SUSE Security Update: Security update for ntp
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1686-1
Rating: critical
References: #910764
Cross-References: CVE-2014-9295
Affected Products:
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Server 11 SP2 LTSS
SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This ntp update fixes the following critical security issue:
* A potential remote code execution problem was found inside ntpd. The
functions crypto_recv() (when using autokey authentication) and
ctl_putdata() where updated to avoid buffer overflows that could
have been exploited. (CVE-2014-9295 / VU#852879)
Security Issues:
* CVE-2014-9295
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-ntp-10117
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-ntp-10117
- SUSE Linux Enterprise Server 11 SP2 LTSS:
zypper in -t patch slessp2-ntp-10118
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-ntp-10117
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
ntp-4.2.4p8-1.28.1
ntp-doc-4.2.4p8-1.28.1
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
ntp-4.2.4p8-1.28.1
ntp-doc-4.2.4p8-1.28.1
- SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64):
ntp-4.2.4p8-1.28.1
ntp-doc-4.2.4p8-1.28.1
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):
ntp-4.2.4p8-1.28.1
ntp-doc-4.2.4p8-1.28.1
References:
http://support.novell.com/security/cve/CVE-2014-9295.htmlhttps://bugzilla.suse.com/show_bug.cgi?id=910764http://download.suse.com/patch/finder/?keywords=49ee0f538b0a3f58f2160d4c874…http://download.suse.com/patch/finder/?keywords=8082bb36619fe906d1390813bfc…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for ntp
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:1680-1
Rating: critical
References: #910764
Cross-References: CVE-2014-9295 CVE-2014-9296
Affected Products:
openSUSE Evergreen 11.4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
The network timeservice ntp was updated to fix critical security issues
(bnc#910764, CERT VU#852879)
* A potential remote code execution problem was found inside ntpd. The
functions crypto_recv() (when using autokey authentication),
ctl_putdata(), and configure() where updated to avoid buffer overflows
that could be exploited. (CVE-2014-9295)
* Furthermore a problem inside the ntpd error handling was found that is
missing a return statement. This could also lead to a potentially attack
vector. (CVE-2014-9296)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Evergreen 11.4:
zypper in -t patch 2014-95
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Evergreen 11.4 (i586 x86_64):
ntp-4.2.6p3-6.28.1
ntp-debuginfo-4.2.6p3-6.28.1
ntp-debugsource-4.2.6p3-6.28.1
ntp-doc-4.2.6p3-6.28.1
References:
http://support.novell.com/security/cve/CVE-2014-9295.htmlhttp://support.novell.com/security/cve/CVE-2014-9296.htmlhttps://bugzilla.suse.com/show_bug.cgi?id=910764
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for clamav
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:1679-1
Rating: important
References: #903489 #904207 #906077
Cross-References: CVE-2013-6497
Affected Products:
openSUSE Evergreen 11.4
______________________________________________________________________________
An update that solves one vulnerability and has two fixes
is now available.
Description:
clamav was updated to version 0.98.5 to fix two security issues.
These security issues were fixed:
- Segmentation fault when processing certain files (CVE-2013-6497).
- Heap-based buffer overflow when scanning crypted PE files
(CVE-2014-9050).
The following non-security issues were fixed:
- Support for the XDP file format and extracting, decoding, and scanning
PDF files within XDP files.
- Addition of shared library support for LLVM versions 3.1 - 3.5 for the
purpose of just-in-time(JIT) compilation of ClamAV bytecode signatures.
- Enhancements to the clambc command line utility to assist ClamAV
bytecode signature authors by providing introspection into compiled
bytecode programs.
- Resolution of many of the warning messages from ClamAV compilation.
- Improved detection of malicious PE files.
- ClamAV 0.98.5 now works with OpenSSL in FIPS compliant mode (bnc#904207).
- Fix server socket setup code in clamd (bnc#903489).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Evergreen 11.4:
zypper in -t patch 2014-94
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Evergreen 11.4 (i586 x86_64):
clamav-0.98.5-37.1
clamav-debuginfo-0.98.5-37.1
clamav-debugsource-0.98.5-37.1
- openSUSE Evergreen 11.4 (noarch):
clamav-db-0.98.5-37.1
References:
http://support.novell.com/security/cve/CVE-2013-6497.htmlhttps://bugzilla.suse.com/show_bug.cgi?id=903489https://bugzilla.suse.com/show_bug.cgi?id=904207https://bugzilla.suse.com/show_bug.cgi?id=906077
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:1678-1
Rating: important
References: #665315 #856659 #897112 #897736 #900786 #902346
#902349 #902351 #902632 #902633 #902728 #903748
#903986 #904013 #904097 #904289 #904417 #904539
#904717 #904932 #905068 #905100 #905329 #905739
#906914 #907818 #908163 #908253 #909077 #910251
Cross-References: CVE-2014-3673 CVE-2014-3687 CVE-2014-3688
CVE-2014-7826 CVE-2014-7841 CVE-2014-8133
CVE-2014-9090 CVE-2014-9322
Affected Products:
openSUSE 13.2
______________________________________________________________________________
An update that solves 8 vulnerabilities and has 22 fixes is
now available.
Description:
The openSUSE 13.2 kernel was updated to version 3.16.7.
These security issues were fixed:
- CVE-2014-9322: A local privilege escalation in the x86_64 32bit
compatibility signal handling was fixed, which could be used by local
attackers to crash the machine or execute code. (bnc#910251)
- CVE-2014-9090: The do_double_fault function in arch/x86/kernel/traps.c
in the Linux kernel did not properly handle faults associated with the
Stack Segment (SS) segment register, which allowed local users to cause
a denial of service (panic) via a modify_ldt system call, as
demonstrated by sigreturn_32 in the linux-clock-tests test suite.
(bnc#907818)
- CVE-2014-8133: Insufficient validation of TLS register usage could leak
information from the kernel stack to userspace. (bnc#909077)
- CVE-2014-3673: The SCTP implementation in the Linux kernel through
3.17.2 allowed remote attackers to cause a denial of service (system
crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c
and net/sctp/sm_statefuns.c (bnc#902346, bnc#902349).
- CVE-2014-3687: The sctp_assoc_lookup_asconf_ack function in
net/sctp/associola.c in the SCTP implementation in the Linux kernel
through 3.17.2 allowed remote attackers to cause a denial of service
(panic) via duplicate ASCONF chunks that triggered an incorrect uncork
within the side-effect interpreter (bnc#902349).
- CVE-2014-3688: The SCTP implementation in the Linux kernel before 3.17.4
allowed remote attackers to cause a denial of service (memory
consumption) by triggering a large number of chunks in an association's
output queue, as demonstrated by ASCONF probes, related to
net/sctp/inqueue.c and net/sctp/sm_statefuns.c (bnc#902351).
- CVE-2014-7826: kernel/trace/trace_syscalls.c in the Linux kernel through
3.17.2 did not properly handle private syscall numbers during use of the
ftrace subsystem, which allowed local users to gain privileges or cause
a denial of service (invalid pointer dereference) via a crafted
application (bnc#904013).
- CVE-2014-7841: The sctp_process_param function in
net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel
before 3.17.4, when ASCONF is used, allowed remote attackers to cause a
denial of service (NULL pointer dereference and system crash) via a
malformed INIT chunk (bnc#905100).
These non-security issues were fixed:
- ahci: Check and set 64-bit DMA mask for platform AHCI driver
(bnc#902632).
- ahci/xgene: Remove logic to set 64-bit DMA mask (bnc#902632).
- ahci_xgene: Skip the PHY and clock initialization if already configured
by the firmware (bnc#902632).
- ALSA: hda - Add mute LED control for Lenovo Ideapad Z560 (bnc#665315).
- ALSA: hda/realtek - Add alc_update_coef*_idx() helper (bnc#905068).
- ALSA: hda/realtek - Change EAPD to verb control (bnc#905068).
- ALSA: hda/realtek - Optimize alc888_coef_init() (bnc#905068).
- ALSA: hda/realtek - Restore default value for ALC668 (bnc#905068).
- ALSA: hda/realtek - Update Initial AMP for EAPD control (bnc#905068).
- ALSA: hda/realtek - Update restore default value for ALC282 (bnc#905068).
- ALSA: hda/realtek - Update restore default value for ALC283 (bnc#905068).
- ALSA: hda/realtek - Use alc_write_coef_idx() in alc269_quanta_automake()
(bnc#905068).
- ALSA: hda/realtek - Use tables for batch COEF writes/updtes (bnc#905068).
- ALSA: usb-audio: Do not resubmit pending URBs at MIDI error recovery.
- arm64: Add architectural support for PCI (bnc#902632).
- arm64: adjust el0_sync so that a function can be called (bnc#902632).
- arm64: Do not call enable PCI resources when specify PCI_PROBE_ONLY
(bnc#902632).
- arm64: dts: Add X-Gene reboot driver dts node (bnc#902632).
- arm64/efi: efistub: cover entire static mem footprint in PE/COFF .text
(bnc#902632).
- arm64/efi: efistub: do not abort if base of DRAM is occupied
(bnc#902632).
- arm64: fix bug for reloading FPSIMD state after cpu power off
(bnc#902632).
- arm64: fix VTTBR_BADDR_MASK (bnc#902632).
- arm64: fpsimd: fix a typo in fpsimd_save_partial_state ENDPROC
(bnc#902632).
- arm64/mustang: Disable sgenet and xgenet (bnc#902632).
- arm64: Select reboot driver for X-Gene platform (bnc#902632).
- arm: Add APM Mustang network driver (bnc#902632).
- arm/arm64: KVM: Fix and refactor unmap_range (bnc#902632).
- arm: Define PCI_IOBASE as the base of virtual PCI IO space (bnc#902632).
- asm-generic/io.h: Fix ioport_map() for !CONFIG_GENERIC_IOMAP
(bnc#902632).
- ax88179_178a: fix bonding failure (bsc#908253).
- btrfs: Fix and enhance merge_extent_mapping() to insert best fitted
extent map.
- btrfs: fix crash of btrfs_release_extent_buffer_page.
- btrfs: fix invalid leaf slot access in btrfs_lookup_extent().
- btrfs: fix kfree on list_head in btrfs_lookup_csums_range error cleanup.
- btrfs: fix lockups from btrfs_clear_path_blocking.
- btrfs: fix race that makes btrfs_lookup_extent_info miss skinny extent
items.
- btrfs: Fix the wrong condition judgment about subset extent map.
- btrfs: fix wrong accounting of raid1 data profile in statfs.
- btrfs: send, do not delay dir move if there is a new parent inode.
- config: armv7hl: Disable CONFIG_USB_MUSB_TUSB6010 (bnc#906914).
- cpufreq: arm_big_little: fix module license spec (bnc#902632).
- Delete patches.rpmify/chipidea-clean-up-dependencies (bnc#903986).
- Disable Exynos cpufreq modules.
- drivers/net/fddi/skfp/h/skfbi.h: Remove useless PCI_BASE_2ND macros
(bnc#902632).
- drm/i915: Keep vblank interrupts enabled while enabling/disabling planes
(bnc#904097).
- drm: Implement O_NONBLOCK support on /dev/dri/cardN (bnc#904097).
- drm/nv50/disp: fix dpms regression on certain boards (bnc#902728).
- drm/radeon: add locking around atombios scratch space usage (bnc#904932).
- drm/radeon: add missing crtc unlock when setting up the MC (bnc#904932).
- drm/radeon/dpm: disable ulv support on SI (bnc#904932).
- drm/radeon: fix endian swapping in vbios fetch for tdp table
(bnc#904932).
- drm/radeon: fix speaker allocation setup (bnc#904932).
- drm/radeon: initialize sadb to NULL in the audio code (bnc#904932).
- drm/radeon: make sure mode init is complete in bandwidth_update
(bnc#904932).
- drm/radeon: report disconnected for LVDS/eDP with PX if ddc fails
(bnc#904417).
- drm/radeon: set correct CE ram size for CIK (bnc#904932).
- drm/radeon: Use drm_malloc_ab instead of kmalloc_array (bnc#904932).
- drm/radeon: use gart for DMA IB tests (bnc#904932).
- drm/radeon: use gart memory for DMA ring tests (bnc#904932).
- drm/tilcdc: Fix the error path in tilcdc_load() (bko#86071).
- hp_accel: Add support for HP ZBook 15 (bnc#905329).
- ideapad-laptop: Change Lenovo Yoga 2 series rfkill handling (bnc#904289).
- Input: i8042 - also set the firmware id for MUXed ports (bnc#897112).
- Input: psmouse - add psmouse_matches_pnp_id helper function (bnc#897112).
- Input: psmouse - add support for detecting FocalTech PS/2 touchpads
(bnc#897112).
- Input: synaptics - add min/max quirk for Lenovo T440s (bnc#903748).
- irqchip: gic: preserve gic V2 bypass bits in cpu ctrl register
(bnc#902632).
- iwlwifi: dvm: drop non VO frames when flushing (bnc#900786).
- KEYS: Allow special keys (eg. DNS results) to be invalidated by
CAP_SYS_ADMIN (bnc#904717).
- KEYS: Fix stale key registration at error path (bnc#908163).
- KEYS: Fix the size of the key description passed to/from userspace
(bnc#904717).
- KEYS: Increase root_maxkeys and root_maxbytes sizes (bnc#904717).
- KEYS: request_key() should reget expired keys rather than give
EKEYEXPIRED (bnc#904717).
- KEYS: Simplify KEYRING_SEARCH_{NO,DO}_STATE_CHECK flags (bnc#904717).
- KVM: ARM: Add arm,gic-400 compatible support (bnc#902632).
- KVM: ARM: Hack to enable VGIC mapping on 64k PAGE_SIZE kernels
(bnc#902633).
- Limit xgbe a0 driver to arm64
- net/xgbe: Add A0 silicon support (bnc#902632).
- of/pci: Add pci_get_new_domain_nr() and of_get_pci_domain_nr()
(bnc#902632).
- of/pci: Add pci_register_io_range() and pci_pio_to_address()
(bnc#902632).
- of/pci: Add support for parsing PCI host bridge resources from DT
(bnc#902632).
- of/pci: Fix the conversion of IO ranges into IO resources (bnc#902632).
- of/pci: Move of_pci_range_to_resource() to of/address.c (bnc#902632).
- parport: parport_pc, do not remove parent devices early (bnc#856659).
- PCI: Add generic domain handling (bnc#902632).
- PCI: Add pci_remap_iospace() to map bus I/O resources (bnc#902632).
- PCI: xgene: Add APM X-Gene PCIe driver (bnc#902632).
- power: reset: Add generic SYSCON register mapped reset (bnc#902632).
- power: reset: Remove X-Gene reboot driver (bnc#902632).
- quirk for Lenovo Yoga 3: no rfkill switch (bnc#904289).
- reiserfs: destroy allocated commit workqueue.
- rtc: ia64: allow other architectures to use EFI RTC (bnc#902632).
- scripts/tags.sh: Do not specify kind-spec for emacs ctags/etags.
- scripts/tags.sh: fix DEFINE_HASHTABLE in emacs case.
- tags.sh: Fixup regex definition for etags.
- ttusb-dec: buffer overflow in ioctl (bnc#905739).
- usb: Add support for Synopsis H20AHB EHCI host controller (bnc#902632).
- usb: fix hcd h20ahb driver depends (bnc#902632).
- usb: uvc: add a quirk for Dell XPS M1330 webcam (bnc#904539).
- usb: uvc: Fix destruction order in uvc_delete() (bnc#897736).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2014-794
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
kernel-default-3.16.7-7.1
kernel-default-base-3.16.7-7.1
kernel-default-base-debuginfo-3.16.7-7.1
kernel-default-debuginfo-3.16.7-7.1
kernel-default-debugsource-3.16.7-7.1
kernel-default-devel-3.16.7-7.1
kernel-ec2-3.16.7-7.1
kernel-ec2-base-3.16.7-7.1
kernel-ec2-devel-3.16.7-7.1
kernel-obs-build-3.16.7-7.3
kernel-obs-build-debugsource-3.16.7-7.3
kernel-obs-qa-3.16.7-7.2
kernel-obs-qa-xen-3.16.7-7.2
kernel-syms-3.16.7-7.1
- openSUSE 13.2 (i686 x86_64):
kernel-debug-3.16.7-7.1
kernel-debug-base-3.16.7-7.1
kernel-debug-base-debuginfo-3.16.7-7.1
kernel-debug-debuginfo-3.16.7-7.1
kernel-debug-debugsource-3.16.7-7.1
kernel-debug-devel-3.16.7-7.1
kernel-debug-devel-debuginfo-3.16.7-7.1
kernel-desktop-3.16.7-7.1
kernel-desktop-base-3.16.7-7.1
kernel-desktop-base-debuginfo-3.16.7-7.1
kernel-desktop-debuginfo-3.16.7-7.1
kernel-desktop-debugsource-3.16.7-7.1
kernel-desktop-devel-3.16.7-7.1
kernel-ec2-base-debuginfo-3.16.7-7.1
kernel-ec2-debuginfo-3.16.7-7.1
kernel-ec2-debugsource-3.16.7-7.1
kernel-vanilla-3.16.7-7.1
kernel-vanilla-debuginfo-3.16.7-7.1
kernel-vanilla-debugsource-3.16.7-7.1
kernel-vanilla-devel-3.16.7-7.1
kernel-xen-3.16.7-7.1
kernel-xen-base-3.16.7-7.1
kernel-xen-base-debuginfo-3.16.7-7.1
kernel-xen-debuginfo-3.16.7-7.1
kernel-xen-debugsource-3.16.7-7.1
kernel-xen-devel-3.16.7-7.1
- openSUSE 13.2 (noarch):
kernel-devel-3.16.7-7.1
kernel-docs-3.16.7-7.2
kernel-macros-3.16.7-7.1
kernel-source-3.16.7-7.1
kernel-source-vanilla-3.16.7-7.1
- openSUSE 13.2 (i686):
kernel-pae-3.16.7-7.1
kernel-pae-base-3.16.7-7.1
kernel-pae-base-debuginfo-3.16.7-7.1
kernel-pae-debuginfo-3.16.7-7.1
kernel-pae-debugsource-3.16.7-7.1
kernel-pae-devel-3.16.7-7.1
References:
http://support.novell.com/security/cve/CVE-2014-3673.htmlhttp://support.novell.com/security/cve/CVE-2014-3687.htmlhttp://support.novell.com/security/cve/CVE-2014-3688.htmlhttp://support.novell.com/security/cve/CVE-2014-7826.htmlhttp://support.novell.com/security/cve/CVE-2014-7841.htmlhttp://support.novell.com/security/cve/CVE-2014-8133.htmlhttp://support.novell.com/security/cve/CVE-2014-9090.htmlhttp://support.novell.com/security/cve/CVE-2014-9322.htmlhttps://bugzilla.suse.com/show_bug.cgi?id=665315https://bugzilla.suse.com/show_bug.cgi?id=856659https://bugzilla.suse.com/show_bug.cgi?id=897112https://bugzilla.suse.com/show_bug.cgi?id=897736https://bugzilla.suse.com/show_bug.cgi?id=900786https://bugzilla.suse.com/show_bug.cgi?id=902346https://bugzilla.suse.com/show_bug.cgi?id=902349https://bugzilla.suse.com/show_bug.cgi?id=902351https://bugzilla.suse.com/show_bug.cgi?id=902632https://bugzilla.suse.com/show_bug.cgi?id=902633https://bugzilla.suse.com/show_bug.cgi?id=902728https://bugzilla.suse.com/show_bug.cgi?id=903748https://bugzilla.suse.com/show_bug.cgi?id=903986https://bugzilla.suse.com/show_bug.cgi?id=904013https://bugzilla.suse.com/show_bug.cgi?id=904097https://bugzilla.suse.com/show_bug.cgi?id=904289https://bugzilla.suse.com/show_bug.cgi?id=904417https://bugzilla.suse.com/show_bug.cgi?id=904539https://bugzilla.suse.com/show_bug.cgi?id=904717https://bugzilla.suse.com/show_bug.cgi?id=904932https://bugzilla.suse.com/show_bug.cgi?id=905068https://bugzilla.suse.com/show_bug.cgi?id=905100https://bugzilla.suse.com/show_bug.cgi?id=905329https://bugzilla.suse.com/show_bug.cgi?id=905739https://bugzilla.suse.com/show_bug.cgi?id=906914https://bugzilla.suse.com/show_bug.cgi?id=907818https://bugzilla.suse.com/show_bug.cgi?id=908163https://bugzilla.suse.com/show_bug.cgi?id=908253https://bugzilla.suse.com/show_bug.cgi?id=909077https://bugzilla.suse.com/show_bug.cgi?id=910251
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:1677-1
Rating: important
References: #818966 #835839 #853040 #856659 #864375 #865882
#873790 #875051 #881008 #882639 #882804 #883518
#883724 #883948 #883949 #884324 #887046 #887082
#889173 #890114 #891689 #892490 #893429 #896382
#896385 #896390 #896391 #896392 #896689 #897736
#899785 #900392 #902346 #902349 #902351 #904013
#904700 #905100 #905744 #907818 #908163 #909077
#910251
Cross-References: CVE-2013-2891 CVE-2013-2898 CVE-2014-0181
CVE-2014-0206 CVE-2014-1739 CVE-2014-3181
CVE-2014-3182 CVE-2014-3184 CVE-2014-3185
CVE-2014-3186 CVE-2014-3673 CVE-2014-3687
CVE-2014-3688 CVE-2014-4171 CVE-2014-4508
CVE-2014-4608 CVE-2014-4611 CVE-2014-4943
CVE-2014-5077 CVE-2014-5206 CVE-2014-5207
CVE-2014-5471 CVE-2014-5472 CVE-2014-6410
CVE-2014-7826 CVE-2014-7841 CVE-2014-7975
CVE-2014-8133 CVE-2014-8709 CVE-2014-9090
CVE-2014-9322
Affected Products:
openSUSE 13.1
______________________________________________________________________________
An update that solves 31 vulnerabilities and has 12 fixes
is now available.
Description:
The openSUSE 13.1 kernel was updated to fix security issues and bugs:
Security issues fixed: CVE-2014-9322: A local privilege escalation in the
x86_64 32bit compatibility signal handling was fixed, which could be used
by local attackers to crash the machine or execute code.
CVE-2014-9090: The do_double_fault function in arch/x86/kernel/traps.c in
the Linux kernel did not properly handle faults associated with the Stack
Segment (SS) segment register, which allowed local users to cause a denial
of service (panic) via a modify_ldt system call, as demonstrated by
sigreturn_32 in the linux-clock-tests test suite.
CVE-2014-8133: Insufficient validation of TLS register usage could leak
information from the kernel stack to userspace.
CVE-2014-0181: The Netlink implementation in the Linux kernel through
3.14.1 did not provide a mechanism for authorizing socket operations based
on the opener of a socket, which allowed local users to bypass intended
access restrictions and modify network configurations by using a Netlink
socket for the (1) stdout or (2) stderr of a setuid program. (bsc#875051)
CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel on 32-bit
x86 platforms, when syscall auditing is enabled and the sep CPU feature
flag is set, allowed local users to cause a denial of service (OOPS and
system crash) via an invalid syscall number, as demonstrated by number
1000.
CVE-2014-3688: The SCTP implementation in the Linux kernel allowed remote
attackers to cause a denial of service (memory consumption) by triggering
a large number of chunks in an association's output queue, as demonstrated
by ASCONF probes, related to net/sctp/inqueue.c and
net/sctp/sm_statefuns.c.
CVE-2014-3687: The sctp_assoc_lookup_asconf_ack function in
net/sctp/associola.c in the SCTP implementation in the Linux kernel
allowed remote attackers to cause a denial of service (panic) via
duplicate ASCONF chunks that trigger an incorrect uncork within the
side-effect interpreter.
CVE-2014-7975: The do_umount function in fs/namespace.c in the Linux
kernel did not require the CAP_SYS_ADMIN capability for do_remount_sb
calls that change the root filesystem to read-only, which allowed local
users to cause a denial of service (loss of writability) by making certain
unshare system calls, clearing the / MNT_LOCKED flag, and making an
MNT_FORCE umount system call.
CVE-2014-8884: Stack-based buffer overflow in the
ttusbdecfe_dvbs_diseqc_send_master_cmd function in
drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel allowed local
users to cause a denial of service (system crash) or possibly gain
privileges via a large message length in an ioctl call.
CVE-2014-3673: The SCTP implementation in the Linux kernel allowed remote
attackers to cause a denial of service (system crash) via a malformed
ASCONF chunk, related to net/sctp/sm_make_chunk.c and
net/sctp/sm_statefuns.c.
CVE-2014-3186: Buffer overflow in the picolcd_raw_event function in
devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in the
Linux kernel, as used in Android on Nexus 7 devices, allowed physically
proximate attackers to cause a denial of service (system crash) or
possibly execute arbitrary code via a crafted device that sends a large
report.
CVE-2014-7841: The sctp_process_param function in net/sctp/sm_make_chunk.c
in the SCTP implementation in the Linux kernel, when ASCONF is used,
allowed remote attackers to cause a denial of service (NULL pointer
dereference and system crash) via a malformed INIT chunk.
CVE-2014-4611: Integer overflow in the LZ4 algorithm implementation, as
used in Yann Collet LZ4 before r118 and in the lz4_uncompress function in
lib/lz4/lz4_decompress.c in the Linux kernel before 3.15.2, on 32-bit
platforms might allow context-dependent attackers to cause a denial of
service (memory corruption) or possibly have unspecified other impact via
a crafted Literal Run that would be improperly handled by programs not
complying with an API limitation, a different vulnerability than
CVE-2014-4715.
CVE-2014-4608: Multiple integer overflows in the lzo1x_decompress_safe
function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the
Linux kernel allowed context-dependent attackers to cause a denial
of service (memory corruption) via a crafted Literal Run.
CVE-2014-8709: The ieee80211_fragment function in net/mac80211/tx.c in the
Linux kernel did not properly maintain a certain tail pointer, which
allowed remote attackers to obtain sensitive cleartext information by
reading packets.
CVE-2014-3185: Multiple buffer overflows in the command_port_read_callback
function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial
Driver in the Linux kernel allowed physically proximate attackers to
execute arbitrary code or cause a denial of service (memory corruption and
system crash) via a crafted device that provides a large amount of (1)
EHCI or (2) XHCI data associated with a bulk response.
CVE-2014-3184: The report_fixup functions in the HID subsystem in the
Linux kernel might have allowed physically proximate attackers to cause a
denial of service (out-of-bounds write) via a crafted device that provides
a small report descriptor, related to (1) drivers/hid/hid-cherry.c, (2)
drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4)
drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6)
drivers/hid/hid-sunplus.c.
CVE-2014-3182: Array index error in the logi_dj_raw_event function in
drivers/hid/hid-logitech-dj.c in the Linux kernel allowed physically
proximate attackers to execute arbitrary code or cause a denial of service
(invalid kfree) via a crafted device that provides a malformed
REPORT_TYPE_NOTIF_DEVICE_UNPAIRED value.
CVE-2014-3181: Multiple stack-based buffer overflows in the
magicmouse_raw_event function in drivers/hid/hid-magicmouse.c in the Magic
Mouse HID driver in the Linux kernel allowed physically proximate
attackers to cause a denial of service (system crash) or possibly execute
arbitrary code via a crafted device that provides a large amount of (1)
EHCI or (2) XHCI data associated with an event.
CVE-2014-7826: kernel/trace/trace_syscalls.c in the Linux kernel did not
properly handle private syscall numbers during use of the ftrace
subsystem, which allowed local users to gain privileges or cause a denial
of service (invalid pointer dereference) via a crafted application.
CVE-2013-7263: The Linux kernel updated certain length values before
ensuring that associated data structures have been initialized, which
allowed local users to obtain sensitive information from kernel stack
memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call,
related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c,
net/ipv6/raw.c, and net/ipv6/udp.c. This update fixes the leak of the port
number when using ipv6 sockets. (bsc#853040).
CVE-2013-2898: Fixed potential kernel caller confusion via
past-end-of-heap-allocation read in sensor-hub HID driver.
CVE-2013-2891: Fixed 16 byte past-end-of-heap-alloc zeroing in steelseries
HID driver.
VE-2014-6410: The __udf_read_inode function in fs/udf/inode.c in the Linux
kernel did not restrict the amount of ICB indirection, which allowed
physically proximate attackers to cause a denial of service (infinite loop
or stack consumption) via a UDF filesystem with a crafted inode.
CVE-2014-5471: Stack consumption vulnerability in the
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux
kernel allowed local users to cause a denial of service (uncontrolled
recursion, and system crash or reboot) via a crafted iso9660 image with a
CL entry referring to a directory entry that has a CL entry.
CVE-2014-5472: The parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel allowed local users to cause a denial
of service (unkillable mount process) via a crafted iso9660 image with a
self-referential CL entry.
CVE-2014-0206: Array index error in the aio_read_events_ring function in
fs/aio.c in the Linux kernel allowed local users to obtain sensitive
information from kernel memory via a large head value.
CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel on 32-bit
x86 platforms, when syscall auditing is enabled and the sep CPU feature
flag is set, allowed local users to cause a denial of service (OOPS and
system crash) via an invalid syscall number, as demonstrated by number
1000.
CVE-2014-5206: The do_remount function in fs/namespace.c in the Linux
kernel did not maintain the MNT_LOCK_READONLY bit across a remount of a
bind mount, which allowed local users to bypass an intended read-only
restriction and defeat certain sandbox protection mechanisms via a "mount
-o remount" command within a user namespace.
CVE-2014-5207: fs/namespace.c in the Linux kernel did not properly
restrict clearing MNT_NODEV, MNT_NOSUID, and MNT_NOEXEC and changing
MNT_ATIME_MASK during a remount of a bind mount, which allowed local users
to gain privileges, interfere with backups and auditing on systems that
had atime enabled, or cause a denial of service (excessive filesystem
updating) on systems that had atime disabled via a "mount -o remount"
command within a user namespace.
CVE-2014-1739: The media_device_enum_entities function in
drivers/media/media-device.c in the Linux kernel did not initialize a
certain data structure, which allowed local users to obtain sensitive
information from kernel memory by leveraging /dev/media0 read access for a
MEDIA_IOC_ENUM_ENTITIES ioctl call.
CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux
kernel allowed local users to gain privileges by leveraging data-structure
differences between an l2tp socket and an inet socket.
CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel on 32-bit
x86 platforms, when syscall auditing is enabled and the sep CPU feature
flag is set, allowed local users to cause a denial of service (OOPS and
system crash) via an invalid syscall number, as demonstrated by number
1000.
CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in
the Linux kernel, when SCTP authentication is enabled, allowed remote
attackers to cause a denial of service (NULL pointer dereference and OOPS)
by starting to establish an association between two endpoints immediately
after an exchange of INIT and INIT ACK chunks to establish an earlier
association between these endpoints in the opposite direction.
CVE-2014-4171: mm/shmem.c in the Linux kernel did not properly implement
the interaction between range notification and hole punching, which
allowed local users to cause a denial of service (i_mutex hold) by using
the mmap system call to access a hole, as demonstrated by interfering with
intended shmem activity by blocking completion of (1) an MADV_REMOVE
madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call.
Also the following bugs were fixed:
- KEYS: Fix stale key registration at error path (bnc#908163).
- parport: parport_pc, do not remove parent devices early (bnc#856659).
- xfs: fix directory hash ordering bug.
- xfs: mark all internal workqueues as freezable (bnc#899785).
- [media] uvc: Fix destruction order in uvc_delete() (bnc#897736).
- cfq-iosched: Fix wrong children_weight calculation (bnc#893429).
- target/rd: Refactor rd_build_device_space + rd_release_device_space
(bnc#882639).
- Btrfs: Fix memory corruption by ulist_add_merge() on 32bit arch
(bnc#887046).
- usb: pci-quirks: Prevent Sony VAIO t-series from switching usb ports
(bnc#864375).
- xhci: Switch only Intel Lynx Point-LP ports to EHCI on shutdown
(bnc#864375).
- xhci: Switch Intel Lynx Point ports to EHCI on shutdown (bnc#864375).
- ALSA: hda - Fix broken PM due to incomplete i915 initialization
(bnc#890114).
- netbk: Don't destroy the netdev until the vif is shut down (bnc#881008).
- swiotlb: don't assume PA 0 is invalid (bnc#865882).
- PM / sleep: Fix request_firmware() error at resume (bnc#873790).
- usbcore: don't log on consecutive debounce failures of the same port
(bnc#818966).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-793
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i686 x86_64):
kernel-debug-3.11.10-25.1
kernel-debug-base-3.11.10-25.1
kernel-debug-base-debuginfo-3.11.10-25.1
kernel-debug-debuginfo-3.11.10-25.1
kernel-debug-debugsource-3.11.10-25.1
kernel-debug-devel-3.11.10-25.1
kernel-debug-devel-debuginfo-3.11.10-25.1
kernel-desktop-3.11.10-25.1
kernel-desktop-base-3.11.10-25.1
kernel-desktop-base-debuginfo-3.11.10-25.1
kernel-desktop-debuginfo-3.11.10-25.1
kernel-desktop-debugsource-3.11.10-25.1
kernel-desktop-devel-3.11.10-25.1
kernel-desktop-devel-debuginfo-3.11.10-25.1
kernel-ec2-3.11.10-25.1
kernel-ec2-base-3.11.10-25.1
kernel-ec2-base-debuginfo-3.11.10-25.1
kernel-ec2-debuginfo-3.11.10-25.1
kernel-ec2-debugsource-3.11.10-25.1
kernel-ec2-devel-3.11.10-25.1
kernel-ec2-devel-debuginfo-3.11.10-25.1
kernel-trace-3.11.10-25.1
kernel-trace-base-3.11.10-25.1
kernel-trace-base-debuginfo-3.11.10-25.1
kernel-trace-debuginfo-3.11.10-25.1
kernel-trace-debugsource-3.11.10-25.1
kernel-trace-devel-3.11.10-25.1
kernel-trace-devel-debuginfo-3.11.10-25.1
kernel-vanilla-3.11.10-25.1
kernel-vanilla-debuginfo-3.11.10-25.1
kernel-vanilla-debugsource-3.11.10-25.1
kernel-vanilla-devel-3.11.10-25.1
kernel-vanilla-devel-debuginfo-3.11.10-25.1
kernel-xen-3.11.10-25.1
kernel-xen-base-3.11.10-25.1
kernel-xen-base-debuginfo-3.11.10-25.1
kernel-xen-debuginfo-3.11.10-25.1
kernel-xen-debugsource-3.11.10-25.1
kernel-xen-devel-3.11.10-25.1
kernel-xen-devel-debuginfo-3.11.10-25.1
- openSUSE 13.1 (i586 x86_64):
cloop-2.639-11.16.1
cloop-debuginfo-2.639-11.16.1
cloop-debugsource-2.639-11.16.1
cloop-kmp-default-2.639_k3.11.10_25-11.16.1
cloop-kmp-default-debuginfo-2.639_k3.11.10_25-11.16.1
cloop-kmp-desktop-2.639_k3.11.10_25-11.16.1
cloop-kmp-desktop-debuginfo-2.639_k3.11.10_25-11.16.1
cloop-kmp-xen-2.639_k3.11.10_25-11.16.1
cloop-kmp-xen-debuginfo-2.639_k3.11.10_25-11.16.1
crash-7.0.2-2.16.1
crash-debuginfo-7.0.2-2.16.1
crash-debugsource-7.0.2-2.16.1
crash-devel-7.0.2-2.16.1
crash-doc-7.0.2-2.16.1
crash-eppic-7.0.2-2.16.1
crash-eppic-debuginfo-7.0.2-2.16.1
crash-gcore-7.0.2-2.16.1
crash-gcore-debuginfo-7.0.2-2.16.1
crash-kmp-default-7.0.2_k3.11.10_25-2.16.1
crash-kmp-default-debuginfo-7.0.2_k3.11.10_25-2.16.1
crash-kmp-desktop-7.0.2_k3.11.10_25-2.16.1
crash-kmp-desktop-debuginfo-7.0.2_k3.11.10_25-2.16.1
crash-kmp-xen-7.0.2_k3.11.10_25-2.16.1
crash-kmp-xen-debuginfo-7.0.2_k3.11.10_25-2.16.1
hdjmod-debugsource-1.28-16.16.1
hdjmod-kmp-default-1.28_k3.11.10_25-16.16.1
hdjmod-kmp-default-debuginfo-1.28_k3.11.10_25-16.16.1
hdjmod-kmp-desktop-1.28_k3.11.10_25-16.16.1
hdjmod-kmp-desktop-debuginfo-1.28_k3.11.10_25-16.16.1
hdjmod-kmp-xen-1.28_k3.11.10_25-16.16.1
hdjmod-kmp-xen-debuginfo-1.28_k3.11.10_25-16.16.1
ipset-6.21.1-2.20.1
ipset-debuginfo-6.21.1-2.20.1
ipset-debugsource-6.21.1-2.20.1
ipset-devel-6.21.1-2.20.1
ipset-kmp-default-6.21.1_k3.11.10_25-2.20.1
ipset-kmp-default-debuginfo-6.21.1_k3.11.10_25-2.20.1
ipset-kmp-desktop-6.21.1_k3.11.10_25-2.20.1
ipset-kmp-desktop-debuginfo-6.21.1_k3.11.10_25-2.20.1
ipset-kmp-xen-6.21.1_k3.11.10_25-2.20.1
ipset-kmp-xen-debuginfo-6.21.1_k3.11.10_25-2.20.1
iscsitarget-1.4.20.3-13.16.1
iscsitarget-debuginfo-1.4.20.3-13.16.1
iscsitarget-debugsource-1.4.20.3-13.16.1
iscsitarget-kmp-default-1.4.20.3_k3.11.10_25-13.16.1
iscsitarget-kmp-default-debuginfo-1.4.20.3_k3.11.10_25-13.16.1
iscsitarget-kmp-desktop-1.4.20.3_k3.11.10_25-13.16.1
iscsitarget-kmp-desktop-debuginfo-1.4.20.3_k3.11.10_25-13.16.1
iscsitarget-kmp-xen-1.4.20.3_k3.11.10_25-13.16.1
iscsitarget-kmp-xen-debuginfo-1.4.20.3_k3.11.10_25-13.16.1
kernel-default-3.11.10-25.1
kernel-default-base-3.11.10-25.1
kernel-default-base-debuginfo-3.11.10-25.1
kernel-default-debuginfo-3.11.10-25.1
kernel-default-debugsource-3.11.10-25.1
kernel-default-devel-3.11.10-25.1
kernel-default-devel-debuginfo-3.11.10-25.1
kernel-syms-3.11.10-25.1
libipset3-6.21.1-2.20.1
libipset3-debuginfo-6.21.1-2.20.1
ndiswrapper-1.58-16.1
ndiswrapper-debuginfo-1.58-16.1
ndiswrapper-debugsource-1.58-16.1
ndiswrapper-kmp-default-1.58_k3.11.10_25-16.1
ndiswrapper-kmp-default-debuginfo-1.58_k3.11.10_25-16.1
ndiswrapper-kmp-desktop-1.58_k3.11.10_25-16.1
ndiswrapper-kmp-desktop-debuginfo-1.58_k3.11.10_25-16.1
pcfclock-0.44-258.16.1
pcfclock-debuginfo-0.44-258.16.1
pcfclock-debugsource-0.44-258.16.1
pcfclock-kmp-default-0.44_k3.11.10_25-258.16.1
pcfclock-kmp-default-debuginfo-0.44_k3.11.10_25-258.16.1
pcfclock-kmp-desktop-0.44_k3.11.10_25-258.16.1
pcfclock-kmp-desktop-debuginfo-0.44_k3.11.10_25-258.16.1
python-virtualbox-4.2.18-2.21.1
python-virtualbox-debuginfo-4.2.18-2.21.1
vhba-kmp-debugsource-20130607-2.17.1
vhba-kmp-default-20130607_k3.11.10_25-2.17.1
vhba-kmp-default-debuginfo-20130607_k3.11.10_25-2.17.1
vhba-kmp-desktop-20130607_k3.11.10_25-2.17.1
vhba-kmp-desktop-debuginfo-20130607_k3.11.10_25-2.17.1
vhba-kmp-xen-20130607_k3.11.10_25-2.17.1
vhba-kmp-xen-debuginfo-20130607_k3.11.10_25-2.17.1
virtualbox-4.2.18-2.21.1
virtualbox-debuginfo-4.2.18-2.21.1
virtualbox-debugsource-4.2.18-2.21.1
virtualbox-devel-4.2.18-2.21.1
virtualbox-guest-kmp-default-4.2.18_k3.11.10_25-2.21.1
virtualbox-guest-kmp-default-debuginfo-4.2.18_k3.11.10_25-2.21.1
virtualbox-guest-kmp-desktop-4.2.18_k3.11.10_25-2.21.1
virtualbox-guest-kmp-desktop-debuginfo-4.2.18_k3.11.10_25-2.21.1
virtualbox-guest-tools-4.2.18-2.21.1
virtualbox-guest-tools-debuginfo-4.2.18-2.21.1
virtualbox-guest-x11-4.2.18-2.21.1
virtualbox-guest-x11-debuginfo-4.2.18-2.21.1
virtualbox-host-kmp-default-4.2.18_k3.11.10_25-2.21.1
virtualbox-host-kmp-default-debuginfo-4.2.18_k3.11.10_25-2.21.1
virtualbox-host-kmp-desktop-4.2.18_k3.11.10_25-2.21.1
virtualbox-host-kmp-desktop-debuginfo-4.2.18_k3.11.10_25-2.21.1
virtualbox-qt-4.2.18-2.21.1
virtualbox-qt-debuginfo-4.2.18-2.21.1
virtualbox-websrv-4.2.18-2.21.1
virtualbox-websrv-debuginfo-4.2.18-2.21.1
xen-debugsource-4.3.2_02-30.1
xen-devel-4.3.2_02-30.1
xen-kmp-default-4.3.2_02_k3.11.10_25-30.1
xen-kmp-default-debuginfo-4.3.2_02_k3.11.10_25-30.1
xen-kmp-desktop-4.3.2_02_k3.11.10_25-30.1
xen-kmp-desktop-debuginfo-4.3.2_02_k3.11.10_25-30.1
xen-libs-4.3.2_02-30.1
xen-libs-debuginfo-4.3.2_02-30.1
xen-tools-domU-4.3.2_02-30.1
xen-tools-domU-debuginfo-4.3.2_02-30.1
xtables-addons-2.3-2.16.1
xtables-addons-debuginfo-2.3-2.16.1
xtables-addons-debugsource-2.3-2.16.1
xtables-addons-kmp-default-2.3_k3.11.10_25-2.16.1
xtables-addons-kmp-default-debuginfo-2.3_k3.11.10_25-2.16.1
xtables-addons-kmp-desktop-2.3_k3.11.10_25-2.16.1
xtables-addons-kmp-desktop-debuginfo-2.3_k3.11.10_25-2.16.1
xtables-addons-kmp-xen-2.3_k3.11.10_25-2.16.1
xtables-addons-kmp-xen-debuginfo-2.3_k3.11.10_25-2.16.1
- openSUSE 13.1 (noarch):
kernel-devel-3.11.10-25.1
kernel-docs-3.11.10-25.2
kernel-source-3.11.10-25.1
kernel-source-vanilla-3.11.10-25.1
- openSUSE 13.1 (x86_64):
xen-4.3.2_02-30.1
xen-doc-html-4.3.2_02-30.1
xen-libs-32bit-4.3.2_02-30.1
xen-libs-debuginfo-32bit-4.3.2_02-30.1
xen-tools-4.3.2_02-30.1
xen-tools-debuginfo-4.3.2_02-30.1
xen-xend-tools-4.3.2_02-30.1
xen-xend-tools-debuginfo-4.3.2_02-30.1
- openSUSE 13.1 (i686):
kernel-pae-3.11.10-25.1
kernel-pae-base-3.11.10-25.1
kernel-pae-base-debuginfo-3.11.10-25.1
kernel-pae-debuginfo-3.11.10-25.1
kernel-pae-debugsource-3.11.10-25.1
kernel-pae-devel-3.11.10-25.1
kernel-pae-devel-debuginfo-3.11.10-25.1
- openSUSE 13.1 (i586):
cloop-kmp-pae-2.639_k3.11.10_25-11.16.1
cloop-kmp-pae-debuginfo-2.639_k3.11.10_25-11.16.1
crash-kmp-pae-7.0.2_k3.11.10_25-2.16.1
crash-kmp-pae-debuginfo-7.0.2_k3.11.10_25-2.16.1
hdjmod-kmp-pae-1.28_k3.11.10_25-16.16.1
hdjmod-kmp-pae-debuginfo-1.28_k3.11.10_25-16.16.1
ipset-kmp-pae-6.21.1_k3.11.10_25-2.20.1
ipset-kmp-pae-debuginfo-6.21.1_k3.11.10_25-2.20.1
iscsitarget-kmp-pae-1.4.20.3_k3.11.10_25-13.16.1
iscsitarget-kmp-pae-debuginfo-1.4.20.3_k3.11.10_25-13.16.1
ndiswrapper-kmp-pae-1.58_k3.11.10_25-16.1
ndiswrapper-kmp-pae-debuginfo-1.58_k3.11.10_25-16.1
pcfclock-kmp-pae-0.44_k3.11.10_25-258.16.1
pcfclock-kmp-pae-debuginfo-0.44_k3.11.10_25-258.16.1
vhba-kmp-pae-20130607_k3.11.10_25-2.17.1
vhba-kmp-pae-debuginfo-20130607_k3.11.10_25-2.17.1
virtualbox-guest-kmp-pae-4.2.18_k3.11.10_25-2.21.1
virtualbox-guest-kmp-pae-debuginfo-4.2.18_k3.11.10_25-2.21.1
virtualbox-host-kmp-pae-4.2.18_k3.11.10_25-2.21.1
virtualbox-host-kmp-pae-debuginfo-4.2.18_k3.11.10_25-2.21.1
xen-kmp-pae-4.3.2_02_k3.11.10_25-30.1
xen-kmp-pae-debuginfo-4.3.2_02_k3.11.10_25-30.1
xtables-addons-kmp-pae-2.3_k3.11.10_25-2.16.1
xtables-addons-kmp-pae-debuginfo-2.3_k3.11.10_25-2.16.1
References:
http://support.novell.com/security/cve/CVE-2013-2891.htmlhttp://support.novell.com/security/cve/CVE-2013-2898.htmlhttp://support.novell.com/security/cve/CVE-2014-0181.htmlhttp://support.novell.com/security/cve/CVE-2014-0206.htmlhttp://support.novell.com/security/cve/CVE-2014-1739.htmlhttp://support.novell.com/security/cve/CVE-2014-3181.htmlhttp://support.novell.com/security/cve/CVE-2014-3182.htmlhttp://support.novell.com/security/cve/CVE-2014-3184.htmlhttp://support.novell.com/security/cve/CVE-2014-3185.htmlhttp://support.novell.com/security/cve/CVE-2014-3186.htmlhttp://support.novell.com/security/cve/CVE-2014-3673.htmlhttp://support.novell.com/security/cve/CVE-2014-3687.htmlhttp://support.novell.com/security/cve/CVE-2014-3688.htmlhttp://support.novell.com/security/cve/CVE-2014-4171.htmlhttp://support.novell.com/security/cve/CVE-2014-4508.htmlhttp://support.novell.com/security/cve/CVE-2014-4608.htmlhttp://support.novell.com/security/cve/CVE-2014-4611.htmlhttp://support.novell.com/security/cve/CVE-2014-4943.htmlhttp://support.novell.com/security/cve/CVE-2014-5077.htmlhttp://support.novell.com/security/cve/CVE-2014-5206.htmlhttp://support.novell.com/security/cve/CVE-2014-5207.htmlhttp://support.novell.com/security/cve/CVE-2014-5471.htmlhttp://support.novell.com/security/cve/CVE-2014-5472.htmlhttp://support.novell.com/security/cve/CVE-2014-6410.htmlhttp://support.novell.com/security/cve/CVE-2014-7826.htmlhttp://support.novell.com/security/cve/CVE-2014-7841.htmlhttp://support.novell.com/security/cve/CVE-2014-7975.htmlhttp://support.novell.com/security/cve/CVE-2014-8133.htmlhttp://support.novell.com/security/cve/CVE-2014-8709.htmlhttp://support.novell.com/security/cve/CVE-2014-9090.htmlhttp://support.novell.com/security/cve/CVE-2014-9322.htmlhttps://bugzilla.suse.com/show_bug.cgi?id=818966https://bugzilla.suse.com/show_bug.cgi?id=835839https://bugzilla.suse.com/show_bug.cgi?id=853040https://bugzilla.suse.com/show_bug.cgi?id=856659https://bugzilla.suse.com/show_bug.cgi?id=864375https://bugzilla.suse.com/show_bug.cgi?id=865882https://bugzilla.suse.com/show_bug.cgi?id=873790https://bugzilla.suse.com/show_bug.cgi?id=875051https://bugzilla.suse.com/show_bug.cgi?id=881008https://bugzilla.suse.com/show_bug.cgi?id=882639https://bugzilla.suse.com/show_bug.cgi?id=882804https://bugzilla.suse.com/show_bug.cgi?id=883518https://bugzilla.suse.com/show_bug.cgi?id=883724https://bugzilla.suse.com/show_bug.cgi?id=883948https://bugzilla.suse.com/show_bug.cgi?id=883949https://bugzilla.suse.com/show_bug.cgi?id=884324https://bugzilla.suse.com/show_bug.cgi?id=887046https://bugzilla.suse.com/show_bug.cgi?id=887082https://bugzilla.suse.com/show_bug.cgi?id=889173https://bugzilla.suse.com/show_bug.cgi?id=890114https://bugzilla.suse.com/show_bug.cgi?id=891689https://bugzilla.suse.com/show_bug.cgi?id=892490https://bugzilla.suse.com/show_bug.cgi?id=893429https://bugzilla.suse.com/show_bug.cgi?id=896382https://bugzilla.suse.com/show_bug.cgi?id=896385https://bugzilla.suse.com/show_bug.cgi?id=896390https://bugzilla.suse.com/show_bug.cgi?id=896391https://bugzilla.suse.com/show_bug.cgi?id=896392https://bugzilla.suse.com/show_bug.cgi?id=896689https://bugzilla.suse.com/show_bug.cgi?id=897736https://bugzilla.suse.com/show_bug.cgi?id=899785https://bugzilla.suse.com/show_bug.cgi?id=900392https://bugzilla.suse.com/show_bug.cgi?id=902346https://bugzilla.suse.com/show_bug.cgi?id=902349https://bugzilla.suse.com/show_bug.cgi?id=902351https://bugzilla.suse.com/show_bug.cgi?id=904013https://bugzilla.suse.com/show_bug.cgi?id=904700https://bugzilla.suse.com/show_bug.cgi?id=905100https://bugzilla.suse.com/show_bug.cgi?id=905744https://bugzilla.suse.com/show_bug.cgi?id=907818https://bugzilla.suse.com/show_bug.cgi?id=908163https://bugzilla.suse.com/show_bug.cgi?id=909077https://bugzilla.suse.com/show_bug.cgi?id=910251
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for ntp
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:1670-1
Rating: critical
References: #910764
Cross-References: CVE-2014-9295 CVE-2014-9296
Affected Products:
openSUSE 13.2
openSUSE 13.1
openSUSE 12.3
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
The network timeservice ntp was updated to fix critical security issues
(bnc#910764, CERT VU#852879)
* A potential remote code execution problem was found inside ntpd. The
functions crypto_recv() (when using autokey authentication),
ctl_putdata(), and configure() where updated to avoid buffer overflows
that could be exploited. (CVE-2014-9295)
* Furthermore a problem inside the ntpd error handling was found that is
missing a return statement. This could also lead to a potentially attack
vector. (CVE-2014-9296)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2014-792
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-792
- openSUSE 12.3:
zypper in -t patch openSUSE-2014-792
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
ntp-4.2.6p5-25.5.1
ntp-debuginfo-4.2.6p5-25.5.1
ntp-debugsource-4.2.6p5-25.5.1
ntp-doc-4.2.6p5-25.5.1
- openSUSE 13.1 (i586 x86_64):
ntp-4.2.6p5-15.13.1
ntp-debuginfo-4.2.6p5-15.13.1
ntp-debugsource-4.2.6p5-15.13.1
ntp-doc-4.2.6p5-15.13.1
- openSUSE 12.3 (i586 x86_64):
ntp-4.2.6p5-9.14.1
ntp-debuginfo-4.2.6p5-9.14.1
ntp-debugsource-4.2.6p5-9.14.1
ntp-doc-4.2.6p5-9.14.1
References:
http://support.novell.com/security/cve/CVE-2014-9295.htmlhttp://support.novell.com/security/cve/CVE-2014-9296.htmlhttps://bugzilla.suse.com/show_bug.cgi?id=910764
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:1669-1
Rating: important
References: #768714 #818561 #835839 #853040 #865882 #882639
#883518 #883724 #883948 #887082 #889173 #890624
#892490 #896382 #896385 #896390 #896391 #896392
#896689 #899785 #904013 #904700 #905100 #905764
#907818 #909077 #910251
Cross-References: CVE-2013-2889 CVE-2013-2891 CVE-2014-3181
CVE-2014-3182 CVE-2014-3184 CVE-2014-3185
CVE-2014-3186 CVE-2014-4171 CVE-2014-4508
CVE-2014-4608 CVE-2014-4943 CVE-2014-5077
CVE-2014-5471 CVE-2014-5472 CVE-2014-6410
CVE-2014-7826 CVE-2014-7841 CVE-2014-8133
CVE-2014-8709 CVE-2014-8884 CVE-2014-9090
CVE-2014-9322
Affected Products:
openSUSE 12.3
______________________________________________________________________________
An update that solves 22 vulnerabilities and has 5 fixes is
now available.
Description:
The openSUSE 12.3 kernel was updated to fix security issues:
This will be the final kernel update for openSUSE 13.2 during its
lifetime, which ends January 4th 2015.
CVE-2014-9322: A local privilege escalation in the x86_64 32bit
compatibility signal handling was fixed, which could be used by local
attackers to crash the machine or execute code.
CVE-2014-9090: The do_double_fault function in arch/x86/kernel/traps.c in
the Linux kernel did not properly handle faults associated with the Stack
Segment (SS) segment register, which allowed local users to cause a denial
of service (panic) via a modify_ldt system call, as demonstrated by
sigreturn_32 in the linux-clock-tests test suite.
CVE-2014-8133: Insufficient validation of TLS register usage could leak
information from the kernel stack to userspace.
CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel on 32-bit
x86 platforms, when syscall auditing is enabled and the sep CPU feature
flag is set, allowed local users to cause a denial of service (OOPS and
system crash) via an invalid syscall number, as demonstrated by number
1000.
CVE-2014-8884: Stack-based buffer overflow in the
ttusbdecfe_dvbs_diseqc_send_master_cmd function in
drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel allowed local
users to cause a denial of service (system crash) or possibly gain
privileges via a large message length in an ioctl call.
CVE-2014-3186: Buffer overflow in the picolcd_raw_event function in
devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in the
Linux kernel, as used in Android on Nexus 7 devices, allowed physically
proximate attackers to cause a denial of service (system crash) or
possibly execute arbitrary code via a crafted device that sends a large
report.
CVE-2014-7841: The sctp_process_param function in net/sctp/sm_make_chunk.c
in the SCTP implementation in the Linux kernel, when ASCONF is used,
allowed remote attackers to cause a denial of service (NULL pointer
dereference and system crash) via a malformed INIT chunk.
CVE-2014-4608: Multiple integer overflows in the lzo1x_decompress_safe
function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the
Linux kernel allowed context-dependent attackers to cause a denial
of service (memory corruption) via a crafted Literal Run.
CVE-2014-8709: The ieee80211_fragment function in net/mac80211/tx.c in the
Linux kernel did not properly maintain a certain tail pointer, which
allowed remote attackers to obtain sensitive cleartext information by
reading packets.
CVE-2014-3185: Multiple buffer overflows in the command_port_read_callback
function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial
Driver in the Linux kernel allowed physically proximate attackers to
execute arbitrary code or cause a denial of service (memory corruption and
system crash) via a crafted device that provides a large amount of (1)
EHCI or (2) XHCI data associated with a bulk response.
CVE-2014-3184: The report_fixup functions in the HID subsystem in the
Linux kernel might have allowed physically proximate attackers to cause a
denial of service (out-of-bounds write) via a crafted device that provides
a small report descriptor, related to (1) drivers/hid/hid-cherry.c, (2)
drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4)
drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6)
drivers/hid/hid-sunplus.c.
CVE-2014-3182: Array index error in the logi_dj_raw_event function in
drivers/hid/hid-logitech-dj.c in the Linux kernel allowed physically
proximate attackers to execute arbitrary code or cause a denial of service
(invalid kfree) via a crafted device that provides a malformed
REPORT_TYPE_NOTIF_DEVICE_UNPAIRED value.
CVE-2014-3181: Multiple stack-based buffer overflows in the
magicmouse_raw_event function in drivers/hid/hid-magicmouse.c in the Magic
Mouse HID driver in the Linux kernel allowed physically proximate
attackers to cause a denial of service (system crash) or possibly execute
arbitrary code via a crafted device that provides a large amount of (1)
EHCI or (2) XHCI data associated with an event.
CVE-2014-7826: kernel/trace/trace_syscalls.c in the Linux kernel did not
properly handle private syscall numbers during use of the ftrace
subsystem, which allowed local users to gain privileges or cause a denial
of service (invalid pointer dereference) via a crafted application.
CVE-2013-7263: The Linux kernel updated certain length values before
ensuring that associated data structures have been initialized, which
allowed local users to obtain sensitive information from kernel stack
memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call,
related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c,
net/ipv6/raw.c, and net/ipv6/udp.c. This update fixes the leak of the port
number when using ipv6 sockets. (bsc#853040).
CVE-2014-6410: The __udf_read_inode function in fs/udf/inode.c in the
Linux kernel did not restrict the amount of ICB indirection, which allowed
physically proximate attackers to cause a denial of service (infinite loop
or stack consumption) via a UDF filesystem with a crafted inode.
CVE-2014-5471: Stack consumption vulnerability in the
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux
kernel allowed local users to cause a denial of service (uncontrolled
recursion, and system crash or reboot) via a crafted iso9660 image with a
CL entry referring to a directory entry that has a CL entry.
CVE-2014-5472: The parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel allowed local users to cause a denial
of service (unkillable mount process) via a crafted iso9660 image with a
self-referential CL entry.
CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel on 32-bit
x86 platforms, when syscall auditing is enabled and the sep CPU feature
flag is set, allowed local users to cause a denial of service (OOPS and
system crash) via an invalid syscall number, as demonstrated by number
1000.
CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux
kernel allowed local users to gain privileges by leveraging data-structure
differences between an l2tp socket and an inet socket.
CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in
the Linux kernel, when SCTP authentication is enabled, allowed remote
attackers to cause a denial of service (NULL pointer dereference and OOPS)
by starting to establish an association between two endpoints immediately
after an exchange of INIT and INIT ACK chunks to establish an earlier
association between these endpoints in the opposite direction.
CVE-2014-4171: mm/shmem.c in the Linux kernel did not properly implement
the interaction between range notification and hole punching, which
allowed local users to cause a denial of service (i_mutex hold) by using
the mmap system call to access a hole, as demonstrated by interfering with
intended shmem activity by blocking completion of (1) an MADV_REMOVE
madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call.
CVE-2013-2888, CVE-2013-2889, CVE-2013-2890, CVE-2013-2891, CVE-2013-2892,
CVE-2013-2893, CVE-2013-2894, CVE-2013-2895, CVE-2013-2896, CVE-2013-2897,
CVE-2013-2898, CVE-2013-2899: Multiple issues in the Human Interface
Device (HID) subsystem in the Linux kernel allowed physically proximate
attackers to cause a denial of service
or system crash via (heap-based out-of-bounds write) via a crafted device.
(Not seperately listed.)
Other bugfixes:
- xfs: mark all internal workqueues as freezable (bnc#899785).
- target/rd: Refactor rd_build_device_space + rd_release_device_space
(bnc#882639)
- Enable CONFIG_ATH9K_HTC for armv7hl/omap2plus config (bnc#890624)
- swiotlb: don't assume PA 0 is invalid (bnc#865882).
- drm/i915: Apply alignment restrictions on scanout surfaces for VT-d
(bnc#818561).
- tg3: Change nvram command timeout value to 50ms (bnc#768714).
- tg3: Override clock, link aware and link idle mode during NVRAM dump
(bnc#768714).
- tg3: Set the MAC clock to the fastest speed during boot code load
(bnc#768714).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.3:
zypper in -t patch openSUSE-2014-791
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.3 (i586 x86_64):
kernel-default-3.7.10-1.45.1
kernel-default-base-3.7.10-1.45.1
kernel-default-base-debuginfo-3.7.10-1.45.1
kernel-default-debuginfo-3.7.10-1.45.1
kernel-default-debugsource-3.7.10-1.45.1
kernel-default-devel-3.7.10-1.45.1
kernel-default-devel-debuginfo-3.7.10-1.45.1
kernel-syms-3.7.10-1.45.1
- openSUSE 12.3 (i686 x86_64):
kernel-debug-3.7.10-1.45.1
kernel-debug-base-3.7.10-1.45.1
kernel-debug-base-debuginfo-3.7.10-1.45.1
kernel-debug-debuginfo-3.7.10-1.45.1
kernel-debug-debugsource-3.7.10-1.45.1
kernel-debug-devel-3.7.10-1.45.1
kernel-debug-devel-debuginfo-3.7.10-1.45.1
kernel-desktop-3.7.10-1.45.1
kernel-desktop-base-3.7.10-1.45.1
kernel-desktop-base-debuginfo-3.7.10-1.45.1
kernel-desktop-debuginfo-3.7.10-1.45.1
kernel-desktop-debugsource-3.7.10-1.45.1
kernel-desktop-devel-3.7.10-1.45.1
kernel-desktop-devel-debuginfo-3.7.10-1.45.1
kernel-ec2-3.7.10-1.45.1
kernel-ec2-base-3.7.10-1.45.1
kernel-ec2-base-debuginfo-3.7.10-1.45.1
kernel-ec2-debuginfo-3.7.10-1.45.1
kernel-ec2-debugsource-3.7.10-1.45.1
kernel-ec2-devel-3.7.10-1.45.1
kernel-ec2-devel-debuginfo-3.7.10-1.45.1
kernel-trace-3.7.10-1.45.1
kernel-trace-base-3.7.10-1.45.1
kernel-trace-base-debuginfo-3.7.10-1.45.1
kernel-trace-debuginfo-3.7.10-1.45.1
kernel-trace-debugsource-3.7.10-1.45.1
kernel-trace-devel-3.7.10-1.45.1
kernel-trace-devel-debuginfo-3.7.10-1.45.1
kernel-vanilla-3.7.10-1.45.1
kernel-vanilla-debuginfo-3.7.10-1.45.1
kernel-vanilla-debugsource-3.7.10-1.45.1
kernel-vanilla-devel-3.7.10-1.45.1
kernel-vanilla-devel-debuginfo-3.7.10-1.45.1
kernel-xen-3.7.10-1.45.1
kernel-xen-base-3.7.10-1.45.1
kernel-xen-base-debuginfo-3.7.10-1.45.1
kernel-xen-debuginfo-3.7.10-1.45.1
kernel-xen-debugsource-3.7.10-1.45.1
kernel-xen-devel-3.7.10-1.45.1
kernel-xen-devel-debuginfo-3.7.10-1.45.1
- openSUSE 12.3 (noarch):
kernel-devel-3.7.10-1.45.1
kernel-docs-3.7.10-1.45.2
kernel-source-3.7.10-1.45.1
kernel-source-vanilla-3.7.10-1.45.1
- openSUSE 12.3 (i686):
kernel-pae-3.7.10-1.45.1
kernel-pae-base-3.7.10-1.45.1
kernel-pae-base-debuginfo-3.7.10-1.45.1
kernel-pae-debuginfo-3.7.10-1.45.1
kernel-pae-debugsource-3.7.10-1.45.1
kernel-pae-devel-3.7.10-1.45.1
kernel-pae-devel-debuginfo-3.7.10-1.45.1
References:
http://support.novell.com/security/cve/CVE-2013-2889.htmlhttp://support.novell.com/security/cve/CVE-2013-2891.htmlhttp://support.novell.com/security/cve/CVE-2014-3181.htmlhttp://support.novell.com/security/cve/CVE-2014-3182.htmlhttp://support.novell.com/security/cve/CVE-2014-3184.htmlhttp://support.novell.com/security/cve/CVE-2014-3185.htmlhttp://support.novell.com/security/cve/CVE-2014-3186.htmlhttp://support.novell.com/security/cve/CVE-2014-4171.htmlhttp://support.novell.com/security/cve/CVE-2014-4508.htmlhttp://support.novell.com/security/cve/CVE-2014-4608.htmlhttp://support.novell.com/security/cve/CVE-2014-4943.htmlhttp://support.novell.com/security/cve/CVE-2014-5077.htmlhttp://support.novell.com/security/cve/CVE-2014-5471.htmlhttp://support.novell.com/security/cve/CVE-2014-5472.htmlhttp://support.novell.com/security/cve/CVE-2014-6410.htmlhttp://support.novell.com/security/cve/CVE-2014-7826.htmlhttp://support.novell.com/security/cve/CVE-2014-7841.htmlhttp://support.novell.com/security/cve/CVE-2014-8133.htmlhttp://support.novell.com/security/cve/CVE-2014-8709.htmlhttp://support.novell.com/security/cve/CVE-2014-8884.htmlhttp://support.novell.com/security/cve/CVE-2014-9090.htmlhttp://support.novell.com/security/cve/CVE-2014-9322.htmlhttps://bugzilla.suse.com/show_bug.cgi?id=768714https://bugzilla.suse.com/show_bug.cgi?id=818561https://bugzilla.suse.com/show_bug.cgi?id=835839https://bugzilla.suse.com/show_bug.cgi?id=853040https://bugzilla.suse.com/show_bug.cgi?id=865882https://bugzilla.suse.com/show_bug.cgi?id=882639https://bugzilla.suse.com/show_bug.cgi?id=883518https://bugzilla.suse.com/show_bug.cgi?id=883724https://bugzilla.suse.com/show_bug.cgi?id=883948https://bugzilla.suse.com/show_bug.cgi?id=887082https://bugzilla.suse.com/show_bug.cgi?id=889173https://bugzilla.suse.com/show_bug.cgi?id=890624https://bugzilla.suse.com/show_bug.cgi?id=892490https://bugzilla.suse.com/show_bug.cgi?id=896382https://bugzilla.suse.com/show_bug.cgi?id=896385https://bugzilla.suse.com/show_bug.cgi?id=896390https://bugzilla.suse.com/show_bug.cgi?id=896391https://bugzilla.suse.com/show_bug.cgi?id=896392https://bugzilla.suse.com/show_bug.cgi?id=896689https://bugzilla.suse.com/show_bug.cgi?id=899785https://bugzilla.suse.com/show_bug.cgi?id=904013https://bugzilla.suse.com/show_bug.cgi?id=904700https://bugzilla.suse.com/show_bug.cgi?id=905100https://bugzilla.suse.com/show_bug.cgi?id=905764https://bugzilla.suse.com/show_bug.cgi?id=907818https://bugzilla.suse.com/show_bug.cgi?id=909077https://bugzilla.suse.com/show_bug.cgi?id=910251
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org