Sparse warnings (bnc#888847). - x86: Add
check for number
of available vectors before CPU down (bnc#887418). - x86: Lock down IO
port access when module security is enabled (bnc#884333). - x86: Restrict
MSR access when module loading is restricted (bnc#884333).
Security Issues:
* CVE-2013-1979
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979>
* CVE-2014-1739
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739>
* CVE-2014-2706
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706>
* CVE-2014-4027
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027>
* CVE-2014-4171
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171>
* CVE-2014-4508
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508>
* CVE-2014-4667
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667>
* CVE-2014-4943
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943>
* CVE-2014-5077
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077>
* CVE-2014-5471
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471>
* CVE-2014-5472
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472>
* CVE-2014-3153
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153>
* CVE-2014-6410
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410>
Indications:
Everyone using the Real Time Linux Kernel on x86_64 architecture should update.
Contraindications:
Indications:
Everyone using the Real Time Linux Kernel on x86_64 architecture should update.
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-kernel-9746 slessp3-kernel-9751
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-kernel-9746 slessp3-kernel-9747 slessp3-kernel-9748 slessp3-kernel-9749 slessp3-kernel-9751
- SUSE Linux Enterprise Real Time Extension 11 SP3:
zypper in -t patch slertesp3-kernel-9772
- SUSE Linux Enterprise High Availability Extension 11 SP3:
zypper in -t patch slehasp3-kernel-9746 slehasp3-kernel-9747 slehasp3-kernel-9748 slehasp3-kernel-9749 slehasp3-kernel-9751
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-kernel-9746 sledsp3-kernel-9751
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 3.0.101]:
kernel-default-3.0.101-0.40.1
kernel-default-base-3.0.101-0.40.1
kernel-default-devel-3.0.101-0.40.1
kernel-source-3.0.101-0.40.1
kernel-syms-3.0.101-0.40.1
kernel-trace-3.0.101-0.40.1
kernel-trace-base-3.0.101-0.40.1
kernel-trace-devel-3.0.101-0.40.1
kernel-xen-devel-3.0.101-0.40.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586) [New Version: 3.0.101]:
kernel-pae-3.0.101-0.40.1
kernel-pae-base-3.0.101-0.40.1
kernel-pae-devel-3.0.101-0.40.1
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 3.0.101]:
kernel-default-3.0.101-0.40.1
kernel-default-base-3.0.101-0.40.1
kernel-default-devel-3.0.101-0.40.1
kernel-source-3.0.101-0.40.1
kernel-syms-3.0.101-0.40.1
kernel-trace-3.0.101-0.40.1
kernel-trace-base-3.0.101-0.40.1
kernel-trace-devel-3.0.101-0.40.1
- SUSE Linux Enterprise Server 11 SP3 (i586 x86_64) [New Version: 3.0.101]:
kernel-ec2-3.0.101-0.40.1
kernel-ec2-base-3.0.101-0.40.1
kernel-ec2-devel-3.0.101-0.40.1
kernel-xen-3.0.101-0.40.1
kernel-xen-base-3.0.101-0.40.1
kernel-xen-devel-3.0.101-0.40.1
xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3
- SUSE Linux Enterprise Server 11 SP3 (s390x) [New Version: 3.0.101]:
kernel-default-man-3.0.101-0.40.1
- SUSE Linux Enterprise Server 11 SP3 (ppc64) [New Version: 3.0.101]:
kernel-ppc64-3.0.101-0.40.1
kernel-ppc64-base-3.0.101-0.40.1
kernel-ppc64-devel-3.0.101-0.40.1
- SUSE Linux Enterprise Server 11 SP3 (i586) [New Version: 3.0.101]:
kernel-pae-3.0.101-0.40.1
kernel-pae-base-3.0.101-0.40.1
kernel-pae-devel-3.0.101-0.40.1
xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3
- SUSE Linux Enterprise Real Time Extension 11 SP3 (x86_64) [New Version: 3.0.101.rt130]:
cluster-network-kmp-rt-1.4_3.0.101_rt130_0.28-2.27.99
cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.28-2.27.99
drbd-kmp-rt-8.4.4_3.0.101_rt130_0.28-0.22.65
drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.28-0.22.65
iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.28-0.38.84
iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.28-0.38.84
kernel-rt-3.0.101.rt130-0.28.1
kernel-rt-base-3.0.101.rt130-0.28.1
kernel-rt-devel-3.0.101.rt130-0.28.1
kernel-rt_trace-3.0.101.rt130-0.28.1
kernel-rt_trace-base-3.0.101.rt130-0.28.1
kernel-rt_trace-devel-3.0.101.rt130-0.28.1
kernel-source-rt-3.0.101.rt130-0.28.1
kernel-syms-rt-3.0.101.rt130-0.28.1
lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.28-0.11.75
lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.28-0.11.75
ocfs2-kmp-rt-1.6_3.0.101_rt130_0.28-0.20.99
ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.28-0.20.99
ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.28-0.13.90
ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.28-0.13.90
- SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 ia64 ppc64 s390x x86_64):
cluster-network-kmp-default-1.4_3.0.101_0.40-2.27.98
cluster-network-kmp-trace-1.4_3.0.101_0.40-2.27.98
gfs2-kmp-default-2_3.0.101_0.40-0.16.104
gfs2-kmp-trace-2_3.0.101_0.40-0.16.104
ocfs2-kmp-default-1.6_3.0.101_0.40-0.20.98
ocfs2-kmp-trace-1.6_3.0.101_0.40-0.20.98
- SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 x86_64):
cluster-network-kmp-xen-1.4_3.0.101_0.40-2.27.98
gfs2-kmp-xen-2_3.0.101_0.40-0.16.104
ocfs2-kmp-xen-1.6_3.0.101_0.40-0.20.98
- SUSE Linux Enterprise High Availability Extension 11 SP3 (ppc64):
cluster-network-kmp-ppc64-1.4_3.0.101_0.40-2.27.98
gfs2-kmp-ppc64-2_3.0.101_0.40-0.16.104
ocfs2-kmp-ppc64-1.6_3.0.101_0.40-0.20.98
- SUSE Linux Enterprise High Availability Extension 11 SP3 (i586):
cluster-network-kmp-pae-1.4_3.0.101_0.40-2.27.98
gfs2-kmp-pae-2_3.0.101_0.40-0.16.104
ocfs2-kmp-pae-1.6_3.0.101_0.40-0.20.98
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 3.0.101]:
kernel-default-3.0.101-0.40.1
kernel-default-base-3.0.101-0.40.1
kernel-default-devel-3.0.101-0.40.1
kernel-default-extra-3.0.101-0.40.1
kernel-source-3.0.101-0.40.1
kernel-syms-3.0.101-0.40.1
kernel-trace-devel-3.0.101-0.40.1
kernel-xen-3.0.101-0.40.1
kernel-xen-base-3.0.101-0.40.1
kernel-xen-devel-3.0.101-0.40.1
kernel-xen-extra-3.0.101-0.40.1
xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3
- SUSE Linux Enterprise Desktop 11 SP3 (i586) [New Version: 3.0.101]:
kernel-pae-3.0.101-0.40.1
kernel-pae-base-3.0.101-0.40.1
kernel-pae-devel-3.0.101-0.40.1
kernel-pae-extra-3.0.101-0.40.1
xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3
- SLE 11 SERVER Unsupported Extras (i586 ia64 ppc64 s390x x86_64):
kernel-default-extra-3.0.101-0.40.1
- SLE 11 SERVER Unsupported Extras (i586 x86_64):
kernel-xen-extra-3.0.101-0.40.1
- SLE 11 SERVER Unsupported Extras (ppc64):
kernel-ppc64-extra-3.0.101-0.40.1
- SLE 11 SERVER Unsupported Extras (i586):
kernel-pae-extra-3.0.101-0.40.1
References:
http://support.novell.com/security/cve/CVE-2013-1979.html
http://support.novell.com/security/cve/CVE-2014-1739.html
http://support.novell.com/security/cve/CVE-2014-2706.html
http://support.novell.com/security/cve/CVE-2014-3153.html
http://support.novell.com/security/cve/CVE-2014-4027.html
http://support.novell.com/security/cve/CVE-2014-4171.html
http://support.novell.com/security/cve/CVE-2014-4508.html
http://support.novell.com/security/cve/CVE-2014-4667.html
http://support.novell.com/security/cve/CVE-2014-4943.html
http://support.novell.com/security/cve/CVE-2014-5077.html
http://support.novell.com/security/cve/CVE-2014-5471.html
http://support.novell.com/security/cve/CVE-2014-5472.html
http://support.novell.com/security/cve/CVE-2014-6410.html
https://bugzilla.suse.com/show_bug.cgi?id=774818
https://bugzilla.suse.com/show_bug.cgi?id=806990
https://bugzilla.suse.com/show_bug.cgi?id=816708
https://bugzilla.suse.com/show_bug.cgi?id=826486
https://bugzilla.suse.com/show_bug.cgi?id=832309
https://bugzilla.suse.com/show_bug.cgi?id=833820
https://bugzilla.suse.com/show_bug.cgi?id=849123
https://bugzilla.suse.com/show_bug.cgi?id=855657
https://bugzilla.suse.com/show_bug.cgi?id=859840
https://bugzilla.suse.com/show_bug.cgi?id=860441
https://bugzilla.suse.com/show_bug.cgi?id=860593
https://bugzilla.suse.com/show_bug.cgi?id=863586
https://bugzilla.suse.com/show_bug.cgi?id=866130
https://bugzilla.suse.com/show_bug.cgi?id=866615
https://bugzilla.suse.com/show_bug.cgi?id=866864
https://bugzilla.suse.com/show_bug.cgi?id=866911
https://bugzilla.suse.com/show_bug.cgi?id=869055
https://bugzilla.suse.com/show_bug.cgi?id=869934
https://bugzilla.suse.com/show_bug.cgi?id=870161
https://bugzilla.suse.com/show_bug.cgi?id=871134
https://bugzilla.suse.com/show_bug.cgi?id=871797
https://bugzilla.suse.com/show_bug.cgi?id=876017
https://bugzilla.suse.com/show_bug.cgi?id=876055
https://bugzilla.suse.com/show_bug.cgi?id=876114
https://bugzilla.suse.com/show_bug.cgi?id=876590
https://bugzilla.suse.com/show_bug.cgi?id=879304
https://bugzilla.suse.com/show_bug.cgi?id=879921
https://bugzilla.suse.com/show_bug.cgi?id=880344
https://bugzilla.suse.com/show_bug.cgi?id=880370
https://bugzilla.suse.com/show_bug.cgi?id=880892
https://bugzilla.suse.com/show_bug.cgi?id=881051
https://bugzilla.suse.com/show_bug.cgi?id=881759
https://bugzilla.suse.com/show_bug.cgi?id=882317
https://bugzilla.suse.com/show_bug.cgi?id=882639
https://bugzilla.suse.com/show_bug.cgi?id=882804
https://bugzilla.suse.com/show_bug.cgi?id=882900
https://bugzilla.suse.com/show_bug.cgi?id=883096
https://bugzilla.suse.com/show_bug.cgi?id=883376
https://bugzilla.suse.com/show_bug.cgi?id=883518
https://bugzilla.suse.com/show_bug.cgi?id=883724
https://bugzilla.suse.com/show_bug.cgi?id=884333
https://bugzilla.suse.com/show_bug.cgi?id=884582
https://bugzilla.suse.com/show_bug.cgi?id=884725
https://bugzilla.suse.com/show_bug.cgi?id=884767
https://bugzilla.suse.com/show_bug.cgi?id=885262
https://bugzilla.suse.com/show_bug.cgi?id=885382
https://bugzilla.suse.com/show_bug.cgi?id=885422
https://bugzilla.suse.com/show_bug.cgi?id=885509
https://bugzilla.suse.com/show_bug.cgi?id=886840
https://bugzilla.suse.com/show_bug.cgi?id=887082
https://bugzilla.suse.com/show_bug.cgi?id=887418
https://bugzilla.suse.com/show_bug.cgi?id=887503
https://bugzilla.suse.com/show_bug.cgi?id=887608
https://bugzilla.suse.com/show_bug.cgi?id=887645
https://bugzilla.suse.com/show_bug.cgi?id=887680
https://bugzilla.suse.com/show_bug.cgi?id=888058
https://bugzilla.suse.com/show_bug.cgi?id=888105
https://bugzilla.suse.com/show_bug.cgi?id=888591
https://bugzilla.suse.com/show_bug.cgi?id=888607
https://bugzilla.suse.com/show_bug.cgi?id=888847
https://bugzilla.suse.com/show_bug.cgi?id=888849
https://bugzilla.suse.com/show_bug.cgi?id=888968
https://bugzilla.suse.com/show_bug.cgi?id=889061
https://bugzilla.suse.com/show_bug.cgi?id=889173
https://bugzilla.suse.com/show_bug.cgi?id=889451
https://bugzilla.suse.com/show_bug.cgi?id=889614
https://bugzilla.suse.com/show_bug.cgi?id=889727
https://bugzilla.suse.com/show_bug.cgi?id=890297
https://bugzilla.suse.com/show_bug.cgi?id=890426
https://bugzilla.suse.com/show_bug.cgi?id=890513
https://bugzilla.suse.com/show_bug.cgi?id=890526
https://bugzilla.suse.com/show_bug.cgi?id=891087
https://bugzilla.suse.com/show_bug.cgi?id=891259
https://bugzilla.suse.com/show_bug.cgi?id=891281
https://bugzilla.suse.com/show_bug.cgi?id=891619
https://bugzilla.suse.com/show_bug.cgi?id=891746
https://bugzilla.suse.com/show_bug.cgi?id=892200
https://bugzilla.suse.com/show_bug.cgi?id=892490
https://bugzilla.suse.com/show_bug.cgi?id=892723
https://bugzilla.suse.com/show_bug.cgi?id=893064
https://bugzilla.suse.com/show_bug.cgi?id=893496
https://bugzilla.suse.com/show_bug.cgi?id=893596
https://bugzilla.suse.com/show_bug.cgi?id=894200
https://bugzilla.suse.com/show_bug.cgi?id=895221
https://bugzilla.suse.com/show_bug.cgi?id=895608
https://bugzilla.suse.com/show_bug.cgi?id=895680
https://bugzilla.suse.com/show_bug.cgi?id=895983
https://bugzilla.suse.com/show_bug.cgi?id=896689
http://download.suse.com/patch/finder/?keywords=01c0bdf9329bf1fbfc034fc0095…
http://download.suse.com/patch/finder/?keywords=1439dbce4e4c9644db358f75319…
http://download.suse.com/patch/finder/?keywords=1a668c9859986c2300a5f27acf2…
http://download.suse.com/patch/finder/?keywords=4af5f794a265afdfe45a95f7032…
http://download.suse.com/patch/finder/?keywords=5e4143f9e1829ed4b39a7eccffa…
http://download.suse.com/patch/finder/?keywords=81ea8f0b23808daa3ce30dda8a9…
http://download.suse.com/patch/finder/?keywords=9a4508f548dca82be59620eeabe…
http://download.suse.com/patch/finder/?keywords=9f2f8b759827a980e4f998aef65…
http://download.suse.com/patch/finder/?keywords=c2937e35f763f2736ed1acf1055…
http://download.suse.com/patch/finder/?keywords=ec3b4fdfc28b3e5b31314cd6b64…
http://download.suse.com/patch/finder/?keywords=fe96acccaeb363ead4fc832ed39…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:1316-1: important: Security update for Linux kernel
by opensuse-security@opensuse.org 22 Oct '14
by opensuse-security@opensuse.org 22 Oct '14
22 Oct '14
SUSE Security Update: Security update for Linux kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1316-1
Rating: important
References: #774818 #806990 #816708 #826486 #832309 #849123
#855657 #859840 #860441 #860593 #863586 #866130
#866615 #866864 #866911 #869055 #869934 #870161
#871797 #876017 #876055 #876114 #876590 #879921
#880344 #880370 #881051 #881759 #882317 #882639
#882804 #882900 #883376 #883518 #883724 #884333
#884582 #884725 #884767 #885262 #885382 #885422
#885509 #886840 #887082 #887503 #887608 #887645
#887680 #888058 #888105 #888591 #888607 #888847
#888849 #888968 #889061 #889173 #889451 #889614
#889727 #890297 #890426 #890513 #890526 #891087
#891259 #891619 #892200 #892490 #892723 #893064
#893496 #893596 #894200
Cross-References: CVE-2013-1979 CVE-2014-1739 CVE-2014-2706
CVE-2014-4027 CVE-2014-4171 CVE-2014-4508
CVE-2014-4667 CVE-2014-4943 CVE-2014-5077
CVE-2014-5471 CVE-2014-5472
Affected Products:
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise High Availability Extension 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
SLE 11 SERVER Unsupported Extras
______________________________________________________________________________
An update that solves 11 vulnerabilities and has 64 fixes
is now available.
Description:
The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix
various bugs and security issues.
The following security bugs have been fixed:
*
CVE-2014-1739: The media_device_enum_entities function in
drivers/media/media-device.c in the Linux kernel before 3.14.6 does not
initialize a certain data structure, which allows local users to
obtain sensitive information from kernel memory by leveraging
/dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call
(bnc#882804).
*
CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does
not properly implement the interaction between range notification and hole
punching, which allows local users to cause a denial of service (i_mutex
hold) by using the mmap system call to access a hole, as demonstrated by
interfering with intended shmem activity by blocking completion of (1) an
MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call
(bnc#883518).
*
CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel
through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled
and the sep CPU feature flag is set, allows local users to cause a denial
of service (OOPS and system crash) via an invalid syscall number, as
demonstrated by number 1000 (bnc#883724).
*
CVE-2014-4667: The sctp_association_free function in
net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly
manage a certain backlog value, which allows remote attackers to cause a
denial of service (socket outage) via a crafted SCTP packet (bnc#885422).
*
CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the
Linux kernel through 3.15.6 allows local users to gain privileges by
leveraging data-structure differences between an l2tp socket and an inet
socket (bnc#887082).
*
CVE-2014-5077: The sctp_assoc_update function in
net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP
authentication is enabled, allows remote attackers to cause a denial of
service (NULL pointer dereference and OOPS) by starting to establish an
association between two endpoints immediately after an exchange of INIT
and INIT ACK chunks to establish an earlier association between these
endpoints in the opposite direction (bnc#889173).
*
CVE-2014-5471: Stack consumption vulnerability in the
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux
kernel through 3.16.1 allows local users to cause a denial of service
(uncontrolled recursion, and system crash or reboot) via a crafted iso9660
image with a CL entry referring to a directory entry that has a CL entry.
(bnc#892490)
*
CVE-2014-5472: The parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to
cause a denial of service (unkillable mount process) via a crafted iso9660
image with a self-referential CL entry. (bnc#892490)
*
CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux
kernel before 3.13.7 allows remote attackers to cause a denial of service
(system crash) via network traffic that improperly interacts with the
WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and
tx.c. (bnc#871797)
*
CVE-2014-4027: The rd_build_device_space function in
drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not
properly initialize a certain data structure, which allows local users to
obtain sensitive information from ramdisk_mcp memory by leveraging access
to a SCSI initiator. (bnc#882639)
*
CVE-2014-3153 The futex_requeue function in kernel/futex.c in the
Linux kernel through 3.14.5 does not ensure that calls have two different
futex addresses, which allows local users to gain privileges via a crafted
FUTEX_REQUEUE command that facilitates unsafe waiter modification.
(bnc#880892)
*
CVE-2014-6410: Avoid infinite loop when processing indirect ICBs
(bnc#896689)
The following non-security bugs have been fixed:
* ACPI / PAD: call schedule() when need_resched() is true (bnc#866911).
* ACPI: Fix bug when ACPI reset register is implemented in system
memory (bnc#882900).
* ACPI: Limit access to custom_method (bnc#884333).
* ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746).
* Add option to automatically enforce module signatures when in Secure
Boot mode (bnc#884333).
* Add secure_modules() call (bnc#884333).
* Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344).
* Backported new patches of Lock down functions for UEFI secure boot
Also updated series.conf and removed old patches.
* Btrfs: Return EXDEV for cross file system snapshot.
* Btrfs: abort the transaction when we does not find our extent ref.
* Btrfs: avoid warning bomb of btrfs_invalidate_inodes.
* Btrfs: cancel scrub on transaction abortion.
* Btrfs: correctly set profile flags on seqlock retry.
* Btrfs: does not check nodes for extent items.
* Btrfs: fix a possible deadlock between scrub and transaction
committing.
* Btrfs: fix corruption after write/fsync failure + fsync + log
recovery (bnc#894200).
* Btrfs: fix csum tree corruption, duplicate and outdated checksums
(bnc#891619).
* Btrfs: fix double free in find_lock_delalloc_range.
* Btrfs: fix possible memory leak in btrfs_create_tree().
* Btrfs: fix use of uninit "ret" in end_extent_writepage().
* Btrfs: free delayed node outside of root->inode_lock (bnc#866864).
* Btrfs: make DEV_INFO ioctl available to anyone.
* Btrfs: make FS_INFO ioctl available to anyone.
* Btrfs: make device scan less noisy.
* Btrfs: make sure there are not any read requests before stopping
workers.
* Btrfs: more efficient io tree navigation on wait_extent_bit.
* Btrfs: output warning instead of error when loading free space cache
failed.
* Btrfs: retrieve more info from FS_INFO ioctl.
* Btrfs: return EPERM when deleting a default subvolume (bnc#869934).
* Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol
(bnc#866615).
* Btrfs: use right type to get real comparison.
* Btrfs: wake up @scrub_pause_wait as much as we can.
* Btrfs: wake up transaction thread upon remount.
* CacheFiles: Add missing retrieval completions (bnc#880344).
* CacheFiles: Does not try to dump the index key if the cookie has
been cleared (bnc#880344).
* CacheFiles: Downgrade the requirements passed to the allocator
(bnc#880344).
* CacheFiles: Fix the marking of cached pages (bnc#880344).
* CacheFiles: Implement invalidation (bnc#880344).
* CacheFiles: Make some debugging statements conditional (bnc#880344).
* Drivers: hv: util: Fix a bug in the KVP code (bnc#886840).
* Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code
(bnc#886840).
* FS-Cache: Add transition to handle invalidate immediately after
lookup (bnc#880344).
* FS-Cache: Check that there are no read ops when cookie relinquished
(bnc#880344).
* FS-Cache: Clear remaining page count on retrieval cancellation
(bnc#880344).
* FS-Cache: Convert the object event ID #defines into an enum
(bnc#880344).
* FS-Cache: Does not sleep in page release if __GFP_FS is not set
(bnc#880344).
* FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344).
* FS-Cache: Exclusive op submission can BUG if there is been an I/O
error (bnc#880344).
* FS-Cache: Fix __wait_on_atomic_t() to call the action func if the
counter != 0 (bnc#880344).
* FS-Cache: Fix object state machine to have separate work and wait
states (bnc#880344).
* FS-Cache: Fix operation state management and accounting (bnc#880344).
* FS-Cache: Fix signal handling during waits (bnc#880344).
* FS-Cache: Initialise the object event mask with the calculated mask
(bnc#880344).
* FS-Cache: Limit the number of I/O error reports for a cache
(bnc#880344).
* FS-Cache: Make cookie relinquishment wait for outstanding reads
(bnc#880344).
* FS-Cache: Mark cancellation of in-progress operation (bnc#880344).
* FS-Cache: One of the write operation paths doeses not set the object
state (bnc#880344).
* FS-Cache: Provide proper invalidation (bnc#880344).
* FS-Cache: Simplify cookie retention for fscache_objects, fixing oops
(bnc#880344).
* FS-Cache: The retrieval remaining-pages counter needs to be atomic_t
(bnc#880344).
* FS-Cache: Uninline fscache_object_init() (bnc#880344).
* FS-Cache: Wrap checks on object state (bnc#880344).
* HID: usbhid: add always-poll quirk (bnc#888607).
* HID: usbhid: enable always-poll quirk for Elan Touchscreen
(bnc#888607).
* IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297).
* Ignore "flags" change to event_constraint (bnc#876114).
* Ignore data_src/weight changes to perf_sample_data (bnc#876114).
* NFS: Allow more operations in an NFSv4.1 request (bnc#890513).
* NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968).
* NFS: Does not copy read delegation stateids in setattr (bnc#888968).
* NFS: Does not use a delegation to open a file when returning that
delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496)
* NFS: Fixes for NFS RCU-walk support in line with code going upstream
* NFS: Use FS-Cache invalidation (bnc#880344).
* NFS: allow lockless access to access_cache (bnc#866130).
* NFS: avoid mountpoint being displayed as " (deleted)" in
/proc/mounts (bnc#888591).
* NFS: nfs4_do_open should add negative results to the dcache
(bnc#866130).
* NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a
page (bnc#880344).
* NFS: nfs_open_revalidate: only evaluate parent if it will be used
(bnc#866130).
* NFS: prepare for RCU-walk support but pushing tests later in code
(bnc#866130).
* NFS: support RCU_WALK in nfs_permission() (bnc#866130).
* NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130).
* NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130).
* NFSD: Does not hand out delegations for 30 seconds after recalling
them (bnc#880370).
* NFSv4 set open access operation call flag in nfs4_init_opendata_res
(bnc#888968, bnc#892200, bnc#893596, bnc#893496).
* NFSv4: Add a helper for encoding opaque data (bnc#888968).
* NFSv4: Add a helper for encoding stateids (bnc#888968).
* NFSv4: Add helpers for basic copying of stateids (bnc#888968).
* NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968).
* NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968).
* NFSv4: Rename nfs4_copy_stateid() (bnc#888968).
* NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an
error (bnc#888968).
* NFSv4: Simplify the struct nfs4_stateid (bnc#888968).
* NFSv4: The stateid must remain the same for replayed RPC calls
(bnc#888968).
* NFSv4: nfs4_stateid_is_current should return "true" for an invalid
stateid (bnc#888968).
* One more fix for kABI breakage.
* PCI: Lock down BAR access when module security is enabled
(bnc#884333).
* PCI: enable MPS "performance" setting to properly handle bridge MPS
(bnc#883376).
* PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441).
* PM / Hibernate: Create a Radix-Tree to store memory bitmap
(bnc#860441).
* PM / Hibernate: Implement position keeping in radix tree
(bnc#860441).
* PM / Hibernate: Iterate over set bits instead of PFNs in
swsusp_free() (bnc#860441).
* PM / Hibernate: Remove the old memory-bitmap implementation
(bnc#860441).
* PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node
(bnc#860441).
* Restrict /dev/mem and /dev/kmem when module loading is restricted
(bnc#884333).
* Reuse existing "state" field to indicate PERF_X86_EVENT_PEBS_LDLAT
(bnc#876114).
* USB: handle LPM errors during device suspend correctly (bnc#849123).
* Update kabi files to reflect fscache change (bnc#880344)
* Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281)
* VFS: Make more complete truncate operation available to CacheFiles
(bnc#880344).
* [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366,
ltc#83367).
* acpi: Ignore acpi_rsdp kernel parameter when module loading is
restricted (bnc#884333).
* af_iucv: correct cleanup if listen backlog is full (bnc#885262,
LTC#111728).
* asus-wmi: Restrict debugfs interface when module loading is
restricted (bnc#884333).
* autofs4: allow RCU-walk to walk through autofs4 (bnc#866130).
* autofs4: avoid taking fs_lock during rcu-walk (bnc#866130).
* autofs4: does not take spinlock when not needed in
autofs4_lookup_expiring (bnc#866130).
* autofs4: factor should_expire() out of autofs4_expire_indirect
(bnc#866130).
* autofs4: make "autofs4_can_expire" idempotent (bnc#866130).
* autofs4: remove a redundant assignment (bnc#866130).
* autofs: fix lockref lookup (bnc#888591).
* be2net: add dma_mapping_error() check for dma_map_page()
(bnc#881759).
* block: add cond_resched() to potentially long running ioctl discard
loop (bnc#884725).
* block: fix race between request completion and timeout handling
(bnc#881051).
* cdc-ether: clean packet filter upon probe (bnc#876017).
* cpuset: Fix memory allocator deadlock (bnc#876590).
* crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs
have them, but some are FIPS certified, with some kernel support.
* crypto: fips - only panic on bad/missing crypto mod signatures
(bnc#887503).
* crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips
mode (bnc#889451).
* dasd: validate request size before building CCW/TCW (bnc#891087,
LTC#114068).
* dm mpath: fix race condition between multipath_dtr and pg_init_done
(bnc#826486).
* dm-mpath: fix panic on deleting sg device (bnc#870161).
* drm/ast: AST2000 cannot be detected correctly (bnc#895983).
* drm/ast: Actually load DP501 firmware when required (bnc#895608
bnc#871134).
* drm/ast: Add missing entry to dclk_table[].
* drm/ast: Add reduced non reduced mode parsing for wide screen mode
(bnc#892723).
* drm/ast: initial DP501 support (v0.2) (bnc#871134).
* drm/ast: open key before detect chips (bnc#895983).
* drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304).
* drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064).
* drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init
(bnc#869055).
* drm/i915: create functions for the "unclaimed register" checks
(bnc#869055).
* drm/i915: use FPGA_DBG for the "unclaimed register" checks
(bnc#869055).
* drm/mgag200: Initialize data needed to map fbdev memory (bnc
#806990).
* e1000e: enable support for new device IDs (bnc#885509).
* fs/fscache: remove spin_lock() from the condition in while()
(bnc#880344).
* hibernate: Disable in a signed modules environment (bnc#884333).
* hugetlb: does not use ERR_PTR with VM_FAULT* values
* ibmvscsi: Abort init sequence during error recovery (bnc#885382).
* ibmvscsi: Add memory barriers for send / receive (bnc#885382).
* inet: add a redirect generation id in inetpeer (bnc#860593).
* inetpeer: initialize ->redirect_genid in inet_getpeer() (bnc#860593).
* ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645).
* kabi: hide bnc#860593 changes of struct inetpeer_addr_base
(bnc#860593).
* kernel: 3215 tty hang (bnc#891087, LTC#114562).
* kernel: fix data corruption when reading /proc/sysinfo (bnc#891087,
LTC#114480).
* kernel: fix kernel oops with load of fpc register (bnc#889061,
LTC#113596).
* kernel: sclp console tty reference counting (bnc#891087, LTC#115466).
* kexec: Disable at runtime if the kernel enforces module loading
restrictions (bnc#884333).
* md/raid6: avoid data corruption during recovery of double-degraded
RAID6.
* memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim
fix).
* memcg: do not expose uninitialized mem_cgroup_per_node to world
(bnc#883096).
* mm, hugetlb: add VM_NORESERVE check in vma_has_reserves()
* mm, hugetlb: change variable name reservations to resv
* mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache
* mm, hugetlb: defer freeing pages when gathering surplus pages
* mm, hugetlb: do not use a page in page cache for cow optimization
* mm, hugetlb: fix and clean-up node iteration code to alloc or free
* mm, hugetlb: fix race in region tracking
* mm, hugetlb: fix subpool accounting handling
* mm, hugetlb: improve page-fault scalability
* mm, hugetlb: improve, cleanup resv_map parameters
* mm, hugetlb: move up the code which check availability of free huge
page
* mm, hugetlb: protect reserved pages when soft offlining a hugepage
* mm, hugetlb: remove decrement_hugepage_resv_vma()
* mm, hugetlb: remove redundant list_empty check in
gather_surplus_pages()
* mm, hugetlb: remove resv_map_put
* mm, hugetlb: remove useless check about mapping type
* mm, hugetlb: return a reserved page to a reserved pool if failed
* mm, hugetlb: trivial commenting fix
* mm, hugetlb: unify region structure handling
* mm, hugetlb: unify region structure handling kabi
* mm, hugetlb: use long vars instead of int in region_count() (Hugetlb
Fault Scalability).
* mm, hugetlb: use vma_resv_map() map types
* mm, oom: fix badness score underflow (bnc#884582, bnc#884767).
* mm, oom: normalize oom scores to oom_score_adj scale only for
userspace (bnc#884582, bnc#884767).
* mm, thp: do not allow thp faults to avoid cpuset restrictions
(bnc#888849).
* net/mlx4_core: Load higher level modules according to ports type
(bnc#887680).
* net/mlx4_core: Load the IB driver when the device supports IBoE
(bnc#887680).
* net/mlx4_en: Fix a race between napi poll function and RX ring
cleanup (bnc#863586).
* net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058).
* net: fix checksumming features handling in output path (bnc#891259).
* pagecache_limit: batch large nr_to_scan targets (bnc#895221).
* pagecachelimit: reduce lru_lock congestion for heavy parallel
reclaim fix (bnc#895680).
* perf/core: Add weighted samples (bnc#876114).
* perf/x86: Add flags to event constraints (bnc#876114).
* perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114).
* perf: Add generic memory sampling interface (bnc#876114).
* qla2xxx: Avoid escalating the SCSI error handler if the command is
not found in firmware (bnc#859840).
* qla2xxx: Clear loop_id for ports that are marked lost during fabric
scanning (bnc#859840).
* qla2xxx: Does not check for firmware hung during the reset context
for ISP82XX (bnc#859840).
* qla2xxx: Issue abort command for outstanding commands during cleanup
when only firmware is alive (bnc#859840).
* qla2xxx: Reduce the time we wait for a command to complete during
SCSI error handling (bnc#859840).
* qla2xxx: Set host can_queue value based on available resources
(bnc#859840).
* restore smp_mb() in unlock_new_inode() (bnc#890526).
* s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061,
LTC#113725).
* sched: fix the theoretical signal_wake_up() vs schedule() race
(bnc#876055).
* sclp_vt220: Enable integrated ASCII console per default (bnc#885262,
LTC#112035).
* scsi_dh: use missing accessor "scsi_device_from_queue" (bnc#889614).
* scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608).
* scsiback: correct grant page unmapping.
* scsiback: fix retry handling in __report_luns().
* scsiback: free resources after error.
* sunrpc/auth: allow lockless (rcu) lookup of credential cache
(bnc#866130).
* supported.conf: remove external from drivers/net/veth (bnc#889727)
* supported.conf: support net/sched/act_police.ko (bnc#890426)
* tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921).
* tg3: Change nvram command timeout value to 50ms (bnc#855657).
* tg3: Override clock, link aware and link idle mode during NVRAM dump
(bnc#855657).
* tg3: Set the MAC clock to the fastest speed during boot code load
(bnc#855657).
* usb: Does not enable LPM if the exit latency is zero (bnc#832309).
* usbcore: Does not log on consecutive debounce failures of the same
port (bnc#888105).
* usbhid: fix PIXART optical mouse (bnc#888607).
* uswsusp: Disable when module loading is restricted (bnc#884333).
* vscsi: support larger transfer sizes (bnc#774818).
* writeback: Do not sync data dirtied after sync start (bnc#833820).
* x86 thermal: Delete power-limit-notification console messages
(bnc#882317).
* x86 thermal: Disable power limit notification interrupt by default
(bnc#882317).
* x86 thermal: Re-enable power limit notification interrupt by default
(bnc#882317).
* x86, cpu hotplug: Fix stack frame warning in
check_irq_vectors_for_cpu_disable() (bnc#887418).
* x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847).
* x86/UV: Add kdump to UV NMI handler (bnc#888847).
* x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847).
* x86/UV: Move NMI support (bnc#888847).
* x86/UV: Update UV support for external NMI signals (bnc#888847).
* x86/uv/nmi: Fix Sparse warnings (bnc#888847).
* x86: Add check for number of available vectors before CPU down
(bnc#887418).
* x86: Lock down IO port access when module security is enabled
(bnc#884333).
* x86: Restrict MSR access when module loading is restricted
(bnc#884333).
Security Issues:
* CVE-2013-1979
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979>
* CVE-2014-1739
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739>
* CVE-2014-2706
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706>
* CVE-2014-4027
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027>
* CVE-2014-4171
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171>
* CVE-2014-4508
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508>
* CVE-2014-4667
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667>
* CVE-2014-4943
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943>
* CVE-2014-5077
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077>
* CVE-2014-5471
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471>
* CVE-2014-5472
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472>
* CVE-2014-3153
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153>
* CVE-2014-6410
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410>
The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to fix
various bugs and security issues.
Following security bugs were fixed: CVE-2013-1979: The scm_set_cred
function in include/net/scm.h in the Linux kernel before 3.8.11 uses
incorrect uid and gid values during credentials passing, which allows
local users to gain privileges via a crafted application (bnc#816708).
CVE-2014-1739: The media_device_enum_entities function in
drivers/media/media-device.c in the Linux kernel before 3.14.6 does not
initialize a certain data structure, which allows local users to obtain
sensitive information from kernel memory by leveraging /dev/media0 read
access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).
CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not
properly implement the interaction between range notification and hole
punching, which allows local users to cause a denial of service (i_mutex
hold) by using the mmap system call to access a hole, as demonstrated by
interfering with intended shmem activity by blocking completion of (1) an
MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call
(bnc#883518).
CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through
3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the
sep CPU feature flag is set, allows local users to cause a denial of
service (OOPS and system crash) via an invalid syscall number, as
demonstrated by number 1000 (bnc#883724).
CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c
in the Linux kernel before 3.15.2 does not properly manage a certain
backlog value, which allows remote attackers to cause a denial of service
(socket outage) via a crafted SCTP packet (bnc#885422).
CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux
kernel through 3.15.6 allows local users to gain privileges by leveraging
data-structure differences between an l2tp socket and an inet socket
(bnc#887082).
CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in
the Linux kernel through 3.15.8, when SCTP authentication is enabled,
allows remote attackers to cause a denial of service (NULL pointer
dereference and OOPS) by starting to establish an association between two
endpoints immediately after an exchange of INIT and INIT ACK chunks to
establish an earlier association between these endpoints in the opposite
direction (bnc#889173).
CVE-2014-5471: Stack consumption vulnerability in the
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux
kernel through 3.16.1 allows local users to cause a denial of service
(uncontrolled recursion, and system crash or reboot) via a crafted iso9660
image with a CL entry referring to a directory entry that has a CL entry.
(bnc#892490)
CVE-2014-5472: The parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to
cause a denial of service (unkillable mount process) via a crafted iso9660
image with a self-referential CL entry. (bnc#892490)
CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux
kernel before 3.13.7 allows remote attackers to cause a denial of service
(system crash) via network traffic that improperly interacts with the
WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and
tx.c. (bnc#871797)
CVE-2014-4027: The rd_build_device_space function in
drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not
properly initialize a certain data structure, which allows local users to
obtain sensitive information from ramdisk_mcp memory by leveraging access
to a SCSI initiator. (bnc#882639)
The following non-security bugs were fixed: - ACPI / PAD: call schedule()
when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset
register is implemented in system memory (bnc#882900). - ACPI: Limit
access to custom_method (bnc#884333). - Add option to automatically
enforce module signatures when in Secure Boot mode (bnc#884333). - Add
secure_modules() call (bnc#884333). - Add wait_on_atomic_t() and
wake_up_atomic_t() (bnc#880344). - Backported new patches of Lock down
functions for UEFI secure boot Also updated series.conf and removed old
patches. - Btrfs: Return EXDEV for cross file system snapshot. - Btrfs:
abort the transaction when we does not find our extent ref. - Btrfs: avoid
warning bomb of btrfs_invalidate_inodes. - Btrfs: cancel scrub on
transaction abortion. - Btrfs: correctly set profile flags on seqlock
retry. - Btrfs: does not check nodes for extent items. - Btrfs: fix a
possible deadlock between scrub and transaction committing. - Btrfs: fix
corruption after write/fsync failure + fsync + log recovery (bnc#894200).
- Btrfs: fix csum tree corruption, duplicate and outdated checksums
(bnc#891619). - Btrfs: fix double free in find_lock_delalloc_range. -
Btrfs: fix possible memory leak in btrfs_create_tree(). - Btrfs: fix use
of uninit "ret" in end_extent_writepage(). - Btrfs: free delayed node
outside of root->inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl
available to anyone. - Btrfs: make FS_INFO ioctl available to anyone. -
Btrfs: make device scan less noisy. - Btrfs: make sure there are not any
read requests before stopping workers. - Btrfs: more efficient io tree
navigation on wait_extent_bit. - Btrfs: output warning instead of error
when loading free space cache failed. - Btrfs: retrieve more info from
FS_INFO ioctl. - Btrfs: return EPERM when deleting a default subvolume
(bnc#869934). - Btrfs: unset DCACHE_DISCONNECTED when mounting default
subvol (bnc#866615).
- Btrfs: use right type to get real comparison. - Btrfs: wake up
@scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread
upon remount. - CacheFiles: Add missing retrieval completions
(bnc#880344).
- CacheFiles: Does not try to dump the index key if the cookie has been
cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to
the allocator (bnc#880344). - CacheFiles: Fix the marking of cached
pages (bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). -
CacheFiles: Make some debugging statements conditional (bnc#880344). -
Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers:
hv: vmbus: Fix a bug in the channel callback dispatch code (bnc#886840).
- FS-Cache: Add transition to handle invalidate immediately after lookup
(bnc#880344). - FS-Cache: Check that there are no read ops when cookie
relinquished (bnc#880344). - FS-Cache: Clear remaining page count on
retrieval cancellation (bnc#880344). - FS-Cache: Convert the object
event ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep
in page release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does
not use spin_is_locked() in assertions (bnc#880344). - FS-Cache:
Exclusive op submission can BUG if there is been an I/O error
(bnc#880344). - FS-Cache: Fix __wait_on_atomic_t() to call the action
func if the counter != 0 (bnc#880344). - FS-Cache: Fix object state
machine to have separate work and wait states (bnc#880344). - FS-Cache:
Fix operation state management and accounting (bnc#880344). - FS-Cache:
Fix signal handling during waits (bnc#880344). - FS-Cache: Initialise
the object event mask with the calculated mask (bnc#880344). - FS-Cache:
Limit the number of I/O error reports for a cache (bnc#880344). -
FS-Cache: Make cookie relinquishment wait for outstanding reads
(bnc#880344). - FS-Cache: Mark cancellation of in-progress operation
(bnc#880344). - FS-Cache: One of the write operation paths doeses not
set the object state (bnc#880344). - FS-Cache: Provide proper
invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for
fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval
remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache:
Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on
object state (bnc#880344). - HID: usbhid: add always-poll quirk
(bnc#888607). - HID: usbhid: enable always-poll quirk for Elan
Touchscreen (bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling
(bnc#890297). - Ignore "flags" change to event_constraint (bnc#876114). -
Ignore data_src/weight changes to perf_sample_data (bnc#876114). - NFS:
Allow more
operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper
function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read
delegation stateids in setattr (bnc#888968). - NFS: Does not use a
delegation to open a file when returning that delegation (bnc#888968,
bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support
in line with code going upstream - NFS: Use FS-Cache invalidation
(bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130).
- NFS: avoid mountpoint being displayed as " (deleted)" in /proc/mounts
(bnc#888591). - NFS: nfs4_do_open should add negative results to the
dcache (bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache
to finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only
evaluate parent if it will be used (bnc#866130). - NFS: prepare for
RCU-walk support but pushing tests later in code (bnc#866130). - NFS:
support RCU_WALK in nfs_permission() (bnc#866130). - NFS: teach
nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130). - NFS: teach
nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130). - NFSD: Does
not hand out delegations for 30 seconds after recalling them
(bnc#880370). - NFSv4 set open access
operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200,
bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data
(bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). -
NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4:
Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return
value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename
nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call
if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the
struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the
same for replayed RPC calls (bnc#888968). - NFSv4:
nfs4_stateid_is_current should return "true" for an invalid stateid
(bnc#888968). - One more fix for kABI breakage. - PCI: Lock down BAR
access when module security is enabled (bnc#884333). - PCI: enable MPS
"performance" setting to properly handle bridge MPS (bnc#883376). - PM /
Hibernate: Add memory_rtree_find_bit function (bnc#860441). - PM /
Hibernate: Create a Radix-Tree to store memory bitmap (bnc#860441). - PM
/ Hibernate: Implement position keeping in radix tree (bnc#860441). - PM
/ Hibernate: Iterate over set bits instead of PFNs in swsusp_free()
(bnc#860441). - PM / Hibernate: Remove the old memory-bitmap
implementation (bnc#860441). - PM / Hibernate: Touch Soft Lockup Watchdog
in rtree_next_node (bnc#860441). - Restrict /dev/mem and /dev/kmem when
module loading is restricted (bnc#884333). - Reuse existing "state" field
to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: handle LPM
errors during device suspend correctly (bnc#849123). - Update kabi files
to reflect fscache change (bnc#880344) - VFS: Make more complete truncate
operation available to CacheFiles (bnc#880344). - [FEAT NET1222]
ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi:
Ignore acpi_rsdp kernel parameter when module loading is restricted
(bnc#884333). - af_iucv: correct cleanup if listen backlog is full
(bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when
module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to
walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during
rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed
in autofs4_lookup_expiring (bnc#866130). - autofs4: factor
should_expire() out
of autofs4_expire_indirect (bnc#866130). - autofs4: make
"autofs4_can_expire" idempotent (bnc#866130). - autofs4: remove a
redundant assignment (bnc#866130). - autofs: fix lockref lookup
(bnc#888591). - be2net: add dma_mapping_error() check for dma_map_page()
(bnc#881759). - block: add cond_resched() to potentially long running
ioctl discard loop (bnc#884725). - block: fix race between request
completion and timeout handling (bnc#881051). - cdc-ether: clean packet
filter upon probe (bnc#876017). - cpuset: Fix memory allocator deadlock
(bnc#876590). - crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not
all archs have them, but some are FIPS certified, with some kernel
support. - crypto: fips
- only panic on bad/missing crypto mod signatures (bnc#887503). - crypto:
testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode
(bnc#889451). - dasd: validate request size before building CCW/TCW
(bnc#891087, LTC#114068). - dm mpath: fix race condition between
multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on
deleting sg device (bnc#870161). - drm/ast: Add missing entry to
dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide
screen mode (bnc#892723). - drm/i915: Only apply DPMS to the encoder if
enabled (bnc#893064). - drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at
driver init (bnc#869055). - drm/i915: create functions for the
"unclaimed register" checks (bnc#869055). - drm/i915: use FPGA_DBG for
the "unclaimed register" checks (bnc#869055). - drm/mgag200: Initialize
data needed to map fbdev memory (bnc #806990). - e1000e: enable support
for new device IDs (bnc#885509). - fs/fscache: remove spin_lock() from
the condition in while() (bnc#880344). - hibernate: Disable in a signed
modules environment (bnc#884333). - hugetlb: does not use ERR_PTR with
VM_FAULT* values - ibmvscsi: Abort init sequence during error recovery
(bnc#885382). - ibmvscsi: Add memory barriers for send / receive
(bnc#885382). - inet: add a redirect generation id in inetpeer
(bnc#860593). - inetpeer: initialize
->redirect_genid in inet_getpeer() (bnc#860593). - ipv6: tcp: fix
tcp_v6_conn_request() (bnc#887645). - kabi: hide bnc#860593 changes of
struct inetpeer_addr_base (bnc#860593). - kernel: 3215 tty hang
(bnc#891087, LTC#114562). - kernel: fix data corruption when reading
/proc/sysinfo (bnc#891087, LTC#114480). - kernel: fix kernel oops with
load
of fpc register (bnc#889061, LTC#113596). - kernel: sclp console tty
reference counting (bnc#891087, LTC#115466). - kexec: Disable at runtime
if the kernel enforces module loading restrictions (bnc#884333). -
md/raid6: avoid data corruption during recovery of double-degraded RAID6.
- memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim fix).
- mm, hugetlb: add VM_NORESERVE check in vma_has_reserves() - mm,
hugetlb: change variable name reservations to resv - mm, hugetlb:
decrement reserve count if VM_NORESERVE alloc page cache - mm, hugetlb:
defer freeing pages when gathering surplus pages - mm, hugetlb: do not
use a page in page cache for cow optimization - mm, hugetlb: fix and
clean-up node iteration code to alloc or free - mm, hugetlb: fix race in
region tracking - mm, hugetlb: fix subpool accounting handling - mm,
hugetlb: improve page-fault scalability - mm, hugetlb: improve, cleanup
resv_map parameters - mm, hugetlb: move up the code which check
availability of free huge page - mm, hugetlb: protect reserved pages when
soft offlining a hugepage - mm, hugetlb: remove
decrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty
check in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm,
hugetlb: remove useless check about mapping type - mm, hugetlb: return a
reserved page to a reserved pool if failed - mm, hugetlb: trivial
commenting fix - mm, hugetlb: unify region structure handling - mm,
hugetlb: unify region structure handling kabi - mm, hugetlb: use long
vars instead of int in region_count() (Hugetlb Fault Scalability). - mm,
hugetlb: use vma_resv_map() map types - mm, oom: fix badness score
underflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to
oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm,
thp: do not allow thp faults to avoid cpuset restrictions (bnc#888849). -
net/mlx4_core: Load higher level modules according to ports type
(bnc#887680). - net/mlx4_core: Load the IB driver when the device
supports IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll
function and RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest
failing on non 10G link speed (bnc#888058). - net: fix checksumming
features handling in
output path (bnc#891259). - perf/core: Add weighted samples (bnc#876114).
- perf/x86: Add flags to event constraints (bnc#876114). - perf/x86: Add
memory profiling via PEBS Load Latency (bnc#876114). - perf: Add generic
memory sampling interface (bnc#876114). - qla2xxx: Avoid escalating the
SCSI error handler if the command is not found in firmware (bnc#859840).
- qla2xxx: Clear loop_id for ports that are marked lost during fabric
scanning (bnc#859840). - qla2xxx: Does not check for firmware hung during
the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue abort
command for outstanding commands during cleanup when only firmware is
alive (bnc#859840). - qla2xxx: Reduce the time we wait for a command to
complete during SCSI error handling (bnc#859840). - qla2xxx: Set host
can_queue value based on available resources (bnc#859840). - restore
smp_mb() in unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy
IOTLB flushing for DMA unmap (bnc#889061, LTC#113725). - sched: fix the
theoretical signal_wake_up() vs schedule() race (bnc#876055). -
sclp_vt220: Enable integrated ASCII console per default (bnc#885262,
LTC#112035). - scsi_dh: use missing accessor "scsi_device_from_queue"
(bnc#889614). - scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail
(bnc#887608). - scsiback: correct grant page unmapping. - scsiback: fix
retry handling in __report_luns(). - scsiback: free resources after
error. - sunrpc/auth: allow lockless (rcu) lookup of credential cache
(bnc#866130). - supported.conf: remove external from drivers/net/veth
(bnc#889727) - supported.conf: support net/sched/act_police.ko
(bnc#890426) - tcp: adapt selected parts of RFC 5682 and PRR logic
(bnc#879921). - tg3: Change nvram command timeout value to 50ms
(bnc#855657). - tg3: Override clock, link aware and link idle mode during
NVRAM dump (bnc#855657). - tg3: Set the MAC clock to the fastest speed
during boot code load (bnc#855657). - usb: Does not enable LPM if the
exit latency is zero (bnc#832309). - usbcore: Does not log on consecutive
debounce failures of the same port (bnc#888105). - usbhid: fix PIXART
optical mouse (bnc#888607). - uswsusp: Disable when module loading is
restricted (bnc#884333). - vscsi: support larger transfer sizes
(bnc#774818). - x86 thermal: Delete power-limit-notification console
messages (bnc#882317). - x86 thermal: Disable power limit notification
interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit
notification interrupt by default (bnc#882317). - x86/UV: Add call to
KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add kdump to UV NMI
handler (bnc#888847). - x86/UV: Add summary of cpu activity to UV NMI
handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). - x86/UV:
Update UV support for external NMI signals (bnc#888847). - x86/uv/nmi:
Fix Sparse warnings (bnc#888847). - x86: Lock down IO port access when
module security is enabled (bnc#884333). - x86: Restrict MSR access when
module loading is restricted (bnc#884333).
Security Issues:
* CVE-2013-1979
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979>
* CVE-2014-1739
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739>
* CVE-2014-2706
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706>
* CVE-2014-4027
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027>
* CVE-2014-4171
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171>
* CVE-2014-4508
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508>
* CVE-2014-4667
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667>
* CVE-2014-4943
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943>
* CVE-2014-5077
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077>
* CVE-2014-5471
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471>
* CVE-2014-5472
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472>
Indications:
Everyone using the Linux Kernel on x86_64 architecture should update.
Contraindications:
Indications:
Everyone using the Linux Kernel on x86_64 architecture should update.
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-kernel-bigsmp-201409-9750
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-kernel-bigsmp-201409-9750
- SUSE Linux Enterprise High Availability Extension 11 SP3:
zypper in -t patch slehasp3-kernel-bigsmp-201409-9750
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-kernel-bigsmp-201409-9750
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):
kernel-bigsmp-devel-3.0.101-0.40.1
- SUSE Linux Enterprise Server 11 SP3 (x86_64):
iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.40-0.38.83
kernel-bigsmp-3.0.101-0.40.1
kernel-bigsmp-base-3.0.101-0.40.1
kernel-bigsmp-devel-3.0.101-0.40.1
ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.40-0.13.89
oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.40-7.39.89
- SUSE Linux Enterprise High Availability Extension 11 SP3 (x86_64):
cluster-network-kmp-bigsmp-1.4_3.0.101_0.40-2.27.98
drbd-kmp-bigsmp-8.4.4_3.0.101_0.40-0.22.64
gfs2-kmp-bigsmp-2_3.0.101_0.40-0.16.104
ocfs2-kmp-bigsmp-1.6_3.0.101_0.40-0.20.98
- SUSE Linux Enterprise Desktop 11 SP3 (x86_64):
kernel-bigsmp-devel-3.0.101-0.40.1
- SLE 11 SERVER Unsupported Extras (x86_64):
kernel-bigsmp-extra-3.0.101-0.40.1
References:
http://support.novell.com/security/cve/CVE-2013-1979.html
http://support.novell.com/security/cve/CVE-2014-1739.html
http://support.novell.com/security/cve/CVE-2014-2706.html
http://support.novell.com/security/cve/CVE-2014-4027.html
http://support.novell.com/security/cve/CVE-2014-4171.html
http://support.novell.com/security/cve/CVE-2014-4508.html
http://support.novell.com/security/cve/CVE-2014-4667.html
http://support.novell.com/security/cve/CVE-2014-4943.html
http://support.novell.com/security/cve/CVE-2014-5077.html
http://support.novell.com/security/cve/CVE-2014-5471.html
http://support.novell.com/security/cve/CVE-2014-5472.html
https://bugzilla.suse.com/show_bug.cgi?id=774818
https://bugzilla.suse.com/show_bug.cgi?id=806990
https://bugzilla.suse.com/show_bug.cgi?id=816708
https://bugzilla.suse.com/show_bug.cgi?id=826486
https://bugzilla.suse.com/show_bug.cgi?id=832309
https://bugzilla.suse.com/show_bug.cgi?id=849123
https://bugzilla.suse.com/show_bug.cgi?id=855657
https://bugzilla.suse.com/show_bug.cgi?id=859840
https://bugzilla.suse.com/show_bug.cgi?id=860441
https://bugzilla.suse.com/show_bug.cgi?id=860593
https://bugzilla.suse.com/show_bug.cgi?id=863586
https://bugzilla.suse.com/show_bug.cgi?id=866130
https://bugzilla.suse.com/show_bug.cgi?id=866615
https://bugzilla.suse.com/show_bug.cgi?id=866864
https://bugzilla.suse.com/show_bug.cgi?id=866911
https://bugzilla.suse.com/show_bug.cgi?id=869055
https://bugzilla.suse.com/show_bug.cgi?id=869934
https://bugzilla.suse.com/show_bug.cgi?id=870161
https://bugzilla.suse.com/show_bug.cgi?id=871797
https://bugzilla.suse.com/show_bug.cgi?id=876017
https://bugzilla.suse.com/show_bug.cgi?id=876055
https://bugzilla.suse.com/show_bug.cgi?id=876114
https://bugzilla.suse.com/show_bug.cgi?id=876590
https://bugzilla.suse.com/show_bug.cgi?id=879921
https://bugzilla.suse.com/show_bug.cgi?id=880344
https://bugzilla.suse.com/show_bug.cgi?id=880370
https://bugzilla.suse.com/show_bug.cgi?id=881051
https://bugzilla.suse.com/show_bug.cgi?id=881759
https://bugzilla.suse.com/show_bug.cgi?id=882317
https://bugzilla.suse.com/show_bug.cgi?id=882639
https://bugzilla.suse.com/show_bug.cgi?id=882804
https://bugzilla.suse.com/show_bug.cgi?id=882900
https://bugzilla.suse.com/show_bug.cgi?id=883376
https://bugzilla.suse.com/show_bug.cgi?id=883518
https://bugzilla.suse.com/show_bug.cgi?id=883724
https://bugzilla.suse.com/show_bug.cgi?id=884333
https://bugzilla.suse.com/show_bug.cgi?id=884582
https://bugzilla.suse.com/show_bug.cgi?id=884725
https://bugzilla.suse.com/show_bug.cgi?id=884767
https://bugzilla.suse.com/show_bug.cgi?id=885262
https://bugzilla.suse.com/show_bug.cgi?id=885382
https://bugzilla.suse.com/show_bug.cgi?id=885422
https://bugzilla.suse.com/show_bug.cgi?id=885509
https://bugzilla.suse.com/show_bug.cgi?id=886840
https://bugzilla.suse.com/show_bug.cgi?id=887082
https://bugzilla.suse.com/show_bug.cgi?id=887503
https://bugzilla.suse.com/show_bug.cgi?id=887608
https://bugzilla.suse.com/show_bug.cgi?id=887645
https://bugzilla.suse.com/show_bug.cgi?id=887680
https://bugzilla.suse.com/show_bug.cgi?id=888058
https://bugzilla.suse.com/show_bug.cgi?id=888105
https://bugzilla.suse.com/show_bug.cgi?id=888591
https://bugzilla.suse.com/show_bug.cgi?id=888607
https://bugzilla.suse.com/show_bug.cgi?id=888847
https://bugzilla.suse.com/show_bug.cgi?id=888849
https://bugzilla.suse.com/show_bug.cgi?id=888968
https://bugzilla.suse.com/show_bug.cgi?id=889061
https://bugzilla.suse.com/show_bug.cgi?id=889173
https://bugzilla.suse.com/show_bug.cgi?id=889451
https://bugzilla.suse.com/show_bug.cgi?id=889614
https://bugzilla.suse.com/show_bug.cgi?id=889727
https://bugzilla.suse.com/show_bug.cgi?id=890297
https://bugzilla.suse.com/show_bug.cgi?id=890426
https://bugzilla.suse.com/show_bug.cgi?id=890513
https://bugzilla.suse.com/show_bug.cgi?id=890526
https://bugzilla.suse.com/show_bug.cgi?id=891087
https://bugzilla.suse.com/show_bug.cgi?id=891259
https://bugzilla.suse.com/show_bug.cgi?id=891619
https://bugzilla.suse.com/show_bug.cgi?id=892200
https://bugzilla.suse.com/show_bug.cgi?id=892490
https://bugzilla.suse.com/show_bug.cgi?id=892723
https://bugzilla.suse.com/show_bug.cgi?id=893064
https://bugzilla.suse.com/show_bug.cgi?id=893496
https://bugzilla.suse.com/show_bug.cgi?id=893596
https://bugzilla.suse.com/show_bug.cgi?id=894200
http://download.suse.com/patch/finder/?keywords=dc5412c9dbb50ea612d1193ae55…
http://download.suse.com/patch/finder/?keywords=e0773faf1a29419cf53084e7aa8…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:1294-1: important: Security update for rsyslog
by opensuse-security@opensuse.org 14 Oct '14
by opensuse-security@opensuse.org 14 Oct '14
14 Oct '14
SUSE Security Update: Security update for rsyslog
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1294-1
Rating: important
References: #890228 #897262 #899756
Cross-References: CVE-2014-3634 CVE-2014-3683
Affected Products:
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
rsyslog has been updated to fix a remote denial of service issue:
* Under certain configurations, a local or remote attacker able to
send syslog messages to the server could have crashed the log server
due to an array overread. (CVE-2014-3634, CVE-2014-3683)
Security Issues:
* CVE-2014-3634
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3634>
* CVE-2014-3683
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3683>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-rsyslog-9840
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-rsyslog-9840
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
rsyslog-5.10.1-0.11.1
rsyslog-diag-tools-5.10.1-0.11.1
rsyslog-doc-5.10.1-0.11.1
rsyslog-module-gssapi-5.10.1-0.11.1
rsyslog-module-gtls-5.10.1-0.11.1
rsyslog-module-mysql-5.10.1-0.11.1
rsyslog-module-pgsql-5.10.1-0.11.1
rsyslog-module-relp-5.10.1-0.11.1
rsyslog-module-snmp-5.10.1-0.11.1
rsyslog-module-udpspoof-5.10.1-0.11.1
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
rsyslog-5.10.1-0.11.1
rsyslog-diag-tools-5.10.1-0.11.1
rsyslog-doc-5.10.1-0.11.1
rsyslog-module-gssapi-5.10.1-0.11.1
rsyslog-module-gtls-5.10.1-0.11.1
rsyslog-module-mysql-5.10.1-0.11.1
rsyslog-module-pgsql-5.10.1-0.11.1
rsyslog-module-relp-5.10.1-0.11.1
rsyslog-module-snmp-5.10.1-0.11.1
rsyslog-module-udpspoof-5.10.1-0.11.1
References:
http://support.novell.com/security/cve/CVE-2014-3634.html
http://support.novell.com/security/cve/CVE-2014-3683.html
https://bugzilla.suse.com/show_bug.cgi?id=890228
https://bugzilla.suse.com/show_bug.cgi?id=897262
https://bugzilla.suse.com/show_bug.cgi?id=899756
http://download.suse.com/patch/finder/?keywords=bf1479391eaebb0445fd0ffa918…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:1287-1: important: Security update for Containment-Studio
by opensuse-security@opensuse.org 13 Oct '14
by opensuse-security@opensuse.org 13 Oct '14
13 Oct '14
SUSE Security Update: Security update for Containment-Studio
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1287-1
Rating: important
References: #898604
Cross-References: CVE-2014-6271 CVE-2014-6277 CVE-2014-6278
CVE-2014-7169
Affected Products:
SUSE Studio Onsite 1.3
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
SUSE Studio uses a pre-built containment RPM for testing purposes.
This update contains a rebuild with current security fixes like e.g. bash
shellshock fixes included.
Security Issues:
* CVE-2014-6271
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271>
* CVE-2014-7169
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169>
* CVE-2014-6277
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277>
* CVE-2014-6278
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Studio Onsite 1.3:
zypper in -t patch slestso13-Containment-201410-9833
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Studio Onsite 1.3 (x86_64):
Containment-Studio-SLE11_SP3-5.04.108-20141006122525
- SUSE Studio Onsite 1.3 (noarch):
Containment-Studio-SLE11_SP1-4.85.108-20141006120850
References:
http://support.novell.com/security/cve/CVE-2014-6271.html
http://support.novell.com/security/cve/CVE-2014-6277.html
http://support.novell.com/security/cve/CVE-2014-6278.html
http://support.novell.com/security/cve/CVE-2014-7169.html
https://bugzilla.suse.com/show_bug.cgi?id=898604
http://download.suse.com/patch/finder/?keywords=1867dc0f69170864bf05a7d68ce…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2014:1281-1: important: xen: security and bugfix update
by opensuse-security@opensuse.org 09 Oct '14
by opensuse-security@opensuse.org 09 Oct '14
09 Oct '14
openSUSE Security Update: xen: security and bugfix update
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:1281-1
Rating: important
References: #798770 #820873 #842006 #864801 #865682 #875668
#878841 #880751 #882127 #895798 #895799 #895802
#896023 #897657
Cross-References: CVE-2013-4344 CVE-2013-4540 CVE-2014-3124
CVE-2014-3967 CVE-2014-3968 CVE-2014-4021
CVE-2014-7154 CVE-2014-7155 CVE-2014-7156
CVE-2014-7188
Affected Products:
openSUSE 13.1
______________________________________________________________________________
An update that solves 10 vulnerabilities and has four fixes
is now available.
Description:
XEN was updated to fix security issues and bugs.
Security issues fixed:
- bnc#897657 - CVE-2014-7188: XSA-108 Improper MSR range used for x2APIC
emulation
- bnc#895802 - CVE-2014-7156: XSA-106: Missing privilege level checks in
x86 emulation of software interrupts
- bnc#895799 - CVE-2014-7155: XSA-105: Missing privilege level checks in
x86 HLT, LGDT, LIDT, and LMSW emulation
- bnc#895798 - CVE-2014-7154: XSA-104: Race condition in
HVMOP_track_dirty_vram
- bnc#864801 - CVE-2013-4540: qemu: zaurus: buffer overrun on invalid
state load
- bnc#875668 - CVE-2014-3124: XSA-92: HVMOP_set_mem_type allows invalid
P2M entries to be created
- bnc#878841 - CVE-2014-3967, CVE-2014-3968: XSA-96: Xen: Vulnerabilities
in HVM MSI injection
- bnc#880751 - CVE-2014-4021: XSA-100: Hypervisor heap contents leaked to
guests
- bnc#842006 - CVE-2013-4344: XSA-65: xen: qemu SCSI REPORT LUNS buffer
overflow
Other bugs fixed:
- bnc#896023 - Adjust xentop column layout
- bnc#820873 - The "long" option doesn't work with "xl list"
- bnc#882127 - Xen kernel panics on booting SLES12 Beta 8
- bnc#865682 - Local attach support for PHY backends using scripts
- bnc#798770 - Improve multipath support for npiv devices
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-580
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
xen-debugsource-4.3.2_02-27.1
xen-devel-4.3.2_02-27.1
xen-kmp-default-4.3.2_02_k3.11.10_21-27.1
xen-kmp-default-debuginfo-4.3.2_02_k3.11.10_21-27.1
xen-kmp-desktop-4.3.2_02_k3.11.10_21-27.1
xen-kmp-desktop-debuginfo-4.3.2_02_k3.11.10_21-27.1
xen-libs-4.3.2_02-27.1
xen-libs-debuginfo-4.3.2_02-27.1
xen-tools-domU-4.3.2_02-27.1
xen-tools-domU-debuginfo-4.3.2_02-27.1
- openSUSE 13.1 (x86_64):
xen-4.3.2_02-27.1
xen-doc-html-4.3.2_02-27.1
xen-libs-32bit-4.3.2_02-27.1
xen-libs-debuginfo-32bit-4.3.2_02-27.1
xen-tools-4.3.2_02-27.1
xen-tools-debuginfo-4.3.2_02-27.1
xen-xend-tools-4.3.2_02-27.1
xen-xend-tools-debuginfo-4.3.2_02-27.1
- openSUSE 13.1 (i586):
xen-kmp-pae-4.3.2_02_k3.11.10_21-27.1
xen-kmp-pae-debuginfo-4.3.2_02_k3.11.10_21-27.1
References:
http://support.novell.com/security/cve/CVE-2013-4344.html
http://support.novell.com/security/cve/CVE-2013-4540.html
http://support.novell.com/security/cve/CVE-2014-3124.html
http://support.novell.com/security/cve/CVE-2014-3967.html
http://support.novell.com/security/cve/CVE-2014-3968.html
http://support.novell.com/security/cve/CVE-2014-4021.html
http://support.novell.com/security/cve/CVE-2014-7154.html
http://support.novell.com/security/cve/CVE-2014-7155.html
http://support.novell.com/security/cve/CVE-2014-7156.html
http://support.novell.com/security/cve/CVE-2014-7188.html
https://bugzilla.suse.com/show_bug.cgi?id=798770
https://bugzilla.suse.com/show_bug.cgi?id=820873
https://bugzilla.suse.com/show_bug.cgi?id=842006
https://bugzilla.suse.com/show_bug.cgi?id=864801
https://bugzilla.suse.com/show_bug.cgi?id=865682
https://bugzilla.suse.com/show_bug.cgi?id=875668
https://bugzilla.suse.com/show_bug.cgi?id=878841
https://bugzilla.suse.com/show_bug.cgi?id=880751
https://bugzilla.suse.com/show_bug.cgi?id=882127
https://bugzilla.suse.com/show_bug.cgi?id=895798
https://bugzilla.suse.com/show_bug.cgi?id=895799
https://bugzilla.suse.com/show_bug.cgi?id=895802
https://bugzilla.suse.com/show_bug.cgi?id=896023
https://bugzilla.suse.com/show_bug.cgi?id=897657
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2014:1279-1: important: xen: security and bugfix update
by opensuse-security@opensuse.org 09 Oct '14
by opensuse-security@opensuse.org 09 Oct '14
09 Oct '14
openSUSE Security Update: xen: security and bugfix update
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:1279-1
Rating: important
References: #798770 #820873 #833483 #842006 #858178 #862608
#864801 #865682 #867910 #878841 #880751 #881900
#891539 #895798 #895799 #895802 #896023 #897657
Cross-References: CVE-2013-4344 CVE-2013-4540 CVE-2014-2599
CVE-2014-3967 CVE-2014-3968 CVE-2014-4021
CVE-2014-7154 CVE-2014-7155 CVE-2014-7156
CVE-2014-7188
Affected Products:
openSUSE 12.3
______________________________________________________________________________
An update that solves 10 vulnerabilities and has 8 fixes is
now available.
Description:
XEN was updated to fix various bugs and security issues.
Security issues fixed:
- bnc#897657 - CVE-2014-7188: XSA-108 Improper MSR range used for x2APIC
emulation
- bnc#895802 - CVE-2014-7156: XSA-106: Missing privilege level checks in
x86 emulation of software interrupts
- bnc#895799 - CVE-2014-7155: XSA-105: Missing privilege level checks in
x86 HLT, LGDT, LIDT, and LMSW emulation
- bnc#895798 - CVE-2014-7154: XSA-104: Race condition in
HVMOP_track_dirty_vram
- bnc#864801 - CVE-2013-4540: qemu: zaurus: buffer overrun on invalid
state load
- bnc#880751 - CVE-2014-4021: XSA-100: Hypervisor heap contents leaked to
guests
- bnc#878841 - CVE-2014-3967,CVE-2014-3968: XSA-96: Vulnerabilities in HVM
MSI injection
- bnc#867910 - CVE-2014-2599: XSA-89: HVMOP_set_mem_access is not
preemptible
- bnc#842006 - CVE-2013-4344: XSA-65: xen: qemu SCSI REPORT LUNS buffer
overflow
Other bugs fixed:
- bnc#896023 - Adjust xentop column layout
- bnc#891539 - xend: fix netif convertToDeviceNumber for running domains
- bnc#820873 - The "long" option doesn't work with "xl list"
- bnc#881900 - XEN kernel panic do_device_not_available()
- bnc#833483 - Boot Failure with xen kernel in UEFI mode with error "No
memory for trampoline"
- bnc#862608 - SLES 11 SP3 vm-install should get RHEL 7 support when
released
- bnc#858178 - [HP HPS Bug]: SLES11sp3 XEN kiso version cause softlockup
on 8 blades npar(480 cpu)
- bnc#865682 - Local attach support for PHY backends using scripts
- bnc#798770 - Improve multipath support for npiv devices
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.3:
zypper in -t patch openSUSE-2014-579
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.3 (i586 x86_64):
xen-debugsource-4.2.4_04-1.32.1
xen-devel-4.2.4_04-1.32.1
xen-kmp-default-4.2.4_04_k3.7.10_1.40-1.32.1
xen-kmp-default-debuginfo-4.2.4_04_k3.7.10_1.40-1.32.1
xen-kmp-desktop-4.2.4_04_k3.7.10_1.40-1.32.1
xen-kmp-desktop-debuginfo-4.2.4_04_k3.7.10_1.40-1.32.1
xen-libs-4.2.4_04-1.32.1
xen-libs-debuginfo-4.2.4_04-1.32.1
xen-tools-domU-4.2.4_04-1.32.1
xen-tools-domU-debuginfo-4.2.4_04-1.32.1
- openSUSE 12.3 (x86_64):
xen-4.2.4_04-1.32.1
xen-doc-html-4.2.4_04-1.32.1
xen-doc-pdf-4.2.4_04-1.32.1
xen-libs-32bit-4.2.4_04-1.32.1
xen-libs-debuginfo-32bit-4.2.4_04-1.32.1
xen-tools-4.2.4_04-1.32.1
xen-tools-debuginfo-4.2.4_04-1.32.1
- openSUSE 12.3 (i586):
xen-kmp-pae-4.2.4_04_k3.7.10_1.40-1.32.1
xen-kmp-pae-debuginfo-4.2.4_04_k3.7.10_1.40-1.32.1
References:
http://support.novell.com/security/cve/CVE-2013-4344.html
http://support.novell.com/security/cve/CVE-2013-4540.html
http://support.novell.com/security/cve/CVE-2014-2599.html
http://support.novell.com/security/cve/CVE-2014-3967.html
http://support.novell.com/security/cve/CVE-2014-3968.html
http://support.novell.com/security/cve/CVE-2014-4021.html
http://support.novell.com/security/cve/CVE-2014-7154.html
http://support.novell.com/security/cve/CVE-2014-7155.html
http://support.novell.com/security/cve/CVE-2014-7156.html
http://support.novell.com/security/cve/CVE-2014-7188.html
https://bugzilla.suse.com/show_bug.cgi?id=798770
https://bugzilla.suse.com/show_bug.cgi?id=820873
https://bugzilla.suse.com/show_bug.cgi?id=833483
https://bugzilla.suse.com/show_bug.cgi?id=842006
https://bugzilla.suse.com/show_bug.cgi?id=858178
https://bugzilla.suse.com/show_bug.cgi?id=862608
https://bugzilla.suse.com/show_bug.cgi?id=864801
https://bugzilla.suse.com/show_bug.cgi?id=865682
https://bugzilla.suse.com/show_bug.cgi?id=867910
https://bugzilla.suse.com/show_bug.cgi?id=878841
https://bugzilla.suse.com/show_bug.cgi?id=880751
https://bugzilla.suse.com/show_bug.cgi?id=881900
https://bugzilla.suse.com/show_bug.cgi?id=891539
https://bugzilla.suse.com/show_bug.cgi?id=895798
https://bugzilla.suse.com/show_bug.cgi?id=895799
https://bugzilla.suse.com/show_bug.cgi?id=895802
https://bugzilla.suse.com/show_bug.cgi?id=896023
https://bugzilla.suse.com/show_bug.cgi?id=897657
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
Hi folks,
A heads up on the current status of the so called "Shellshock" vulnerabilities found in bash.
CVE-2014-6271:
This is the original issue, that was embargoed and got public on Wednesday September 24th, 1400 UTC.
This issue allows trivial code execution if an attacker can inject environment variables into bash.
We have published online updates on September 24th as soon as the embargo ended.
--------------------------------------------------------------------------------
Over the next days several more issues were found.
CVE-2014-7169:
Another issue found shortly after release of the first one. This problem
so far only allowed overwriting of specific filenames (the first word
in the called shell script).
Due to this limitation of exploitability we considered it less severe
than the original problem.
CVE-2014-7186:
A nesting issue of "HERE" documents, which could lead to crashes of bash,
but without controlled exploitation.
CVE-2014-7187:
A nesting issue with "FOR" loops, which lead to bash parser errors
(but no crashes).
--------------------------------------------------------------------------------
On Sunday the 28th we released a second round of bash security updates,
that fixed those 3 new CVEs.
This second round of updates also contains a hardening patch that changes the
function export to use a prefix of "BASH_FUNC_" and a suffix of "()".
This patch makes it impossible for attackers to exploit the function
parsing feature of bash altogether.
(If it would be possible for attackers to inject environment variables named
BASH_FUNC_xx() they could also inject variables like PATH, PS1,
LD_PRELOAD and others.)
--------------------------------------------------------------------------------
Today, Wednesday Oct 1st, two more CVEs were published by Michael Zalewski:
CVE-2014-6277: Attacker controllable crash in bash that could lead to code execution.
CVE-2014-6278: Code injection via parsing of function definitions in environment variables.
Due to the environment variable hardening patch being included in our
second round of updates, both issues are not exploitable and so currently
no updates are being planned for these issues.
We have published a high level overview page for our enterprise customers:
https://www.suse.com/support/shellshock/
If you are running an outdated SUSE Linux Enterprise installation (but have a valid SLES
subscription) we will supply fixes for your outdated installation as a one-time offering,
above page has links on how to get this offering.
More references:
https://www.suse.com/support/kb/doc.php?id=7015702
TID on the original shellshock issues
https://www.suse.com/support/kb/doc.php?id=7015714
TID on Oct 1st shellshock issues
Upstream documentation of new issues:
http://lcamtuf.blogspot.de/2014/10/bash-bug-how-we-finally-cracked.html
Our automated references:
http://support.novell.com/security/cve/CVE-2014-6271.html
http://support.novell.com/security/cve/CVE-2014-7169.html
http://support.novell.com/security/cve/CVE-2014-7187.html
http://support.novell.com/security/cve/CVE-2014-7186.html
http://support.novell.com/security/cve/CVE-2014-6277.html
http://support.novell.com/security/cve/CVE-2014-6278.html
http://lists.opensuse.org/opensuse-security-announce/2014-09/
Ciao, Marcus
1
0