openSUSE Security Update: Security update for seamonkey
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:0636-1
Rating: important
References: #923534
Cross-References: CVE-2015-0817 CVE-2015-0818
Affected Products:
openSUSE 13.2
openSUSE 13.1
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
SeaMonkey was updated to 2.33.1 to fix several vulnerabilities.
The following vulnerabilities were fixed:
* Privilege escalation through SVG navigation (CVE-2015-0818)
* Code execution through incorrect JavaScript bounds checking elimination
(CVE-2015-0817)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2015-279=1
- openSUSE 13.1:
zypper in -t patch openSUSE-2015-279=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
seamonkey-2.33.1-17.1
seamonkey-debuginfo-2.33.1-17.1
seamonkey-debugsource-2.33.1-17.1
seamonkey-dom-inspector-2.33.1-17.1
seamonkey-irc-2.33.1-17.1
seamonkey-translations-common-2.33.1-17.1
seamonkey-translations-other-2.33.1-17.1
- openSUSE 13.1 (i586 x86_64):
seamonkey-2.33.1-53.1
seamonkey-debuginfo-2.33.1-53.1
seamonkey-debugsource-2.33.1-53.1
seamonkey-dom-inspector-2.33.1-53.1
seamonkey-irc-2.33.1-53.1
seamonkey-translations-common-2.33.1-53.1
seamonkey-translations-other-2.33.1-53.1
References:
https://www.suse.com/security/cve/CVE-2015-0817.htmlhttps://www.suse.com/security/cve/CVE-2015-0818.htmlhttps://bugzilla.suse.com/923534
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0630-1
Rating: important
References: #923534
Cross-References: CVE-2015-0817 CVE-2015-0818
Affected Products:
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Desktop 12
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
MozillaFirefox was updated to the 31.5.3ESR release to fix two security
vulnerabilities:
MFSA 2015-29 / CVE-2015-0817: Security researcher ilxu1a reported, through
HP Zero Day Initiative's Pwn2Own contest, a flaw in Mozilla's
implementation of typed array bounds checking in JavaScript just-in-time
compilation (JIT) and its management of bounds checking for heap access.
This flaw can be leveraged into the reading and writing of memory allowing
for arbitary code execution on the local system.
MFSA 2015-28 / CVE-2015-0818: Security researcher Mariusz Mlynski
reported, through HP Zero Day Initiative's Pwn2Own contest, a method to
run arbitrary scripts in a privileged context. This bypassed the
same-origin policy protections by using a flaw in the processing of SVG
format content navigation.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12:
zypper in -t patch SUSE-SLE-SDK-12-2015-148=1
- SUSE Linux Enterprise Server 12:
zypper in -t patch SUSE-SLE-SERVER-12-2015-148=1
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2015-148=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):
MozillaFirefox-debuginfo-31.5.3esr-27.1
MozillaFirefox-debugsource-31.5.3esr-27.1
MozillaFirefox-devel-31.5.3esr-27.1
- SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
MozillaFirefox-31.5.3esr-27.1
MozillaFirefox-debuginfo-31.5.3esr-27.1
MozillaFirefox-debugsource-31.5.3esr-27.1
MozillaFirefox-translations-31.5.3esr-27.1
- SUSE Linux Enterprise Desktop 12 (x86_64):
MozillaFirefox-31.5.3esr-27.1
MozillaFirefox-debuginfo-31.5.3esr-27.1
MozillaFirefox-debugsource-31.5.3esr-27.1
MozillaFirefox-translations-31.5.3esr-27.1
References:
https://www.suse.com/security/cve/CVE-2015-0817.htmlhttps://www.suse.com/security/cve/CVE-2015-0818.htmlhttps://bugzilla.suse.com/923534
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0593-2
Rating: important
References: #923534
Cross-References: CVE-2015-0817 CVE-2015-0818
Affected Products:
SUSE Linux Enterprise Server 11 SP2 LTSS
SUSE Linux Enterprise Server 11 SP1 LTSS
SUSE Linux Enterprise Server 10 SP4 LTSS
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
It includes one version update.
Description:
MozillaFirefox was updated to the 31.5.3ESR release to fix two security
vulnerabilities:
*
MFSA 2015-29 / CVE-2015-0817: Security researcher ilxu1a reported,
through HP Zero Day Initiative's Pwn2Own contest, a flaw in Mozilla's
implementation of typed array bounds checking in JavaScript just-in-time
compilation (JIT) and its management of bounds checking for heap access.
This flaw can be leveraged into the reading and writing of memory allowing
for arbitrary code execution on the local system.
*
MFSA 2015-28 / CVE-2015-0818: Security researcher Mariusz Mlynski
reported, through HP Zero Day Initiative's Pwn2Own contest, a method to
run arbitrary scripts in a privileged context. This bypassed the
same-origin policy protections by using a flaw in the processing of SVG
format content navigation.
Security Issues:
* CVE-2015-0817
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817>
* CVE-2015-0818
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP2 LTSS:
zypper in -t patch slessp2-firefox-20150323=10528
- SUSE Linux Enterprise Server 11 SP1 LTSS:
zypper in -t patch slessp1-firefox-20150323=10527
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64) [New Version: 31.5.3esr]:
MozillaFirefox-31.5.3esr-0.3.1
MozillaFirefox-translations-31.5.3esr-0.3.1
- SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64) [New Version: 31.5.3esr]:
MozillaFirefox-31.5.3esr-0.3.1
MozillaFirefox-translations-31.5.3esr-0.3.1
- SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x):
MozillaFirefox-31.5.3esr-0.5.2
MozillaFirefox-translations-31.5.3esr-0.5.2
References:
https://www.suse.com/security/cve/CVE-2015-0817.htmlhttps://www.suse.com/security/cve/CVE-2015-0818.htmlhttps://bugzilla.suse.com/923534https://download.suse.com/patch/finder/?keywords=46e1d668433ddb6f934feef219…https://download.suse.com/patch/finder/?keywords=b6ab105b8070b709479f15ffda…https://download.suse.com/patch/finder/?keywords=d22145407e04e2836b7712bde0…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for libXfont
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:0614-1
Rating: important
References: #921978
Cross-References: CVE-2015-1802 CVE-2015-1803 CVE-2015-1804
Affected Products:
openSUSE 13.2
openSUSE 13.1
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
libXFont was updated to fix three vulnerabilities when parsing BDF files
(bnc#921978)
As libXfont is used by the X server to read font files, and an
unprivileged user with access to the X server can tell the X server to
read a given font file from a path of their choosing, these
vulnerabilities have the potential to allow unprivileged users to run code
with the privileges of the X server.
The following vulnerabilities were fixed:
* The BDF parser could allocate the a wrong buffer size, leading to out of
bound writes (CVE-2015-1802)
* The BDF parser could crash when trying to read an invalid pointer
(CVE-2015-1803)
* The BDF parser could read 32 bit metrics values into 16 bit integers,
causing an out-of-bound memory access though integer overflow
(CVE-2015-1804)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2015-266=1
- openSUSE 13.1:
zypper in -t patch openSUSE-2015-266=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
libXfont-debugsource-1.5.0-2.4.1
libXfont-devel-1.5.0-2.4.1
libXfont1-1.5.0-2.4.1
libXfont1-debuginfo-1.5.0-2.4.1
- openSUSE 13.2 (x86_64):
libXfont-devel-32bit-1.5.0-2.4.1
libXfont1-32bit-1.5.0-2.4.1
libXfont1-debuginfo-32bit-1.5.0-2.4.1
- openSUSE 13.1 (i586 x86_64):
libXfont-debugsource-1.4.6-2.12.1
libXfont-devel-1.4.6-2.12.1
libXfont1-1.4.6-2.12.1
libXfont1-debuginfo-1.4.6-2.12.1
- openSUSE 13.1 (x86_64):
libXfont-devel-32bit-1.4.6-2.12.1
libXfont1-32bit-1.4.6-2.12.1
libXfont1-debuginfo-32bit-1.4.6-2.12.1
References:
http://support.novell.com/security/cve/CVE-2015-1802.htmlhttp://support.novell.com/security/cve/CVE-2015-1803.htmlhttp://support.novell.com/security/cve/CVE-2015-1804.htmlhttps://bugzilla.suse.com/921978
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for Xen
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0613-1
Rating: important
References: #861318 #882089 #895528 #901488 #903680 #904255
#906996 #910254 #910681 #912011 #918995 #918998
#919098 #919464 #919663
Cross-References: CVE-2014-3615 CVE-2014-9065 CVE-2014-9066
CVE-2015-0361 CVE-2015-2044 CVE-2015-2045
CVE-2015-2151 CVE-2015-2152
Affected Products:
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Desktop 12
______________________________________________________________________________
An update that solves 8 vulnerabilities and has 7 fixes is
now available.
Description:
The XEN hypervisor received updates to fix various security issues and
bugs.
The following security issues were fixed:
- CVE-2015-2151: XSA-123: A hypervisor memory corruption due to x86
emulator flaw.
- CVE-2015-2045: XSA-122: Information leak through version information
hypercall.
- CVE-2015-2044: XSA-121: Information leak via internal x86 system device
emulation.
- CVE-2015-2152: XSA-119: HVM qemu was unexpectedly enabling emulated VGA
graphics backends.
- CVE-2014-3615: Information leakage when guest sets high graphics
resolution.
- CVE-2015-0361: XSA-116: A xen crash due to use after free on hvm guest
teardown.
- CVE-2014-9065, CVE-2014-9066: XSA-114: xen: p2m lock starvation.
Also the following bugs were fixed:
- bnc#919098 - XEN blktap device intermittently fails to connect
- bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus
- bnc#903680 - Problems with detecting free loop devices on Xen guest
startup
- bnc#861318 - xentop reports "Found interface vif101.0 but domain 101
does not exist."
- Update seabios to rel-1.7.3.1 which is the correct version for Xen 4.4
- Enhancement to virsh/libvirtd "send-key" command The xen side small fix.
(FATE#317240)
- bnc#901488 - Intel ixgbe driver assigns rx/tx queues per core resulting
in irq problems on servers with a large amount of CPU cores
- bnc#910254 - SLES11 SP3 Xen VT-d igb NIC doesn't work
- Add domain_migrate_constraints_set API to Xend's http interface
(FATE#317239)
- Restore missing fixes from block-dmmd script
- bnc#904255 - XEN boot hangs in early boot on UEFI system
- bsc#912011 - high ping latency after upgrade to latest SLES11SP3 on xen
Dom0
- Fix missing banner by restoring the figlet program.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12:
zypper in -t patch SUSE-SLE-SDK-12-2015-147=1
- SUSE Linux Enterprise Server 12:
zypper in -t patch SUSE-SLE-SERVER-12-2015-147=1
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2015-147=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12 (x86_64):
xen-debugsource-4.4.1_10-9.1
xen-devel-4.4.1_10-9.1
- SUSE Linux Enterprise Server 12 (x86_64):
xen-4.4.1_10-9.1
xen-debugsource-4.4.1_10-9.1
xen-doc-html-4.4.1_10-9.1
xen-kmp-default-4.4.1_10_k3.12.36_38-9.1
xen-kmp-default-debuginfo-4.4.1_10_k3.12.36_38-9.1
xen-libs-32bit-4.4.1_10-9.1
xen-libs-4.4.1_10-9.1
xen-libs-debuginfo-32bit-4.4.1_10-9.1
xen-libs-debuginfo-4.4.1_10-9.1
xen-tools-4.4.1_10-9.1
xen-tools-debuginfo-4.4.1_10-9.1
xen-tools-domU-4.4.1_10-9.1
xen-tools-domU-debuginfo-4.4.1_10-9.1
- SUSE Linux Enterprise Desktop 12 (x86_64):
xen-4.4.1_10-9.1
xen-debugsource-4.4.1_10-9.1
xen-kmp-default-4.4.1_10_k3.12.36_38-9.1
xen-kmp-default-debuginfo-4.4.1_10_k3.12.36_38-9.1
xen-libs-32bit-4.4.1_10-9.1
xen-libs-4.4.1_10-9.1
xen-libs-debuginfo-32bit-4.4.1_10-9.1
xen-libs-debuginfo-4.4.1_10-9.1
References:
http://support.novell.com/security/cve/CVE-2014-3615.htmlhttp://support.novell.com/security/cve/CVE-2014-9065.htmlhttp://support.novell.com/security/cve/CVE-2014-9066.htmlhttp://support.novell.com/security/cve/CVE-2015-0361.htmlhttp://support.novell.com/security/cve/CVE-2015-2044.htmlhttp://support.novell.com/security/cve/CVE-2015-2045.htmlhttp://support.novell.com/security/cve/CVE-2015-2151.htmlhttp://support.novell.com/security/cve/CVE-2015-2152.htmlhttps://bugzilla.suse.com/861318https://bugzilla.suse.com/882089https://bugzilla.suse.com/895528https://bugzilla.suse.com/901488https://bugzilla.suse.com/903680https://bugzilla.suse.com/904255https://bugzilla.suse.com/906996https://bugzilla.suse.com/910254https://bugzilla.suse.com/910681https://bugzilla.suse.com/912011https://bugzilla.suse.com/918995https://bugzilla.suse.com/918998https://bugzilla.suse.com/919098https://bugzilla.suse.com/919464https://bugzilla.suse.com/919663
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
openSUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:0607-1
Rating: important
References: #923534
Cross-References: CVE-2015-0817 CVE-2015-0818
Affected Products:
openSUSE 13.2
openSUSE 13.1
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
MozillaFirefox was updated to Firefox 36.0.4 to fix two critical security
issues found during Pwn2Own:
* MFSA 2015-28/CVE-2015-0818 (bmo#1144988) Privilege escalation through
SVG navigation
* MFSA 2015-29/CVE-2015-0817 (bmo#1145255) Code execution through
incorrect JavaScript bounds checking elimination
Als fixed were the following bugs:
- Copy the icons to /usr/share/icons instead of symlinking them: in
preparation for containerized apps (e.g. xdg-app) as well as AppStream
metadata extraction, there are a couple locations that need to be real
files for system integration (.desktop files, icons, mime-type info).
- update to Firefox 36.0.1 Bugfixes:
* Disable the usage of the ANY DNS query type (bmo#1093983)
* Hello may become inactive until restart (bmo#1137469)
* Print preferences may not be preserved (bmo#1136855)
* Hello contact tabs may not be visible (bmo#1137141)
* Accept hostnames that include an underscore character ("_")
(bmo#1136616)
* WebGL may use significant memory with Canvas2d (bmo#1137251)
* Option -remote has been restored (bmo#1080319)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2015-263=1
- openSUSE 13.1:
zypper in -t patch openSUSE-2015-263=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
MozillaFirefox-36.0.4-18.1
MozillaFirefox-branding-upstream-36.0.4-18.1
MozillaFirefox-buildsymbols-36.0.4-18.1
MozillaFirefox-debuginfo-36.0.4-18.1
MozillaFirefox-debugsource-36.0.4-18.1
MozillaFirefox-devel-36.0.4-18.1
MozillaFirefox-translations-common-36.0.4-18.1
MozillaFirefox-translations-other-36.0.4-18.1
- openSUSE 13.1 (i586 x86_64):
MozillaFirefox-36.0.4-63.1
MozillaFirefox-branding-upstream-36.0.4-63.1
MozillaFirefox-buildsymbols-36.0.4-63.1
MozillaFirefox-debuginfo-36.0.4-63.1
MozillaFirefox-debugsource-36.0.4-63.1
MozillaFirefox-devel-36.0.4-63.1
MozillaFirefox-translations-common-36.0.4-63.1
MozillaFirefox-translations-other-36.0.4-63.1
References:
http://support.novell.com/security/cve/CVE-2015-0817.htmlhttp://support.novell.com/security/cve/CVE-2015-0818.htmlhttps://bugzilla.suse.com/923534
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for Mozilla Firefox
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0593-1
Rating: important
References: #923534
Cross-References: CVE-2015-0817 CVE-2015-0818
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
It includes one version update.
Description:
MozillaFirefox was updated to the 31.5.3ESR release to fix two security
vulnerabilities:
*
MFSA 2015-29 / CVE-2015-0817: Security researcher ilxu1a reported,
through HP Zero Day Initiative's Pwn2Own contest, a flaw in Mozilla's
implementation of typed array bounds checking in JavaScript just-in-time
compilation (JIT) and its management of bounds checking for heap access.
This flaw can be leveraged into the reading and writing of memory allowing
for arbitary code execution on the local system.
*
MFSA 2015-28 / CVE-2015-0818: Security researcher Mariusz Mlynski
reported, through HP Zero Day Initiative's Pwn2Own contest, a method to
run arbitrary scripts in a privileged context. This bypassed the
same-origin policy protections by using a flaw in the processing of SVG
format content navigation.
Security Issues:
* CVE-2015-0817
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817>
* CVE-2015-0818
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP3:
zypper in -t patch sdksp3-firefox-20150323=10524
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-firefox-20150323=10524
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-firefox-20150323=10524
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-firefox-20150323=10524
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):
MozillaFirefox-devel-31.5.3esr-0.8.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 31.5.3esr]:
MozillaFirefox-31.5.3esr-0.8.1
MozillaFirefox-translations-31.5.3esr-0.8.1
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 31.5.3esr]:
MozillaFirefox-31.5.3esr-0.8.1
MozillaFirefox-translations-31.5.3esr-0.8.1
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 31.5.3esr]:
MozillaFirefox-31.5.3esr-0.8.1
MozillaFirefox-translations-31.5.3esr-0.8.1
References:
http://support.novell.com/security/cve/CVE-2015-0817.htmlhttp://support.novell.com/security/cve/CVE-2015-0818.htmlhttps://bugzilla.suse.com/923534http://download.suse.com/patch/finder/?keywords=c769ca2ba75baf304d03ef988f0…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0581-1
Rating: important
References: #771619 #816099 #829110 #833588 #833820 #846656
#853040 #856760 #864401 #864404 #864409 #864411
#865419 #875051 #876086 #876594 #877593 #882470
#883948 #884817 #887597 #891277 #894213 #895841
#896484 #900279 #900644 #902232 #902349 #902351
#902675 #903096 #903640 #904053 #904242 #904659
#904671 #905304 #905312 #905799 #906586 #907196
#907338 #907551 #907611 #907818 #908069 #908163
#908393 #908550 #908551 #908572 #908825 #909077
#909078 #909088 #909092 #909093 #909095 #909264
#909565 #909740 #909846 #910013 #910150 #910159
#910321 #910322 #910517 #911181 #911325 #911326
#912171 #912705 #913059 #914355 #914423 #914726
#915209 #915322 #915335 #915791 #915826 #916515
#916982 #917839 #917884 #920250
Cross-References: CVE-2013-7263 CVE-2014-0181 CVE-2014-3687
CVE-2014-3688 CVE-2014-3690 CVE-2014-4608
CVE-2014-7822 CVE-2014-7842 CVE-2014-7970
CVE-2014-8133 CVE-2014-8134 CVE-2014-8160
CVE-2014-8369 CVE-2014-8559 CVE-2014-9090
CVE-2014-9322 CVE-2014-9419 CVE-2014-9420
CVE-2014-9584 CVE-2014-9585 CVE-2015-1593
Affected Products:
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise High Availability Extension 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
SLE 11 SERVER Unsupported Extras
______________________________________________________________________________
An update that solves 21 vulnerabilities and has 67 fixes
is now available. It includes one version update.
Description:
The SUSE Linux Enterprise 11 SP3 kernel has been updated to receive
various security and bugfixes.
New features enabled:
* The Ceph and rbd remote network block device drivers are now enabled
and supported, to serve as client for SUSE Enterprise Storage 1.0.
(FATE#318328)
* Support to selected Bay Trail CPUs used in Point of Service Hardware
was enabled. (FATE#317933)
* Broadwell Legacy Audio, HDMI Audio and DisplayPort Audio support
(Audio Driver: HD-A HDMI/DP Audio/HDA Analog/DSP) was enabled.
(FATE#317347)
The following security bugs have been fixed:
* CVE-2015-1593: An integer overflow in the stack randomization on
64-bit systems lead to less effective stack ASLR on those systems.
(bsc#917839)
* CVE-2014-8160: iptables rules could be bypassed if the specific
network protocol module was not loaded, allowing e.g. SCTP to bypass
the firewall if the sctp protocol was not enabled. (bsc#913059)
* CVE-2014-7822: A flaw was found in the way the Linux kernels
splice() system call validated its parameters. On certain file
systems, a local, unprivileged user could have used this flaw to
write past the maximum file size, and thus crash the system.
(bnc#915322)
* CVE-2014-9419: The __switch_to function in
arch/x86/kernel/process_64.c in the Linux kernel did not ensure that
Thread Local Storage (TLS) descriptors are loaded before proceeding
with other steps, which made it easier for local users to bypass the
ASLR protection mechanism via a crafted application that reads a TLS
base address (bnc#911326).
* CVE-2014-9584: The parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel did not validate a length value
in the Extensions Reference (ER) System Use Field, which allowed
local users to obtain sensitive information from kernel memory via a
crafted iso9660 image (bnc#912654).
* CVE-2014-9585: The vdso_addr function in arch/x86/vdso/vma.c in the
Linux kernel did not properly choose memory locations for the vDSO
area, which made it easier for local users to bypass the ASLR
protection mechanism by guessing a location at the end of a PMD
(bnc#912705).
* CVE-2014-8559: The d_walk function in fs/dcache.c in the Linux
kernel did not properly maintain the semantics of rename_lock, which
allowed local users to cause a denial of service (deadlock and
system hang) via a crafted application (bnc#903640).
* CVE-2014-9420: The rock_continue function in fs/isofs/rock.c in the
Linux kernel did not restrict the number of Rock Ridge continuation
entries, which allowed local users to cause a denial of service
(infinite loop, and system crash or hang) via a crafted iso9660
image (bsc#911325).
* CVE-2014-8134: The paravirt_ops_setup function in
arch/x86/kernel/kvm.c in the Linux kernel used an improper
paravirt_enabled setting for KVM guest kernels, which made it easier
for guest OS users to bypass the ASLR protection mechanism via a
crafted application that reads a 16-bit value (bnc#907818 909077
909078).
* CVE-2014-8369: The kvm_iommu_map_pages function in virt/kvm/iommu.c
in the Linux kernel miscalculated the number of pages during the
handling of a mapping failure, which allowed guest OS users to cause
a denial of service (host OS page unpinning) or possibly have
unspecified other impact by leveraging guest OS privileges. NOTE:
this vulnerability exists because of an incorrect fix for
CVE-2014-3601 (bsc#902675).
* CVE-2014-3690: arch/x86/kvm/vmx.c in the KVM subsystem in the Linux
kernel on Intel processors did not ensure that the value in the CR4
control register remains the same after a VM entry, which allowed
host OS users to kill arbitrary processes or cause a denial of
service (system disruption) by leveraging /dev/kvm access, as
demonstrated by PR_SET_TSC prctl calls within a modified copy of
QEMU (bnc#902232).
* CVE-2014-7842: Race condition in arch/x86/kvm/x86.c in the Linux
kernel allowed guest OS users to cause a denial of service (guest OS
crash) via a crafted application that performs an MMIO transaction
or a PIO transaction to trigger a guest userspace emulation error
report, a similar issue to CVE-2010-5313 (bnc#905312).
* CVE-2014-0181: The Netlink implementation in the Linux kernel did
not provide a mechanism for authorizing socket operations based on
the
opener of a socket, which allowed local users to bypass intended
access restrictions and modify network configurations by using a Netlink
socket for the (1) stdout or (2) stderr of a setuid program (bnc#875051).
* CVE-2014-3688: The SCTP implementation in the Linux kernel allowed
remote attackers to cause a denial of service (memory consumption)
by triggering a large number of chunks in an associations output
queue, as demonstrated by ASCONF probes, related to
net/sctp/inqueue.c and net/sctp/sm_statefuns.c (bnc#902351).
* CVE-2014-7970: The pivot_root implementation in fs/namespace.c in
the Linux kernel did not properly interact with certain locations of
a chroot directory, which allowed local users to cause a denial of
service (mount-tree loop) via . (dot) values in both arguments to
the pivot_root system call (bnc#900644).
* CVE-2014-3687: The sctp_assoc_lookup_asconf_ack function in
net/sctp/associola.c in the SCTP implementation in the Linux kernel
allowed remote attackers to cause a denial of service (panic) via
duplicate ASCONF chunks that trigger an incorrect uncork within the
side-effect interpreter (bnc#902349, bnc#904899).
The following non-security bugs have been fixed:
* ACPI idle: permit sparse C-state sub-state numbers
(bnc#908550,FATE#317933).
* ALSA : hda - not use assigned converters for all unused pins
(FATE#317933).
* ALSA: hda - Add Device IDs for Intel Wildcat Point-LP PCH
(FATE#317347).
* ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets
(FATE#317347).
* ALSA: hda - add PCI IDs for Intel BayTrail (FATE#317347).
* ALSA: hda - add PCI IDs for Intel Braswell (FATE#317347).
* ALSA: hda - add codec ID for Braswell display audio codec
(FATE#317933).
* ALSA: hda - add codec ID for Broadwell display audio codec
(FATE#317933).
* ALSA: hda - add codec ID for Valleyview2 display codec (FATE#317933).
* ALSA: hda - define is_haswell() to check if a display audio codec is
Haswell (FATE#317933).
* ALSA: hda - hdmi: Re-setup pin and infoframe on plug-in on all
codecs (FATE#317933).
* ALSA: hda - not choose assigned converters for unused pins of
Valleyview (FATE#317933).
* ALSA: hda - rename function not_share_unassigned_cvt() (FATE#317933).
* ALSA: hda - unmute pin amplifier in infoframe setup for Haswell
(FATE#317933).
* ALSA: hda - verify pin:converter connection on unsol event for HSW
and VLV (FATE#317933).
* ALSA: hda - verify pin:cvt connection on preparing a stream for
Intel HDMI codec (FATE#317933).
* ALSA: hda/hdmi - apply Valleyview fix-ups to Cherryview display
codec (FATE#317933).
* ALSA: hda/hdmi - apply all Haswell fix-ups to Broadwell display
codec (FATE#317933).
* ALSA: hda_intel: Add Device IDs for Intel Sunrise Point PCH
(FATE#317347).
* ALSA: hda_intel: Add DeviceIDs for Sunrise Point-LP (FATE#317347).
* Add support for AdvancedSilicon HID multitouch screen (2149:36b1)
(FATE#317933).
* Disable switching to bootsplash at oops/panic (bnc#877593).
* Do not trigger congestion wait on dirty-but-not-writeout pages (VM
Performance, bnc#909093, bnc#910517).
* Fix HDIO_DRIVE_* ioctl() regression (bnc#833588, bnc#905799)
* Fix Module.supported handling for external modules (bnc#905304).
* Fix zero freq if frequency is requested too quickly in a row
(bnc#908572).
* Fix zero freq if frequency is requested too quickly in a row
(bnc#908572).
* Fixup kABI after
patches.fixes/writeback-do-not-sync-data-dirtied-after-sync-start.patch (bn
c#833820).
* Force native backlight for HP POS machines (bnc#908551,FATE#317933).
* HID: use multi input quirk for 22b9:2968 (FATE#317933).
* IPoIB: Use a private hash table for path lookup in xmit path
(bsc#907196).
* Import kabi files from kernel 3.0.101-0.40
* KEYS: Fix stale key registration at error path (bnc#908163).
* NFS: Add sequence_priviliged_ops for nfs4_proc_sequence()
(bnc#864401).
* NFS: do not use STABLE writes during writeback (bnc#816099).
* NFSv4.1 handle DS stateid errors (bnc#864401).
* NFSv4.1: Do not decode skipped layoutgets (bnc#864411).
* NFSv4.1: Fix a race in the pNFS return-on-close code (bnc#864409).
* NFSv4.1: Fix an ABBA locking issue with session and state
serialisation (bnc#864409).
* NFSv4.1: We must release the sequence id when we fail to get a
session slot (bnc#864401).
* NFSv4: Do not accept delegated opens when a delegation recall is in
effect (bnc#864409).
* NFSv4: Ensure correct locking when accessing the "^a" list
(bnc#864401).
* NFSv4: Fix another reboot recovery race (bnc#916982).
* Preserve kabi checksum of path_is_under().
* Refresh patches.drivers/HID-multitouch-add-support-for-Atmel-212c.
Fix the non-working touchsreen (bnc#909740)
* Revert "drm/i915: Calculate correct stolen size for GEN7+"
(bnc#908550,FATE#317933).
* SUNRPC: Do not allow low priority tasks to pre-empt higher priority
ones (bnc#864401).
* SUNRPC: When changing the queue priority, ensure that we change the
owner (bnc#864401).
* Setting rbd and libceph as supported drivers (bsc#917884)
* audit: efficiency fix 1: only wake up if queue shorter than backlog
limit (bnc#908393).
* audit: efficiency fix 2: request exclusive wait since all need same
resource (bnc#908393).
* audit: fix endless wait in audit_log_start() (bnc#908393).
* audit: make use of remaining sleep time from wait_for_auditd
(bnc#908393).
* audit: refactor hold queue flush (bnc#908393).
* audit: reset audit backlog wait time after error recovery
(bnc#908393).
* audit: wait_for_auditd() should use TASK_UNINTERRUPTIBLE
(bnc#908393).
* block: rbd: use NULL instead of 0 (FATE#318328 bsc#917884).
* block: replace strict_strtoul() with kstrtoul() (FATE#318328
bsc#917884).
* bonding: propagate LRO disabling down to slaves (bnc#829110
bnc#891277 bnc#904053).
* cciss: fix broken mutex usage in ioctl (bnc#910013).
* ceph: Add necessary clean up if invalid reply received in
handle_reply() (FATE#318328 bsc#917884).
* ceph: remove bogus extern (FATE#318328 bsc#917884).
* config: Disable CONFIG_RCU_FAST_NO_HZ (bnc#884817) This option has
been verified to be racy vs hotplug, and is irrelevant to SLE in any
case.
* coredump: ensure the fpu state is flushed for proper multi-threaded
core dump (bnc#904671).
* crush: CHOOSE_LEAF -> CHOOSELEAF throughout (FATE#318328 bsc#917884).
* crush: add SET_CHOOSE_TRIES rule step (FATE#318328 bsc#917884).
* crush: add note about r in recursive choose (FATE#318328 bsc#917884).
* crush: add set_choose_local_[fallback_]tries steps (FATE#318328
bsc#917884).
* crush: apply chooseleaf_tries to firstn mode too (FATE#318328
bsc#917884).
* crush: attempts -> tries (FATE#318328 bsc#917884).
* crush: clarify numrep vs endpos (FATE#318328 bsc#917884).
* crush: eliminate CRUSH_MAX_SET result size limitation (FATE#318328
bsc#917884).
* crush: factor out (trivial) crush_destroy_rule() (FATE#318328
bsc#917884).
* crush: fix crush_choose_firstn comment (FATE#318328 bsc#917884).
* crush: fix some comments (FATE#318328 bsc#917884).
* crush: generalize descend_once (FATE#318328 bsc#917884).
* crush: new SET_CHOOSE_LEAF_TRIES command (FATE#318328 bsc#917884).
* crush: pass parent r value for indep call (FATE#318328 bsc#917884).
* crush: pass weight vector size to map function (FATE#318328
bsc#917884).
* crush: reduce scope of some local variables (FATE#318328 bsc#917884).
* crush: return CRUSH_ITEM_UNDEF for failed placements with indep
(FATE#318328 bsc#917884).
* crush: strip firstn conditionals out of crush_choose, rename
(FATE#318328 bsc#917884).
* crush: use breadth-first search for indep mode (FATE#318328
bsc#917884).
* crypto: add missing crypto module aliases (bsc#914423).
* crypto: include crypto- module prefix in template (bsc#914423).
* crypto: kernel oops at insmod of the z90crypt device driver
(bnc#909088, LTC#119591).
* crypto: prefix module autoloading with "crypto-" (bsc#914423).
* dm raid: add region_size parameter (bnc#895841).
* do not do blind d_drop() in nfs_prime_dcache() (bnc#908069
bnc#896484).
* drm/cirrus: Fix cirrus drm driver for fbdev + qemu
(bsc#909846,bnc#856760).
* drm/i915: split PCI IDs out into i915_drm.h v4
(bnc#908550,FATE#317933).
* fix dcache exit scaling (bnc#876594).
* infiniband: ipoib: Sanitize neighbour handling in ipoib_main.c
(bsc#907196).
* iommu/vt-d: Fix an off-by-one bug in __domain_mapping() (bsc#908825).
* ipoib: Convert over to dev_lookup_neigh_skb() (bsc#907196).
* ipoib: Need to do dst_neigh_lookup_skb() outside of priv->lock
(bsc#907196).
* ipv6: fix net reference leak in IPv6 conntrack reassembly
(bnc#865419).
* isofs: Fix unchecked printing of ER records.
* kABI: protect console include in consolemap.
* kabi fix (bnc#864404).
* kabi, mm: prevent endless growth of anon_vma hierarchy (bnc#904242).
* kernel/audit.c: avoid negative sleep durations (bnc#908393).
* kernel: 3215 tty close crash (bnc#915209, LTC#120873).
* kernel: incorrect clock_gettime result (bnc#915209, LTC#121184).
* kvm: Do not expose MONITOR cpuid as available (bnc#887597)
* kvm: iommu: Add cond_resched to legacy device assignment code
(bnc#910159).
* libceph: CEPH_OSD_FLAG_* enum update (FATE#318328 bsc#917884).
* libceph: add ceph_kv{malloc,free}() and switch to them (FATE#318328
bsc#917884).
* libceph: add ceph_pg_pool_by_id() (FATE#318328 bsc#917884).
* libceph: add function to ensure notifies are complete (FATE#318328
bsc#917884).
* libceph: add process_one_ticket() helper (FATE#318328 bsc#917884).
* libceph: all features fields must be u64 (FATE#318328 bsc#917884).
* libceph: block I/O when PAUSE or FULL osd map flags are set
(FATE#318328 bsc#917884).
* libceph: call r_unsafe_callback when unsafe reply is received
(FATE#318328 bsc#917884).
* libceph: create_singlethread_workqueue() does not return ERR_PTRs
(FATE#318328 bsc#917884).
* libceph: do not hard code max auth ticket len (FATE#318328
bsc#917884).
* libceph: dout() is missing a newline (FATE#318328 bsc#917884).
* libceph: factor out logic from ceph_osdc_start_request()
(FATE#318328 bsc#917884).
* libceph: fix error handling in ceph_osdc_init() (FATE#318328
bsc#917884).
* libceph: fix preallocation check in get_reply() (FATE#318328
bsc#917884).
* libceph: fix safe completion (FATE#318328 bsc#917884).
* libceph: follow redirect replies from osds (FATE#318328 bsc#917884).
* libceph: follow {read,write}_tier fields on osd request submission
(FATE#318328 bsc#917884).
* libceph: gracefully handle large reply messages from the mon
(FATE#318328 bsc#917884).
* libceph: introduce and start using oid abstraction (FATE#318328
bsc#917884).
* libceph: rename MAX_OBJ_NAME_SIZE to CEPH_MAX_OID_NAME_LEN
(FATE#318328 bsc#917884).
* libceph: rename ceph_msg::front_max to front_alloc_len (FATE#318328
bsc#917884).
* libceph: rename ceph_osd_request::r_{oloc,oid} to r_base_{oloc,oid}
(FATE#318328 bsc#917884).
* libceph: rename front to front_len in get_reply() (FATE#318328
bsc#917884).
* libceph: replace ceph_calc_ceph_pg() with ceph_oloc_oid_to_pg()
(FATE#318328 bsc#917884).
* libceph: resend all writes after the osdmap loses the full flag
(FATE#318328 bsc#917884).
* libceph: start using oloc abstraction (FATE#318328 bsc#917884).
* libceph: take map_sem for read in handle_reply() (FATE#318328
bsc#917884).
* libceph: update ceph_features.h (FATE#318328 bsc#917884).
* libceph: use CEPH_MON_PORT when the specified port is 0 (FATE#318328
bsc#917884).
* libiscsi: Added new boot entries in the session sysfs (FATE#316723
bsc#914355)
* mei: ME hardware reset needs to be synchronized (bnc#876086).
* mei: add 9 series PCH mei device ids (bnc#876086).
* mei: add hw start callback (bnc#876086).
* mei: cancel stall timers in mei_reset (bnc#876086).
* mei: do not have to clean the state on power up (bnc#876086).
* mei: limit the number of consecutive resets (bnc#876086).
* mei: me: add Lynx Point Wellsburg work station device id
(bnc#876086).
* mei: me: clear interrupts on the resume path (bnc#876086).
* mei: me: do not load the driver if the FW does not support MEI
interface (bnc#876086).
* mei: me: fix hardware reset flow (bnc#876086).
* mei: me: read H_CSR after asserting reset (bnc#876086).
* mm, vmscan: prevent kswapd livelock due to pfmemalloc-throttled
process being killed (VM Functionality bnc#910150).
* mm: fix BUG in __split_huge_page_pmd (bnc#906586).
* mm: fix corner case in anon_vma endless growing prevention
(bnc#904242).
* mm: prevent endless growth of anon_vma hierarchy (bnc#904242).
* mm: vmscan: count only dirty pages as congested (VM Performance,
bnc#910517).
* net, sunrpc: suppress allocation warning in rpc_malloc()
(bnc#904659).
* net: 8021q/bluetooth/bridge/can/ceph: Remove extern from function
prototypes (FATE#318328 bsc#917884).
* net: handle more general stacking in dev_disable_lro() (bnc#829110
bnc#891277 bnc#904053).
* netfilter: do not drop packet on insert collision (bnc#907611).
* nf_conntrack: avoid reference leak in __ipv6_conntrack_in()
(bnc#865419).
* nfs_prime_dcache needs fh to be set (bnc#908069 bnc#896484).
* nfsd: fix EXDEV checking in rename (bnc#915791).
* pnfs: defer release of pages in layoutget (bnc#864411).
* proc_sys_revalidate: fix Oops on NULL nameidata (bnc#907551).
* qlge: fix an "&&" vs "||" bug (bsc#912171).
* rbd: Fix error recovery in rbd_obj_read_sync() (FATE#318328
bsc#917884).
* rbd: Use min_t() to fix comparison of distinct pointer types warning
(FATE#318328 bsc#917884).
* rbd: add "minor" sysfs rbd device attribute (FATE#318328 bsc#917884).
* rbd: add support for single-major device number allocation scheme
(FATE#318328 bsc#917884).
* rbd: clean up a few things in the refresh path (FATE#318328
bsc#917884).
* rbd: complete notifies before cleaning up osd_client and rbd_dev
(FATE#318328 bsc#917884).
* rbd: do not destroy ceph_opts in rbd_add() (FATE#318328 bsc#917884).
* rbd: do not hold ctl_mutex to get/put device (FATE#318328
bsc#917884).
* rbd: drop an unsafe assertion (FATE#318328 bsc#917884).
* rbd: drop original request earlier for existence check (FATE#318328
bsc#917884).
* rbd: enable extended devt in single-major mode (FATE#318328
bsc#917884).
* rbd: fetch object order before using it (FATE#318328 bsc#917884).
* rbd: fix I/O error propagation for reads (FATE#318328 bsc#917884).
* rbd: fix a couple warnings (FATE#318328 bsc#917884).
* rbd: fix buffer size for writes to images with snapshots
(FATE#318328 bsc#917884).
* rbd: fix cleanup in rbd_add() (FATE#318328 bsc#917884).
* rbd: fix error handling from rbd_snap_name() (FATE#318328
bsc#917884).
* rbd: fix error paths in rbd_img_request_fill() (FATE#318328
bsc#917884).
* rbd: fix null dereference in dout (FATE#318328 bsc#917884).
* rbd: fix use-after free of rbd_dev->disk (FATE#318328 bsc#917884).
* rbd: flush dcache after zeroing page data (FATE#318328 bsc#917884).
* rbd: ignore unmapped snapshots that no longer exist (FATE#318328
bsc#917884).
* rbd: introduce rbd_dev_header_unwatch_sync() and switch to it
(FATE#318328 bsc#917884).
* rbd: make rbd_obj_notify_ack() synchronous (FATE#318328 bsc#917884).
* rbd: protect against concurrent unmaps (FATE#318328 bsc#917884).
* rbd: protect against duplicate client creation (FATE#318328
bsc#917884).
* rbd: rbd_device::dev_id is an int, format it as such (FATE#318328
bsc#917884).
* rbd: refactor rbd_init() a bit (FATE#318328 bsc#917884).
* rbd: send snapshot context with writes (FATE#318328 bsc#917884).
* rbd: set removing flag while holding list lock (FATE#318328
bsc#917884).
* rbd: switch to ida for rbd id assignments (FATE#318328 bsc#917884).
* rbd: take a little credit (FATE#318328 bsc#917884).
* rbd: tear down watch request if rbd_dev_device_setup() fails
(FATE#318328 bsc#917884).
* rbd: tweak "loaded" message and module description (FATE#318328
bsc#917884).
* rbd: use reference counts for image requests (FATE#318328
bsc#917884).
* rbd: use rwsem to protect header updates (FATE#318328 bsc#917884).
* rbd: use the correct length for format 2 object names (FATE#318328
bsc#917884).
* rpm/kernel-binary.spec.in: Own the modules directory in the devel
package (bnc#910322)
* scsi_dh_alua: add missing hunk in alua_set_params() (bnc#846656).
* scsifront: avoid acquiring same lock twice if ring is full.
* sd: medium access timeout counter fails to reset (bnc#894213).
* storvsc: ring buffer failures may result in I/O freeze
* swap: fix shmem swapping when more than 8 areas (bnc#903096).
* timekeeping: Avoid possible deadlock from clock_was_set_delayed
(bsc#771619).
* tty: Fix memory leak in virtual console when enable unicode
translation (bnc#916515).
* udf: Check component length before reading it.
* udf: Check path length when reading symlink.
* udf: Verify i_size when loading inode.
* udf: Verify symlink size before loading it.
* udp: Add MIB counters for rcvbuferrors (bnc#909565).
* usb: xhci: rework root port wake bits if controller is not allowed
to wakeup (bsc#909264).
* virtio_net: drop dst reference before transmitting a packet
(bnc#882470).
* vt: push the tty_lock down into the map handling (bnc#915826).
* workqueue: Make rescuer thread process more works (bnc#900279).
* x86, xsave: remove thread_has_fpu() bug check in
__sanitize_i387_state() (bnc#904671).
* x86-64/MCE: flip CPU and bank numbers in log message.
* x86/UV: Fix NULL pointer dereference in uv_flush_tlb_others() if the
"^a" boot option is used (bsc#909092).
* x86/UV: Fix conditional in gru_exit() (bsc#909095).
* x86/early quirk: use gen6 stolen detection for VLV
(bnc#908550,FATE#317933).
* x86/gpu: Print the Intel graphics stolen memory range (bnc#908550).
* x86/hpet: Make boot_hpet_disable extern (bnc#908550,FATE#317933).
* x86/intel: Add quirk to disable HPET for the Baytrail platform
(bnc#908550,FATE#317933).
* x86/uv: Fix UV2 BAU legacy mode (bsc#909092).
* x86/uv: Fix the UV BAU destination timeout period (bsc#909092).
* x86/uv: Implement UV BAU runtime enable and disable control via
/proc/sgi_uv/ (bsc#909092).
* x86/uv: Update the UV3 TLB shootdown logic (bsc#909092).
* x86/uv: Work around UV2 BAU hangs (bsc#909092).
* x86: UV BAU: Avoid NULL pointer reference in ptc_seq_show
(bsc#911181).
* x86: UV BAU: Increase maximum CPUs per socket/hub (bsc#911181).
* x86: add early quirk for reserving Intel graphics stolen memory v5
(bnc#908550,FATE#317933).
* x86: irq: Check for valid irq descriptor in
check_irq_vectors_for_cpu_disable (bnc#914726).
* xen-privcmd-hcall-preemption: Fix EFLAGS.IF access.
* xfs: re-enable non-blocking behaviour in xfs_map_blocks (bnc#900279).
* xfs: recheck buffer pinned status after push trylock failure
(bnc#907338).
* xfs: remove log force from xfs_buf_trylock() (bnc#907338).
* xhci: fix incorrect type in assignment in
handle_device_notification() (bsc#910321).
* zcrypt: Number of supported ap domains is not retrievable
(bnc#915209, LTC#120788).
Security Issues:
* CVE-2013-7263
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7263>
* CVE-2014-0181
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0181>
* CVE-2014-3687
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3687>
* CVE-2014-3688
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3688>
* CVE-2014-3690
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3690>
* CVE-2014-4608
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4608>
* CVE-2014-7822
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7822>
* CVE-2014-7842
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7842>
* CVE-2014-7970
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7970>
* CVE-2014-8133
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133>
* CVE-2014-8134
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8134>
* CVE-2014-8160
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8160>
* CVE-2014-8369
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8369>
* CVE-2014-8559
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8559>
* CVE-2014-9090
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9090>
* CVE-2014-9322
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322>
* CVE-2014-9419
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9419>
* CVE-2014-9420
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9420>
* CVE-2014-9584
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9584>
* CVE-2014-9585
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9585>
* CVE-2015-1593
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1593>
Indications:
Everyone using the Linux Kernel on x86_64 architecture should update.
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-kernel=10412 slessp3-kernel=10416
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-kernel=10412 slessp3-kernel=10413 slessp3-kernel=10414 slessp3-kernel=10415 slessp3-kernel=10416
- SUSE Linux Enterprise High Availability Extension 11 SP3:
zypper in -t patch slehasp3-kernel=10412 slehasp3-kernel=10413 slehasp3-kernel=10414 slehasp3-kernel=10415 slehasp3-kernel=10416
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-kernel=10412 sledsp3-kernel=10416
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 3.0.101]:
kernel-default-3.0.101-0.47.50.1
kernel-default-base-3.0.101-0.47.50.1
kernel-default-devel-3.0.101-0.47.50.1
kernel-source-3.0.101-0.47.50.1
kernel-syms-3.0.101-0.47.50.1
kernel-trace-3.0.101-0.47.50.1
kernel-trace-base-3.0.101-0.47.50.1
kernel-trace-devel-3.0.101-0.47.50.1
kernel-xen-devel-3.0.101-0.47.50.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64) [New Version: 3.0.101]:
kernel-bigsmp-devel-3.0.101-0.47.50.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586) [New Version: 3.0.101]:
kernel-pae-3.0.101-0.47.50.1
kernel-pae-base-3.0.101-0.47.50.1
kernel-pae-devel-3.0.101-0.47.50.1
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 3.0.101]:
kernel-default-3.0.101-0.47.50.1
kernel-default-base-3.0.101-0.47.50.1
kernel-default-devel-3.0.101-0.47.50.1
kernel-source-3.0.101-0.47.50.1
kernel-syms-3.0.101-0.47.50.1
kernel-trace-3.0.101-0.47.50.1
kernel-trace-base-3.0.101-0.47.50.1
kernel-trace-devel-3.0.101-0.47.50.1
- SUSE Linux Enterprise Server 11 SP3 (i586 x86_64) [New Version: 3.0.101]:
kernel-ec2-3.0.101-0.47.50.1
kernel-ec2-base-3.0.101-0.47.50.1
kernel-ec2-devel-3.0.101-0.47.50.1
kernel-xen-3.0.101-0.47.50.1
kernel-xen-base-3.0.101-0.47.50.1
kernel-xen-devel-3.0.101-0.47.50.1
xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1
- SUSE Linux Enterprise Server 11 SP3 (x86_64) [New Version: 3.0.101]:
kernel-bigsmp-3.0.101-0.47.50.1
kernel-bigsmp-base-3.0.101-0.47.50.1
kernel-bigsmp-devel-3.0.101-0.47.50.1
- SUSE Linux Enterprise Server 11 SP3 (s390x) [New Version: 3.0.101]:
kernel-default-man-3.0.101-0.47.50.1
- SUSE Linux Enterprise Server 11 SP3 (ppc64) [New Version: 3.0.101]:
kernel-ppc64-3.0.101-0.47.50.1
kernel-ppc64-base-3.0.101-0.47.50.1
kernel-ppc64-devel-3.0.101-0.47.50.1
- SUSE Linux Enterprise Server 11 SP3 (i586) [New Version: 3.0.101]:
kernel-pae-3.0.101-0.47.50.1
kernel-pae-base-3.0.101-0.47.50.1
kernel-pae-devel-3.0.101-0.47.50.1
xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1
- SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 ia64 ppc64 s390x x86_64):
cluster-network-kmp-default-1.4_3.0.101_0.47.50-2.28.1.7
cluster-network-kmp-trace-1.4_3.0.101_0.47.50-2.28.1.7
gfs2-kmp-default-2_3.0.101_0.47.50-0.17.1.7
gfs2-kmp-trace-2_3.0.101_0.47.50-0.17.1.7
ocfs2-kmp-default-1.6_3.0.101_0.47.50-0.21.1.7
ocfs2-kmp-trace-1.6_3.0.101_0.47.50-0.21.1.7
- SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 x86_64):
cluster-network-kmp-xen-1.4_3.0.101_0.47.50-2.28.1.7
gfs2-kmp-xen-2_3.0.101_0.47.50-0.17.1.7
ocfs2-kmp-xen-1.6_3.0.101_0.47.50-0.21.1.7
- SUSE Linux Enterprise High Availability Extension 11 SP3 (x86_64):
cluster-network-kmp-bigsmp-1.4_3.0.101_0.47.50-2.28.1.7
gfs2-kmp-bigsmp-2_3.0.101_0.47.50-0.17.1.7
ocfs2-kmp-bigsmp-1.6_3.0.101_0.47.50-0.21.1.7
- SUSE Linux Enterprise High Availability Extension 11 SP3 (ppc64):
cluster-network-kmp-ppc64-1.4_3.0.101_0.47.50-2.28.1.7
gfs2-kmp-ppc64-2_3.0.101_0.47.50-0.17.1.7
ocfs2-kmp-ppc64-1.6_3.0.101_0.47.50-0.21.1.7
- SUSE Linux Enterprise High Availability Extension 11 SP3 (i586):
cluster-network-kmp-pae-1.4_3.0.101_0.47.50-2.28.1.7
gfs2-kmp-pae-2_3.0.101_0.47.50-0.17.1.7
ocfs2-kmp-pae-1.6_3.0.101_0.47.50-0.21.1.7
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 3.0.101]:
kernel-default-3.0.101-0.47.50.1
kernel-default-base-3.0.101-0.47.50.1
kernel-default-devel-3.0.101-0.47.50.1
kernel-default-extra-3.0.101-0.47.50.1
kernel-source-3.0.101-0.47.50.1
kernel-syms-3.0.101-0.47.50.1
kernel-trace-devel-3.0.101-0.47.50.1
kernel-xen-3.0.101-0.47.50.1
kernel-xen-base-3.0.101-0.47.50.1
kernel-xen-devel-3.0.101-0.47.50.1
kernel-xen-extra-3.0.101-0.47.50.1
xen-kmp-default-4.2.5_04_3.0.101_0.47.50-0.7.1
- SUSE Linux Enterprise Desktop 11 SP3 (x86_64) [New Version: 3.0.101]:
kernel-bigsmp-devel-3.0.101-0.47.50.1
- SUSE Linux Enterprise Desktop 11 SP3 (i586) [New Version: 3.0.101]:
kernel-pae-3.0.101-0.47.50.1
kernel-pae-base-3.0.101-0.47.50.1
kernel-pae-devel-3.0.101-0.47.50.1
kernel-pae-extra-3.0.101-0.47.50.1
xen-kmp-pae-4.2.5_04_3.0.101_0.47.50-0.7.1
- SLE 11 SERVER Unsupported Extras (i586 ia64 ppc64 s390x x86_64):
kernel-default-extra-3.0.101-0.47.50.1
- SLE 11 SERVER Unsupported Extras (i586 x86_64):
kernel-xen-extra-3.0.101-0.47.50.1
- SLE 11 SERVER Unsupported Extras (x86_64):
kernel-bigsmp-extra-3.0.101-0.47.50.1
- SLE 11 SERVER Unsupported Extras (ppc64):
kernel-ppc64-extra-3.0.101-0.47.50.1
- SLE 11 SERVER Unsupported Extras (i586):
kernel-pae-extra-3.0.101-0.47.50.1
References:
http://support.novell.com/security/cve/CVE-2013-7263.htmlhttp://support.novell.com/security/cve/CVE-2014-0181.htmlhttp://support.novell.com/security/cve/CVE-2014-3687.htmlhttp://support.novell.com/security/cve/CVE-2014-3688.htmlhttp://support.novell.com/security/cve/CVE-2014-3690.htmlhttp://support.novell.com/security/cve/CVE-2014-4608.htmlhttp://support.novell.com/security/cve/CVE-2014-7822.htmlhttp://support.novell.com/security/cve/CVE-2014-7842.htmlhttp://support.novell.com/security/cve/CVE-2014-7970.htmlhttp://support.novell.com/security/cve/CVE-2014-8133.htmlhttp://support.novell.com/security/cve/CVE-2014-8134.htmlhttp://support.novell.com/security/cve/CVE-2014-8160.htmlhttp://support.novell.com/security/cve/CVE-2014-8369.htmlhttp://support.novell.com/security/cve/CVE-2014-8559.htmlhttp://support.novell.com/security/cve/CVE-2014-9090.htmlhttp://support.novell.com/security/cve/CVE-2014-9322.htmlhttp://support.novell.com/security/cve/CVE-2014-9419.htmlhttp://support.novell.com/security/cve/CVE-2014-9420.htmlhttp://support.novell.com/security/cve/CVE-2014-9584.htmlhttp://support.novell.com/security/cve/CVE-2014-9585.htmlhttp://support.novell.com/security/cve/CVE-2015-1593.htmlhttps://bugzilla.suse.com/771619https://bugzilla.suse.com/816099https://bugzilla.suse.com/829110https://bugzilla.suse.com/833588https://bugzilla.suse.com/833820https://bugzilla.suse.com/846656https://bugzilla.suse.com/853040https://bugzilla.suse.com/856760https://bugzilla.suse.com/864401https://bugzilla.suse.com/864404https://bugzilla.suse.com/864409https://bugzilla.suse.com/864411https://bugzilla.suse.com/865419https://bugzilla.suse.com/875051https://bugzilla.suse.com/876086https://bugzilla.suse.com/876594https://bugzilla.suse.com/877593https://bugzilla.suse.com/882470https://bugzilla.suse.com/883948https://bugzilla.suse.com/884817https://bugzilla.suse.com/887597https://bugzilla.suse.com/891277https://bugzilla.suse.com/894213https://bugzilla.suse.com/895841https://bugzilla.suse.com/896484https://bugzilla.suse.com/900279https://bugzilla.suse.com/900644https://bugzilla.suse.com/902232https://bugzilla.suse.com/902349https://bugzilla.suse.com/902351https://bugzilla.suse.com/902675https://bugzilla.suse.com/903096https://bugzilla.suse.com/903640https://bugzilla.suse.com/904053https://bugzilla.suse.com/904242https://bugzilla.suse.com/904659https://bugzilla.suse.com/904671https://bugzilla.suse.com/905304https://bugzilla.suse.com/905312https://bugzilla.suse.com/905799https://bugzilla.suse.com/906586https://bugzilla.suse.com/907196https://bugzilla.suse.com/907338https://bugzilla.suse.com/907551https://bugzilla.suse.com/907611https://bugzilla.suse.com/907818https://bugzilla.suse.com/908069https://bugzilla.suse.com/908163https://bugzilla.suse.com/908393https://bugzilla.suse.com/908550https://bugzilla.suse.com/908551https://bugzilla.suse.com/908572https://bugzilla.suse.com/908825https://bugzilla.suse.com/909077https://bugzilla.suse.com/909078https://bugzilla.suse.com/909088https://bugzilla.suse.com/909092https://bugzilla.suse.com/909093https://bugzilla.suse.com/909095https://bugzilla.suse.com/909264https://bugzilla.suse.com/909565https://bugzilla.suse.com/909740https://bugzilla.suse.com/909846https://bugzilla.suse.com/910013https://bugzilla.suse.com/910150https://bugzilla.suse.com/910159https://bugzilla.suse.com/910321https://bugzilla.suse.com/910322https://bugzilla.suse.com/910517https://bugzilla.suse.com/911181https://bugzilla.suse.com/911325https://bugzilla.suse.com/911326https://bugzilla.suse.com/912171https://bugzilla.suse.com/912705https://bugzilla.suse.com/913059https://bugzilla.suse.com/914355https://bugzilla.suse.com/914423https://bugzilla.suse.com/914726https://bugzilla.suse.com/915209https://bugzilla.suse.com/915322https://bugzilla.suse.com/915335https://bugzilla.suse.com/915791https://bugzilla.suse.com/915826https://bugzilla.suse.com/916515https://bugzilla.suse.com/916982https://bugzilla.suse.com/917839https://bugzilla.suse.com/917884https://bugzilla.suse.com/920250http://download.suse.com/patch/finder/?keywords=0fd9eadfb31561dd2d783db07c7…http://download.suse.com/patch/finder/?keywords=17ea342ac70ce094db352e89d14…http://download.suse.com/patch/finder/?keywords=321560c2742d1b151f3288d50e9…http://download.suse.com/patch/finder/?keywords=5b95a73648a17520abb1323d24f…http://download.suse.com/patch/finder/?keywords=67d4ee6ce4fba72ecd3e70dc418…http://download.suse.com/patch/finder/?keywords=6fcf5fa8810b78007b8a23933dd…http://download.suse.com/patch/finder/?keywords=970f627fefba5af21dfb55448da…http://download.suse.com/patch/finder/?keywords=99f6f7f6dfadfd4b30ee84103aa…http://download.suse.com/patch/finder/?keywords=ba948ef69752594d363b7f7db54…http://download.suse.com/patch/finder/?keywords=ffa229c2e3c1d02c022c4adc72e…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
SUSE Security Update: Security update for compat-openssl097g
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0578-1
Rating: important
References: #802184 #880891 #890764 #901223 #901277 #905106
#912014 #912015 #912018 #912293 #912296 #920236
#922488 #922496 #922499 #922500 #922501
Affected Products:
SUSE Linux Enterprise for SAP Applications 11 SP2
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
OpenSSL has been updated to fix various security issues:
*
CVE-2014-3568: The build option no-ssl3 was incomplete.
*
CVE-2014-3566: Support for TLS_FALLBACK_SCSV was added.
*
CVE-2014-3508: An information leak in pretty printing functions was
fixed.
*
CVE-2013-0166: A OCSP bad key DoS attack was fixed.
*
CVE-2013-0169: An SSL/TLS CBC plaintext recovery attack was fixed.
*
CVE-2014-3470: Anonymous ECDH denial of service was fixed.
*
CVE-2014-0224: A SSL/TLS MITM vulnerability was fixed.
*
CVE-2014-3570: Bignum squaring (BN_sqr) may have produced incorrect
results on some platforms, including x86_64.
*
CVE-2014-3572: Don't accept a handshake using an ephemeral ECDH
ciphersuites with the server key exchange message omitted.
*
CVE-2014-8275: Fixed various certificate fingerprint issues.
*
CVE-2015-0204: Only allow ephemeral RSA keys in export ciphersuites
*
CVE-2015-0205: A fix was added to prevent use of DH client
certificates without sending certificate verify message.
*
CVE-2015-0286: A segmentation fault in ASN1_TYPE_cmp was fixed that
could be exploited by attackers when e.g. client authentication is used.
This could be exploited over SSL connections.
*
CVE-2015-0287: A ASN.1 structure reuse memory corruption was fixed.
This problem can not be exploited over regular SSL connections, only if
specific client programs use specific ASN.1 routines.
*
CVE-2015-0288: A X509_to_X509_REQ NULL pointer dereference was
fixed, which could lead to crashes. This function is not commonly used,
and not reachable over SSL methods.
*
CVE-2015-0289: Several PKCS7 NULL pointer dereferences were fixed,
which could lead to crashes of programs using the PKCS7 APIs. The SSL apis
do not use those by default.
*
CVE-2015-0292: Various issues in base64 decoding were fixed, which
could lead to crashes with memory corruption, for instance by using
attacker supplied PEM data.
*
CVE-2015-0293: Denial of service via reachable assert in SSLv2
servers, could be used by remote attackers to terminate the server
process. Note that this requires SSLv2 being allowed, which is not the
default.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise for SAP Applications 11 SP2:
zypper in -t patch slesapp2-compat-openssl097g=10507
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise for SAP Applications 11 SP2 (x86_64):
compat-openssl097g-0.9.7g-146.22.29.1
compat-openssl097g-32bit-0.9.7g-146.22.29.1
References:
https://bugzilla.suse.com/802184https://bugzilla.suse.com/880891https://bugzilla.suse.com/890764https://bugzilla.suse.com/901223https://bugzilla.suse.com/901277https://bugzilla.suse.com/905106https://bugzilla.suse.com/912014https://bugzilla.suse.com/912015https://bugzilla.suse.com/912018https://bugzilla.suse.com/912293https://bugzilla.suse.com/912296https://bugzilla.suse.com/920236https://bugzilla.suse.com/922488https://bugzilla.suse.com/922496https://bugzilla.suse.com/922499https://bugzilla.suse.com/922500https://bugzilla.suse.com/922501http://download.suse.com/patch/finder/?keywords=2c7184ba59decc9a1f6c8b3e301…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org