openSUSE Security Announce
Threads by month
- ----- 2024 -----
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
May 2014
- 1 participants
- 19 discussions
[security-announce] SUSE-SU-2014:0728-2: important: Security update for IBM Java 6
by opensuse-security@opensuse.org 30 May '14
by opensuse-security@opensuse.org 30 May '14
30 May '14
SUSE Security Update: Security update for IBM Java 6
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:0728-2
Rating: important
References: #877430
Cross-References: CVE-2013-6629 CVE-2013-6954 CVE-2014-0428
CVE-2014-0429 CVE-2014-0446 CVE-2014-0449
CVE-2014-0451 CVE-2014-0452 CVE-2014-0453
CVE-2014-0457 CVE-2014-0458 CVE-2014-0459
CVE-2014-0460 CVE-2014-0461 CVE-2014-0878
CVE-2014-1876 CVE-2014-2398 CVE-2014-2401
CVE-2014-2409 CVE-2014-2412 CVE-2014-2414
CVE-2014-2420 CVE-2014-2421 CVE-2014-2423
CVE-2014-2427 CVE-2014-2428
Affected Products:
SUSE Linux Enterprise Server 11 SP2 LTSS
SUSE Linux Enterprise Server 10 SP4 LTSS
SUSE Linux Enterprise Server 10 SP3 LTSS
______________________________________________________________________________
An update that fixes 26 vulnerabilities is now available.
Description:
IBM Java 6 was updated to version 6 SR16 to fix several security issues
and various other bugs.
More information can be found at:
http://www.ibm.com/developerworks/java/jdk/alerts/
<http://www.ibm.com/developerworks/java/jdk/alerts/>
Security Issues references:
* CVE-2013-6629
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629>
* CVE-2013-6954
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954>
* CVE-2014-0429
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429>
* CVE-2014-0446
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446>
* CVE-2014-0449
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0449>
* CVE-2014-0451
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451>
* CVE-2014-0452
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452>
* CVE-2014-0457
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457>
* CVE-2014-0458
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458>
* CVE-2014-0459
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459>
* CVE-2014-0460
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460>
* CVE-2014-0461
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461>
* CVE-2014-1876
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876>
* CVE-2014-2398
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398>
* CVE-2014-2401
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2401>
* CVE-2014-2409
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2409>
* CVE-2014-2412
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412>
* CVE-2014-2414
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414>
* CVE-2014-2420
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2420>
* CVE-2014-2421
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421>
* CVE-2014-2423
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423>
* CVE-2014-2427
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427>
* CVE-2014-2428
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2428>
* CVE-2014-0428
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0428>
* CVE-2014-0453
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453>
* CVE-2014-0878
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0878>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP2 LTSS:
zypper in -t patch slessp2-java-1_6_0-ibm-9274
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64):
java-1_6_0-ibm-1.6.0_sr16.0-0.3.1
java-1_6_0-ibm-devel-1.6.0_sr16.0-0.3.1
java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3.1
java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3.1
- SUSE Linux Enterprise Server 11 SP2 LTSS (i586 x86_64):
java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3.1
- SUSE Linux Enterprise Server 11 SP2 LTSS (i586):
java-1_6_0-ibm-alsa-1.6.0_sr16.0-0.3.1
- SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):
java-1_6_0-ibm-1.6.0_sr16.0-0.8.1
java-1_6_0-ibm-devel-1.6.0_sr16.0-0.8.1
java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.8.1
java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.8.1
- SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64):
java-1_6_0-ibm-32bit-1.6.0_sr16.0-0.8.1
java-1_6_0-ibm-devel-32bit-1.6.0_sr16.0-0.8.1
- SUSE Linux Enterprise Server 10 SP4 LTSS (i586 x86_64):
java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.8.1
- SUSE Linux Enterprise Server 10 SP4 LTSS (x86_64):
java-1_6_0-ibm-alsa-32bit-1.6.0_sr16.0-0.8.1
java-1_6_0-ibm-plugin-32bit-1.6.0_sr16.0-0.8.1
- SUSE Linux Enterprise Server 10 SP4 LTSS (i586):
java-1_6_0-ibm-alsa-1.6.0_sr16.0-0.8.1
- SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64):
java-1_6_0-ibm-1.6.0_sr16.0-0.5.1
java-1_6_0-ibm-devel-1.6.0_sr16.0-0.5.1
java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.5.1
java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.5.1
- SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64):
java-1_6_0-ibm-32bit-1.6.0_sr16.0-0.5.1
java-1_6_0-ibm-devel-32bit-1.6.0_sr16.0-0.5.1
- SUSE Linux Enterprise Server 10 SP3 LTSS (i586 x86_64):
java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.5.1
- SUSE Linux Enterprise Server 10 SP3 LTSS (x86_64):
java-1_6_0-ibm-alsa-32bit-1.6.0_sr16.0-0.5.1
java-1_6_0-ibm-plugin-32bit-1.6.0_sr16.0-0.5.1
- SUSE Linux Enterprise Server 10 SP3 LTSS (i586):
java-1_6_0-ibm-alsa-1.6.0_sr16.0-0.5.1
References:
http://support.novell.com/security/cve/CVE-2013-6629.html
http://support.novell.com/security/cve/CVE-2013-6954.html
http://support.novell.com/security/cve/CVE-2014-0428.html
http://support.novell.com/security/cve/CVE-2014-0429.html
http://support.novell.com/security/cve/CVE-2014-0446.html
http://support.novell.com/security/cve/CVE-2014-0449.html
http://support.novell.com/security/cve/CVE-2014-0451.html
http://support.novell.com/security/cve/CVE-2014-0452.html
http://support.novell.com/security/cve/CVE-2014-0453.html
http://support.novell.com/security/cve/CVE-2014-0457.html
http://support.novell.com/security/cve/CVE-2014-0458.html
http://support.novell.com/security/cve/CVE-2014-0459.html
http://support.novell.com/security/cve/CVE-2014-0460.html
http://support.novell.com/security/cve/CVE-2014-0461.html
http://support.novell.com/security/cve/CVE-2014-0878.html
http://support.novell.com/security/cve/CVE-2014-1876.html
http://support.novell.com/security/cve/CVE-2014-2398.html
http://support.novell.com/security/cve/CVE-2014-2401.html
http://support.novell.com/security/cve/CVE-2014-2409.html
http://support.novell.com/security/cve/CVE-2014-2412.html
http://support.novell.com/security/cve/CVE-2014-2414.html
http://support.novell.com/security/cve/CVE-2014-2420.html
http://support.novell.com/security/cve/CVE-2014-2421.html
http://support.novell.com/security/cve/CVE-2014-2423.html
http://support.novell.com/security/cve/CVE-2014-2427.html
http://support.novell.com/security/cve/CVE-2014-2428.html
https://bugzilla.novell.com/877430
http://download.suse.com/patch/finder/?keywords=8737d63fc5fbcb05aaf87bdb3c7…
http://download.suse.com/patch/finder/?keywords=ae92cd41800301a5a62df344f42…
http://download.suse.com/patch/finder/?keywords=e24327af0d6908f1ed88c62bf84…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:0733-1: important: Security update for IBM Java 7
by opensuse-security@opensuse.org 30 May '14
by opensuse-security@opensuse.org 30 May '14
30 May '14
SUSE Security Update: Security update for IBM Java 7
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:0733-1
Rating: important
References: #877429
Cross-References: CVE-2013-6629 CVE-2013-6954 CVE-2014-0428
CVE-2014-0429 CVE-2014-0446 CVE-2014-0448
CVE-2014-0449 CVE-2014-0451 CVE-2014-0452
CVE-2014-0453 CVE-2014-0454 CVE-2014-0455
CVE-2014-0457 CVE-2014-0458 CVE-2014-0459
CVE-2014-0460 CVE-2014-0461 CVE-2014-0878
CVE-2014-1876 CVE-2014-2398 CVE-2014-2401
CVE-2014-2402 CVE-2014-2409 CVE-2014-2412
CVE-2014-2414 CVE-2014-2420 CVE-2014-2421
CVE-2014-2423 CVE-2014-2427 CVE-2014-2428
Affected Products:
SUSE Linux Enterprise Server 11 SP2 LTSS
______________________________________________________________________________
An update that fixes 30 vulnerabilities is now available.
Description:
IBM Java 7 was updated to version SR7, which received security and bug
fixes.
More information is available at:
http://www.ibm.com/developerworks/java/jdk/aix/j764/Java7_64.fixes.html#SR7
<http://www.ibm.com/developerworks/java/jdk/aix/j764/Java7_64.fixes.html#SR
7>
Security Issues references:
* CVE-2013-6629
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629>
* CVE-2013-6954
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954>
* CVE-2014-0429
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429>
* CVE-2014-0446
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446>
* CVE-2014-0448
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0448>
* CVE-2014-0449
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0449>
* CVE-2014-0451
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451>
* CVE-2014-0452
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452>
* CVE-2014-0457
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457>
* CVE-2014-0458
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458>
* CVE-2014-0459
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459>
* CVE-2014-0460
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460>
* CVE-2014-0461
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461>
* CVE-2014-1876
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876>
* CVE-2014-2398
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398>
* CVE-2014-2401
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2401>
* CVE-2014-2402
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2402>
* CVE-2014-2409
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2409>
* CVE-2014-2412
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412>
* CVE-2014-2414
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414>
* CVE-2014-2420
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2420>
* CVE-2014-2421
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421>
* CVE-2014-2423
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423>
* CVE-2014-2427
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427>
* CVE-2014-2428
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2428>
* CVE-2014-0455
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0455>
* CVE-2014-0428
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0428>
* CVE-2014-0453
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453>
* CVE-2014-0454
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0454>
* CVE-2014-0878
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0878>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP2 LTSS:
zypper in -t patch slessp2-java-1_7_0-ibm-9275
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64):
java-1_7_0-ibm-1.7.0_sr7.0-0.5.1
java-1_7_0-ibm-devel-1.7.0_sr7.0-0.5.1
java-1_7_0-ibm-jdbc-1.7.0_sr7.0-0.5.1
- SUSE Linux Enterprise Server 11 SP2 LTSS (i586 x86_64):
java-1_7_0-ibm-alsa-1.7.0_sr7.0-0.5.1
java-1_7_0-ibm-plugin-1.7.0_sr7.0-0.5.1
References:
http://support.novell.com/security/cve/CVE-2013-6629.html
http://support.novell.com/security/cve/CVE-2013-6954.html
http://support.novell.com/security/cve/CVE-2014-0428.html
http://support.novell.com/security/cve/CVE-2014-0429.html
http://support.novell.com/security/cve/CVE-2014-0446.html
http://support.novell.com/security/cve/CVE-2014-0448.html
http://support.novell.com/security/cve/CVE-2014-0449.html
http://support.novell.com/security/cve/CVE-2014-0451.html
http://support.novell.com/security/cve/CVE-2014-0452.html
http://support.novell.com/security/cve/CVE-2014-0453.html
http://support.novell.com/security/cve/CVE-2014-0454.html
http://support.novell.com/security/cve/CVE-2014-0455.html
http://support.novell.com/security/cve/CVE-2014-0457.html
http://support.novell.com/security/cve/CVE-2014-0458.html
http://support.novell.com/security/cve/CVE-2014-0459.html
http://support.novell.com/security/cve/CVE-2014-0460.html
http://support.novell.com/security/cve/CVE-2014-0461.html
http://support.novell.com/security/cve/CVE-2014-0878.html
http://support.novell.com/security/cve/CVE-2014-1876.html
http://support.novell.com/security/cve/CVE-2014-2398.html
http://support.novell.com/security/cve/CVE-2014-2401.html
http://support.novell.com/security/cve/CVE-2014-2402.html
http://support.novell.com/security/cve/CVE-2014-2409.html
http://support.novell.com/security/cve/CVE-2014-2412.html
http://support.novell.com/security/cve/CVE-2014-2414.html
http://support.novell.com/security/cve/CVE-2014-2420.html
http://support.novell.com/security/cve/CVE-2014-2421.html
http://support.novell.com/security/cve/CVE-2014-2423.html
http://support.novell.com/security/cve/CVE-2014-2427.html
http://support.novell.com/security/cve/CVE-2014-2428.html
https://bugzilla.novell.com/877429
http://download.suse.com/patch/finder/?keywords=b4c561518a2b8e396c17cfe8ee6…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:0728-1: important: Security update for IBM Java 6
by opensuse-security@opensuse.org 28 May '14
by opensuse-security@opensuse.org 28 May '14
28 May '14
SUSE Security Update: Security update for IBM Java 6
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:0728-1
Rating: important
References: #877430
Cross-References: CVE-2013-6629 CVE-2013-6954 CVE-2014-0428
CVE-2014-0429 CVE-2014-0446 CVE-2014-0449
CVE-2014-0451 CVE-2014-0452 CVE-2014-0453
CVE-2014-0457 CVE-2014-0458 CVE-2014-0459
CVE-2014-0460 CVE-2014-0461 CVE-2014-0878
CVE-2014-1876 CVE-2014-2398 CVE-2014-2401
CVE-2014-2409 CVE-2014-2412 CVE-2014-2414
CVE-2014-2420 CVE-2014-2421 CVE-2014-2423
CVE-2014-2427 CVE-2014-2428
Affected Products:
SUSE Manager 1.7 for SLE 11 SP2
______________________________________________________________________________
An update that fixes 26 vulnerabilities is now available.
Description:
Java has been updated to version 6 SR16 to fix several security issues and
various other bugs.
More information can be found at
http://www.ibm.com/developerworks/java/jdk/alerts/
<http://www.ibm.com/developerworks/java/jdk/alerts/>
Security Issues:
* CVE-2013-6629
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629>
* CVE-2013-6954
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954>
* CVE-2014-0429
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429>
* CVE-2014-0446
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446>
* CVE-2014-0449
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0449>
* CVE-2014-0451
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451>
* CVE-2014-0452
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452>
* CVE-2014-0457
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457>
* CVE-2014-0458
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458>
* CVE-2014-0459
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459>
* CVE-2014-0460
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460>
* CVE-2014-0461
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461>
* CVE-2014-1876
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876>
* CVE-2014-2398
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398>
* CVE-2014-2401
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2401>
* CVE-2014-2409
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2409>
* CVE-2014-2412
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412>
* CVE-2014-2414
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414>
* CVE-2014-2420
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2420>
* CVE-2014-2421
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421>
* CVE-2014-2423
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423>
* CVE-2014-2427
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427>
* CVE-2014-2428
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2428>
* CVE-2014-0428
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0428>
* CVE-2014-0453
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453>
* CVE-2014-0878
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0878>
* CVE-2013-6954
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954>
* CVE-2014-0429
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429>
* CVE-2014-0446
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446>
* CVE-2014-0449
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0449>
* CVE-2014-0451
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451>
* CVE-2014-0452
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452>
* CVE-2014-0457
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457>
* CVE-2014-0458
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458>
* CVE-2014-0459
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459>
* CVE-2014-0460
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460>
* CVE-2014-0461
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461>
* CVE-2014-1876
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876>
* CVE-2014-2398
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398>
* CVE-2014-2401
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2401>
* CVE-2014-2409
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2409>
* CVE-2014-2412
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412>
* CVE-2014-2414
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414>
* CVE-2014-2420
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2420>
* CVE-2014-2421
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421>
* CVE-2014-2423
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423>
* CVE-2014-2427
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427>
* CVE-2014-2428
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2428>
* CVE-2014-0428
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0428>
* CVE-2014-0453
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453>
* CVE-2014-0878
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0878>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Manager 1.7 for SLE 11 SP2:
zypper in -t patch sleman17sp2-java-1_6_0-ibm-9258
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Manager 1.7 for SLE 11 SP2 (x86_64):
java-1_6_0-ibm-1.6.0_sr16.0-0.3.1
java-1_6_0-ibm-devel-1.6.0_sr16.0-0.3.1
java-1_6_0-ibm-fonts-1.6.0_sr16.0-0.3.1
java-1_6_0-ibm-jdbc-1.6.0_sr16.0-0.3.1
java-1_6_0-ibm-plugin-1.6.0_sr16.0-0.3.1
References:
http://support.novell.com/security/cve/CVE-2013-6629.html
http://support.novell.com/security/cve/CVE-2013-6954.html
http://support.novell.com/security/cve/CVE-2014-0428.html
http://support.novell.com/security/cve/CVE-2014-0429.html
http://support.novell.com/security/cve/CVE-2014-0446.html
http://support.novell.com/security/cve/CVE-2014-0449.html
http://support.novell.com/security/cve/CVE-2014-0451.html
http://support.novell.com/security/cve/CVE-2014-0452.html
http://support.novell.com/security/cve/CVE-2014-0453.html
http://support.novell.com/security/cve/CVE-2014-0457.html
http://support.novell.com/security/cve/CVE-2014-0458.html
http://support.novell.com/security/cve/CVE-2014-0459.html
http://support.novell.com/security/cve/CVE-2014-0460.html
http://support.novell.com/security/cve/CVE-2014-0461.html
http://support.novell.com/security/cve/CVE-2014-0878.html
http://support.novell.com/security/cve/CVE-2014-1876.html
http://support.novell.com/security/cve/CVE-2014-2398.html
http://support.novell.com/security/cve/CVE-2014-2401.html
http://support.novell.com/security/cve/CVE-2014-2409.html
http://support.novell.com/security/cve/CVE-2014-2412.html
http://support.novell.com/security/cve/CVE-2014-2414.html
http://support.novell.com/security/cve/CVE-2014-2420.html
http://support.novell.com/security/cve/CVE-2014-2421.html
http://support.novell.com/security/cve/CVE-2014-2423.html
http://support.novell.com/security/cve/CVE-2014-2427.html
http://support.novell.com/security/cve/CVE-2014-2428.html
https://bugzilla.novell.com/877430
http://download.suse.com/patch/finder/?keywords=2078c426a75755f7ebf4f9052a9…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:0727-1: important: Security update for Mozilla Firefox
by opensuse-security@opensuse.org 28 May '14
by opensuse-security@opensuse.org 28 May '14
28 May '14
SUSE Security Update: Security update for Mozilla Firefox
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:0727-1
Rating: important
References: #869827
Cross-References: CVE-2014-1492 CVE-2014-1518 CVE-2014-1523
CVE-2014-1524 CVE-2014-1529 CVE-2014-1530
CVE-2014-1531 CVE-2014-1532
Affected Products:
SUSE Linux Enterprise Server 10 SP4 LTSS
______________________________________________________________________________
An update that fixes 8 vulnerabilities is now available. It
includes 5 new package versions.
Description:
This Mozilla Firefox update provides several security and non-security
fixes.
MozillaFirefox has been updated to 24.5.0esr, which fixes the following
issues:
* MFSA 2014-34/CVE-2014-1518 Miscellaneous memory safety hazards
* MFSA 2014-37/CVE-2014-1523 Out of bounds read while decoding JPG
images
* MFSA 2014-38/CVE-2014-1524 Buffer overflow when using non-XBL object
as XBL
* MFSA 2014-42/CVE-2014-1529 Privilege escalation through Web
Notification API
* MFSA 2014-43/CVE-2014-1530 Cross-site scripting (XSS) using history
navigations
* MFSA 2014-44/CVE-2014-1531 Use-after-free in imgLoader while
resizing images
* MFSA 2014-46/CVE-2014-1532 Use-after-free in nsHostResolver
Mozilla NSS has been updated to 3.16
* required for Firefox 29
* CVE-2014-1492_ In a wildcard certificate, the wildcard character
should not be embedded within the U-label of an internationalized
domain name. See the last bullet point in RFC 6125, Section 7.2.
* Update of root certificates.
Security Issue references:
* CVE-2014-1532
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532>
* CVE-2014-1531
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531>
* CVE-2014-1530
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530>
* CVE-2014-1529
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529>
* CVE-2014-1524
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524>
* CVE-2014-1523
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523>
* CVE-2014-1518
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518>
* CVE-2014-1492
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492>
Package List:
- SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64) [New Version: 1.9.1.19,1.9.2.28,3.16 and 4.10.4]:
firefox-atk-1.28.0-0.7.3
firefox-cairo-1.8.0-0.10.2
firefox-fontconfig-2.6.0-0.7.1
firefox-freetype2-2.3.7-0.35.1
firefox-glib2-2.22.5-0.13.3
firefox-gtk2-2.18.9-0.9.2
firefox-gtk2-lang-2.18.9-0.9.2
firefox-libgcc_s1-4.7.2_20130108-0.22.1
firefox-libstdc++6-4.7.2_20130108-0.22.1
firefox-pango-1.26.2-0.9.2
firefox-pcre-7.8-0.8.1
firefox-pixman-0.16.0-0.7.1
mozilla-nspr-4.10.4-0.5.1
mozilla-nspr-devel-4.10.4-0.5.1
mozilla-nss-3.16-0.5.1
mozilla-nss-devel-3.16-0.5.1
mozilla-nss-tools-3.16-0.5.1
mozilla-xulrunner191-1.9.1.19-0.13.3
mozilla-xulrunner191-gnomevfs-1.9.1.19-0.13.3
mozilla-xulrunner191-translations-1.9.1.19-0.13.3
mozilla-xulrunner192-1.9.2.28-0.13.4
mozilla-xulrunner192-gnome-1.9.2.28-0.13.4
mozilla-xulrunner192-translations-1.9.2.28-0.13.4
- SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64) [New Version: 1.9.1.19,1.9.2.28,3.16 and 4.10.4]:
firefox-atk-32bit-1.28.0-0.7.3
firefox-cairo-32bit-1.8.0-0.10.2
firefox-fontconfig-32bit-2.6.0-0.7.1
firefox-freetype2-32bit-2.3.7-0.35.1
firefox-glib2-32bit-2.22.5-0.13.3
firefox-gtk2-32bit-2.18.9-0.9.2
firefox-libgcc_s1-32bit-4.7.2_20130108-0.22.1
firefox-libstdc++6-32bit-4.7.2_20130108-0.22.1
firefox-pango-32bit-1.26.2-0.9.2
firefox-pcre-32bit-7.8-0.8.1
firefox-pixman-32bit-0.16.0-0.7.1
mozilla-nspr-32bit-4.10.4-0.5.1
mozilla-nss-32bit-3.16-0.5.1
mozilla-xulrunner191-32bit-1.9.1.19-0.13.3
mozilla-xulrunner191-gnomevfs-32bit-1.9.1.19-0.13.3
mozilla-xulrunner191-translations-32bit-1.9.1.19-0.13.3
mozilla-xulrunner192-32bit-1.9.2.28-0.13.4
mozilla-xulrunner192-gnome-32bit-1.9.2.28-0.13.4
mozilla-xulrunner192-translations-32bit-1.9.2.28-0.13.4
- SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x) [New Version: 24]:
MozillaFirefox-24.5.0esr-0.7.2
MozillaFirefox-branding-SLED-24-0.12.1
MozillaFirefox-translations-24.5.0esr-0.7.2
References:
http://support.novell.com/security/cve/CVE-2014-1492.html
http://support.novell.com/security/cve/CVE-2014-1518.html
http://support.novell.com/security/cve/CVE-2014-1523.html
http://support.novell.com/security/cve/CVE-2014-1524.html
http://support.novell.com/security/cve/CVE-2014-1529.html
http://support.novell.com/security/cve/CVE-2014-1530.html
http://support.novell.com/security/cve/CVE-2014-1531.html
http://support.novell.com/security/cve/CVE-2014-1532.html
https://bugzilla.novell.com/869827
http://download.suse.com/patch/finder/?keywords=6deb2806a7e4f6bdaa090876193…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:0665-2: important: Security update for Mozilla Firefox
by opensuse-security@opensuse.org 28 May '14
by opensuse-security@opensuse.org 28 May '14
28 May '14
SUSE Security Update: Security update for Mozilla Firefox
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:0665-2
Rating: important
References: #865539 #869827 #875378
Cross-References: CVE-2014-1492 CVE-2014-1518 CVE-2014-1523
CVE-2014-1524 CVE-2014-1529 CVE-2014-1530
CVE-2014-1531 CVE-2014-1532
Affected Products:
SUSE Linux Enterprise Server 10 SP3 LTSS
______________________________________________________________________________
An update that fixes 8 vulnerabilities is now available. It
includes 5 new package versions.
Description:
This Mozilla Firefox update provides several security and non-security
fixes.
Mozilla Firefox has been updated to the 24.5.0esr version, which fixes the
following issues:
* MFSA 2014-34/CVE-2014-1518 Miscellaneous memory safety hazards
* MFSA 2014-37/CVE-2014-1523 Out of bounds read while decoding JPG
images
* MFSA 2014-38/CVE-2014-1524 Buffer overflow when using non-XBL object
as XBL
* MFSA 2014-42/CVE-2014-1529 Privilege escalation through Web
Notification API
* MFSA 2014-43/CVE-2014-1530 Cross-site scripting (XSS) using history
navigations
* MFSA 2014-44/CVE-2014-1531 Use-after-free in imgLoader while
resizing images
* MFSA 2014-46/CVE-2014-1532 Use-after-free in nsHostResolver
Mozilla NSS has been updated to version 3.16
* required for Firefox 29
* CVE-2014-1492_ In a wildcard certificate, the wildcard character
should not be embedded within the U-label of an internationalized
domain name. See the last bullet point in RFC 6125, Section 7.2.
* Update of root certificates.
Security Issue references:
* CVE-2014-1532
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532>
* CVE-2014-1531
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531>
* CVE-2014-1530
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530>
* CVE-2014-1529
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529>
* CVE-2014-1524
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524>
* CVE-2014-1523
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523>
* CVE-2014-1518
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518>
* CVE-2014-1492
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492>
Package List:
- SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64) [New Version: 1.9.1.19,1.9.2.28,3.16 and 4.10.4]:
firefox-atk-1.28.0-0.7.3
firefox-cairo-1.8.0-0.10.2
firefox-fontconfig-2.6.0-0.7.1
firefox-freetype2-2.3.7-0.35.1
firefox-glib2-2.22.5-0.13.3
firefox-gtk2-2.18.9-0.9.2
firefox-gtk2-lang-2.18.9-0.9.2
firefox-libgcc_s1-4.7.2_20130108-0.22.1
firefox-libstdc++6-4.7.2_20130108-0.22.1
firefox-pango-1.26.2-0.9.2
firefox-pcre-7.8-0.8.1
firefox-pixman-0.16.0-0.7.1
mozilla-nspr-4.10.4-0.5.1
mozilla-nspr-devel-4.10.4-0.5.1
mozilla-nss-3.16-0.5.1
mozilla-nss-devel-3.16-0.5.1
mozilla-nss-tools-3.16-0.5.1
mozilla-xulrunner191-1.9.1.19-0.13.3
mozilla-xulrunner191-gnomevfs-1.9.1.19-0.13.3
mozilla-xulrunner191-translations-1.9.1.19-0.13.3
mozilla-xulrunner192-1.9.2.28-0.13.4
mozilla-xulrunner192-gnome-1.9.2.28-0.13.4
mozilla-xulrunner192-translations-1.9.2.28-0.13.4
- SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64) [New Version: 1.9.1.19,1.9.2.28,3.16 and 4.10.4]:
firefox-atk-32bit-1.28.0-0.7.3
firefox-cairo-32bit-1.8.0-0.10.2
firefox-fontconfig-32bit-2.6.0-0.7.1
firefox-freetype2-32bit-2.3.7-0.35.1
firefox-glib2-32bit-2.22.5-0.13.3
firefox-gtk2-32bit-2.18.9-0.9.2
firefox-libgcc_s1-32bit-4.7.2_20130108-0.22.1
firefox-libstdc++6-32bit-4.7.2_20130108-0.22.1
firefox-pango-32bit-1.26.2-0.9.2
firefox-pcre-32bit-7.8-0.8.1
firefox-pixman-32bit-0.16.0-0.7.1
mozilla-nspr-32bit-4.10.4-0.5.1
mozilla-nss-32bit-3.16-0.5.1
mozilla-xulrunner191-32bit-1.9.1.19-0.13.3
mozilla-xulrunner191-gnomevfs-32bit-1.9.1.19-0.13.3
mozilla-xulrunner191-translations-32bit-1.9.1.19-0.13.3
mozilla-xulrunner192-32bit-1.9.2.28-0.13.4
mozilla-xulrunner192-gnome-32bit-1.9.2.28-0.13.4
mozilla-xulrunner192-translations-32bit-1.9.2.28-0.13.4
- SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x) [New Version: 24]:
MozillaFirefox-24.5.0esr-0.7.2
MozillaFirefox-branding-SLED-24-0.12.1
MozillaFirefox-translations-24.5.0esr-0.7.2
References:
http://support.novell.com/security/cve/CVE-2014-1492.html
http://support.novell.com/security/cve/CVE-2014-1518.html
http://support.novell.com/security/cve/CVE-2014-1523.html
http://support.novell.com/security/cve/CVE-2014-1524.html
http://support.novell.com/security/cve/CVE-2014-1529.html
http://support.novell.com/security/cve/CVE-2014-1530.html
http://support.novell.com/security/cve/CVE-2014-1531.html
http://support.novell.com/security/cve/CVE-2014-1532.html
https://bugzilla.novell.com/865539
https://bugzilla.novell.com/869827
https://bugzilla.novell.com/875378
http://download.suse.com/patch/finder/?keywords=286e8d629532f85ab01bea1a264…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:0696-1: important: Security update for Linux kernel
by opensuse-security@opensuse.org 22 May '14
by opensuse-security@opensuse.org 22 May '14
22 May '14
SUSE Security Update: Security update for Linux kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:0696-1
Rating: important
References: #708296 #736697 #746500 #814788 #819351 #831029
#836347 #843185 #844513 #847672 #849364 #851426
#852488 #852553 #852967 #853455 #854025 #855347
#855885 #856083 #857499 #857643 #858280 #858534
#858604 #858869 #858870 #858872 #862429 #863300
#863335 #864025 #864833 #865307 #865310 #865330
#865342 #865783 #866102 #867953 #868528 #868653
#869033 #869563 #870801 #871325 #871561 #871861
#873061 #874108 #875690 #875798 #876102
Cross-References: CVE-2013-4470 CVE-2013-4579 CVE-2013-6382
CVE-2013-6885 CVE-2013-7263 CVE-2013-7264
CVE-2013-7265 CVE-2013-7339 CVE-2014-0069
CVE-2014-0101 CVE-2014-0196 CVE-2014-1444
CVE-2014-1445 CVE-2014-1446 CVE-2014-1737
CVE-2014-1738 CVE-2014-1874 CVE-2014-2039
CVE-2014-2523 CVE-2014-2678 CVE-2014-3122
Affected Products:
SUSE Linux Enterprise Server 11 SP2 LTSS
SLE 11 SERVER Unsupported Extras
______________________________________________________________________________
An update that solves 21 vulnerabilities and has 32 fixes
is now available. It includes one version update.
Description:
The SUSE Linux Enterprise Server 11 SP2 LTSS kernel received a roll-up
update to fix security and non-security issues.
The following security bugs have been fixed:
*
CVE-2013-4470: The Linux kernel before 3.12, when UDP Fragmentation
Offload (UFO) is enabled, does not properly initialize certain data
structures, which allows local users to cause a denial of service (memory
corruption and system crash) or possibly gain privileges via a crafted
application that uses the UDP_CORK option in a setsockopt system call and
sends both short and long packets, related to the ip_ufo_append_data
function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in
net/ipv6/ip6_output.c. (bnc#847672)
*
CVE-2013-4579: The ath9k_htc_set_bssid_mask function in
drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel through
3.12 uses a BSSID masking approach to determine the set of MAC addresses
on which a Wi-Fi device is listening, which allows remote attackers to
discover the original MAC address after spoofing by sending a series of
packets to MAC addresses with certain bit manipulations. (bnc#851426)
*
CVE-2013-6382: Multiple buffer underflows in the XFS implementation
in the Linux kernel through 3.12.1 allow local users to cause a denial of
service (memory corruption) or possibly have unspecified
other impact by leveraging the CAP_SYS_ADMIN capability for a (1)
XFS_IOC_ATTRLIST_BY_HANDLE or (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 ioctl call
with a crafted length value, related to the xfs_attrlist_by_handle
function in fs/xfs/xfs_ioctl.c and the xfs_compat_attrlist_by_handle
function in fs/xfs/xfs_ioctl32.c. (bnc#852553)
*
CVE-2013-6885: The microcode on AMD 16h 00h through 0Fh processors
does not properly handle the interaction between locked instructions and
write-combined memory types, which allows local users to cause a denial of
service (system hang) via a crafted application, aka the errata 793 issue.
(bnc#852967)
*
CVE-2013-7263: The Linux kernel before 3.12.4 updates certain length
values before ensuring that associated data structures have been
initialized, which allows local users to obtain sensitive information from
kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg
system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c,
net/ipv6/raw.c, and net/ipv6/udp.c. (bnc#857643)
*
CVE-2013-7264: The l2tp_ip_recvmsg function in net/l2tp/l2tp_ip.c in
the Linux kernel before 3.12.4 updates a certain length value before
ensuring that an associated data structure has been initialized, which
allows local users to obtain sensitive information from kernel stack
memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
(bnc#857643)
*
CVE-2013-7265: The pn_recvmsg function in net/phonet/datagram.c in
the Linux kernel before 3.12.4 updates a certain length value before
ensuring that an associated data structure has been initialized, which
allows local users to obtain sensitive information from kernel stack
memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
(bnc#857643)
*
CVE-2013-7339: The rds_ib_laddr_check function in net/rds/ib.c in
the Linux kernel before 3.12.8 allows local users to cause a denial of
service (NULL pointer dereference and system crash) or possibly have
unspecified other impact via a bind system call for an RDS socket on a
system that lacks RDS transports. (bnc#869563)
*
CVE-2014-0069: The cifs_iovec_write function in fs/cifs/file.c in
the Linux kernel through 3.13.5 does not properly handle uncached write
operations that copy fewer than the requested number of bytes, which
allows local users to obtain sensitive information from kernel memory,
cause a denial of service (memory corruption and system crash), or
possibly gain privileges via a writev system call with a crafted pointer.
(bnc#864025)
*
CVE-2014-0101: The sctp_sf_do_5_1D_ce function in
net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not
validate certain auth_enable and auth_capable fields before making an
sctp_sf_authenticate call, which allows remote attackers to cause a denial
of service (NULL pointer dereference and system crash) via an SCTP
handshake with a modified INIT chunk and a crafted AUTH chunk before a
COOKIE_ECHO chunk. (bnc#866102)
*
CVE-2014-0196: The n_tty_write function in drivers/tty/n_tty.c in
the Linux kernel through 3.14.3 does not properly manage tty driver access
in the "LECHO & !OPOST" case, which allows local users to cause a denial
of service (memory corruption and system crash) or gain privileges by
triggering a race condition involving read and write operations with long
strings. (bnc#875690)
*
CVE-2014-1444: The fst_get_iface function in
drivers/net/wan/farsync.c in the Linux kernel before 3.11.7 does not
properly initialize a certain data structure, which allows local users to
obtain sensitive information from kernel memory by leveraging the
CAP_NET_ADMIN capability for an SIOCWANDEV ioctl call. (bnc#858869)
*
CVE-2014-1445: The wanxl_ioctl function in drivers/net/wan/wanxl.c
in the Linux kernel before 3.11.7 does not properly initialize a certain
data structure, which allows local users to obtain sensitive information
from kernel memory via an ioctl call. (bnc#858870)
*
CVE-2014-1446: The yam_ioctl function in drivers/net/hamradio/yam.c
in the Linux kernel before 3.12.8 does not initialize a certain structure
member, which allows local users to obtain sensitive information from
kernel memory by leveraging the CAP_NET_ADMIN capability for an
SIOCYAMGCFG ioctl call. (bnc#858872)
*
CVE-2014-1737: The raw_cmd_copyin function in drivers/block/floppy.c
in the Linux kernel through 3.14.3 does not properly handle error
conditions during processing of an FDRAWCMD ioctl call, which allows local
users to trigger kfree operations and gain privileges by leveraging write
access to a /dev/fd device. (bnc#875798)
*
CVE-2014-1738: The raw_cmd_copyout function in
drivers/block/floppy.c in the Linux kernel through 3.14.3 does not
properly restrict access to certain pointers during processing of an
FDRAWCMD ioctl call, which allows local users to obtain sensitive
information from kernel heap memory by leveraging write access to a
/dev/fd device. (bnc#875798)
*
CVE-2014-1874: The security_context_to_sid_core function in
security/selinux/ss/services.c in the Linux kernel before 3.13.4 allows
local users to cause a denial of service (system crash) by leveraging the
CAP_MAC_ADMIN capability to set a zero-length security context.
(bnc#863335)
*
CVE-2014-2039: arch/s390/kernel/head64.S in the Linux kernel before
3.13.5 on the s390 platform does not properly handle attempted use of the
linkage stack, which allows local users to cause a denial of service
(system crash) by executing a crafted instruction. (bnc#865307)
*
CVE-2014-2523: net/netfilter/nf_conntrack_proto_dccp.c in the Linux
kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows
remote attackers to cause a denial of service (system crash)
or possibly execute arbitrary code via a DCCP packet that triggers a
call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.
(bnc#868653)
*
CVE-2014-2678: The rds_iw_laddr_check function in net/rds/iw.c in
the Linux kernel through 3.14 allows local users to cause a denial of
service (NULL pointer dereference and system crash) or possibly have
unspecified other impact via a bind system call for an RDS socket on a
system that lacks RDS transports. (bnc#871561)
*
CVE-2014-3122: The try_to_unmap_cluster function in mm/rmap.c in the
Linux kernel before 3.14.3 does not properly consider which pages must be
locked, which allows local users to cause a denial of service (system
crash) by triggering a memory-usage pattern that requires removal of
page-table mappings. (bnc#876102)
Also the following non-security bugs have been fixed:
* kabi: protect symbols modified by bnc#864833 fix (bnc#864833).
* arch: Fix incorrect config symbol in #ifdef (bnc#844513).
* ACPICA: Add a lock to the internal object reference count mechanism
(bnc#857499).
* x86/PCI: reduce severity of host bridge window conflict warnings
(bnc#858534).
* ia64: Change default PSR.ac from "1" to "0" (Fix erratum #237)
(bnc#874108).
* timer: Prevent overflow in apply_slack (bnc#873061).
* xen: Close a race condition in Xen nested spinlock (bnc#858280,
bnc#819351).
* storvsc: NULL pointer dereference fix (bnc#865330).
* sched: Make scale_rt_power() deal with backward clocks (bnc#865310).
* sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri
check (bnc#871861).
*
sched: update_rq_clock() must skip ONE update (bnc#868528,
bnc#869033).
*
md: Change handling of save_raid_disk and metadata update during
recovery (bnc#849364).
* dm-mpath: Fixup race condition in activate_path() (bnc#708296).
* dm-mpath: do not detach stale hardware handler (bnc#708296).
* dm-multipath: Improve logging (bnc#708296).
* scsi_dh_alua: Simplify state machine (bnc#854025).
* scsi_dh_alua: endless STPG retries for a failed LUN (bnc#865342).
*
scsi_dh_alua: fixup RTPG retry delay miscalculation (bnc#854025).
*
vfs,proc: guarantee unique inodes in /proc.
* FS-Cache: Handle removal of unadded object to the
fscache_object_list rb tree (bnc#855885).
* NFSD/sunrpc: avoid deadlock on TCP connection due to memory pressure
(bnc#853455).
* NFS: Avoid occasional hang with NFS (bnc#852488).
* NFS: do not try to use lock state when we hold a delegation
(bnc#831029) - add to series.conf
* btrfs: do not loop on large offsets in readdir (bnc#863300).
* btrfs: restrict snapshotting to own subvolumes (bnc#736697).
* btrfs: fix extent boundary check in bio_readpage_error.
*
btrfs: fix extent_map block_len after merging.
*
net: add missing bh_unlock_sock() calls (bnc#862429).
* inet: Pass inetpeer root into inet_getpeer*() interfaces
(bnc#864833).
* inet: Hide route peer accesses behind helpers (bnc#864833).
* inet: Avoid potential NULL peer dereference (bnc#864833).
* inet: handle rt{,6}_bind_peer() failure correctly (bnc#870801).
* inetpeer: prevent unlinking from unused list twice (bnc#867953).
* net/mlx4_en: Fix pages never dma unmapped on rx (bnc#858604).
* tcp: clear xmit timers in tcp_v4_syn_recv_sock() (bnc#862429).
* ipv6: fix race condition regarding dst->expires and dst->from
(bnc#843185).
*
ipv6 routing, NLM_F_* flag support: REPLACE and EXCL flags support,
warn about missing CREATE flag (bnc#865783).
*
mpt2sas: Do not check DIF for unwritten blocks (bnc#746500,
bnc#836347).
* mpt2sas: Add a module parameter that permits overriding protection
capabilities (bnc#746500).
*
mpt2sas: Return the correct sense key for DIF errors (bnc#746500).
*
s390/cio: Delay scan for newly available I/O devices (bnc#855347,
bnc#814788, bnc#856083).
* s390/cio: More efficient handling of CHPID availability events
(bnc#855347, bnc#814788, bnc#856083).
* s390/cio: Relax subchannel scan loop (bnc#855347, bnc#814788,
bnc#856083).
*
s390/css: stop stsch loop after cc 3 (bnc#855347, bnc#814788,
bnc#856083).
*
supported.conf: Driver corgi_bl was renamed to generic_bl in kernel
2.6.29.
* supported.conf: Add drivers/of/of_mdio That was a missing dependency
for mdio-gpio on ppc64.
* supported.conf: Fix mdio-gpio module name Module mdio-ofgpio was
renamed to mdio-gpio in kernel 2.6.29, this should have been
reflected in supported.conf.
* supported.conf: Adjust radio-si470x module names
* Update config files: re-enable twofish crypto support. (bnc#871325)
Security Issue references:
* CVE-2013-4470
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4470>
* CVE-2013-4579
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4579>
* CVE-2013-6382
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6382>
* CVE-2013-6885
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885>
* CVE-2013-7263
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7263>
* CVE-2013-7264
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7264>
* CVE-2013-7265
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7265>
* CVE-2013-7339
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7339>
* CVE-2014-0069
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0069>
* CVE-2014-0101
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0101>
* CVE-2014-0196
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196>
* CVE-2014-1444
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1444>
* CVE-2014-1445
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1445>
* CVE-2014-1446
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1446>
* CVE-2014-1737
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1737>
* CVE-2014-1738
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1738>
* CVE-2014-1874
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1874>
* CVE-2014-2039
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2039>
* CVE-2014-2523
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2523>
* CVE-2014-2678
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2678>
* CVE-2014-3122
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3122>
Indications:
Everyone using the Linux Kernel on x86_64 architecture should update.
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP2 LTSS:
zypper in -t patch slessp2-kernel-9248 slessp2-kernel-9249 slessp2-kernel-9254
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64) [New Version: 3.0.101]:
kernel-default-3.0.101-0.7.19.1
kernel-default-base-3.0.101-0.7.19.1
kernel-default-devel-3.0.101-0.7.19.1
kernel-source-3.0.101-0.7.19.1
kernel-syms-3.0.101-0.7.19.1
kernel-trace-3.0.101-0.7.19.1
kernel-trace-base-3.0.101-0.7.19.1
kernel-trace-devel-3.0.101-0.7.19.1
- SUSE Linux Enterprise Server 11 SP2 LTSS (i586 x86_64) [New Version: 3.0.101]:
kernel-ec2-3.0.101-0.7.19.1
kernel-ec2-base-3.0.101-0.7.19.1
kernel-ec2-devel-3.0.101-0.7.19.1
kernel-xen-3.0.101-0.7.19.1
kernel-xen-base-3.0.101-0.7.19.1
kernel-xen-devel-3.0.101-0.7.19.1
- SUSE Linux Enterprise Server 11 SP2 LTSS (s390x) [New Version: 3.0.101]:
kernel-default-man-3.0.101-0.7.19.1
- SUSE Linux Enterprise Server 11 SP2 LTSS (i586) [New Version: 3.0.101]:
kernel-pae-3.0.101-0.7.19.1
kernel-pae-base-3.0.101-0.7.19.1
kernel-pae-devel-3.0.101-0.7.19.1
- SLE 11 SERVER Unsupported Extras (i586 s390x x86_64):
kernel-default-extra-3.0.101-0.7.19.1
- SLE 11 SERVER Unsupported Extras (i586 x86_64):
kernel-xen-extra-3.0.101-0.7.19.1
- SLE 11 SERVER Unsupported Extras (i586):
kernel-pae-extra-3.0.101-0.7.19.1
References:
http://support.novell.com/security/cve/CVE-2013-4470.html
http://support.novell.com/security/cve/CVE-2013-4579.html
http://support.novell.com/security/cve/CVE-2013-6382.html
http://support.novell.com/security/cve/CVE-2013-6885.html
http://support.novell.com/security/cve/CVE-2013-7263.html
http://support.novell.com/security/cve/CVE-2013-7264.html
http://support.novell.com/security/cve/CVE-2013-7265.html
http://support.novell.com/security/cve/CVE-2013-7339.html
http://support.novell.com/security/cve/CVE-2014-0069.html
http://support.novell.com/security/cve/CVE-2014-0101.html
http://support.novell.com/security/cve/CVE-2014-0196.html
http://support.novell.com/security/cve/CVE-2014-1444.html
http://support.novell.com/security/cve/CVE-2014-1445.html
http://support.novell.com/security/cve/CVE-2014-1446.html
http://support.novell.com/security/cve/CVE-2014-1737.html
http://support.novell.com/security/cve/CVE-2014-1738.html
http://support.novell.com/security/cve/CVE-2014-1874.html
http://support.novell.com/security/cve/CVE-2014-2039.html
http://support.novell.com/security/cve/CVE-2014-2523.html
http://support.novell.com/security/cve/CVE-2014-2678.html
http://support.novell.com/security/cve/CVE-2014-3122.html
https://bugzilla.novell.com/708296
https://bugzilla.novell.com/736697
https://bugzilla.novell.com/746500
https://bugzilla.novell.com/814788
https://bugzilla.novell.com/819351
https://bugzilla.novell.com/831029
https://bugzilla.novell.com/836347
https://bugzilla.novell.com/843185
https://bugzilla.novell.com/844513
https://bugzilla.novell.com/847672
https://bugzilla.novell.com/849364
https://bugzilla.novell.com/851426
https://bugzilla.novell.com/852488
https://bugzilla.novell.com/852553
https://bugzilla.novell.com/852967
https://bugzilla.novell.com/853455
https://bugzilla.novell.com/854025
https://bugzilla.novell.com/855347
https://bugzilla.novell.com/855885
https://bugzilla.novell.com/856083
https://bugzilla.novell.com/857499
https://bugzilla.novell.com/857643
https://bugzilla.novell.com/858280
https://bugzilla.novell.com/858534
https://bugzilla.novell.com/858604
https://bugzilla.novell.com/858869
https://bugzilla.novell.com/858870
https://bugzilla.novell.com/858872
https://bugzilla.novell.com/862429
https://bugzilla.novell.com/863300
https://bugzilla.novell.com/863335
https://bugzilla.novell.com/864025
https://bugzilla.novell.com/864833
https://bugzilla.novell.com/865307
https://bugzilla.novell.com/865310
https://bugzilla.novell.com/865330
https://bugzilla.novell.com/865342
https://bugzilla.novell.com/865783
https://bugzilla.novell.com/866102
https://bugzilla.novell.com/867953
https://bugzilla.novell.com/868528
https://bugzilla.novell.com/868653
https://bugzilla.novell.com/869033
https://bugzilla.novell.com/869563
https://bugzilla.novell.com/870801
https://bugzilla.novell.com/871325
https://bugzilla.novell.com/871561
https://bugzilla.novell.com/871861
https://bugzilla.novell.com/873061
https://bugzilla.novell.com/874108
https://bugzilla.novell.com/875690
https://bugzilla.novell.com/875798
https://bugzilla.novell.com/876102
http://download.suse.com/patch/finder/?keywords=787d82dbb16377714bc927d0255…
http://download.suse.com/patch/finder/?keywords=8e83fb23e69fc57ddd82e1ab0aa…
http://download.suse.com/patch/finder/?keywords=be4d02e114cf7bfcc6687ae1882…
http://download.suse.com/patch/finder/?keywords=d8a4989ab7c16d4dac2badacf2d…
http://download.suse.com/patch/finder/?keywords=da132fe457db88249d2db18bc5c…
http://download.suse.com/patch/finder/?keywords=ffc3bcce4bbb0dc6b7c0acc2c40…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:0683-1: important: Security update for Linux kernel
by opensuse-security@opensuse.org 20 May '14
by opensuse-security@opensuse.org 20 May '14
20 May '14
SUSE Security Update: Security update for Linux kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:0683-1
Rating: important
References: #875690 #875798
Cross-References: CVE-2014-0196 CVE-2014-1737 CVE-2014-1738
Affected Products:
SUSE Linux Enterprise Real Time Extension 11 SP3
______________________________________________________________________________
An update that fixes three vulnerabilities is now
available. It includes one version update.
Description:
The SUSE Linux Enterprise 11 Service Pack 3 RealTime Extension kernel has
been updated to fix two critical security issues.
The following security bugs have been fixed:
*
CVE-2014-1737: The raw_cmd_copyin function in drivers/block/floppy.c
in the Linux kernel through 3.14.3 does not properly handle error
conditions during processing of an FDRAWCMD ioctl call, which allows local
users to trigger kfree operations and gain privileges by leveraging write
access to a /dev/fd device. (bnc#875798)
*
CVE-2014-1738: The raw_cmd_copyout function in
drivers/block/floppy.c in the Linux kernel through 3.14.3 does not
properly restrict access to certain pointers during processing of an
FDRAWCMD ioctl call, which allows local users to obtain sensitive
information from kernel heap memory by leveraging write access to a
/dev/fd device. (bnc#875798)
*
CVE-2014-0196: The n_tty_write function in drivers/tty/n_tty.c in
the Linux kernel through 3.14.3 does not properly manage tty driver access
in the "LECHO & !OPOST" case, which allows local users to cause a denial
of service (memory corruption and system crash) or gain privileges by
triggering a race condition involving read and write operations with long
strings. (bnc#875690)
Security Issue references:
* CVE-2014-0196
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196>
* CVE-2014-1737
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1737>
* CVE-2014-1738
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1738>
Indications:
Everyone using the Real Time Linux Kernel on x86_64 architecture should update.
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Real Time Extension 11 SP3:
zypper in -t patch slertesp3-kernel-9260
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Real Time Extension 11 SP3 (x86_64) [New Version: 3.0.101.rt130]:
cluster-network-kmp-rt-1.4_3.0.101_rt130_0.16-2.27.65
cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.16-2.27.65
drbd-kmp-rt-8.4.4_3.0.101_rt130_0.16-0.22.31
drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.16-0.22.31
iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.16-0.38.50
iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.16-0.38.50
kernel-rt-3.0.101.rt130-0.16.1
kernel-rt-base-3.0.101.rt130-0.16.1
kernel-rt-devel-3.0.101.rt130-0.16.1
kernel-rt_trace-3.0.101.rt130-0.16.1
kernel-rt_trace-base-3.0.101.rt130-0.16.1
kernel-rt_trace-devel-3.0.101.rt130-0.16.1
kernel-source-rt-3.0.101.rt130-0.16.1
kernel-syms-rt-3.0.101.rt130-0.16.1
lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.16-0.11.45
lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.16-0.11.45
ocfs2-kmp-rt-1.6_3.0.101_rt130_0.16-0.20.65
ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.16-0.20.65
ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.16-0.13.56
ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.16-0.13.56
References:
http://support.novell.com/security/cve/CVE-2014-0196.html
http://support.novell.com/security/cve/CVE-2014-1737.html
http://support.novell.com/security/cve/CVE-2014-1738.html
https://bugzilla.novell.com/875690
https://bugzilla.novell.com/875798
http://download.suse.com/patch/finder/?keywords=cce936fb7796bd584f137b79a0c…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] SUSE-SU-2014:0682-1: important: Security update for nagios-nrpe, nagios-nrpe-debuginfo, nagios-nrpe-debugsource, nagios-nrpe-doc, nagios-plugins-nrpe
by opensuse-security@opensuse.org 20 May '14
by opensuse-security@opensuse.org 20 May '14
20 May '14
SUSE Security Update: Security update for nagios-nrpe, nagios-nrpe-debuginfo, nagios-nrpe-debugsource, nagios-nrpe-doc, nagios-plugins-nrpe
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:0682-1
Rating: important
References: #874743
Cross-References: CVE-2014-2913
Affected Products:
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
nagios-nrpe has been updated to prevent possible remote command execution
when command arguments are enabled. This issue affects versions 2.15 and
older.
Further information is available at
http://seclists.org/fulldisclosure/2014/Apr/240
<http://seclists.org/fulldisclosure/2014/Apr/240>
These security issues have been fixed:
* Remote command execution (CVE-2014-2913)
Security Issue references:
* CVE-2014-2913
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2913>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-nagios-nrpe-9204
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-nagios-nrpe-9204
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
nagios-nrpe-2.12-24.4.10.1
nagios-nrpe-doc-2.12-24.4.10.1
nagios-plugins-nrpe-2.12-24.4.10.1
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
nagios-nrpe-2.12-24.4.10.1
nagios-nrpe-doc-2.12-24.4.10.1
nagios-plugins-nrpe-2.12-24.4.10.1
References:
http://support.novell.com/security/cve/CVE-2014-2913.html
https://bugzilla.novell.com/874743
http://download.suse.com/patch/finder/?keywords=5c4ec51db20294eb2e261a8c624…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2014:0678-1: important: kernel: security and bugfix update
by opensuse-security@opensuse.org 19 May '14
by opensuse-security@opensuse.org 19 May '14
19 May '14
openSUSE Security Update: kernel: security and bugfix update
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:0678-1
Rating: important
References: #639379 #812592 #81660 #821619 #833968 #842553
#849334 #851244 #851426 #852656 #852967 #853350
#856760 #857643 #858638 #858872 #859342 #860502
#860835 #861750 #862746 #863235 #863335 #864025
#864867 #865075 #866075 #866102 #867718 #868653
#869414 #871148 #871160 #871252 #871325 #875440
#875690 #875798 #876531 #876699
Cross-References: CVE-2013-4579 CVE-2013-6885 CVE-2013-7263
CVE-2013-7264 CVE-2013-7265 CVE-2013-7281
CVE-2014-0069 CVE-2014-0101 CVE-2014-0196
CVE-2014-1438 CVE-2014-1446 CVE-2014-1690
CVE-2014-1737 CVE-2014-1738 CVE-2014-1874
CVE-2014-2523 CVE-2014-2672
Affected Products:
openSUSE 13.1
______________________________________________________________________________
An update that solves 17 vulnerabilities and has 23 fixes
is now available.
Description:
This Linux kernel security update fixes various security issues and bugs.
The Linux Kernel was updated to fix various security issues and bugs.
Main security issues fixed:
A security issue in the tty layer that was fixed that could be used by
local attackers for code execution (CVE-2014-0196).
Two security issues in the floppy driver were fixed that could be used by
local attackers on machines with the floppy to crash the kernel or
potentially execute code in the kernel (CVE-2014-1737 CVE-2014-1738).
Other security issues and bugfixes:
- netfilter: nf_nat: fix access to uninitialized buffer in IRC NAT helper
(bnc#860835 CVE-2014-1690).
- net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH
(bnc#866102, CVE-2014-0101).
- [media] ivtv: Fix Oops when no firmware is loaded (bnc#875440).
- ALSA: hda - Add dock pin setups for Thinkpad T440 (bnc#876699).
- ip6tnl: fix double free of fb_tnl_dev on exit (bnc#876531).
- Update arm config files: Enable all USB-to-serial drivers Specifically,
enable USB_SERIAL_WISHBONE and USB_SERIAL_QT2 on all arm flavors.
- mei: limit the number of consecutive resets (bnc#821619,bnc#852656).
- mei: revamp mei reset state machine (bnc#821619,bnc#852656).
- mei: use hbm idle state to prevent spurious resets (bnc#821619).
- mei: do not run reset flow from the interrupt thread
(bnc#821619,bnc#852656).
- mei: don't get stuck in select during reset (bnc#821619).
- mei: wake also writers on reset (bnc#821619).
- mei: remove flash_work_queue (bnc#821619,bnc#852656).
- mei: me: do not load the driver if the FW doesn't support MEI interface
(bnc#821619).
- Update ec2 config files: Disable CONFIG_CAN CAN support is disabled
everywhere else, so disable it in ec2 too.
- Refresh Xen patches (bnc#851244).
- Update arm/exynos config file: disable AHCI_IMX This driver is only used
on Freescale i.MX systems so it isn't needed on Exynos.
- drm: Prefer noninterlace cmdline mode unless explicitly specified
(bnc#853350).
- kabi/severities: add exception for irda. The changes resulted in a 4x
performance increase. Any external users of this API will also want to
rebuild their modules.
- i7core_edac: Fix PCI device reference count.
- KABI: revert tcp: TSO packets automatic sizing.
- KABI: revert tcp: TSQ can use a dynamic limit.
- kabi: add exceptions for kvm and l2tp
- patches.fixes/sunrpc-add-an-info-file-for-the-dummy-gssd-pipe.patch:
Move include of utsname.h to where it's needed to avoid kABI breakage
due to utsname becoming defined.
- Update kabi files. The kABI references were never establishd at release.
- Refresh patches.rpmify/chipidea-clean-up-dependencies Replace OF_DEVICE
by OF (OF_DEVICE does not exist anymore.)
- inet: fix addr_len/msg->msg_namelen assignment in recv_error and rxpmtu
functions (bnc#857643 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265).
- inet: prevent leakage of uninitialized memory to user in recv syscalls
(bnc#857643 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265 CVE-2013-7281).
- Update config files: re-enable twofish crypto support Software twofish
crypto support was disabled in several architectures since openSUSE
10.3. For i386 and x86_64 it was on purpose, because
hardware-accelerated alternatives exist. However for all other
architectures it was by accident. Re-enable software twofish crypto
support in arm, ia64 and ppc configuration files, to guarantee that at
least one implementation is always available (bnc#871325).
- kvm: optimize away THP checks in kvm_is_mmio_pfn() (bnc#871160).
- Update patches.fixes/mm-close-PageTail-race.patch (bnc#871160).
- Update patches.fixes/mm-hugetlbfs-fix-hugetlbfs-optimization.patch
(bnc#871160).
- mm: close PageTail race (bnc#81660).
- mm: hugetlbfs: fix hugetlbfs optimization (bnc#81660).
- Update config files: disable CONFIG_TOUCHSCREEN_W90X900 The w90p910_ts
driver only makes sense on the W90x900 architecture, which we do not
support.
- ath9k: protect tid->sched check (bnc#871148,CVE-2014-2672).
- Update ec2 config files: disable CONFIG_INPUT_FF_MEMLESS This helper
module is useless on EC2.
- SELinux: Fix kernel BUG on empty security contexts
(bnc#863335,CVE-2014-1874).
- hamradio/yam: fix info leak in ioctl (bnc#858872,CVE-2014-1446).
- netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages
(bnc#868653 CVE-2014-2523).
- ath9k_htc: properly set MAC address and BSSID mask
(bnc#851426,CVE-2013-4579).
- drm/ttm: don't oops if no invalidate_caches() (bnc#869414).
- Btrfs: do not bug_on if we try to cow a free space cache inode
(bnc#863235).
- Update vanilla config files: enable console rotation It's enabled in all
other kernel flavors so it should be enabled in vanilla too.
- Update config files. (CONFIG_EFIVAR_FS=m) Due to systemd can auto-load
efivarfs.ko, so wet CONFIG_EFIVAR_FS to module on x86_64.
- libata, freezer: avoid block device removal while system is frozen
(bnc#849334).
- Enable CONFIG_IRDA_FAST_RR=y (bnc#860502)
- [media] bttv: don't setup the controls if there are no video devices
(bnc#861750).
- drm/i915/dp: add native aux defer retry limit (bnc#867718).
- drm/i915/dp: increase native aux defer retry timeout (bnc#867718).
- rpc_pipe: fix cleanup of dummy gssd directory when notification fails
(bnc#862746).
- sunrpc: add an "info" file for the dummy gssd pipe (bnc#862746).
- rpc_pipe: remove the clntXX dir if creating the pipe fails (bnc#862746).
- Delete rpm/_constraints after mismerge
Sat Mar 8 00:41:07 CET 2014 - jbohac(a)suse.cz
- Refresh
patches.fixes/tcp-syncookies-reduce-cookie-lifetime-to-128-seconds.patch.
- tcp: syncookies: reduce cookie lifetime to 128 seconds (bnc#833968).
- tcp: syncookies: reduce mss table to four values (bnc#833968).
- rpm/mkspec: Generate a per-architecture per-package _constraints file
- rpm/mkspec: Remove dead code
- Refresh patches.fixes/rtc-cmos-add-an-alarm-disable-quirk.patch.
- rtc-cmos: Add an alarm disable quirk (bnc#812592).
- Refresh patches.xen/xen-x86-EFI.
- Refresh
patches.apparmor/apparmor-compatibility-patch-for-v5-network-control.
patches.drivers/pstore_disable_efi_backend_by_default.patch.
patches.fixes/dm-table-switch-to-readonly.
patches.fixes/kvm-ioapic.patch. patches.fixes/kvm-macos.patch.
patches.fixes/remount-no-shrink-dcache.
patches.fixes/scsi-dh-queuedata-accessors.
patches.suse/0001-vfs-Hooks-for-more-fine-grained-directory-permission.patc
h. patches.suse/ovl01-vfs-add-i_op-dentry_open.patch.
patches.suse/sd_init.mark_majors_busy.patch.
- rpm/mkspec: Fix whitespace in NoSource lines
- rpm/kernel-binary.spec.in: Do not zero modules.dep before using it
(bnc#866075)
- rpm/kernel-obs-build.spec: Drop useless ExclusiveArch statement
- Update config files. Set CONFIG_EFIVAR_FS to build-in for MOK support
Update config files. Set CONFIG_EFIVAR_FS to build-in for MOK support
- nfs: always make sure page is up-to-date before extending a write to
cover the entire page (bnc#864867 bnc#865075).
- x86, cpu, amd: Add workaround for family 16h, erratum 793 (bnc#852967
CVE-2013-6885).
- Refresh patches.xen/xen3-patch-3.10.
- cifs: ensure that uncached writes handle unmapped areas correctly
(bnc#864025 CVE-2014-0069).
- x86, fpu, amd: Clear exceptions in AMD FXSAVE workaround (bnc#858638
CVE-2014-1438).
- rpm/kernel-obs-build.spec: Do not mount /sys, the build script does it
- Update config files: Disable TS5500-specific drivers These drivers are
useless without TS5500 board support: mtd-ts5500, gpio-ts5500 and max197.
- balloon: don't crash in HVM-with-PoD guests.
- usbback: fix after c/s 1232:8806dfb939d4 (bnc#842553).
- hwmon: (coretemp) Fix truncated name of alarm attributes.
- rpm/kernel-obs-build.spec: Fix for ppc64le
- Scripts: .nosrc.rpm should contain only the specfile (bnc #639379)
- config: update arm7hl/exynos
- Enhances exynos support:
* Add USB support
* Add sound support
* Add devices (accelerometer, etc.) on arndale board
- drm/cirrus: Fix cirrus drm driver for fbdev + qemu (bnc#856760).
- Spec: zeroing modules.dep to get identical builds among different
machines
- doc/README.SUSE: Update to match the current package layout
- Add the README.SUSE file to the packaging branch
- lockd: send correct lock when granting a delayed lock (bnc#859342).
- mm/page-writeback.c: do not count anon pages as dirtyable memory
(reclaim stalls).
- mm/page-writeback.c: fix dirty_balance_reserve subtraction from
dirtyable memory (reclaim stalls).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-375
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
cloop-2.639-11.7.1
cloop-debuginfo-2.639-11.7.1
cloop-debugsource-2.639-11.7.1
cloop-kmp-default-2.639_k3.11.10_11-11.7.1
cloop-kmp-default-debuginfo-2.639_k3.11.10_11-11.7.1
cloop-kmp-desktop-2.639_k3.11.10_11-11.7.1
cloop-kmp-desktop-debuginfo-2.639_k3.11.10_11-11.7.1
cloop-kmp-xen-2.639_k3.11.10_11-11.7.1
cloop-kmp-xen-debuginfo-2.639_k3.11.10_11-11.7.1
crash-7.0.2-2.7.1
crash-debuginfo-7.0.2-2.7.1
crash-debugsource-7.0.2-2.7.1
crash-devel-7.0.2-2.7.1
crash-doc-7.0.2-2.7.1
crash-eppic-7.0.2-2.7.1
crash-eppic-debuginfo-7.0.2-2.7.1
crash-gcore-7.0.2-2.7.1
crash-gcore-debuginfo-7.0.2-2.7.1
crash-kmp-default-7.0.2_k3.11.10_11-2.7.1
crash-kmp-default-debuginfo-7.0.2_k3.11.10_11-2.7.1
crash-kmp-desktop-7.0.2_k3.11.10_11-2.7.1
crash-kmp-desktop-debuginfo-7.0.2_k3.11.10_11-2.7.1
crash-kmp-xen-7.0.2_k3.11.10_11-2.7.1
crash-kmp-xen-debuginfo-7.0.2_k3.11.10_11-2.7.1
hdjmod-debugsource-1.28-16.7.1
hdjmod-kmp-default-1.28_k3.11.10_11-16.7.1
hdjmod-kmp-default-debuginfo-1.28_k3.11.10_11-16.7.1
hdjmod-kmp-desktop-1.28_k3.11.10_11-16.7.1
hdjmod-kmp-desktop-debuginfo-1.28_k3.11.10_11-16.7.1
hdjmod-kmp-xen-1.28_k3.11.10_11-16.7.1
hdjmod-kmp-xen-debuginfo-1.28_k3.11.10_11-16.7.1
ipset-6.19-2.7.1
ipset-debuginfo-6.19-2.7.1
ipset-debugsource-6.19-2.7.1
ipset-devel-6.19-2.7.1
ipset-kmp-default-6.19_k3.11.10_11-2.7.1
ipset-kmp-default-debuginfo-6.19_k3.11.10_11-2.7.1
ipset-kmp-desktop-6.19_k3.11.10_11-2.7.1
ipset-kmp-desktop-debuginfo-6.19_k3.11.10_11-2.7.1
ipset-kmp-xen-6.19_k3.11.10_11-2.7.1
ipset-kmp-xen-debuginfo-6.19_k3.11.10_11-2.7.1
iscsitarget-1.4.20.3-13.7.1
iscsitarget-debuginfo-1.4.20.3-13.7.1
iscsitarget-debugsource-1.4.20.3-13.7.1
iscsitarget-kmp-default-1.4.20.3_k3.11.10_11-13.7.1
iscsitarget-kmp-default-debuginfo-1.4.20.3_k3.11.10_11-13.7.1
iscsitarget-kmp-desktop-1.4.20.3_k3.11.10_11-13.7.1
iscsitarget-kmp-desktop-debuginfo-1.4.20.3_k3.11.10_11-13.7.1
iscsitarget-kmp-xen-1.4.20.3_k3.11.10_11-13.7.1
iscsitarget-kmp-xen-debuginfo-1.4.20.3_k3.11.10_11-13.7.1
kernel-default-3.11.10-11.1
kernel-default-base-3.11.10-11.1
kernel-default-base-debuginfo-3.11.10-11.1
kernel-default-debuginfo-3.11.10-11.1
kernel-default-debugsource-3.11.10-11.1
kernel-default-devel-3.11.10-11.1
kernel-default-devel-debuginfo-3.11.10-11.1
kernel-syms-3.11.10-11.1
libipset3-6.19-2.7.1
libipset3-debuginfo-6.19-2.7.1
ndiswrapper-1.58-7.1
ndiswrapper-debuginfo-1.58-7.1
ndiswrapper-debugsource-1.58-7.1
ndiswrapper-kmp-default-1.58_k3.11.10_11-7.1
ndiswrapper-kmp-default-debuginfo-1.58_k3.11.10_11-7.1
ndiswrapper-kmp-desktop-1.58_k3.11.10_11-7.1
ndiswrapper-kmp-desktop-debuginfo-1.58_k3.11.10_11-7.1
openvswitch-1.11.0-0.25.1
openvswitch-controller-1.11.0-0.25.1
openvswitch-controller-debuginfo-1.11.0-0.25.1
openvswitch-debuginfo-1.11.0-0.25.1
openvswitch-debugsource-1.11.0-0.25.1
openvswitch-kmp-default-1.11.0_k3.11.10_11-0.25.1
openvswitch-kmp-default-debuginfo-1.11.0_k3.11.10_11-0.25.1
openvswitch-kmp-desktop-1.11.0_k3.11.10_11-0.25.1
openvswitch-kmp-desktop-debuginfo-1.11.0_k3.11.10_11-0.25.1
openvswitch-kmp-xen-1.11.0_k3.11.10_11-0.25.1
openvswitch-kmp-xen-debuginfo-1.11.0_k3.11.10_11-0.25.1
openvswitch-pki-1.11.0-0.25.1
openvswitch-switch-1.11.0-0.25.1
openvswitch-switch-debuginfo-1.11.0-0.25.1
openvswitch-test-1.11.0-0.25.1
pcfclock-0.44-258.7.1
pcfclock-debuginfo-0.44-258.7.1
pcfclock-debugsource-0.44-258.7.1
pcfclock-kmp-default-0.44_k3.11.10_11-258.7.1
pcfclock-kmp-default-debuginfo-0.44_k3.11.10_11-258.7.1
pcfclock-kmp-desktop-0.44_k3.11.10_11-258.7.1
pcfclock-kmp-desktop-debuginfo-0.44_k3.11.10_11-258.7.1
python-openvswitch-1.11.0-0.25.1
python-openvswitch-test-1.11.0-0.25.1
python-virtualbox-4.2.18-2.12.1
python-virtualbox-debuginfo-4.2.18-2.12.1
virtualbox-4.2.18-2.12.1
virtualbox-debuginfo-4.2.18-2.12.1
virtualbox-debugsource-4.2.18-2.12.1
virtualbox-devel-4.2.18-2.12.1
virtualbox-guest-kmp-default-4.2.18_k3.11.10_11-2.12.1
virtualbox-guest-kmp-default-debuginfo-4.2.18_k3.11.10_11-2.12.1
virtualbox-guest-kmp-desktop-4.2.18_k3.11.10_11-2.12.1
virtualbox-guest-kmp-desktop-debuginfo-4.2.18_k3.11.10_11-2.12.1
virtualbox-guest-tools-4.2.18-2.12.1
virtualbox-guest-tools-debuginfo-4.2.18-2.12.1
virtualbox-guest-x11-4.2.18-2.12.1
virtualbox-guest-x11-debuginfo-4.2.18-2.12.1
virtualbox-host-kmp-default-4.2.18_k3.11.10_11-2.12.1
virtualbox-host-kmp-default-debuginfo-4.2.18_k3.11.10_11-2.12.1
virtualbox-host-kmp-desktop-4.2.18_k3.11.10_11-2.12.1
virtualbox-host-kmp-desktop-debuginfo-4.2.18_k3.11.10_11-2.12.1
virtualbox-qt-4.2.18-2.12.1
virtualbox-qt-debuginfo-4.2.18-2.12.1
virtualbox-websrv-4.2.18-2.12.1
virtualbox-websrv-debuginfo-4.2.18-2.12.1
xen-debugsource-4.3.2_01-15.1
xen-devel-4.3.2_01-15.1
xen-kmp-default-4.3.2_01_k3.11.10_11-15.1
xen-kmp-default-debuginfo-4.3.2_01_k3.11.10_11-15.1
xen-kmp-desktop-4.3.2_01_k3.11.10_11-15.1
xen-kmp-desktop-debuginfo-4.3.2_01_k3.11.10_11-15.1
xen-libs-4.3.2_01-15.1
xen-libs-debuginfo-4.3.2_01-15.1
xen-tools-domU-4.3.2_01-15.1
xen-tools-domU-debuginfo-4.3.2_01-15.1
xtables-addons-2.3-2.7.1
xtables-addons-debuginfo-2.3-2.7.1
xtables-addons-debugsource-2.3-2.7.1
xtables-addons-kmp-default-2.3_k3.11.10_11-2.7.1
xtables-addons-kmp-default-debuginfo-2.3_k3.11.10_11-2.7.1
xtables-addons-kmp-desktop-2.3_k3.11.10_11-2.7.1
xtables-addons-kmp-desktop-debuginfo-2.3_k3.11.10_11-2.7.1
xtables-addons-kmp-xen-2.3_k3.11.10_11-2.7.1
xtables-addons-kmp-xen-debuginfo-2.3_k3.11.10_11-2.7.1
- openSUSE 13.1 (i686 x86_64):
kernel-debug-3.11.10-11.1
kernel-debug-base-3.11.10-11.1
kernel-debug-base-debuginfo-3.11.10-11.1
kernel-debug-debuginfo-3.11.10-11.1
kernel-debug-debugsource-3.11.10-11.1
kernel-debug-devel-3.11.10-11.1
kernel-debug-devel-debuginfo-3.11.10-11.1
kernel-desktop-3.11.10-11.1
kernel-desktop-base-3.11.10-11.1
kernel-desktop-base-debuginfo-3.11.10-11.1
kernel-desktop-debuginfo-3.11.10-11.1
kernel-desktop-debugsource-3.11.10-11.1
kernel-desktop-devel-3.11.10-11.1
kernel-desktop-devel-debuginfo-3.11.10-11.1
kernel-ec2-3.11.10-11.1
kernel-ec2-base-3.11.10-11.1
kernel-ec2-base-debuginfo-3.11.10-11.1
kernel-ec2-debuginfo-3.11.10-11.1
kernel-ec2-debugsource-3.11.10-11.1
kernel-ec2-devel-3.11.10-11.1
kernel-ec2-devel-debuginfo-3.11.10-11.1
kernel-trace-3.11.10-11.1
kernel-trace-base-3.11.10-11.1
kernel-trace-base-debuginfo-3.11.10-11.1
kernel-trace-debuginfo-3.11.10-11.1
kernel-trace-debugsource-3.11.10-11.1
kernel-trace-devel-3.11.10-11.1
kernel-trace-devel-debuginfo-3.11.10-11.1
kernel-vanilla-3.11.10-11.1
kernel-vanilla-debuginfo-3.11.10-11.1
kernel-vanilla-debugsource-3.11.10-11.1
kernel-vanilla-devel-3.11.10-11.1
kernel-vanilla-devel-debuginfo-3.11.10-11.1
kernel-xen-3.11.10-11.1
kernel-xen-base-3.11.10-11.1
kernel-xen-base-debuginfo-3.11.10-11.1
kernel-xen-debuginfo-3.11.10-11.1
kernel-xen-debugsource-3.11.10-11.1
kernel-xen-devel-3.11.10-11.1
kernel-xen-devel-debuginfo-3.11.10-11.1
- openSUSE 13.1 (x86_64):
xen-4.3.2_01-15.1
xen-doc-html-4.3.2_01-15.1
xen-libs-32bit-4.3.2_01-15.1
xen-libs-debuginfo-32bit-4.3.2_01-15.1
xen-tools-4.3.2_01-15.1
xen-tools-debuginfo-4.3.2_01-15.1
xen-xend-tools-4.3.2_01-15.1
xen-xend-tools-debuginfo-4.3.2_01-15.1
- openSUSE 13.1 (noarch):
kernel-devel-3.11.10-11.1
kernel-docs-3.11.10-11.3
kernel-source-3.11.10-11.1
kernel-source-vanilla-3.11.10-11.1
- openSUSE 13.1 (i686):
kernel-pae-3.11.10-11.1
kernel-pae-base-3.11.10-11.1
kernel-pae-base-debuginfo-3.11.10-11.1
kernel-pae-debuginfo-3.11.10-11.1
kernel-pae-debugsource-3.11.10-11.1
kernel-pae-devel-3.11.10-11.1
kernel-pae-devel-debuginfo-3.11.10-11.1
- openSUSE 13.1 (i586):
cloop-kmp-pae-2.639_k3.11.10_11-11.7.1
cloop-kmp-pae-debuginfo-2.639_k3.11.10_11-11.7.1
crash-kmp-pae-7.0.2_k3.11.10_11-2.7.1
crash-kmp-pae-debuginfo-7.0.2_k3.11.10_11-2.7.1
hdjmod-kmp-pae-1.28_k3.11.10_11-16.7.1
hdjmod-kmp-pae-debuginfo-1.28_k3.11.10_11-16.7.1
ipset-kmp-pae-6.19_k3.11.10_11-2.7.1
ipset-kmp-pae-debuginfo-6.19_k3.11.10_11-2.7.1
iscsitarget-kmp-pae-1.4.20.3_k3.11.10_11-13.7.1
iscsitarget-kmp-pae-debuginfo-1.4.20.3_k3.11.10_11-13.7.1
ndiswrapper-kmp-pae-1.58_k3.11.10_11-7.1
ndiswrapper-kmp-pae-debuginfo-1.58_k3.11.10_11-7.1
openvswitch-kmp-pae-1.11.0_k3.11.10_11-0.25.1
openvswitch-kmp-pae-debuginfo-1.11.0_k3.11.10_11-0.25.1
pcfclock-kmp-pae-0.44_k3.11.10_11-258.7.1
pcfclock-kmp-pae-debuginfo-0.44_k3.11.10_11-258.7.1
virtualbox-guest-kmp-pae-4.2.18_k3.11.10_11-2.12.1
virtualbox-guest-kmp-pae-debuginfo-4.2.18_k3.11.10_11-2.12.1
virtualbox-host-kmp-pae-4.2.18_k3.11.10_11-2.12.1
virtualbox-host-kmp-pae-debuginfo-4.2.18_k3.11.10_11-2.12.1
xen-kmp-pae-4.3.2_01_k3.11.10_11-15.1
xen-kmp-pae-debuginfo-4.3.2_01_k3.11.10_11-15.1
xtables-addons-kmp-pae-2.3_k3.11.10_11-2.7.1
xtables-addons-kmp-pae-debuginfo-2.3_k3.11.10_11-2.7.1
References:
http://support.novell.com/security/cve/CVE-2013-4579.html
http://support.novell.com/security/cve/CVE-2013-6885.html
http://support.novell.com/security/cve/CVE-2013-7263.html
http://support.novell.com/security/cve/CVE-2013-7264.html
http://support.novell.com/security/cve/CVE-2013-7265.html
http://support.novell.com/security/cve/CVE-2013-7281.html
http://support.novell.com/security/cve/CVE-2014-0069.html
http://support.novell.com/security/cve/CVE-2014-0101.html
http://support.novell.com/security/cve/CVE-2014-0196.html
http://support.novell.com/security/cve/CVE-2014-1438.html
http://support.novell.com/security/cve/CVE-2014-1446.html
http://support.novell.com/security/cve/CVE-2014-1690.html
http://support.novell.com/security/cve/CVE-2014-1737.html
http://support.novell.com/security/cve/CVE-2014-1738.html
http://support.novell.com/security/cve/CVE-2014-1874.html
http://support.novell.com/security/cve/CVE-2014-2523.html
http://support.novell.com/security/cve/CVE-2014-2672.html
https://bugzilla.novell.com/639379
https://bugzilla.novell.com/812592
https://bugzilla.novell.com/81660
https://bugzilla.novell.com/821619
https://bugzilla.novell.com/833968
https://bugzilla.novell.com/842553
https://bugzilla.novell.com/849334
https://bugzilla.novell.com/851244
https://bugzilla.novell.com/851426
https://bugzilla.novell.com/852656
https://bugzilla.novell.com/852967
https://bugzilla.novell.com/853350
https://bugzilla.novell.com/856760
https://bugzilla.novell.com/857643
https://bugzilla.novell.com/858638
https://bugzilla.novell.com/858872
https://bugzilla.novell.com/859342
https://bugzilla.novell.com/860502
https://bugzilla.novell.com/860835
https://bugzilla.novell.com/861750
https://bugzilla.novell.com/862746
https://bugzilla.novell.com/863235
https://bugzilla.novell.com/863335
https://bugzilla.novell.com/864025
https://bugzilla.novell.com/864867
https://bugzilla.novell.com/865075
https://bugzilla.novell.com/866075
https://bugzilla.novell.com/866102
https://bugzilla.novell.com/867718
https://bugzilla.novell.com/868653
https://bugzilla.novell.com/869414
https://bugzilla.novell.com/871148
https://bugzilla.novell.com/871160
https://bugzilla.novell.com/871252
https://bugzilla.novell.com/871325
https://bugzilla.novell.com/875440
https://bugzilla.novell.com/875690
https://bugzilla.novell.com/875798
https://bugzilla.novell.com/876531
https://bugzilla.novell.com/876699
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0
[security-announce] openSUSE-SU-2014:0677-1: important: kernel: security and bugfix update
by opensuse-security@opensuse.org 19 May '14
by opensuse-security@opensuse.org 19 May '14
19 May '14
openSUSE Security Update: kernel: security and bugfix update
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:0677-1
Rating: important
References: #733022 #811746 #833968 #837111 #851426 #852652
#852967 #858233 #858638 #858869 #858870 #858872
#860835 #862145 #863335 #864025 #866102 #868653
#869414 #869898 #871148 #871252 #871325 #873717
#875690 #875798
Cross-References: CVE-2013-4254 CVE-2013-4579 CVE-2013-6885
CVE-2014-0101 CVE-2014-0196 CVE-2014-0069
CVE-2014-1438 CVE-2014-1444 CVE-2014-1445
CVE-2014-1446 CVE-2014-1690 CVE-2014-1737
CVE-2014-1738 CVE-2014-1874 CVE-2014-2523
CVE-2014-2672
Affected Products:
openSUSE 12.3
______________________________________________________________________________
An update that solves 16 vulnerabilities and has 10 fixes
is now available.
Description:
The Linux Kernel was updated to fix various security issues and bugs.
Main security issues fixed:
A security issue in the tty layer that was fixed that could be used by
local attackers for code execution (CVE-2014-0196).
Two security issues in the floppy driver were fixed that could be used by
local attackers on machines with the floppy to crash the kernel or
potentially execute code in the kernel (CVE-2014-1737 CVE-2014-1738).
Other security issues and bugs that were fixed:
- netfilter: nf_nat: fix access to uninitialized buffer in IRC NAT helper
(bnc#860835 CVE-2014-1690).
- net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH
(bnc#866102, CVE-2014-0101).
- n_tty: Fix a n_tty_write crash and code execution when echoing in raw
mode (bnc#871252 bnc#875690 CVE-2014-0196).
- netfilter: nf_ct_sip: support Cisco 7941/7945 IP phones (bnc#873717).
- Update config files: re-enable twofish crypto support Software twofish
crypto support was disabled in several architectures since openSUSE
10.3. For i386 and x86_64 it was on purpose, because
hardware-accelerated alternatives exist. However for all other
architectures it was by accident. Re-enable software twofish crypto
support in arm, ia64 and ppc configuration files, to guarantee that at
least one implementation is always available (bnc#871325).
- Update config files: disable CONFIG_TOUCHSCREEN_W90X900 The w90p910_ts
driver only makes sense on the W90x900 architecture, which we do not
support.
- ath9k: protect tid->sched check (bnc#871148,CVE-2014-2672).
- Fix dst_neigh_lookup/dst_neigh_lookup_skb return value handling bug
(bnc#869898).
- SELinux: Fix kernel BUG on empty security contexts
(bnc#863335,CVE-2014-1874).
- hamradio/yam: fix info leak in ioctl (bnc#858872, CVE-2014-1446).
- wanxl: fix info leak in ioctl (bnc#858870, CVE-2014-1445).
- farsync: fix info leak in ioctl (bnc#858869, CVE-2014-1444).
- ARM: 7809/1: perf: fix event validation for software group leaders
(CVE-2013-4254, bnc#837111).
- netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages
(bnc#868653, CVE-2014-2523).
- ath9k_htc: properly set MAC address and BSSID mask (bnc#851426,
CVE-2013-4579).
- drm/ttm: don't oops if no invalidate_caches() (bnc#869414).
- Apply missing patches.fixes/drm-nouveau-hwmon-rename-fan0-to-fan1.patch
- xfs: growfs: use uncached buffers for new headers (bnc#858233).
- xfs: use btree block initialisation functions in growfs (bnc#858233).
- Revert "Delete
patches.fixes/xfs-fix-xfs_buf_find-oops-on-blocks-beyond-the-filesystem-end
." (bnc#858233) Put back again the patch
patches.fixes/xfs-fix-xfs_buf_find-oops-on-blocks-beyond-the-filesystem-end
back as there is a better fix than reverting the affecting patch.
- Delete
patches.fixes/xfs-fix-xfs_buf_find-oops-on-blocks-beyond-the-filesystem-end
. It turned out that this patch causes regressions (bnc#858233) The
upstream 3.7.x also reverted it in the end (commit c3793e0d94af2).
- tcp: syncookies: reduce cookie lifetime to 128 seconds (bnc#833968).
- tcp: syncookies: reduce mss table to four values (bnc#833968).
- x86, cpu, amd: Add workaround for family 16h, erratum 793 (bnc#852967
CVE-2013-6885).
- cifs: ensure that uncached writes handle unmapped areas correctly
(bnc#864025 CVE-2014-0069).
- x86, fpu, amd: Clear exceptions in AMD FXSAVE workaround (bnc#858638
CVE-2014-1438).
- xencons: generalize use of add_preferred_console() (bnc#733022,
bnc#852652).
- balloon: don't crash in HVM-with-PoD guests.
- hwmon: (coretemp) Fix truncated name of alarm attributes.
- NFS: Avoid PUTROOTFH when managing leases (bnc#811746).
- cifs: delay super block destruction until all cifsFileInfo objects are
gone (bnc#862145).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 12.3:
zypper in -t patch openSUSE-2014-376
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 12.3 (i586 x86_64):
kernel-default-3.7.10-1.32.1
kernel-default-base-3.7.10-1.32.1
kernel-default-base-debuginfo-3.7.10-1.32.1
kernel-default-debuginfo-3.7.10-1.32.1
kernel-default-debugsource-3.7.10-1.32.1
kernel-default-devel-3.7.10-1.32.1
kernel-default-devel-debuginfo-3.7.10-1.32.1
kernel-syms-3.7.10-1.32.1
- openSUSE 12.3 (i686 x86_64):
kernel-debug-3.7.10-1.32.1
kernel-debug-base-3.7.10-1.32.1
kernel-debug-base-debuginfo-3.7.10-1.32.1
kernel-debug-debuginfo-3.7.10-1.32.1
kernel-debug-debugsource-3.7.10-1.32.1
kernel-debug-devel-3.7.10-1.32.1
kernel-debug-devel-debuginfo-3.7.10-1.32.1
kernel-desktop-3.7.10-1.32.1
kernel-desktop-base-3.7.10-1.32.1
kernel-desktop-base-debuginfo-3.7.10-1.32.1
kernel-desktop-debuginfo-3.7.10-1.32.1
kernel-desktop-debugsource-3.7.10-1.32.1
kernel-desktop-devel-3.7.10-1.32.1
kernel-desktop-devel-debuginfo-3.7.10-1.32.1
kernel-ec2-3.7.10-1.32.1
kernel-ec2-base-3.7.10-1.32.1
kernel-ec2-base-debuginfo-3.7.10-1.32.1
kernel-ec2-debuginfo-3.7.10-1.32.1
kernel-ec2-debugsource-3.7.10-1.32.1
kernel-ec2-devel-3.7.10-1.32.1
kernel-ec2-devel-debuginfo-3.7.10-1.32.1
kernel-trace-3.7.10-1.32.1
kernel-trace-base-3.7.10-1.32.1
kernel-trace-base-debuginfo-3.7.10-1.32.1
kernel-trace-debuginfo-3.7.10-1.32.1
kernel-trace-debugsource-3.7.10-1.32.1
kernel-trace-devel-3.7.10-1.32.1
kernel-trace-devel-debuginfo-3.7.10-1.32.1
kernel-vanilla-3.7.10-1.32.1
kernel-vanilla-debuginfo-3.7.10-1.32.1
kernel-vanilla-debugsource-3.7.10-1.32.1
kernel-vanilla-devel-3.7.10-1.32.1
kernel-vanilla-devel-debuginfo-3.7.10-1.32.1
kernel-xen-3.7.10-1.32.1
kernel-xen-base-3.7.10-1.32.1
kernel-xen-base-debuginfo-3.7.10-1.32.1
kernel-xen-debuginfo-3.7.10-1.32.1
kernel-xen-debugsource-3.7.10-1.32.1
kernel-xen-devel-3.7.10-1.32.1
kernel-xen-devel-debuginfo-3.7.10-1.32.1
- openSUSE 12.3 (noarch):
kernel-devel-3.7.10-1.32.1
kernel-docs-3.7.10-1.32.2
kernel-source-3.7.10-1.32.1
kernel-source-vanilla-3.7.10-1.32.1
- openSUSE 12.3 (i686):
kernel-pae-3.7.10-1.32.1
kernel-pae-base-3.7.10-1.32.1
kernel-pae-base-debuginfo-3.7.10-1.32.1
kernel-pae-debuginfo-3.7.10-1.32.1
kernel-pae-debugsource-3.7.10-1.32.1
kernel-pae-devel-3.7.10-1.32.1
kernel-pae-devel-debuginfo-3.7.10-1.32.1
References:
http://support.novell.com/security/cve/CVE-2013-4254.html
http://support.novell.com/security/cve/CVE-2013-4579.html
http://support.novell.com/security/cve/CVE-2013-6885.html
http://support.novell.com/security/cve/CVE-2014-0101.html
http://support.novell.com/security/cve/CVE-2014-0196.html
http://support.novell.com/security/cve/CVE-2014-0069.html
http://support.novell.com/security/cve/CVE-2014-1438.html
http://support.novell.com/security/cve/CVE-2014-1444.html
http://support.novell.com/security/cve/CVE-2014-1445.html
http://support.novell.com/security/cve/CVE-2014-1446.html
http://support.novell.com/security/cve/CVE-2014-1690.html
http://support.novell.com/security/cve/CVE-2014-1737.html
http://support.novell.com/security/cve/CVE-2014-1738.html
http://support.novell.com/security/cve/CVE-2014-1874.html
http://support.novell.com/security/cve/CVE-2014-2523.html
http://support.novell.com/security/cve/CVE-2014-2672.html
https://bugzilla.novell.com/733022
https://bugzilla.novell.com/811746
https://bugzilla.novell.com/833968
https://bugzilla.novell.com/837111
https://bugzilla.novell.com/851426
https://bugzilla.novell.com/852652
https://bugzilla.novell.com/852967
https://bugzilla.novell.com/858233
https://bugzilla.novell.com/858638
https://bugzilla.novell.com/858869
https://bugzilla.novell.com/858870
https://bugzilla.novell.com/858872
https://bugzilla.novell.com/860835
https://bugzilla.novell.com/862145
https://bugzilla.novell.com/863335
https://bugzilla.novell.com/864025
https://bugzilla.novell.com/866102
https://bugzilla.novell.com/868653
https://bugzilla.novell.com/869414
https://bugzilla.novell.com/869898
https://bugzilla.novell.com/871148
https://bugzilla.novell.com/871252
https://bugzilla.novell.com/871325
https://bugzilla.novell.com/873717
https://bugzilla.novell.com/875690
https://bugzilla.novell.com/875798
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0