openSUSE Security Announce
Threads by month
- ----- 2025 -----
- March
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
April 2015
- 1 participants
- 21 discussions

[security-announce] SUSE-SU-2015:0812-1: important: Security update for Linux Kernel
by opensuse-security@opensuse.org 30 Apr '15
by opensuse-security@opensuse.org 30 Apr '15
30 Apr '15
SUSE Security Update: Security update for Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0812-1
Rating: important
References: #677286 #679812 #681175 #681999 #683282 #685402
#687812 #730118 #730200 #738400 #758813 #760902
#769784 #823260 #846404 #853040 #854722 #863335
#874307 #875051 #880484 #883223 #883795 #885422
…
[View More] #891844 #892490 #896390 #896391 #896779 #902346
#907818 #908382 #910251 #911325
Cross-References: CVE-2011-1090 CVE-2011-1163 CVE-2011-1476
CVE-2011-1477 CVE-2011-1493 CVE-2011-1494
CVE-2011-1495 CVE-2011-1585 CVE-2011-4127
CVE-2011-4132 CVE-2011-4913 CVE-2011-4914
CVE-2012-2313 CVE-2012-2319 CVE-2012-3400
CVE-2012-6657 CVE-2013-2147 CVE-2013-4299
CVE-2013-6405 CVE-2013-6463 CVE-2014-0181
CVE-2014-1874 CVE-2014-3184 CVE-2014-3185
CVE-2014-3673 CVE-2014-3917 CVE-2014-4652
CVE-2014-4653 CVE-2014-4654 CVE-2014-4655
CVE-2014-4656 CVE-2014-4667 CVE-2014-5471
CVE-2014-5472 CVE-2014-9090 CVE-2014-9322
CVE-2014-9420 CVE-2014-9584 CVE-2015-2041
Affected Products:
SUSE Linux Enterprise Server 10 SP4 LTSS
______________________________________________________________________________
An update that fixes 39 vulnerabilities is now available.
Description:
The SUSE Linux Enterprise 10 SP4 LTSS kernel was updated to receive
various security and bugfixes.
The following security bugs have been fixed:
* CVE-2015-2041: A information leak in the llc2_timeout_table was
fixed (bnc#919007).
* CVE-2014-9322: arch/x86/kernel/entry_64.S in the Linux kernel did
not properly handle faults associated with the Stack Segment (SS)
segment register, which allowed local users to gain privileges by
triggering an IRET instruction that leads to access to a GS Base
address from the wrong space (bnc#910251).
* CVE-2014-9090: The do_double_fault function in
arch/x86/kernel/traps.c in the Linux kernel did not properly handle
faults associated with the Stack Segment (SS) segment register,
which allowed local users to cause a denial of service (panic) via a
modify_ldt system call, as demonstrated by sigreturn_32 in the
1-clock-tests test suite (bnc#907818).
* CVE-2014-4667: The sctp_association_free function in
net/sctp/associola.c in the Linux kernel did not properly manage a
certain backlog value, which allowed remote attackers to cause a
denial of service (socket outage) via a crafted SCTP packet
(bnc#885422).
* CVE-2014-3673: The SCTP implementation in the Linux kernel allowed
remote attackers to cause a denial of service (system crash) via a
malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and
net/sctp/sm_statefuns.c (bnc#902346).
* CVE-2014-3185: Multiple buffer overflows in the
command_port_read_callback function in
drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in
the Linux kernel allowed physically proximate attackers to execute
arbitrary code or cause a denial of service (memory corruption and
system crash) via a crafted device that provides a large amount of
(1) EHCI or (2) XHCI data associated with a bulk response
(bnc#896391).
* CVE-2014-3184: The report_fixup functions in the HID subsystem in
the Linux kernel might have allowed physically proximate attackers
to cause a denial of service (out-of-bounds write) via a crafted
device that provides a small report descriptor, related to (1)
drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3)
drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5)
drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c
(bnc#896390).
* CVE-2014-1874: The security_context_to_sid_core function in
security/selinux/ss/services.c in the Linux kernel allowed local
users to cause a denial of service (system crash) by leveraging the
CAP_MAC_ADMIN capability to set a zero-length security context
(bnc#863335).
* CVE-2014-0181: The Netlink implementation in the Linux kernel did
not provide a mechanism for authorizing socket operations based on
the
opener of a socket, which allowed local users to bypass intended
access restrictions and modify network configurations by using a Netlink
socket for the (1) stdout or (2) stderr of a setuid program (bnc#875051).
* CVE-2013-4299: Interpretation conflict in
drivers/md/dm-snap-persistent.c in the Linux kernel allowed remote
authenticated users to obtain sensitive information or modify data
via a crafted mapping to a snapshot block device (bnc#846404).
* CVE-2013-2147: The HP Smart Array controller disk-array driver and
Compaq SMART2 controller disk-array driver in the Linux kernel did
not initialize certain data structures, which allowed local users to
obtain sensitive information from kernel memory via (1) a crafted
IDAGETPCIINFO command for a /dev/ida device, related to the
ida_locked_ioctl function in drivers/block/cpqarray.c or (2) a crafted
CCISS_PASSTHRU32 command for a /dev/cciss device, related to the
cciss_ioctl32_passthru function in drivers/block/cciss.c (bnc#823260).
* CVE-2012-6657: The sock_setsockopt function in net/core/sock.c in
the Linux kernel did not ensure that a keepalive action is
associated with a stream socket, which allowed local users to cause
a denial of service (system crash) by leveraging the ability to
create a raw socket (bnc#896779).
* CVE-2012-3400: Heap-based buffer overflow in the udf_load_logicalvol
function in fs/udf/super.c in the Linux kernel allowed remote
attackers to cause a denial of service (system crash) or possibly
have unspecified other impact via a crafted UDF filesystem
(bnc#769784).
* CVE-2012-2319: Multiple buffer overflows in the hfsplus filesystem
implementation in the Linux kernel allowed local users to gain
privileges via a crafted HFS plus filesystem, a related issue to
CVE-2009-4020 (bnc#760902).
* CVE-2012-2313: The rio_ioctl function in
drivers/net/ethernet/dlink/dl2k.c in the Linux kernel did not
restrict access to the SIOCSMIIREG command, which allowed local
users to write data to an Ethernet adapter via an ioctl call
(bnc#758813).
* CVE-2011-4132: The cleanup_journal_tail function in the Journaling
Block Device (JBD) functionality in the Linux kernel 2.6 allowed
local users to cause a denial of service (assertion error and kernel
oops) via an ext3 or ext4 image with an "invalid log first block
value" (bnc#730118).
* CVE-2011-4127: The Linux kernel did not properly restrict SG_IO
ioctl calls, which allowed local users to bypass intended
restrictions on disk read and write operations by sending a SCSI
command to (1) a partition block device or (2) an LVM volume
(bnc#738400).
* CVE-2011-1585: The cifs_find_smb_ses function in fs/cifs/connect.c
in the Linux kernel did not properly determine the associations
between users and sessions, which allowed local users to bypass CIFS
share authentication by leveraging a mount of a share by a different
user (bnc#687812).
* CVE-2011-1494: Integer overflow in the _ctl_do_mpt_command function
in drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel might have
allowed local users to gain privileges or cause a denial of service
(memory corruption) via an ioctl call specifying a crafted value
that triggers a heap-based buffer overflow (bnc#685402).
* CVE-2011-1495: drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux
kernel did not validate (1) length and (2) offset values before
performing memory copy operations, which might allow local users to
gain privileges, cause a denial of service (memory corruption), or
obtain sensitive information from kernel memory via a crafted ioctl
call, related to the _ctl_do_mpt_command and _ctl_diag_read_buffer
functions (bnc#685402).
* CVE-2011-1493: Array index error in the rose_parse_national function
in net/rose/rose_subr.c in the Linux kernel allowed remote attackers
to cause a denial of service (heap memory corruption) or possibly
have unspecified other impact by composing FAC_NATIONAL_DIGIS data
that specifies a large number of digipeaters, and then sending this
data to a ROSE socket (bnc#681175).
* CVE-2011-4913: The rose_parse_ccitt function in net/rose/rose_subr.c
in the Linux kernel did not validate the FAC_CCITT_DEST_NSAP and
FAC_CCITT_SRC_NSAP fields, which allowed remote attackers to (1)
cause a denial of service (integer underflow, heap memory
corruption, and panic) via a small length value in data sent to a
ROSE socket, or (2) conduct stack-based buffer overflow attacks via
a large length value in data sent to a ROSE socket (bnc#681175).
* CVE-2011-4914: The ROSE protocol implementation in the Linux kernel
did not verify that certain data-length values are consistent with
the amount of data sent, which might allow remote attackers to
obtain sensitive information from kernel memory or cause a denial of
service (out-of-bounds read) via crafted data to a ROSE socket
(bnc#681175).
* CVE-2011-1476: Integer underflow in the Open Sound System (OSS)
subsystem in the Linux kernel on unspecified non-x86 platforms
allowed local users to cause a denial of service (memory corruption)
by leveraging write access to /dev/sequencer (bnc#681999).
* CVE-2011-1477: Multiple array index errors in sound/oss/opl3.c in
the Linux kernel allowed local users to cause a denial of service
(heap memory corruption) or possibly gain privileges by leveraging
write access to /dev/sequencer (bnc#681999).
* CVE-2011-1163: The osf_partition function in fs/partitions/osf.c in
the Linux kernel did not properly handle an invalid number of
partitions, which might allow local users to obtain potentially
sensitive information from kernel heap memory via vectors related to
partition-table parsing (bnc#679812).
* CVE-2011-1090: The __nfs4_proc_set_acl function in fs/nfs/nfs4proc.c
in the Linux kernel stored NFSv4 ACL data in memory that is
allocated by kmalloc but not properly freed, which allowed local
users to cause a denial of service (panic) via a crafted attempt to
set an ACL (bnc#677286).
* CVE-2014-9584: The parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel did not validate a length value
in the Extensions Reference (ER) System Use Field, which allowed
local users to obtain sensitive information from kernel memory via a
crafted iso9660 image (bnc#912654).
* CVE-2014-9420: The rock_continue function in fs/isofs/rock.c in the
Linux kernel did not restrict the number of Rock Ridge continuation
entries, which allowed local users to cause a denial of service
(infinite loop, and system crash or hang) via a crafted iso9660
image (bnc#911325).
* CVE-2014-5471: Stack consumption vulnerability in the
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the
Linux kernel allowed local users to cause a denial of service
(uncontrolled recursion, and system crash or reboot) via a crafted
iso9660 image with a CL entry referring to a directory entry that
has a CL entry (bnc#892490).
* CVE-2014-5472: The parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel allowed local users to cause a
denial of service (unkillable mount process) via a crafted iso9660
image with a self-referential CL entry (bnc#892490).
* CVE-2014-3917: kernel/auditsc.c in the Linux kernel, when
CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allowed
local users to obtain potentially sensitive single-bit values from
kernel memory or cause a denial of service (OOPS) via a large value
of a syscall number (bnc#880484).
* CVE-2014-4652: Race condition in the tlv handler functionality in
the snd_ctl_elem_user_tlv function in sound/core/control.c in the
ALSA control implementation in the Linux kernel allowed local users
to
obtain sensitive information from kernel memory by leveraging
/dev/snd/controlCX access (bnc#883795).
* CVE-2014-4654: The snd_ctl_elem_add function in sound/core/control.c
in the ALSA control implementation in the Linux kernel did not check
authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which
allowed local users to remove kernel controls and cause a denial of
service (use-after-free and system crash) by leveraging
/dev/snd/controlCX access for an ioctl call (bnc#883795).
* CVE-2014-4655: The snd_ctl_elem_add function in sound/core/control.c
in the ALSA control implementation in the Linux kernel did not
properly maintain the user_ctl_count value, which allowed local
users to cause a denial of service (integer overflow and limit
bypass) by leveraging /dev/snd/controlCX access for a large number
of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls (bnc#883795).
* CVE-2014-4653: sound/core/control.c in the ALSA control
implementation in the Linux kernel did not ensure possession of a
read/write lock, which allowed local users to cause a denial of
service (use-after-free) and obtain sensitive information from
kernel memory by leveraging /dev/snd/controlCX access (bnc#883795).
* CVE-2014-4656: Multiple integer overflows in sound/core/control.c in
the ALSA control implementation in the Linux kernel allowed local
users to cause a denial of service by leveraging /dev/snd/controlCX
access, related to (1) index values in the snd_ctl_add function and
(2) numid values in the snd_ctl_remove_numid_conflict function
(bnc#883795).
The following non-security bugs have been fixed:
* usb: class: cdc-acm: Be careful with bInterval (bnc#891844).
* Fix BUG due to racing lookups with reiserfs extended attribute
backing directories (bnc#908382).
* reiserfs: eliminate per-super xattr lock (bnc#908382).
* reiserfs: eliminate private use of struct file in xattr (bnc#908382).
* reiserfs: Expand i_mutex to enclose lookup_one_len (bnc#908382).
* reiserfs: fix up lockdep warnings (bnc#908382).
* reiserfs: fix xattr root locking/refcount bug (bnc#908382).
* reiserfs: make per-inode xattr locking more fine grained
(bnc#908382).
* reiserfs: remove IS_PRIVATE helpers (bnc#908382).
* reiserfs: simplify xattr internal file lookups/opens (bnc#908382).
* netfilter: TCP conntrack: improve dead connection detection
(bnc#874307).
* Fix kABI breakage due to addition of user_ctl_lock (bnc#883795).
* isofs: Fix unchecked printing of ER records.
* kabi: protect struct ip_ct_tcp for bnc#874307 fix (bnc#874307).
* s390: fix system hang on shutdown because of sclp_con (bnc#883223).
* udf: Check component length before reading it.
* udf: Check path length when reading symlink.
* udf: Verify i_size when loading inode.
* udf: Verify symlink size before loading it.
* x86, 64-bit: Move K8 B step iret fixup to fault entry asm
(preparatory patch).
* x86, asm: Flip RESTORE_ARGS arguments logic (preparatory patch).
* x86, asm: Thin down SAVE/RESTORE_* asm macros (preparatory patch).
* x86: move dwarf2 related macro to dwarf2.h (preparatory patch).
* xen: x86, asm: Flip RESTORE_ARGS arguments logic (preparatory patch).
Security Issues:
* CVE-2011-1090
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1090>
* CVE-2011-1163
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1163>
* CVE-2011-1476
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1476>
* CVE-2011-1477
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1477>
* CVE-2011-1493
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1493>
* CVE-2011-1494
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1494>
* CVE-2011-1495
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1495>
* CVE-2011-1585
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1585>
* CVE-2011-4127
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4127>
* CVE-2011-4132
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4132>
* CVE-2011-4913
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4913>
* CVE-2011-4914
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4914>
* CVE-2012-2313
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2313>
* CVE-2012-2319
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2319>
* CVE-2012-3400
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3400>
* CVE-2012-6657
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6657>
* CVE-2013-2147
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2147>
* CVE-2013-4299
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4299>
* CVE-2013-6405
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6405>
* CVE-2013-6463
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6463>
* CVE-2014-0181
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0181>
* CVE-2014-1874
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1874>
* CVE-2014-3184
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3184>
* CVE-2014-3185
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3185>
* CVE-2014-3673
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3673>
* CVE-2014-3917
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917>
* CVE-2014-4652
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4652>
* CVE-2014-4653
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653>
* CVE-2014-4654
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654>
* CVE-2014-4655
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655>
* CVE-2014-4656
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4656>
* CVE-2014-4667
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667>
* CVE-2014-5471
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471>
* CVE-2014-5472
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472>
* CVE-2014-9090
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9090>
* CVE-2014-9322
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322>
* CVE-2014-9420
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9420>
* CVE-2014-9584
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9584>
* CVE-2015-2041
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2041>
Indications:
Everyone using the Linux Kernel on x86_64 architecture should update.
Special Instructions and Notes:
Please reboot the system after installing this update.
Package List:
- SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):
kernel-default-2.6.16.60-0.132.1
kernel-source-2.6.16.60-0.132.1
kernel-syms-2.6.16.60-0.132.1
- SUSE Linux Enterprise Server 10 SP4 LTSS (i586 x86_64):
kernel-debug-2.6.16.60-0.132.1
kernel-kdump-2.6.16.60-0.132.1
kernel-smp-2.6.16.60-0.132.1
kernel-xen-2.6.16.60-0.132.1
- SUSE Linux Enterprise Server 10 SP4 LTSS (i586):
kernel-bigsmp-2.6.16.60-0.132.1
kernel-kdumppae-2.6.16.60-0.132.1
kernel-vmi-2.6.16.60-0.132.1
kernel-vmipae-2.6.16.60-0.132.1
kernel-xenpae-2.6.16.60-0.132.1
References:
https://www.suse.com/security/cve/CVE-2011-1090.html
https://www.suse.com/security/cve/CVE-2011-1163.html
https://www.suse.com/security/cve/CVE-2011-1476.html
https://www.suse.com/security/cve/CVE-2011-1477.html
https://www.suse.com/security/cve/CVE-2011-1493.html
https://www.suse.com/security/cve/CVE-2011-1494.html
https://www.suse.com/security/cve/CVE-2011-1495.html
https://www.suse.com/security/cve/CVE-2011-1585.html
https://www.suse.com/security/cve/CVE-2011-4127.html
https://www.suse.com/security/cve/CVE-2011-4132.html
https://www.suse.com/security/cve/CVE-2011-4913.html
https://www.suse.com/security/cve/CVE-2011-4914.html
https://www.suse.com/security/cve/CVE-2012-2313.html
https://www.suse.com/security/cve/CVE-2012-2319.html
https://www.suse.com/security/cve/CVE-2012-3400.html
https://www.suse.com/security/cve/CVE-2012-6657.html
https://www.suse.com/security/cve/CVE-2013-2147.html
https://www.suse.com/security/cve/CVE-2013-4299.html
https://www.suse.com/security/cve/CVE-2013-6405.html
https://www.suse.com/security/cve/CVE-2013-6463.html
https://www.suse.com/security/cve/CVE-2014-0181.html
https://www.suse.com/security/cve/CVE-2014-1874.html
https://www.suse.com/security/cve/CVE-2014-3184.html
https://www.suse.com/security/cve/CVE-2014-3185.html
https://www.suse.com/security/cve/CVE-2014-3673.html
https://www.suse.com/security/cve/CVE-2014-3917.html
https://www.suse.com/security/cve/CVE-2014-4652.html
https://www.suse.com/security/cve/CVE-2014-4653.html
https://www.suse.com/security/cve/CVE-2014-4654.html
https://www.suse.com/security/cve/CVE-2014-4655.html
https://www.suse.com/security/cve/CVE-2014-4656.html
https://www.suse.com/security/cve/CVE-2014-4667.html
https://www.suse.com/security/cve/CVE-2014-5471.html
https://www.suse.com/security/cve/CVE-2014-5472.html
https://www.suse.com/security/cve/CVE-2014-9090.html
https://www.suse.com/security/cve/CVE-2014-9322.html
https://www.suse.com/security/cve/CVE-2014-9420.html
https://www.suse.com/security/cve/CVE-2014-9584.html
https://www.suse.com/security/cve/CVE-2015-2041.html
https://bugzilla.suse.com/677286
https://bugzilla.suse.com/679812
https://bugzilla.suse.com/681175
https://bugzilla.suse.com/681999
https://bugzilla.suse.com/683282
https://bugzilla.suse.com/685402
https://bugzilla.suse.com/687812
https://bugzilla.suse.com/730118
https://bugzilla.suse.com/730200
https://bugzilla.suse.com/738400
https://bugzilla.suse.com/758813
https://bugzilla.suse.com/760902
https://bugzilla.suse.com/769784
https://bugzilla.suse.com/823260
https://bugzilla.suse.com/846404
https://bugzilla.suse.com/853040
https://bugzilla.suse.com/854722
https://bugzilla.suse.com/863335
https://bugzilla.suse.com/874307
https://bugzilla.suse.com/875051
https://bugzilla.suse.com/880484
https://bugzilla.suse.com/883223
https://bugzilla.suse.com/883795
https://bugzilla.suse.com/885422
https://bugzilla.suse.com/891844
https://bugzilla.suse.com/892490
https://bugzilla.suse.com/896390
https://bugzilla.suse.com/896391
https://bugzilla.suse.com/896779
https://bugzilla.suse.com/902346
https://bugzilla.suse.com/907818
https://bugzilla.suse.com/908382
https://bugzilla.suse.com/910251
https://bugzilla.suse.com/911325
https://download.suse.com/patch/finder/?keywords=15c960abc4733df91b510dfe4b…
https://download.suse.com/patch/finder/?keywords=2a99948c9c3be4a024a9fa4d40…
https://download.suse.com/patch/finder/?keywords=53c468d2b277f3335fcb5ddb08…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0

[security-announce] openSUSE-SU-2015:0807-1: important: Security update for DirectFB
by opensuse-security@opensuse.org 30 Apr '15
by opensuse-security@opensuse.org 30 Apr '15
30 Apr '15
openSUSE Security Update: Security update for DirectFB
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:0807-1
Rating: important
References: #878345 #878349
Cross-References: CVE-2014-2977 CVE-2014-2978
Affected Products:
openSUSE 13.2
openSUSE 13.1
______________________________________________________________________________
An update that fixes two …
[View More]vulnerabilities is now available.
Description:
DirectFB was updated to fix two security issues.
The following vulnerabilities were fixed:
* CVE-2014-2977: Multiple integer signedness errors could allow remote
attackers to cause a denial of service (crash) and possibly execute
arbitrary code via the Voodoo interface, which triggers a stack-based
buffer overflow.
* CVE-2014-2978: Remote attackers could cause a denial of service (crash)
and possibly execute arbitrary code via the Voodoo interface, which
triggers an out-of-bounds write.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2015-340=1
- openSUSE 13.1:
zypper in -t patch openSUSE-2015-340=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
DirectFB-1.7.5-3.3.1
DirectFB-Mesa-1.7.5-3.3.1
DirectFB-Mesa-debuginfo-1.7.5-3.3.1
DirectFB-debuginfo-1.7.5-3.3.1
DirectFB-debugsource-1.7.5-3.3.1
DirectFB-devel-1.7.5-3.3.1
DirectFB-doc-1.7.5-3.3.1
DirectFB-libSDL-1.7.5-3.3.1
DirectFB-libSDL-debuginfo-1.7.5-3.3.1
DirectFB-libvncclient-1.7.5-3.3.1
DirectFB-libvncclient-debuginfo-1.7.5-3.3.1
lib++dfb-1_7-5-1.7.5-3.3.1
lib++dfb-1_7-5-debuginfo-1.7.5-3.3.1
lib++dfb-devel-1.7.5-3.3.1
libdirectfb-1_7-5-1.7.5-3.3.1
libdirectfb-1_7-5-debuginfo-1.7.5-3.3.1
- openSUSE 13.2 (x86_64):
DirectFB-devel-32bit-1.7.5-3.3.1
libdirectfb-1_7-5-32bit-1.7.5-3.3.1
libdirectfb-1_7-5-debuginfo-32bit-1.7.5-3.3.1
- openSUSE 13.1 (i586 x86_64):
DirectFB-1.6.3-4.3.1
DirectFB-Mesa-1.6.3-4.3.1
DirectFB-Mesa-debuginfo-1.6.3-4.3.1
DirectFB-debuginfo-1.6.3-4.3.1
DirectFB-debugsource-1.6.3-4.3.1
DirectFB-devel-1.6.3-4.3.1
DirectFB-doc-1.6.3-4.3.1
DirectFB-libSDL-1.6.3-4.3.1
DirectFB-libSDL-debuginfo-1.6.3-4.3.1
DirectFB-libvncclient-1.6.3-4.3.1
DirectFB-libvncclient-debuginfo-1.6.3-4.3.1
libdirectfb-1_6-0-1.6.3-4.3.1
libdirectfb-1_6-0-debuginfo-1.6.3-4.3.1
- openSUSE 13.1 (x86_64):
DirectFB-devel-32bit-1.6.3-4.3.1
libdirectfb-1_6-0-32bit-1.6.3-4.3.1
libdirectfb-1_6-0-debuginfo-32bit-1.6.3-4.3.1
References:
https://www.suse.com/security/cve/CVE-2014-2977.html
https://www.suse.com/security/cve/CVE-2014-2978.html
https://bugzilla.suse.com/878345
https://bugzilla.suse.com/878349
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0

[security-announce] openSUSE-SU-2015:0774-1: important: Security update for java-1_7_0-openjdk
by opensuse-security@opensuse.org 27 Apr '15
by opensuse-security@opensuse.org 27 Apr '15
27 Apr '15
openSUSE Security Update: Security update for java-1_7_0-openjdk
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:0774-1
Rating: important
References: #927591
Cross-References: CVE-2015-0458 CVE-2015-0459 CVE-2015-0460
CVE-2015-0469 CVE-2015-0477 CVE-2015-0478
CVE-2015-0480 CVE-2015-0484 CVE-2015-0488
CVE-2015-0491 CVE-2015-0492
Affected Products:…
[View More]
openSUSE 13.2
______________________________________________________________________________
An update that fixes 11 vulnerabilities is now available.
Description:
OpenJDK was updated to 2.5.5 - OpenJdk 7u79 to fix security issues and
bugs:
The following vulnerabilities were fixed:
* CVE-2015-0458: Deployment: unauthenticated remote attackers could
execute arbitrary code via multiple protocols.
* CVE-2015-0459: 2D: unauthenticated remote attackers could execute
arbitrary code via multiple protocols.
* CVE-2015-0460: Hotspot: unauthenticated remote attackers could execute
arbitrary code via multiple protocols.
* CVE-2015-0469: 2D: unauthenticated remote attackers could execute
arbitrary code via multiple protocols.
* CVE-2015-0477: Beans: unauthenticated remote attackers could update,
insert or delete some JAVA accessible data via multiple protocols
* CVE-2015-0478: JCE: unauthenticated remote attackers could read some
JAVA accessible data via multiple protocols
* CVE-2015-0480: Tools: unauthenticated remote attackers could update,
insert or delete some JAVA accessible data via multiple protocols and
cause a partial denial of service (partial DOS)
* CVE-2015-0484: JavaFX: unauthenticated remote attackers could read,
update, insert or delete access some Java accessible data via multiple
protocols and cause a partial denial of service (partial DOS).
* CVE-2015-0488: JSSE: unauthenticated remote attackers could cause a
partial denial of service (partial DOS).
* CVE-2015-0491: 2D: unauthenticated remote attackers could execute
arbitrary code via multiple protocols.
* CVE-2015-0492: JavaFX: unauthenticated remote attackers could execute
arbitrary code via multiple protocols.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2015-331=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
java-1_7_0-openjdk-1.7.0.79-7.4
java-1_7_0-openjdk-accessibility-1.7.0.79-7.4
java-1_7_0-openjdk-debuginfo-1.7.0.79-7.4
java-1_7_0-openjdk-debugsource-1.7.0.79-7.4
java-1_7_0-openjdk-demo-1.7.0.79-7.4
java-1_7_0-openjdk-demo-debuginfo-1.7.0.79-7.4
java-1_7_0-openjdk-devel-1.7.0.79-7.4
java-1_7_0-openjdk-devel-debuginfo-1.7.0.79-7.4
java-1_7_0-openjdk-headless-1.7.0.79-7.4
java-1_7_0-openjdk-headless-debuginfo-1.7.0.79-7.4
java-1_7_0-openjdk-src-1.7.0.79-7.4
- openSUSE 13.2 (noarch):
java-1_7_0-openjdk-javadoc-1.7.0.79-7.4
References:
https://www.suse.com/security/cve/CVE-2015-0458.html
https://www.suse.com/security/cve/CVE-2015-0459.html
https://www.suse.com/security/cve/CVE-2015-0460.html
https://www.suse.com/security/cve/CVE-2015-0469.html
https://www.suse.com/security/cve/CVE-2015-0477.html
https://www.suse.com/security/cve/CVE-2015-0478.html
https://www.suse.com/security/cve/CVE-2015-0480.html
https://www.suse.com/security/cve/CVE-2015-0484.html
https://www.suse.com/security/cve/CVE-2015-0488.html
https://www.suse.com/security/cve/CVE-2015-0491.html
https://www.suse.com/security/cve/CVE-2015-0492.html
https://bugzilla.suse.com/927591
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0

[security-announce] openSUSE-SU-2015:0773-1: important: Security update for java-1_8_0-openjdk
by opensuse-security@opensuse.org 27 Apr '15
by opensuse-security@opensuse.org 27 Apr '15
27 Apr '15
openSUSE Security Update: Security update for java-1_8_0-openjdk
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:0773-1
Rating: important
References: #927591
Cross-References: CVE-2015-0458 CVE-2015-0459 CVE-2015-0460
CVE-2015-0469 CVE-2015-0470 CVE-2015-0477
CVE-2015-0478 CVE-2015-0480 CVE-2015-0484
CVE-2015-0486 CVE-2015-0488 CVE-2015-0491
…
[View More] CVE-2015-0492
Affected Products:
openSUSE 13.2
______________________________________________________________________________
An update that fixes 13 vulnerabilities is now available.
Description:
OpenJDK was updated to jdk8u45-b14 to fix security issues and bugs.
The following vulnerabilities were fixed:
* CVE-2015-0458: Deployment: unauthenticated remote attackers could
execute arbitrary code via multiple protocols.
* CVE-2015-0459: 2D: unauthenticated remote attackers could execute
arbitrary code via multiple protocols.
* CVE-2015-0460: Hotspot: unauthenticated remote attackers could execute
arbitrary code via multiple protocols.
* CVE-2015-0469: 2D: unauthenticated remote attackers could execute
arbitrary code via multiple protocols.
* CVE-2015-0470: Hotspot: unauthenticated remote attackers could update,
insert or delete some JAVA accessible data via multiple protocols
* CVE-2015-0477: Beans: unauthenticated remote attackers could update,
insert or delete some JAVA accessible data via multiple protocols
* CVE-2015-0478: JCE: unauthenticated remote attackers could read some
JAVA accessible data via multiple protocols
* CVE-2015-0480: Tools: unauthenticated remote attackers could update,
insert or delete some JAVA accessible data via multiple protocols and
cause a partial denial of service (partial DOS)
* CVE-2015-0484: JavaFX: unauthenticated remote attackers could read,
update, insert or delete access some Java accessible data via multiple
protocols and cause a partial denial of service (partial DOS).
* CVE-2015-0486: Deployment: unauthenticated remote attackers could read
some JAVA accessible data via multiple protocols
* CVE-2015-0488: JSSE: unauthenticated remote attackers could cause a
partial denial of service (partial DOS).
* CVE-2015-0491: 2D: unauthenticated remote attackers could execute
arbitrary code via multiple protocols.
* CVE-2015-0492: JavaFX: unauthenticated remote attackers could execute
arbitrary code via multiple protocols.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2015-332=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
java-1_8_0-openjdk-1.8.0.45-9.3
java-1_8_0-openjdk-accessibility-1.8.0.45-9.3
java-1_8_0-openjdk-debuginfo-1.8.0.45-9.3
java-1_8_0-openjdk-debugsource-1.8.0.45-9.3
java-1_8_0-openjdk-demo-1.8.0.45-9.3
java-1_8_0-openjdk-demo-debuginfo-1.8.0.45-9.3
java-1_8_0-openjdk-devel-1.8.0.45-9.3
java-1_8_0-openjdk-headless-1.8.0.45-9.3
java-1_8_0-openjdk-headless-debuginfo-1.8.0.45-9.3
java-1_8_0-openjdk-src-1.8.0.45-9.3
- openSUSE 13.2 (noarch):
java-1_8_0-openjdk-javadoc-1.8.0.45-9.3
References:
https://www.suse.com/security/cve/CVE-2015-0458.html
https://www.suse.com/security/cve/CVE-2015-0459.html
https://www.suse.com/security/cve/CVE-2015-0460.html
https://www.suse.com/security/cve/CVE-2015-0469.html
https://www.suse.com/security/cve/CVE-2015-0470.html
https://www.suse.com/security/cve/CVE-2015-0477.html
https://www.suse.com/security/cve/CVE-2015-0478.html
https://www.suse.com/security/cve/CVE-2015-0480.html
https://www.suse.com/security/cve/CVE-2015-0484.html
https://www.suse.com/security/cve/CVE-2015-0486.html
https://www.suse.com/security/cve/CVE-2015-0488.html
https://www.suse.com/security/cve/CVE-2015-0491.html
https://www.suse.com/security/cve/CVE-2015-0492.html
https://bugzilla.suse.com/927591
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0

[security-announce] SUSE-SU-2015:0743-1: important: Security update for mariadb
by opensuse-security@opensuse.org 21 Apr '15
by opensuse-security@opensuse.org 21 Apr '15
21 Apr '15
SUSE Security Update: Security update for mariadb
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0743-1
Rating: important
References: #873351 #876282 #880891 #896400 #904627 #906117
#906194 #911442 #911556 #915911 #915912 #915913
#915914 #919229
Cross-References: CVE-2010-5298 CVE-2012-5615 CVE-2014-0195
CVE-2014-0198 CVE-2014-0221 CVE-2014-0224
…
[View More] CVE-2014-2494 CVE-2014-3470 CVE-2014-4207
CVE-2014-4258 CVE-2014-4260 CVE-2014-4274
CVE-2014-4287 CVE-2014-6463 CVE-2014-6464
CVE-2014-6469 CVE-2014-6474 CVE-2014-6478
CVE-2014-6484 CVE-2014-6489 CVE-2014-6491
CVE-2014-6494 CVE-2014-6495 CVE-2014-6496
CVE-2014-6500 CVE-2014-6505 CVE-2014-6507
CVE-2014-6520 CVE-2014-6530 CVE-2014-6551
CVE-2014-6555 CVE-2014-6559 CVE-2014-6564
CVE-2014-6568 CVE-2015-0374 CVE-2015-0381
CVE-2015-0382 CVE-2015-0391 CVE-2015-0411
CVE-2015-0432
Affected Products:
SUSE Linux Enterprise Workstation Extension 12
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Desktop 12
______________________________________________________________________________
An update that fixes 40 vulnerabilities is now available.
Description:
mariadb was updated to version 10.0.16 to fix 40 security issues.
These security issues were fixed:
- CVE-2015-0411: Unspecified vulnerability in Oracle MySQL Server 5.5.40
and earlier, and 5.6.21 and earlier, allowed remote attackers to affect
confidentiality, integrity, and availability via unknown vectors related
to Server : Security : Encryption (bnc#915911).
- CVE-2015-0382: Unspecified vulnerability in Oracle MySQL Server 5.5.40
and earlier and 5.6.21 and earlier allowed remote attackers to affect
availability via unknown vectors related to Server : Replication, a
different vulnerability than CVE-2015-0381 (bnc#915911).
- CVE-2015-0381: Unspecified vulnerability in Oracle MySQL Server 5.5.40
and earlier and 5.6.21 and earlier allowed remote attackers to affect
availability via unknown vectors related to Server : Replication, a
different vulnerability than CVE-2015-0382 (bnc#915911).
- CVE-2015-0432: Unspecified vulnerability in Oracle MySQL Server 5.5.40
and earlier allowed remote authenticated users to affect availability
via vectors related to Server : InnoDB : DDL : Foreign Key (bnc#915911).
- CVE-2014-6568: Unspecified vulnerability in Oracle MySQL Server 5.5.40
and earlier, and 5.6.21 and earlier, allowed remote authenticated users
to affect availability via vectors related to Server : InnoDB : DML
(bnc#915911).
- CVE-2015-0374: Unspecified vulnerability in Oracle MySQL Server 5.5.40
and earlier and 5.6.21 and earlier allowed remote authenticated users to
affect confidentiality via unknown vectors related to Server : Security
: Privileges : Foreign Key (bnc#915911).
- CVE-2014-6507: Unspecified vulnerability in Oracle MySQL Server 5.5.39
and earlier, and 5.6.20 and earlier, allowed remote authenticated users
to affect confidentiality, integrity, and availability via vectors
related to SERVER:DML (bnc#915912).
- CVE-2014-6491: Unspecified vulnerability in Oracle MySQL Server 5.5.39
and earlier and 5.6.20 and earlier allowed remote attackers to affect
confidentiality, integrity, and availability via vectors related to
SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6500
(bnc#915912).
- CVE-2014-6500: Unspecified vulnerability in Oracle MySQL Server 5.5.39
and earlier, and 5.6.20 and earlier, allowed remote attackers to affect
confidentiality, integrity, and availability via vectors related to
SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6491
(bnc#915912).
- CVE-2014-6469: Unspecified vulnerability in Oracle MySQL Server 5.5.39
and eariler and 5.6.20 and earlier allowed remote authenticated users to
affect availability via vectors related to SERVER:OPTIMIZER (bnc#915912).
- CVE-2014-6555: Unspecified vulnerability in Oracle MySQL Server 5.5.39
and earlier and 5.6.20 and earlier allowed remote authenticated users to
affect confidentiality, integrity, and availability via vectors related
to SERVER:DML (bnc#915912).
- CVE-2014-6559: Unspecified vulnerability in Oracle MySQL Server 5.5.39
and earlier, and 5.6.20 and earlier, allowed remote attackers to affect
confidentiality via vectors related to C API SSL CERTIFICATE HANDLING
(bnc#915912).
- CVE-2014-6494: Unspecified vulnerability in Oracle MySQL Server 5.5.39
and earlier, and 5.6.20 and earlier, allowed remote attackers to affect
availability via vectors related to CLIENT:SSL:yaSSL, a different
vulnerability than CVE-2014-6496 (bnc#915912).
- CVE-2014-6496: Unspecified vulnerability in Oracle MySQL Server 5.5.39
and earlier, and 5.6.20 and earlier, allowed remote attackers to affect
availability via vectors related to CLIENT:SSL:yaSSL, a different
vulnerability than CVE-2014-6494 (bnc#915912).
- CVE-2014-6464: Unspecified vulnerability in Oracle MySQL Server 5.5.39
and earlier and 5.6.20 and earlier allowed remote authenticated users to
affect availability via vectors related to SERVER:INNODB DML FOREIGN
KEYS (bnc#915912).
- CVE-2010-5298: Race condition in the ssl3_read_bytes function in
s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is
enabled, allowed remote attackers to inject data across sessions or
cause a denial of service (use-after-free and parsing error) via an SSL
connection in a multithreaded environment (bnc#873351).
- CVE-2014-0195: The dtls1_reassemble_fragment function in d1_both.c in
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h did
not properly validate fragment lengths in DTLS ClientHello messages,
which allowed remote attackers to execute arbitrary code or cause a
denial of service (buffer overflow and application crash) via a long
non-initial fragment (bnc#880891).
- CVE-2014-0198: The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x
through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, did not
properly manage a buffer pointer during certain recursive calls, which
allowed remote attackers to cause a denial of service (NULL pointer
dereference and application crash) via vectors that trigger an alert
condition (bnc#876282).
- CVE-2014-0221: The dtls1_get_message_fragment function in d1_both.c in
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h
allowed remote attackers to cause a denial of service (recursion and
client crash) via a DTLS hello message in an invalid DTLS handshake
(bnc#915913).
- CVE-2014-0224: OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1
before 1.0.1h did not properly restrict processing of ChangeCipherSpec
messages, which allowed man-in-the-middle attackers to trigger use of a
zero-length master key in certain OpenSSL-to-OpenSSL communications, and
consequently hijack sessions or obtain sensitive information, via a
crafted TLS handshake, aka the "CCS Injection" vulnerability
(bnc#915913).
- CVE-2014-3470: The ssl3_send_client_key_exchange function in s3_clnt.c
in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h,
when an anonymous ECDH cipher suite is used, allowed remote attackers to
cause a denial of service (NULL pointer dereference and client crash) by
triggering a NULL certificate value (bnc#915913).
- CVE-2014-6474: Unspecified vulnerability in Oracle MySQL Server 5.6.19
and earlier allowed remote authenticated users to affect availability
via vectors related to SERVER:MEMCACHED (bnc#915913).
- CVE-2014-6489: Unspecified vulnerability in Oracle MySQL Server 5.6.19
and earlier allowed remote authenticated users to affect integrity and
availability via vectors related to SERVER:SP (bnc#915913).
- CVE-2014-6564: Unspecified vulnerability in Oracle MySQL Server 5.6.19
and earlier allowed remote authenticated users to affect availability
via vectors related to SERVER:INNODB FULLTEXT SEARCH DML (bnc#915913).
- CVE-2012-5615: Oracle MySQL 5.5.38 and earlier, 5.6.19 and earlier, and
MariaDB 5.5.28a, 5.3.11, 5.2.13, 5.1.66, and possibly other versions,
generates different error messages with different time delays depending
on whether a user name exists, which allowed remote attackers to
enumerate valid usernames (bnc#915913).
- CVE-2014-4274: Unspecified vulnerability in Oracle MySQL Server 5.5.38
and earlier and 5.6.19 and earlier allowed local users to affect
confidentiality, integrity, and availability via vectors related to
SERVER:MyISAM (bnc#896400).
- CVE-2014-4287: Unspecified vulnerability in Oracle MySQL Server 5.5.38
and earlier and 5.6.19 and earlier allowed remote authenticated users to
affect availability via vectors related to SERVER:CHARACTER SETS
(bnc#915913).
- CVE-2014-6463: Unspecified vulnerability in Oracle MySQL Server 5.5.38
and earlier and 5.6.19 and earlier allowed remote authenticated users to
affect availability via vectors related to SERVER:REPLICATION ROW FORMAT
BINARY LOG DML (bnc#915913).
- CVE-2014-6478: Unspecified vulnerability in Oracle MySQL Server 5.5.38
and earlier, and 5.6.19 and earlier, allowed remote attackers to affect
integrity via vectors related to SERVER:SSL:yaSSL (bnc#915913).
- CVE-2014-6484: Unspecified vulnerability in Oracle MySQL Server 5.5.38
and earlier, and 5.6.19 and earlier, allowed remote authenticated users
to affect availability via vectors related to SERVER:DML (bnc#915913).
- CVE-2014-6495: Unspecified vulnerability in Oracle MySQL Server 5.5.38
and earlier, and 5.6.19 and earlier, allowed remote attackers to affect
availability via vectors related to SERVER:SSL:yaSSL (bnc#915913).
- CVE-2014-6505: Unspecified vulnerability in Oracle MySQL Server 5.5.38
and earlier, and 5.6.19 and earlier, allowed remote authenticated users
to affect availability via vectors related to SERVER:MEMORY STORAGE
ENGINE (bnc#915913).
- CVE-2014-6520: Unspecified vulnerability in Oracle MySQL Server 5.5.38
and earlier allowed remote authenticated users to affect availability
via vectors related to SERVER:DDL (bnc#915913).
- CVE-2014-6530: Unspecified vulnerability in Oracle MySQL Server 5.5.38
and earlier, and 5.6.19 and earlier, allowed remote authenticated users
to affect confidentiality, integrity, and availability via vectors
related to CLIENT:MYSQLDUMP (bnc#915913).
- CVE-2014-6551: Unspecified vulnerability in Oracle MySQL Server 5.5.38
and earlier and 5.6.19 and earlier allowed local users to affect
confidentiality via vectors related to CLIENT:MYSQLADMIN (bnc#915913).
- CVE-2015-0391: Unspecified vulnerability in Oracle MySQL Server 5.5.38
and earlier, and 5.6.19 and earlier, allowed remote authenticated users
to affect availability via vectors related to DDL (bnc#915913).
- CVE-2014-4258: Unspecified vulnerability in the MySQL Server component
in Oracle MySQL 5.5.37 and earlier and 5.6.17 and earlier allowed remote
authenticated users to affect confidentiality, integrity, and
availability via vectors related to SRINFOSC (bnc#915914).
- CVE-2014-4260: Unspecified vulnerability in the MySQL Server component
in Oracle MySQL 5.5.37 and earlier, and 5.6.17 and earlier, allowed
remote authenticated users to affect integrity and availability via
vectors related to SRCHAR (bnc#915914).
- CVE-2014-2494: Unspecified vulnerability in the MySQL Server component
in Oracle MySQL 5.5.37 and earlier allowed remote authenticated users to
affect availability via vectors related to ENARC (bnc#915914).
- CVE-2014-4207: Unspecified vulnerability in the MySQL Server component
in Oracle MySQL 5.5.37 and earlier allowed remote authenticated users to
affect availability via vectors related to SROPTZR (bnc#915914).
These non-security issues were fixed:
- Get query produced incorrect results in MariaDB 10.0.11 vs MySQL 5.5 -
SLES12 (bnc#906194).
- After update to version 10.0.14 mariadb did not start - Job for
mysql.service failed (bnc#911442).
- Fix crash when disk full situation is reached on alter table
(bnc#904627).
- Allow md5 in FIPS mode (bnc#911556).
- Fixed a situation when bit and hex string literals unintentionally
changed column names (bnc#919229).
Release notes: https://kb.askmonty.org/en/mariadb-10016-release-notes/
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12:
zypper in -t patch SUSE-SLE-WE-12-2015-170=1
- SUSE Linux Enterprise Software Development Kit 12:
zypper in -t patch SUSE-SLE-SDK-12-2015-170=1
- SUSE Linux Enterprise Server 12:
zypper in -t patch SUSE-SLE-SERVER-12-2015-170=1
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2015-170=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12 (x86_64):
libmysqlclient_r18-10.0.16-15.1
libmysqlclient_r18-32bit-10.0.16-15.1
mariadb-debuginfo-10.0.16-15.1
mariadb-debugsource-10.0.16-15.1
- SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):
libmysqlclient-devel-10.0.16-15.1
libmysqlclient_r18-10.0.16-15.1
libmysqld-devel-10.0.16-15.1
libmysqld18-10.0.16-15.1
libmysqld18-debuginfo-10.0.16-15.1
mariadb-debuginfo-10.0.16-15.1
mariadb-debugsource-10.0.16-15.1
- SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
libmysqlclient18-10.0.16-15.1
libmysqlclient18-debuginfo-10.0.16-15.1
mariadb-10.0.16-15.1
mariadb-client-10.0.16-15.1
mariadb-client-debuginfo-10.0.16-15.1
mariadb-debuginfo-10.0.16-15.1
mariadb-debugsource-10.0.16-15.1
mariadb-errormessages-10.0.16-15.1
mariadb-tools-10.0.16-15.1
mariadb-tools-debuginfo-10.0.16-15.1
- SUSE Linux Enterprise Server 12 (s390x x86_64):
libmysqlclient18-32bit-10.0.16-15.1
libmysqlclient18-debuginfo-32bit-10.0.16-15.1
- SUSE Linux Enterprise Desktop 12 (x86_64):
libmysqlclient18-10.0.16-15.1
libmysqlclient18-32bit-10.0.16-15.1
libmysqlclient18-debuginfo-10.0.16-15.1
libmysqlclient18-debuginfo-32bit-10.0.16-15.1
libmysqlclient_r18-10.0.16-15.1
libmysqlclient_r18-32bit-10.0.16-15.1
mariadb-10.0.16-15.1
mariadb-client-10.0.16-15.1
mariadb-client-debuginfo-10.0.16-15.1
mariadb-debuginfo-10.0.16-15.1
mariadb-debugsource-10.0.16-15.1
mariadb-errormessages-10.0.16-15.1
References:
https://www.suse.com/security/cve/CVE-2010-5298.html
https://www.suse.com/security/cve/CVE-2012-5615.html
https://www.suse.com/security/cve/CVE-2014-0195.html
https://www.suse.com/security/cve/CVE-2014-0198.html
https://www.suse.com/security/cve/CVE-2014-0221.html
https://www.suse.com/security/cve/CVE-2014-0224.html
https://www.suse.com/security/cve/CVE-2014-2494.html
https://www.suse.com/security/cve/CVE-2014-3470.html
https://www.suse.com/security/cve/CVE-2014-4207.html
https://www.suse.com/security/cve/CVE-2014-4258.html
https://www.suse.com/security/cve/CVE-2014-4260.html
https://www.suse.com/security/cve/CVE-2014-4274.html
https://www.suse.com/security/cve/CVE-2014-4287.html
https://www.suse.com/security/cve/CVE-2014-6463.html
https://www.suse.com/security/cve/CVE-2014-6464.html
https://www.suse.com/security/cve/CVE-2014-6469.html
https://www.suse.com/security/cve/CVE-2014-6474.html
https://www.suse.com/security/cve/CVE-2014-6478.html
https://www.suse.com/security/cve/CVE-2014-6484.html
https://www.suse.com/security/cve/CVE-2014-6489.html
https://www.suse.com/security/cve/CVE-2014-6491.html
https://www.suse.com/security/cve/CVE-2014-6494.html
https://www.suse.com/security/cve/CVE-2014-6495.html
https://www.suse.com/security/cve/CVE-2014-6496.html
https://www.suse.com/security/cve/CVE-2014-6500.html
https://www.suse.com/security/cve/CVE-2014-6505.html
https://www.suse.com/security/cve/CVE-2014-6507.html
https://www.suse.com/security/cve/CVE-2014-6520.html
https://www.suse.com/security/cve/CVE-2014-6530.html
https://www.suse.com/security/cve/CVE-2014-6551.html
https://www.suse.com/security/cve/CVE-2014-6555.html
https://www.suse.com/security/cve/CVE-2014-6559.html
https://www.suse.com/security/cve/CVE-2014-6564.html
https://www.suse.com/security/cve/CVE-2014-6568.html
https://www.suse.com/security/cve/CVE-2015-0374.html
https://www.suse.com/security/cve/CVE-2015-0381.html
https://www.suse.com/security/cve/CVE-2015-0382.html
https://www.suse.com/security/cve/CVE-2015-0391.html
https://www.suse.com/security/cve/CVE-2015-0411.html
https://www.suse.com/security/cve/CVE-2015-0432.html
https://bugzilla.suse.com/873351
https://bugzilla.suse.com/876282
https://bugzilla.suse.com/880891
https://bugzilla.suse.com/896400
https://bugzilla.suse.com/904627
https://bugzilla.suse.com/906117
https://bugzilla.suse.com/906194
https://bugzilla.suse.com/911442
https://bugzilla.suse.com/911556
https://bugzilla.suse.com/915911
https://bugzilla.suse.com/915912
https://bugzilla.suse.com/915913
https://bugzilla.suse.com/915914
https://bugzilla.suse.com/919229
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0

[security-announce] SUSE-SU-2015:0736-1: important: Security update for Real Time Linux Kernel
by opensuse-security@opensuse.org 20 Apr '15
by opensuse-security@opensuse.org 20 Apr '15
20 Apr '15
SUSE Security Update: Security update for Real Time Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0736-1
Rating: important
References: #771619 #816099 #829110 #833588 #833820 #846656
#853040 #856760 #864401 #864404 #864409 #864411
#865419 #875051 #876086 #876594 #877593 #882470
#883948 #884817 #887597 #891277 #894213 #895841
…
[View More] #896484 #900279 #900644 #902232 #902349 #902351
#902675 #903096 #903640 #904053 #904242 #904659
#904671 #905304 #905312 #905799 #906586 #907196
#907338 #907551 #907611 #907818 #908069 #908163
#908393 #908550 #908551 #908572 #908825 #909077
#909078 #909088 #909092 #909093 #909095 #909264
#909565 #909740 #909846 #910013 #910150 #910159
#910251 #910321 #910322 #910517 #911181 #911325
#911326 #912171 #912705 #913059 #914355 #914423
#914726 #915209 #915322 #915335 #915791 #915826
#916515 #916982 #917839 #917884 #920250 #924282
Cross-References: CVE-2013-7263 CVE-2014-0181 CVE-2014-3687
CVE-2014-3688 CVE-2014-3690 CVE-2014-4608
CVE-2014-7822 CVE-2014-7842 CVE-2014-7970
CVE-2014-8133 CVE-2014-8134 CVE-2014-8160
CVE-2014-8369 CVE-2014-8559 CVE-2014-9090
CVE-2014-9322 CVE-2014-9419 CVE-2014-9420
CVE-2014-9584 CVE-2014-9585 CVE-2015-1593
Affected Products:
SUSE Linux Enterprise Real Time Extension 11 SP3
______________________________________________________________________________
An update that solves 21 vulnerabilities and has 69 fixes
is now available. It includes one version update.
Description:
The SUSE Linux Enterprise 11 SP3 Realtime kernel was updated to receive
various security and bugfixes.
The following security bugs have been fixed:
*
CVE-2015-1593: An integer overflow in the stack randomization on
64-bit systems lead to less effective stack ASLR on those systems.
(bsc#917839)
*
CVE-2014-8160: iptables rules could be bypassed if the specific
network protocol module was not loaded, allowing e.g. SCTP to bypass the
firewall if the sctp protocol was not enabled. (bsc#913059)
*
CVE-2014-7822: A flaw was found in the way the Linux kernels
splice() system call validated its parameters. On certain file systems, a
local, unprivileged user could have used this flaw to write past the
maximum file size, and thus crash the system. (bnc#915322)
*
CVE-2014-9419: The __switch_to function in
arch/x86/kernel/process_64.c in the Linux kernel did not ensure that
Thread Local Storage (TLS) descriptors are loaded before proceeding with
other steps, which made it easier for local users to bypass the ASLR
protection mechanism via a crafted application that reads a TLS base
address (bnc#911326).
*
CVE-2014-9584: The parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel did not validate a length value in the
Extensions Reference (ER) System Use Field, which allowed local users to
obtain sensitive information from kernel memory via a crafted iso9660
image (bnc#912654).
*
CVE-2014-9585: The vdso_addr function in arch/x86/vdso/vma.c in the
Linux kernel did not properly choose memory locations for the vDSO area,
which made it easier for local users to bypass the ASLR protection
mechanism by guessing a location at the end of a PMD (bnc#912705).
*
CVE-2014-8559: The d_walk function in fs/dcache.c in the Linux
kernel did not properly maintain the semantics of rename_lock, which
allowed local users to cause a denial of service (deadlock and system
hang) via a crafted application (bnc#903640).
*
CVE-2014-9420: The rock_continue function in fs/isofs/rock.c in the
Linux kernel did not restrict the number of Rock Ridge continuation
entries, which allowed local users to cause a denial of service (infinite
loop, and system crash or hang) via a crafted iso9660 image (bsc#911325).
*
CVE-2014-8134: The paravirt_ops_setup function in
arch/x86/kernel/kvm.c in the Linux kernel used an improper
paravirt_enabled setting for KVM guest kernels, which made it easier for
guest OS users to bypass the ASLR protection mechanism via a crafted
application that reads a 16-bit value (bnc#907818 909077 909078).
*
CVE-2014-8369: The kvm_iommu_map_pages function in virt/kvm/iommu.c
in the Linux kernel miscalculated the number of pages during the handling
of a mapping failure, which allowed guest OS users to cause a denial of
service (host OS page unpinning) or possibly have unspecified other impact
by leveraging guest OS privileges. NOTE: this vulnerability exists because
of an incorrect fix for CVE-2014-3601 (bsc#902675).
*
CVE-2014-3690: arch/x86/kvm/vmx.c in the KVM subsystem in the Linux
kernel on Intel processors did not ensure that the value in the CR4
control register remains the same after a VM entry, which allowed host OS
users to kill arbitrary processes or cause a denial of service (system
disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC
prctl calls within a modified copy of QEMU (bnc#902232).
*
CVE-2014-7842: Race condition in arch/x86/kvm/x86.c in the Linux
kernel allowed guest OS users to cause a denial of service (guest OS
crash) via a crafted application that performs an MMIO transaction or a
PIO transaction to trigger a guest userspace emulation error report, a
similar issue to CVE-2010-5313 (bnc#905312).
*
CVE-2014-0181: The Netlink implementation in the Linux kernel did
not provide a mechanism for authorizing socket operations based on the
opener of a socket, which allowed local users to bypass intended
access restrictions and modify network configurations by using a Netlink
socket for the (1) stdout or (2) stderr of a setuid program (bnc#875051).
*
CVE-2014-3688: The SCTP implementation in the Linux kernel allowed
remote attackers to cause a denial of service (memory consumption) by
triggering a large number of chunks in an associations output queue, as
demonstrated by ASCONF probes, related to net/sctp/inqueue.c and
net/sctp/sm_statefuns.c (bnc#902351).
*
CVE-2014-7970: The pivot_root implementation in fs/namespace.c in
the Linux kernel did not properly interact with certain locations of a
chroot directory, which allowed local users to cause a denial of service
(mount-tree loop) via . (dot) values in both arguments to the pivot_root
system call (bnc#900644).
*
CVE-2014-3687: The sctp_assoc_lookup_asconf_ack function in
net/sctp/associola.c in the SCTP implementation in the Linux kernel
allowed remote attackers to cause a denial of service (panic) via
duplicate ASCONF chunks that trigger an incorrect uncork within the
side-effect interpreter (bnc#902349 904899).
The following non-security bugs have been fixed:
* ACPI idle: permit sparse C-state sub-state numbers
(bnc#908550,FATE#317933).
* ALSA : hda - not use assigned converters for all unused pins
(FATE#317933).
* ALSA: hda - Add Device IDs for Intel Wildcat Point-LP PCH
(FATE#317347).
* ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets
(FATE#317347).
* ALSA: hda - add PCI IDs for Intel BayTrail (FATE#317347).
* ALSA: hda - add PCI IDs for Intel Braswell (FATE#317347).
* ALSA: hda - add codec ID for Braswell display audio codec
(FATE#317933).
* ALSA: hda - add codec ID for Broadwell display audio codec
(FATE#317933).
* ALSA: hda - add codec ID for Valleyview2 display codec (FATE#317933).
* ALSA: hda - define is_haswell() to check if a display audio codec is
Haswell (FATE#317933).
* ALSA: hda - hdmi: Re-setup pin and infoframe on plug-in on all
codecs (FATE#317933).
* ALSA: hda - not choose assigned converters for unused pins of
Valleyview (FATE#317933).
* ALSA: hda - rename function not_share_unassigned_cvt() (FATE#317933).
* ALSA: hda - unmute pin amplifier in infoframe setup for Haswell
(FATE#317933).
* ALSA: hda - verify pin:converter connection on unsol event for HSW
and VLV (FATE#317933).
* ALSA: hda - verify pin:cvt connection on preparing a stream for
Intel HDMI codec (FATE#317933).
* ALSA: hda/hdmi - apply Valleyview fix-ups to Cherryview display
codec (FATE#317933).
* ALSA: hda/hdmi - apply all Haswell fix-ups to Broadwell display
codec (FATE#317933).
* ALSA: hda_intel: Add Device IDs for Intel Sunrise Point PCH
(FATE#317347).
* ALSA: hda_intel: Add DeviceIDs for Sunrise Point-LP (FATE#317347).
* Add support for AdvancedSilicon HID multitouch screen (2149:36b1)
(FATE#317933).
* Disable switching to bootsplash at oops/panic (bnc#877593).
* Do not trigger congestion wait on dirty-but-not-writeout pages (VM
Performance, bnc#909093, bnc#910517).
* Fix HDIO_DRIVE_* ioctl() regression (bnc#833588, bnc#905799)
* Fix Module.supported handling for external modules (bnc#905304).
* Fix zero freq if frequency is requested too quickly in a row
(bnc#908572).
* Fix zero freq if frequency is requested too quickly in a row
(bnc#908572).
* Fixup kABI after
patches.fixes/writeback-do-not-sync-data-dirtied-after-sync-start.patch (bn
c#833820).
* Force native backlight for HP POS machines (bnc#908551,FATE#317933).
* HID: use multi input quirk for 22b9:2968 (FATE#317933).
* IPoIB: Use a private hash table for path lookup in xmit path
(bsc#907196).
* Import kabi files from kernel 3.0.101-0.40
* KEYS: Fix stale key registration at error path (bnc#908163).
* NFS: Add sequence_priviliged_ops for nfs4_proc_sequence()
(bnc#864401).
* NFS: do not use STABLE writes during writeback (bnc#816099).
* NFSv4.1 handle DS stateid errors (bnc#864401).
* NFSv4.1: Do not decode skipped layoutgets (bnc#864411).
* NFSv4.1: Fix a race in the pNFS return-on-close code (bnc#864409).
* NFSv4.1: Fix an ABBA locking issue with session and state
serialisation (bnc#864409).
* NFSv4.1: We must release the sequence id when we fail to get a
session slot (bnc#864401).
* NFSv4: Do not accept delegated opens when a delegation recall is in
effect (bnc#864409).
* NFSv4: Ensure correct locking when accessing the "^a" list
(bnc#864401).
* NFSv4: Fix another reboot recovery race (bnc#916982).
* Preserve kabi checksum of path_is_under().
* Refresh patches.drivers/HID-multitouch-add-support-for-Atmel-212c.
Fix the non-working touchsreen (bnc#909740)
* Revert "drm/i915: Calculate correct stolen size for GEN7+"
(bnc#908550,FATE#317933).
* SUNRPC: Do not allow low priority tasks to pre-empt higher priority
ones (bnc#864401).
* SUNRPC: When changing the queue priority, ensure that we change the
owner (bnc#864401).
* Setting rbd and libceph as supported drivers (bsc#917884)
* The bug number in
patches.fixes/timekeeping-avoid-possible-deadlock-from-clock_was_set.patch
changed from bsc#771619 to bsc#915335.
* audit: efficiency fix 1: only wake up if queue shorter than backlog
limit (bnc#908393).
* audit: efficiency fix 2: request exclusive wait since all need same
resource (bnc#908393).
* audit: fix endless wait in audit_log_start() (bnc#908393).
* audit: make use of remaining sleep time from wait_for_auditd
(bnc#908393).
* audit: refactor hold queue flush (bnc#908393).
* audit: reset audit backlog wait time after error recovery
(bnc#908393).
* audit: wait_for_auditd() should use TASK_UNINTERRUPTIBLE
(bnc#908393).
* block: rbd: use NULL instead of 0 (FATE#318328 bsc#917884).
* block: replace strict_strtoul() with kstrtoul() (FATE#318328
bsc#917884).
* bonding: propagate LRO disabling down to slaves (bnc#829110
bnc#891277 bnc#904053).
* cciss: fix broken mutex usage in ioctl (bnc#910013).
* ceph: Add necessary clean up if invalid reply received in
handle_reply() (FATE#318328 bsc#917884).
* ceph: remove bogus extern (FATE#318328 bsc#917884).
* config: Disable CONFIG_RCU_FAST_NO_HZ (bnc#884817) This option has
been verified to be racy vs hotplug, and is irrelevant to SLE in any
case.
* coredump: ensure the fpu state is flushed for proper multi-threaded
core dump (bnc#904671).
* crush: CHOOSE_LEAF -> CHOOSELEAF throughout (FATE#318328 bsc#917884).
* crush: add SET_CHOOSE_TRIES rule step (FATE#318328 bsc#917884).
* crush: add note about r in recursive choose (FATE#318328 bsc#917884).
* crush: add set_choose_local_[fallback_]tries steps (FATE#318328
bsc#917884).
* crush: apply chooseleaf_tries to firstn mode too (FATE#318328
bsc#917884).
* crush: attempts -> tries (FATE#318328 bsc#917884).
* crush: clarify numrep vs endpos (FATE#318328 bsc#917884).
* crush: eliminate CRUSH_MAX_SET result size limitation (FATE#318328
bsc#917884).
* crush: factor out (trivial) crush_destroy_rule() (FATE#318328
bsc#917884).
* crush: fix crush_choose_firstn comment (FATE#318328 bsc#917884).
* crush: fix some comments (FATE#318328 bsc#917884).
* crush: generalize descend_once (FATE#318328 bsc#917884).
* crush: new SET_CHOOSE_LEAF_TRIES command (FATE#318328 bsc#917884).
* crush: pass parent r value for indep call (FATE#318328 bsc#917884).
* crush: pass weight vector size to map function (FATE#318328
bsc#917884).
* crush: reduce scope of some local variables (FATE#318328 bsc#917884).
* crush: return CRUSH_ITEM_UNDEF for failed placements with indep
(FATE#318328 bsc#917884).
* crush: strip firstn conditionals out of crush_choose, rename
(FATE#318328 bsc#917884).
* crush: use breadth-first search for indep mode (FATE#318328
bsc#917884).
* crypto: add missing crypto module aliases (bsc#914423).
* crypto: include crypto- module prefix in template (bsc#914423).
* crypto: kernel oops at insmod of the z90crypt device driver
(bnc#909088, LTC#119591).
* crypto: prefix module autoloading with "crypto-" (bsc#914423).
* dm raid: add region_size parameter (bnc#895841).
* do not do blind d_drop() in nfs_prime_dcache() (bnc#908069
bnc#896484).
* drm/cirrus: Fix cirrus drm driver for fbdev + qemu
(bsc#909846,bnc#856760).
* drm/i915: split PCI IDs out into i915_drm.h v4
(bnc#908550,FATE#317933).
* fix dcache exit scaling (bnc#876594).
* infiniband: ipoib: Sanitize neighbour handling in ipoib_main.c
(bsc#907196).
* iommu/vt-d: Fix an off-by-one bug in __domain_mapping() (bsc#908825).
* ipoib: Convert over to dev_lookup_neigh_skb() (bsc#907196).
* ipoib: Need to do dst_neigh_lookup_skb() outside of priv->lock
(bsc#907196).
* ipv6: fix net reference leak in IPv6 conntrack reassembly
(bnc#865419).
* isofs: Fix unchecked printing of ER records.
* kABI: protect console include in consolemap.
* kabi fix (bnc#864404).
* kabi, mm: prevent endless growth of anon_vma hierarchy (bnc#904242).
* kernel/audit.c: avoid negative sleep durations (bnc#908393).
* kernel: 3215 tty close crash (bnc#915209, LTC#120873).
* kernel: incorrect clock_gettime result (bnc#915209, LTC#121184).
* kvm: Do not expose MONITOR cpuid as available (bnc#887597)
* kvm: iommu: Add cond_resched to legacy device assignment code
(bnc#910159).
* libceph: CEPH_OSD_FLAG_* enum update (FATE#318328 bsc#917884).
* libceph: add ceph_kv{malloc,free}() and switch to them (FATE#318328
bsc#917884).
* libceph: add ceph_pg_pool_by_id() (FATE#318328 bsc#917884).
* libceph: add function to ensure notifies are complete (FATE#318328
bsc#917884).
* libceph: add process_one_ticket() helper (FATE#318328 bsc#917884).
* libceph: all features fields must be u64 (FATE#318328 bsc#917884).
* libceph: block I/O when PAUSE or FULL osd map flags are set
(FATE#318328 bsc#917884).
* libceph: call r_unsafe_callback when unsafe reply is received
(FATE#318328 bsc#917884).
* libceph: create_singlethread_workqueue() does not return ERR_PTRs
(FATE#318328 bsc#917884).
* libceph: do not hard code max auth ticket len (FATE#318328
bsc#917884).
* libceph: dout() is missing a newline (FATE#318328 bsc#917884).
* libceph: factor out logic from ceph_osdc_start_request()
(FATE#318328 bsc#917884).
* libceph: fix error handling in ceph_osdc_init() (FATE#318328
bsc#917884).
* libceph: fix preallocation check in get_reply() (FATE#318328
bsc#917884).
* libceph: fix safe completion (FATE#318328 bsc#917884).
* libceph: follow redirect replies from osds (FATE#318328 bsc#917884).
* libceph: follow {read,write}_tier fields on osd request submission
(FATE#318328 bsc#917884).
* libceph: gracefully handle large reply messages from the mon
(FATE#318328 bsc#917884).
* libceph: introduce and start using oid abstraction (FATE#318328
bsc#917884).
* libceph: rename MAX_OBJ_NAME_SIZE to CEPH_MAX_OID_NAME_LEN
(FATE#318328 bsc#917884).
* libceph: rename ceph_msg::front_max to front_alloc_len (FATE#318328
bsc#917884).
* libceph: rename ceph_osd_request::r_{oloc,oid} to r_base_{oloc,oid}
(FATE#318328 bsc#917884).
* libceph: rename front to front_len in get_reply() (FATE#318328
bsc#917884).
* libceph: replace ceph_calc_ceph_pg() with ceph_oloc_oid_to_pg()
(FATE#318328 bsc#917884).
* libceph: resend all writes after the osdmap loses the full flag
(FATE#318328 bsc#917884).
* libceph: start using oloc abstraction (FATE#318328 bsc#917884).
* libceph: take map_sem for read in handle_reply() (FATE#318328
bsc#917884).
* libceph: update ceph_features.h (FATE#318328 bsc#917884).
* libceph: use CEPH_MON_PORT when the specified port is 0 (FATE#318328
bsc#917884).
* libiscsi: Added new boot entries in the session sysfs (FATE#316723
bsc#914355)
* mei: ME hardware reset needs to be synchronized (bnc#876086).
* mei: add 9 series PCH mei device ids (bnc#876086).
* mei: add hw start callback (bnc#876086).
* mei: cancel stall timers in mei_reset (bnc#876086).
* mei: do not have to clean the state on power up (bnc#876086).
* mei: limit the number of consecutive resets (bnc#876086).
* mei: me: add Lynx Point Wellsburg work station device id
(bnc#876086).
* mei: me: clear interrupts on the resume path (bnc#876086).
* mei: me: do not load the driver if the FW does not support MEI
interface (bnc#876086).
* mei: me: fix hardware reset flow (bnc#876086).
* mei: me: read H_CSR after asserting reset (bnc#876086).
* mm, vmscan: prevent kswapd livelock due to pfmemalloc-throttled
process being killed (VM Functionality bnc#910150).
* mm: fix BUG in __split_huge_page_pmd (bnc#906586).
* mm: fix corner case in anon_vma endless growing prevention
(bnc#904242).
* mm: prevent endless growth of anon_vma hierarchy (bnc#904242).
* mm: vmscan: count only dirty pages as congested (VM Performance,
bnc#910517).
* net, sunrpc: suppress allocation warning in rpc_malloc()
(bnc#904659).
* net: 8021q/bluetooth/bridge/can/ceph: Remove extern from function
prototypes (FATE#318328 bsc#917884).
* net: handle more general stacking in dev_disable_lro() (bnc#829110
bnc#891277 bnc#904053).
* netfilter: do not drop packet on insert collision (bnc#907611).
* nf_conntrack: avoid reference leak in __ipv6_conntrack_in()
(bnc#865419).
* nfs_prime_dcache needs fh to be set (bnc#908069 bnc#896484).
* nfsd: fix EXDEV checking in rename (bnc#915791).
* pnfs: defer release of pages in layoutget (bnc#864411).
* proc_sys_revalidate: fix Oops on NULL nameidata (bnc#907551).
* qlge: fix an "&&" vs "||" bug (bsc#912171).
* rbd: Fix error recovery in rbd_obj_read_sync() (FATE#318328
bsc#917884).
* rbd: Use min_t() to fix comparison of distinct pointer types warning
(FATE#318328 bsc#917884).
* rbd: add "minor" sysfs rbd device attribute (FATE#318328 bsc#917884).
* rbd: add support for single-major device number allocation scheme
(FATE#318328 bsc#917884).
* rbd: clean up a few things in the refresh path (FATE#318328
bsc#917884).
* rbd: complete notifies before cleaning up osd_client and rbd_dev
(FATE#318328 bsc#917884).
* rbd: do not destroy ceph_opts in rbd_add() (FATE#318328 bsc#917884).
* rbd: do not hold ctl_mutex to get/put device (FATE#318328
bsc#917884).
* rbd: drop an unsafe assertion (FATE#318328 bsc#917884).
* rbd: drop original request earlier for existence check (FATE#318328
bsc#917884).
* rbd: enable extended devt in single-major mode (FATE#318328
bsc#917884).
* rbd: fetch object order before using it (FATE#318328 bsc#917884).
* rbd: fix I/O error propagation for reads (FATE#318328 bsc#917884).
* rbd: fix a couple warnings (FATE#318328 bsc#917884).
* rbd: fix buffer size for writes to images with snapshots
(FATE#318328 bsc#917884).
* rbd: fix cleanup in rbd_add() (FATE#318328 bsc#917884).
* rbd: fix error handling from rbd_snap_name() (FATE#318328
bsc#917884).
* rbd: fix error paths in rbd_img_request_fill() (FATE#318328
bsc#917884).
* rbd: fix null dereference in dout (FATE#318328 bsc#917884).
* rbd: fix use-after free of rbd_dev->disk (FATE#318328 bsc#917884).
* rbd: flush dcache after zeroing page data (FATE#318328 bsc#917884).
* rbd: ignore unmapped snapshots that no longer exist (FATE#318328
bsc#917884).
* rbd: introduce rbd_dev_header_unwatch_sync() and switch to it
(FATE#318328 bsc#917884).
* rbd: make rbd_obj_notify_ack() synchronous (FATE#318328 bsc#917884).
* rbd: protect against concurrent unmaps (FATE#318328 bsc#917884).
* rbd: protect against duplicate client creation (FATE#318328
bsc#917884).
* rbd: rbd_device::dev_id is an int, format it as such (FATE#318328
bsc#917884).
* rbd: refactor rbd_init() a bit (FATE#318328 bsc#917884).
* rbd: send snapshot context with writes (FATE#318328 bsc#917884).
* rbd: set removing flag while holding list lock (FATE#318328
bsc#917884).
* rbd: switch to ida for rbd id assignments (FATE#318328 bsc#917884).
* rbd: take a little credit (FATE#318328 bsc#917884).
* rbd: tear down watch request if rbd_dev_device_setup() fails
(FATE#318328 bsc#917884).
* rbd: tweak "loaded" message and module description (FATE#318328
bsc#917884).
* rbd: use reference counts for image requests (FATE#318328
bsc#917884).
* rbd: use rwsem to protect header updates (FATE#318328 bsc#917884).
* rbd: use the correct length for format 2 object names (FATE#318328
bsc#917884).
* rpm/kernel-binary.spec.in: Own the modules directory in the devel
package (bnc#910322)
* scsi_dh_alua: add missing hunk in alua_set_params() (bnc#846656).
* scsifront: avoid acquiring same lock twice if ring is full.
* sd: medium access timeout counter fails to reset (bnc#894213).
* storvsc: ring buffer failures may result in I/O freeze
* swap: fix shmem swapping when more than 8 areas (bnc#903096).
* timekeeping: Avoid possible deadlock from clock_was_set_delayed
(bsc#771619).
* tty: Fix memory leak in virtual console when enable unicode
translation (bnc#916515).
* udf: Check component length before reading it.
* udf: Check path length when reading symlink.
* udf: Verify i_size when loading inode.
* udf: Verify symlink size before loading it.
* udp: Add MIB counters for rcvbuferrors (bnc#909565).
* usb: xhci: rework root port wake bits if controller is not allowed
to wakeup (bsc#909264).
* virtio_net: drop dst reference before transmitting a packet
(bnc#882470).
* vt: push the tty_lock down into the map handling (bnc#915826).
* workqueue: Make rescuer thread process more works (bnc#900279).
* x86, xsave: remove thread_has_fpu() bug check in
__sanitize_i387_state() (bnc#904671).
* x86-64/MCE: flip CPU and bank numbers in log message.
* x86/UV: Fix NULL pointer dereference in uv_flush_tlb_others() if the
"^a" boot option is used (bsc#909092).
* x86/UV: Fix conditional in gru_exit() (bsc#909095).
* x86/early quirk: use gen6 stolen detection for VLV
(bnc#908550,FATE#317933).
* x86/gpu: Print the Intel graphics stolen memory range (bnc#908550).
* x86/hpet: Make boot_hpet_disable extern (bnc#908550,FATE#317933).
* x86/intel: Add quirk to disable HPET for the Baytrail platform
(bnc#908550,FATE#317933).
* x86/uv: Fix UV2 BAU legacy mode (bsc#909092).
* x86/uv: Fix the UV BAU destination timeout period (bsc#909092).
* x86/uv: Implement UV BAU runtime enable and disable control via
/proc/sgi_uv/ (bsc#909092).
* x86/uv: Update the UV3 TLB shootdown logic (bsc#909092).
* x86/uv: Work around UV2 BAU hangs (bsc#909092).
* x86: UV BAU: Avoid NULL pointer reference in ptc_seq_show
(bsc#911181).
* x86: UV BAU: Increase maximum CPUs per socket/hub (bsc#911181).
* x86: add early quirk for reserving Intel graphics stolen memory v5
(bnc#908550,FATE#317933).
* x86: irq: Check for valid irq descriptor in
check_irq_vectors_for_cpu_disable (bnc#914726).
* xen-privcmd-hcall-preemption: Fix EFLAGS.IF access.
* xfs: re-enable non-blocking behaviour in xfs_map_blocks (bnc#900279).
* xfs: recheck buffer pinned status after push trylock failure
(bnc#907338).
* xfs: remove log force from xfs_buf_trylock() (bnc#907338).
* xhci: fix incorrect type in assignment in
handle_device_notification() (bsc#910321).
* zcrypt: Number of supported ap domains is not retrievable
(bnc#915209, LTC#120788).
Security Issues:
* CVE-2013-7263
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7263>
* CVE-2014-0181
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0181>
* CVE-2014-3687
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3687>
* CVE-2014-3688
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3688>
* CVE-2014-3690
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3690>
* CVE-2014-4608
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4608>
* CVE-2014-7822
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7822>
* CVE-2014-7842
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7842>
* CVE-2014-7970
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7970>
* CVE-2014-8133
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133>
* CVE-2014-8134
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8134>
* CVE-2014-8160
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8160>
* CVE-2014-8369
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8369>
* CVE-2014-8559
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8559>
* CVE-2014-9090
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9090>
* CVE-2014-9322
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322>
* CVE-2014-9419
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9419>
* CVE-2014-9420
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9420>
* CVE-2014-9584
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9584>
* CVE-2014-9585
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9585>
* CVE-2015-1593
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1593>
Indications:
Everyone using the Real Time Linux Kernel on x86_64 architecture should update.
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Real Time Extension 11 SP3:
zypper in -t patch slertesp3-kernel=10569
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Real Time Extension 11 SP3 (x86_64) [New Version: 3.0.101.rt130]:
cluster-network-kmp-rt-1.4_3.0.101_rt130_0.33.36-2.28.1.14
cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.33.36-2.28.1.14
drbd-kmp-rt-8.4.4_3.0.101_rt130_0.33.36-0.23.1.14
drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.33.36-0.23.1.14
iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.33.36-0.39.1.14
iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.33.36-0.39.1.14
kernel-rt-3.0.101.rt130-0.33.36.1
kernel-rt-base-3.0.101.rt130-0.33.36.1
kernel-rt-devel-3.0.101.rt130-0.33.36.1
kernel-rt_trace-3.0.101.rt130-0.33.36.1
kernel-rt_trace-base-3.0.101.rt130-0.33.36.1
kernel-rt_trace-devel-3.0.101.rt130-0.33.36.1
kernel-source-rt-3.0.101.rt130-0.33.36.1
kernel-syms-rt-3.0.101.rt130-0.33.36.1
lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.33.36-0.12.1.13
lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.33.36-0.12.1.13
ocfs2-kmp-rt-1.6_3.0.101_rt130_0.33.36-0.21.1.14
ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.33.36-0.21.1.14
ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.33.36-0.14.1.14
ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.33.36-0.14.1.14
References:
https://www.suse.com/security/cve/CVE-2013-7263.html
https://www.suse.com/security/cve/CVE-2014-0181.html
https://www.suse.com/security/cve/CVE-2014-3687.html
https://www.suse.com/security/cve/CVE-2014-3688.html
https://www.suse.com/security/cve/CVE-2014-3690.html
https://www.suse.com/security/cve/CVE-2014-4608.html
https://www.suse.com/security/cve/CVE-2014-7822.html
https://www.suse.com/security/cve/CVE-2014-7842.html
https://www.suse.com/security/cve/CVE-2014-7970.html
https://www.suse.com/security/cve/CVE-2014-8133.html
https://www.suse.com/security/cve/CVE-2014-8134.html
https://www.suse.com/security/cve/CVE-2014-8160.html
https://www.suse.com/security/cve/CVE-2014-8369.html
https://www.suse.com/security/cve/CVE-2014-8559.html
https://www.suse.com/security/cve/CVE-2014-9090.html
https://www.suse.com/security/cve/CVE-2014-9322.html
https://www.suse.com/security/cve/CVE-2014-9419.html
https://www.suse.com/security/cve/CVE-2014-9420.html
https://www.suse.com/security/cve/CVE-2014-9584.html
https://www.suse.com/security/cve/CVE-2014-9585.html
https://www.suse.com/security/cve/CVE-2015-1593.html
https://bugzilla.suse.com/771619
https://bugzilla.suse.com/816099
https://bugzilla.suse.com/829110
https://bugzilla.suse.com/833588
https://bugzilla.suse.com/833820
https://bugzilla.suse.com/846656
https://bugzilla.suse.com/853040
https://bugzilla.suse.com/856760
https://bugzilla.suse.com/864401
https://bugzilla.suse.com/864404
https://bugzilla.suse.com/864409
https://bugzilla.suse.com/864411
https://bugzilla.suse.com/865419
https://bugzilla.suse.com/875051
https://bugzilla.suse.com/876086
https://bugzilla.suse.com/876594
https://bugzilla.suse.com/877593
https://bugzilla.suse.com/882470
https://bugzilla.suse.com/883948
https://bugzilla.suse.com/884817
https://bugzilla.suse.com/887597
https://bugzilla.suse.com/891277
https://bugzilla.suse.com/894213
https://bugzilla.suse.com/895841
https://bugzilla.suse.com/896484
https://bugzilla.suse.com/900279
https://bugzilla.suse.com/900644
https://bugzilla.suse.com/902232
https://bugzilla.suse.com/902349
https://bugzilla.suse.com/902351
https://bugzilla.suse.com/902675
https://bugzilla.suse.com/903096
https://bugzilla.suse.com/903640
https://bugzilla.suse.com/904053
https://bugzilla.suse.com/904242
https://bugzilla.suse.com/904659
https://bugzilla.suse.com/904671
https://bugzilla.suse.com/905304
https://bugzilla.suse.com/905312
https://bugzilla.suse.com/905799
https://bugzilla.suse.com/906586
https://bugzilla.suse.com/907196
https://bugzilla.suse.com/907338
https://bugzilla.suse.com/907551
https://bugzilla.suse.com/907611
https://bugzilla.suse.com/907818
https://bugzilla.suse.com/908069
https://bugzilla.suse.com/908163
https://bugzilla.suse.com/908393
https://bugzilla.suse.com/908550
https://bugzilla.suse.com/908551
https://bugzilla.suse.com/908572
https://bugzilla.suse.com/908825
https://bugzilla.suse.com/909077
https://bugzilla.suse.com/909078
https://bugzilla.suse.com/909088
https://bugzilla.suse.com/909092
https://bugzilla.suse.com/909093
https://bugzilla.suse.com/909095
https://bugzilla.suse.com/909264
https://bugzilla.suse.com/909565
https://bugzilla.suse.com/909740
https://bugzilla.suse.com/909846
https://bugzilla.suse.com/910013
https://bugzilla.suse.com/910150
https://bugzilla.suse.com/910159
https://bugzilla.suse.com/910251
https://bugzilla.suse.com/910321
https://bugzilla.suse.com/910322
https://bugzilla.suse.com/910517
https://bugzilla.suse.com/911181
https://bugzilla.suse.com/911325
https://bugzilla.suse.com/911326
https://bugzilla.suse.com/912171
https://bugzilla.suse.com/912705
https://bugzilla.suse.com/913059
https://bugzilla.suse.com/914355
https://bugzilla.suse.com/914423
https://bugzilla.suse.com/914726
https://bugzilla.suse.com/915209
https://bugzilla.suse.com/915322
https://bugzilla.suse.com/915335
https://bugzilla.suse.com/915791
https://bugzilla.suse.com/915826
https://bugzilla.suse.com/916515
https://bugzilla.suse.com/916982
https://bugzilla.suse.com/917839
https://bugzilla.suse.com/917884
https://bugzilla.suse.com/920250
https://bugzilla.suse.com/924282
https://download.suse.com/patch/finder/?keywords=6ac65f6e9ab5fc78350f4042c5…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0

[security-announce] openSUSE-SU-2015:0732-1: important: Security update for xen
by opensuse-security@opensuse.org 20 Apr '15
by opensuse-security@opensuse.org 20 Apr '15
20 Apr '15
openSUSE Security Update: Security update for xen
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:0732-1
Rating: important
References: #861318 #895528 #901488 #903680 #910254 #918995
#918998 #919098 #919464 #919663 #922705 #922706
Cross-References: CVE-2014-3615 CVE-2015-2044 CVE-2015-2045
CVE-2015-2151 CVE-2015-2152 CVE-2015-2752
…
[View More] CVE-2015-2756
Affected Products:
openSUSE 13.1
______________________________________________________________________________
An update that solves 7 vulnerabilities and has 5 fixes is
now available.
Description:
Xen was updated to 4.3.4 to fix multiple vulnerabities and non-security
bugs.
The following vulnerabilities were fixed:
- Long latency MMIO mapping operations are not preemptible (XSA-125
CVE-2015-2752 bnc#922705)
- Unmediated PCI command register access in qemu (XSA-126 CVE-2015-2756
bnc#922706)
- Hypervisor memory corruption due to x86 emulator flaw (bnc#919464
CVE-2015-2151 XSA-123)
- Information leak through version information hypercall (bnc#918998
CVE-2015-2045 XSA-122)
- Information leak via internal x86 system device emulation (bnc#918995
(CVE-2015-2044 XSA-121)
- HVM qemu unexpectedly enabling emulated VGA graphics backends
(bnc#919663 CVE-2015-2152 XSA-119)
- information leakage when guest sets high resolution (bnc#895528
CVE-2014-3615)
The following non-security bugs were fixed:
- L3: XEN blktap device intermittently fails to connect (bnc#919098)
- Problems with detecting free loop devices on Xen guest startup
(bnc#903680)
- xentop reports "Found interface vif101.0 but domain 101 does not exist."
(bnc#861318)
- Intel ixgbe driver assigns rx/tx queues per core resulting in irq
problems on servers with a large amount of CPU cores (bnc#901488)
- SLES11 SP3 Xen VT-d igb NIC doesn't work (bnc#910254)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2015-314=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
xen-debugsource-4.3.4_02-41.1
xen-devel-4.3.4_02-41.1
xen-kmp-default-4.3.4_02_k3.11.10_29-41.1
xen-kmp-default-debuginfo-4.3.4_02_k3.11.10_29-41.1
xen-kmp-desktop-4.3.4_02_k3.11.10_29-41.1
xen-kmp-desktop-debuginfo-4.3.4_02_k3.11.10_29-41.1
xen-libs-4.3.4_02-41.1
xen-libs-debuginfo-4.3.4_02-41.1
xen-tools-domU-4.3.4_02-41.1
xen-tools-domU-debuginfo-4.3.4_02-41.1
- openSUSE 13.1 (x86_64):
xen-4.3.4_02-41.1
xen-doc-html-4.3.4_02-41.1
xen-libs-32bit-4.3.4_02-41.1
xen-libs-debuginfo-32bit-4.3.4_02-41.1
xen-tools-4.3.4_02-41.1
xen-tools-debuginfo-4.3.4_02-41.1
xen-xend-tools-4.3.4_02-41.1
xen-xend-tools-debuginfo-4.3.4_02-41.1
- openSUSE 13.1 (i586):
xen-kmp-pae-4.3.4_02_k3.11.10_29-41.1
xen-kmp-pae-debuginfo-4.3.4_02_k3.11.10_29-41.1
References:
https://www.suse.com/security/cve/CVE-2014-3615.html
https://www.suse.com/security/cve/CVE-2015-2044.html
https://www.suse.com/security/cve/CVE-2015-2045.html
https://www.suse.com/security/cve/CVE-2015-2151.html
https://www.suse.com/security/cve/CVE-2015-2152.html
https://www.suse.com/security/cve/CVE-2015-2752.html
https://www.suse.com/security/cve/CVE-2015-2756.html
https://bugzilla.suse.com/861318
https://bugzilla.suse.com/895528
https://bugzilla.suse.com/901488
https://bugzilla.suse.com/903680
https://bugzilla.suse.com/910254
https://bugzilla.suse.com/918995
https://bugzilla.suse.com/918998
https://bugzilla.suse.com/919098
https://bugzilla.suse.com/919464
https://bugzilla.suse.com/919663
https://bugzilla.suse.com/922705
https://bugzilla.suse.com/922706
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0

[security-announce] openSUSE-SU-2015:0725-1: important: Security update for Adobe Flash Player
by opensuse-security@opensuse.org 16 Apr '15
by opensuse-security@opensuse.org 16 Apr '15
16 Apr '15
openSUSE Security Update: Security update for Adobe Flash Player
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:0725-1
Rating: important
References: #856386 #901334 #905032 #907257 #909219 #913057
#914333 #914463 #922033 #927089
Cross-References: CVE-2014-0558 CVE-2014-0564 CVE-2014-0569
CVE-2014-0573 CVE-2014-0574 CVE-2014-0576
CVE-2014-0577 …
[View More]CVE-2014-0581 CVE-2014-0582
CVE-2014-0583 CVE-2014-0584 CVE-2014-0585
CVE-2014-0586 CVE-2014-0588 CVE-2014-0589
CVE-2014-0590 CVE-2014-8437 CVE-2014-8438
CVE-2014-8440 CVE-2014-8441 CVE-2014-8442
CVE-2015-0331 CVE-2015-0332 CVE-2015-0346
CVE-2015-0347 CVE-2015-0348 CVE-2015-0349
CVE-2015-0350 CVE-2015-0351 CVE-2015-0352
CVE-2015-0353 CVE-2015-0354 CVE-2015-0355
CVE-2015-0356 CVE-2015-0357 CVE-2015-0358
CVE-2015-0359 CVE-2015-0360 CVE-2015-3038
CVE-2015-3039 CVE-2015-3040 CVE-2015-3041
CVE-2015-3042 CVE-2015-3043 CVE-2015-3044
Affected Products:
openSUSE Evergreen 11.4
______________________________________________________________________________
An update that fixes 45 vulnerabilities is now available.
Description:
Adobe Flash Player was updated to 11.2.202.457 to fix several security
issues that could lead to remote code execution.
An exploit for CVE-2015-3043 was reported to exist in the wild.
The following vulnerabilities were fixed:
* Memory corruption vulnerabilities that could lead to code execution
(CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353,
CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038,
CVE-2015-3041, CVE-2015-3042, CVE-2015-3043).
* Type confusion vulnerability that could lead to code execution
(CVE-2015-0356).
* Buffer overflow vulnerability that could lead to code execution
(CVE-2015-0348).
* Use-after-free vulnerabilities that could lead to code execution
(CVE-2015-0349, CVE-2015-0351, CVE-2015-0358, CVE-2015-3039).
* Double-free vulnerabilities that could lead to code execution
(CVE-2015-0346, CVE-2015-0359).
* Memory leak vulnerabilities that could be used to bypass ASLR
(CVE-2015-0357, CVE-2015-3040).
* Security bypass vulnerability that could lead to information disclosure
(CVE-2015-3044)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE Evergreen 11.4:
zypper in -t patch 2015-13=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE Evergreen 11.4 (i586 x86_64):
flash-player-11.2.202.457-158.1
flash-player-gnome-11.2.202.457-158.1
flash-player-kde4-11.2.202.457-158.1
References:
https://www.suse.com/security/cve/CVE-2014-0558.html
https://www.suse.com/security/cve/CVE-2014-0564.html
https://www.suse.com/security/cve/CVE-2014-0569.html
https://www.suse.com/security/cve/CVE-2014-0573.html
https://www.suse.com/security/cve/CVE-2014-0574.html
https://www.suse.com/security/cve/CVE-2014-0576.html
https://www.suse.com/security/cve/CVE-2014-0577.html
https://www.suse.com/security/cve/CVE-2014-0581.html
https://www.suse.com/security/cve/CVE-2014-0582.html
https://www.suse.com/security/cve/CVE-2014-0583.html
https://www.suse.com/security/cve/CVE-2014-0584.html
https://www.suse.com/security/cve/CVE-2014-0585.html
https://www.suse.com/security/cve/CVE-2014-0586.html
https://www.suse.com/security/cve/CVE-2014-0588.html
https://www.suse.com/security/cve/CVE-2014-0589.html
https://www.suse.com/security/cve/CVE-2014-0590.html
https://www.suse.com/security/cve/CVE-2014-8437.html
https://www.suse.com/security/cve/CVE-2014-8438.html
https://www.suse.com/security/cve/CVE-2014-8440.html
https://www.suse.com/security/cve/CVE-2014-8441.html
https://www.suse.com/security/cve/CVE-2014-8442.html
https://www.suse.com/security/cve/CVE-2015-0331.html
https://www.suse.com/security/cve/CVE-2015-0332.html
https://www.suse.com/security/cve/CVE-2015-0346.html
https://www.suse.com/security/cve/CVE-2015-0347.html
https://www.suse.com/security/cve/CVE-2015-0348.html
https://www.suse.com/security/cve/CVE-2015-0349.html
https://www.suse.com/security/cve/CVE-2015-0350.html
https://www.suse.com/security/cve/CVE-2015-0351.html
https://www.suse.com/security/cve/CVE-2015-0352.html
https://www.suse.com/security/cve/CVE-2015-0353.html
https://www.suse.com/security/cve/CVE-2015-0354.html
https://www.suse.com/security/cve/CVE-2015-0355.html
https://www.suse.com/security/cve/CVE-2015-0356.html
https://www.suse.com/security/cve/CVE-2015-0357.html
https://www.suse.com/security/cve/CVE-2015-0358.html
https://www.suse.com/security/cve/CVE-2015-0359.html
https://www.suse.com/security/cve/CVE-2015-0360.html
https://www.suse.com/security/cve/CVE-2015-3038.html
https://www.suse.com/security/cve/CVE-2015-3039.html
https://www.suse.com/security/cve/CVE-2015-3040.html
https://www.suse.com/security/cve/CVE-2015-3041.html
https://www.suse.com/security/cve/CVE-2015-3042.html
https://www.suse.com/security/cve/CVE-2015-3043.html
https://www.suse.com/security/cve/CVE-2015-3044.html
https://bugzilla.suse.com/856386
https://bugzilla.suse.com/901334
https://bugzilla.suse.com/905032
https://bugzilla.suse.com/907257
https://bugzilla.suse.com/909219
https://bugzilla.suse.com/913057
https://bugzilla.suse.com/914333
https://bugzilla.suse.com/914463
https://bugzilla.suse.com/922033
https://bugzilla.suse.com/927089
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0

[security-announce] SUSE-SU-2015:0723-1: important: Security update for flash-player
by opensuse-security@opensuse.org 15 Apr '15
by opensuse-security@opensuse.org 15 Apr '15
15 Apr '15
SUSE Security Update: Security update for flash-player
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0723-1
Rating: important
References: #927089
Cross-References: CVE-2015-0346 CVE-2015-0347 CVE-2015-0348
CVE-2015-0349 CVE-2015-0350 CVE-2015-0351
CVE-2015-0352 CVE-2015-0353 CVE-2015-0354
CVE-2015-0355 CVE-2015-0356 CVE-2015-0357
…
[View More] CVE-2015-0358 CVE-2015-0359 CVE-2015-0360
CVE-2015-3038 CVE-2015-3039 CVE-2015-3040
CVE-2015-3041 CVE-2015-3042 CVE-2015-3043
CVE-2015-3044
Affected Products:
SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________
An update that fixes 22 vulnerabilities is now available.
It includes one version update.
Description:
Adobe Flash Player was updated to version 11.2.202.457 to fix several
security issues that could have lead to remote code execution.
An exploit for CVE-2015-3043 was reported to exist in the wild.
The following vulnerabilities have been fixed:
* Memory corruption vulnerabilities that could have lead to code
execution (CVE-2015-0347, CVE-2015-0350, CVE-2015-0352,
CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360,
CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, CVE-2015-3043).
* Type confusion vulnerability that could have lead to code execution
(CVE-2015-0356).
* Buffer overflow vulnerability that could have lead to code execution
(CVE-2015-0348).
* Use-after-free vulnerabilities that could have lead to code
execution (CVE-2015-0349, CVE-2015-0351, CVE-2015-0358,
CVE-2015-3039).
* Double-free vulnerabilities that could have lead to code execution
(CVE-2015-0346, CVE-2015-0359).
* Memory leak vulnerabilities that could have been used to bypass ASLR
(CVE-2015-0357, CVE-2015-3040).
* Security bypass vulnerability that could have lead to information
disclosure (CVE-2015-3044).
Security Issues:
* CVE-2015-0346
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0346>
* CVE-2015-0347
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0347>
* CVE-2015-0348
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0348>
* CVE-2015-0349
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0349>
* CVE-2015-0350
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0350>
* CVE-2015-0351
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0351>
* CVE-2015-0352
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0352>
* CVE-2015-0353
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0353>
* CVE-2015-0354
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0354>
* CVE-2015-0355
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0355>
* CVE-2015-0356
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0356>
* CVE-2015-0357
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0357>
* CVE-2015-0358
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0358>
* CVE-2015-0359
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0359>
* CVE-2015-0360
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0360>
* CVE-2015-3038
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3038>
* CVE-2015-3039
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3039>
* CVE-2015-3040
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3040>
* CVE-2015-3041
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3041>
* CVE-2015-3042
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3042>
* CVE-2015-3043
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3043>
* CVE-2015-3044
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3044>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-flash-player=10615
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 11.2.202.457]:
flash-player-11.2.202.457-0.3.1
flash-player-gnome-11.2.202.457-0.3.1
flash-player-kde4-11.2.202.457-0.3.1
References:
https://www.suse.com/security/cve/CVE-2015-0346.html
https://www.suse.com/security/cve/CVE-2015-0347.html
https://www.suse.com/security/cve/CVE-2015-0348.html
https://www.suse.com/security/cve/CVE-2015-0349.html
https://www.suse.com/security/cve/CVE-2015-0350.html
https://www.suse.com/security/cve/CVE-2015-0351.html
https://www.suse.com/security/cve/CVE-2015-0352.html
https://www.suse.com/security/cve/CVE-2015-0353.html
https://www.suse.com/security/cve/CVE-2015-0354.html
https://www.suse.com/security/cve/CVE-2015-0355.html
https://www.suse.com/security/cve/CVE-2015-0356.html
https://www.suse.com/security/cve/CVE-2015-0357.html
https://www.suse.com/security/cve/CVE-2015-0358.html
https://www.suse.com/security/cve/CVE-2015-0359.html
https://www.suse.com/security/cve/CVE-2015-0360.html
https://www.suse.com/security/cve/CVE-2015-3038.html
https://www.suse.com/security/cve/CVE-2015-3039.html
https://www.suse.com/security/cve/CVE-2015-3040.html
https://www.suse.com/security/cve/CVE-2015-3041.html
https://www.suse.com/security/cve/CVE-2015-3042.html
https://www.suse.com/security/cve/CVE-2015-3043.html
https://www.suse.com/security/cve/CVE-2015-3044.html
https://bugzilla.suse.com/927089
https://download.suse.com/patch/finder/?keywords=93ace65cf2a9138aed0ed06c86…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0

[security-announce] SUSE-SU-2015:0722-1: important: Security update for Adobe Flash Player
by opensuse-security@opensuse.org 15 Apr '15
by opensuse-security@opensuse.org 15 Apr '15
15 Apr '15
SUSE Security Update: Security update for Adobe Flash Player
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0722-1
Rating: important
References: #927089
Cross-References: CVE-2015-0346 CVE-2015-0347 CVE-2015-0348
CVE-2015-0349 CVE-2015-0350 CVE-2015-0351
CVE-2015-0352 CVE-2015-0353 CVE-2015-0354
CVE-2015-0355 CVE-2015-0356 CVE-2015-0357
…
[View More] CVE-2015-0358 CVE-2015-0359 CVE-2015-0360
CVE-2015-3038 CVE-2015-3039 CVE-2015-3040
CVE-2015-3041 CVE-2015-3042 CVE-2015-3043
CVE-2015-3044
Affected Products:
SUSE Linux Enterprise Workstation Extension 12
SUSE Linux Enterprise Desktop 12
______________________________________________________________________________
An update that fixes 22 vulnerabilities is now available.
Description:
Adobe Flash Player was updated to 11.2.202.457 to fix several security
issues that could lead to remote code execution.
An exploit for CVE-2015-3043 was reported to exist in the wild.
The following vulnerabilities were fixed:
* Memory corruption vulnerabilities that could lead to code execution
(CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353,
CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038,
CVE-2015-3041, CVE-2015-3042, CVE-2015-3043).
* Type confusion vulnerability that could lead to code execution
(CVE-2015-0356).
* Buffer overflow vulnerability that could lead to code execution
(CVE-2015-0348).
* Use-after-free vulnerabilities that could lead to code execution
(CVE-2015-0349, CVE-2015-0351, CVE-2015-0358, CVE-2015-3039).
* Double-free vulnerabilities that could lead to code execution
(CVE-2015-0346, CVE-2015-0359).
* Memory leak vulnerabilities that could be used to bypass ASLR
(CVE-2015-0357, CVE-2015-3040).
* Security bypass vulnerability that could lead to information disclosure
(CVE-2015-3044).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12:
zypper in -t patch SUSE-SLE-WE-12-2015-167=1
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2015-167=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12 (i586 x86_64):
flash-player-11.2.202.457-80.1
flash-player-gnome-11.2.202.457-80.1
- SUSE Linux Enterprise Desktop 12 (i586 x86_64):
flash-player-11.2.202.457-80.1
flash-player-gnome-11.2.202.457-80.1
References:
https://www.suse.com/security/cve/CVE-2015-0346.html
https://www.suse.com/security/cve/CVE-2015-0347.html
https://www.suse.com/security/cve/CVE-2015-0348.html
https://www.suse.com/security/cve/CVE-2015-0349.html
https://www.suse.com/security/cve/CVE-2015-0350.html
https://www.suse.com/security/cve/CVE-2015-0351.html
https://www.suse.com/security/cve/CVE-2015-0352.html
https://www.suse.com/security/cve/CVE-2015-0353.html
https://www.suse.com/security/cve/CVE-2015-0354.html
https://www.suse.com/security/cve/CVE-2015-0355.html
https://www.suse.com/security/cve/CVE-2015-0356.html
https://www.suse.com/security/cve/CVE-2015-0357.html
https://www.suse.com/security/cve/CVE-2015-0358.html
https://www.suse.com/security/cve/CVE-2015-0359.html
https://www.suse.com/security/cve/CVE-2015-0360.html
https://www.suse.com/security/cve/CVE-2015-3038.html
https://www.suse.com/security/cve/CVE-2015-3039.html
https://www.suse.com/security/cve/CVE-2015-3040.html
https://www.suse.com/security/cve/CVE-2015-3041.html
https://www.suse.com/security/cve/CVE-2015-3042.html
https://www.suse.com/security/cve/CVE-2015-3043.html
https://www.suse.com/security/cve/CVE-2015-3044.html
https://bugzilla.suse.com/927089
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0

[security-announce] openSUSE-SU-2015:0718-1: important: Security update for Adobe Flash Player
by opensuse-security@opensuse.org 15 Apr '15
by opensuse-security@opensuse.org 15 Apr '15
15 Apr '15
openSUSE Security Update: Security update for Adobe Flash Player
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:0718-1
Rating: important
References: #927089
Cross-References: CVE-2015-0346 CVE-2015-0347 CVE-2015-0348
CVE-2015-0349 CVE-2015-0350 CVE-2015-0351
CVE-2015-0352 CVE-2015-0353 CVE-2015-0354
CVE-2015-0355 CVE-2015-0356 CVE-2015-0357
…
[View More] CVE-2015-0358 CVE-2015-0359 CVE-2015-0360
CVE-2015-3038 CVE-2015-3039 CVE-2015-3040
CVE-2015-3041 CVE-2015-3042 CVE-2015-3043
CVE-2015-3044
Affected Products:
openSUSE 13.2:NonFree
openSUSE 13.1:NonFree
______________________________________________________________________________
An update that fixes 22 vulnerabilities is now available.
Description:
Adobe Flash Player was updated to 11.2.202.457 to fix several security
issues that could lead to remote code execution.
An exploit for CVE-2015-3043 was reported to exist in the wild.
The following vulnerabilities were fixed:
* Memory corruption vulnerabilities that could lead to code execution
(CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353,
CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038,
CVE-2015-3041, CVE-2015-3042, CVE-2015-3043).
* Type confusion vulnerability that could lead to code execution
(CVE-2015-0356).
* Buffer overflow vulnerability that could lead to code execution
(CVE-2015-0348).
* Use-after-free vulnerabilities that could lead to code execution
(CVE-2015-0349, CVE-2015-0351, CVE-2015-0358, CVE-2015-3039).
* Double-free vulnerabilities that could lead to code execution
(CVE-2015-0346, CVE-2015-0359).
* Memory leak vulnerabilities that could be used to bypass ASLR
(CVE-2015-0357, CVE-2015-3040).
* Security bypass vulnerability that could lead to information disclosure
(CVE-2015-3044).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:NonFree:
zypper in -t patch openSUSE-2015-304=1
- openSUSE 13.1:NonFree:
zypper in -t patch openSUSE-2015-304=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2:NonFree (i586 x86_64):
flash-player-11.2.202.457-2.48.1
flash-player-gnome-11.2.202.457-2.48.1
flash-player-kde4-11.2.202.457-2.48.1
- openSUSE 13.1:NonFree (i586 x86_64):
flash-player-11.2.202.457-113.1
flash-player-gnome-11.2.202.457-113.1
flash-player-kde4-11.2.202.457-113.1
References:
https://www.suse.com/security/cve/CVE-2015-0346.html
https://www.suse.com/security/cve/CVE-2015-0347.html
https://www.suse.com/security/cve/CVE-2015-0348.html
https://www.suse.com/security/cve/CVE-2015-0349.html
https://www.suse.com/security/cve/CVE-2015-0350.html
https://www.suse.com/security/cve/CVE-2015-0351.html
https://www.suse.com/security/cve/CVE-2015-0352.html
https://www.suse.com/security/cve/CVE-2015-0353.html
https://www.suse.com/security/cve/CVE-2015-0354.html
https://www.suse.com/security/cve/CVE-2015-0355.html
https://www.suse.com/security/cve/CVE-2015-0356.html
https://www.suse.com/security/cve/CVE-2015-0357.html
https://www.suse.com/security/cve/CVE-2015-0358.html
https://www.suse.com/security/cve/CVE-2015-0359.html
https://www.suse.com/security/cve/CVE-2015-0360.html
https://www.suse.com/security/cve/CVE-2015-3038.html
https://www.suse.com/security/cve/CVE-2015-3039.html
https://www.suse.com/security/cve/CVE-2015-3040.html
https://www.suse.com/security/cve/CVE-2015-3041.html
https://www.suse.com/security/cve/CVE-2015-3042.html
https://www.suse.com/security/cve/CVE-2015-3043.html
https://www.suse.com/security/cve/CVE-2015-3044.html
https://bugzilla.suse.com/927089
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0

[security-announce] openSUSE-SU-2015:0714-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 13 Apr '15
by opensuse-security@opensuse.org 13 Apr '15
13 Apr '15
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:0714-1
Rating: important
References: #903640 #904899 #907988 #909078 #910150 #911325
#911326 #912202 #912654 #912705 #913059 #913695
#914175 #915322 #917839 #920901
Cross-References: CVE-2014-7822 CVE-2014-8134 CVE-2014-8160
CVE-2014-…
[View More]8173 CVE-2014-8559 CVE-2014-9419
CVE-2014-9420 CVE-2014-9529 CVE-2014-9584
CVE-2014-9585 CVE-2015-1593
Affected Products:
openSUSE 13.1
______________________________________________________________________________
An update that solves 11 vulnerabilities and has 5 fixes is
now available.
Description:
The Linux kernel was updated to fix various bugs and security issues.
Following security issues were fixed:
- CVE-2014-8173: A NULL pointer dereference flaw was found in the way the
Linux kernels madvise MADV_WILLNEED functionality handled page table
locking. A local, unprivileged user could have used this flaw to crash
the system.
- CVE-2015-1593: A integer overflow reduced the effectiveness of the stack
randomization on 64-bit systems.
- CVE-2014-7822: A flaw was found in the way the Linux kernels splice()
system call validated its parameters. On certain file systems, a local,
unprivileged user could have used this flaw to write past the maximum
file size, and thus crash the system.
- CVE-2014-9419: The __switch_to function in arch/x86/kernel/process_64.c
in the Linux kernel did not ensure that Thread Local Storage (TLS)
descriptors are loaded before proceeding with other steps, which made it
easier for local users to bypass the ASLR protection mechanism via a
crafted application that reads a TLS base address.
- CVE-2014-8134: The paravirt_ops_setup function in arch/x86/kernel/kvm.c
in the Linux kernel used an improper paravirt_enabled setting for KVM
guest kernels, which made it easier for guest OS users to bypass the
ASLR protection mechanism via a crafted application that reads a 16-bit
value.
- CVE-2014-8160: net/netfilter/nf_conntrack_proto_generic.c in the Linux
kernel generated incorrect conntrack entries during handling of certain
iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols,
which allowed remote attackers to bypass intended access restrictions
via packets with disallowed port numbers.
- CVE-2014-9529: Race condition in the key_gc_unused_keys function in
security/keys/gc.c in the Linux kernel allowed local users to cause a
denial of service (memory corruption or panic) or possibly have
unspecified other impact via keyctl commands that trigger access to a
key structure member during garbage collection of a key.
- CVE-2014-8559: The d_walk function in fs/dcache.c in the Linux kernel
through did not properly maintain the semantics of rename_lock, which
allowed local users to cause a denial of service (deadlock and system
hang) via a crafted application.
- CVE-2014-9420: The rock_continue function in fs/isofs/rock.c in the
Linux kernel did not restrict the number of Rock Ridge continuation
entries, which allowed local users to cause a denial of service
(infinite loop, and system crash or hang) via a crafted iso9660 image.
- CVE-2014-9584: The parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel did not validate a length value in
the Extensions Reference (ER) System Use Field, which allowed local
users to obtain sensitive information from kernel memory via a crafted
iso9660 image.
- CVE-2014-9585: The vdso_addr function in arch/x86/vdso/vma.c in the
Linux kernel did not properly choose memory locations for the vDSO area,
which made it easier for local users to bypass the ASLR protection
mechanism by guessing a location at the end of a PMD.
Following bugs were fixed:
- HID: usbhid: enable always-poll quirk for Elan Touchscreen 0103
(bnc#920901).
- HID: usbhid: enable always-poll quirk for Elan Touchscreen 016f
(bnc#920901).
- HID: usbhid: enable always-poll quirk for Elan Touchscreen 009b
(bnc#920901).
- HID: usbhid: add another mouse that needs QUIRK_ALWAYS_POLL (bnc#920901).
- HID: usbhid: fix PIXART optical mouse (bnc#920901).
- HID: usbhid: enable always-poll quirk for Elan Touchscreen (bnc#920901).
- HID: usbhid: add always-poll quirk (bnc#920901).
- storvsc: ring buffer failures may result in I/O freeze (bnc#914175).
- mm, vmscan: prevent kswapd livelock due to pfmemalloc-throttled process
being killed (VM Functionality bnc#910150).
- Input: evdev - fix EVIOCG{type} ioctl (bnc#904899).
- mnt: Implicitly add MNT_NODEV on remount when it was implicitly added by
mount (bsc#907988).
- DocBook: Do not exceed argument list limit.
- DocBook: Make mandocs parallel-safe.
- mm: free compound page with correct order (bnc#913695).
- udf: Check component length before reading it.
- udf: Check path length when reading symlink.
- udf: Verify symlink size before loading it.
- udf: Verify i_size when loading inode.
- xfs: remote attribute overwrite causes transaction overrun.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2015-301=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i686 x86_64):
kernel-debug-3.11.10-29.1
kernel-debug-base-3.11.10-29.1
kernel-debug-base-debuginfo-3.11.10-29.1
kernel-debug-debuginfo-3.11.10-29.1
kernel-debug-debugsource-3.11.10-29.1
kernel-debug-devel-3.11.10-29.1
kernel-debug-devel-debuginfo-3.11.10-29.1
kernel-desktop-3.11.10-29.1
kernel-desktop-base-3.11.10-29.1
kernel-desktop-base-debuginfo-3.11.10-29.1
kernel-desktop-debuginfo-3.11.10-29.1
kernel-desktop-debugsource-3.11.10-29.1
kernel-desktop-devel-3.11.10-29.1
kernel-desktop-devel-debuginfo-3.11.10-29.1
kernel-ec2-3.11.10-29.1
kernel-ec2-base-3.11.10-29.1
kernel-ec2-base-debuginfo-3.11.10-29.1
kernel-ec2-debuginfo-3.11.10-29.1
kernel-ec2-debugsource-3.11.10-29.1
kernel-ec2-devel-3.11.10-29.1
kernel-ec2-devel-debuginfo-3.11.10-29.1
kernel-trace-3.11.10-29.1
kernel-trace-base-3.11.10-29.1
kernel-trace-base-debuginfo-3.11.10-29.1
kernel-trace-debuginfo-3.11.10-29.1
kernel-trace-debugsource-3.11.10-29.1
kernel-trace-devel-3.11.10-29.1
kernel-trace-devel-debuginfo-3.11.10-29.1
kernel-vanilla-3.11.10-29.1
kernel-vanilla-debuginfo-3.11.10-29.1
kernel-vanilla-debugsource-3.11.10-29.1
kernel-vanilla-devel-3.11.10-29.1
kernel-vanilla-devel-debuginfo-3.11.10-29.1
kernel-xen-3.11.10-29.1
kernel-xen-base-3.11.10-29.1
kernel-xen-base-debuginfo-3.11.10-29.1
kernel-xen-debuginfo-3.11.10-29.1
kernel-xen-debugsource-3.11.10-29.1
kernel-xen-devel-3.11.10-29.1
kernel-xen-devel-debuginfo-3.11.10-29.1
- openSUSE 13.1 (i586 x86_64):
cloop-2.639-11.19.1
cloop-debuginfo-2.639-11.19.1
cloop-debugsource-2.639-11.19.1
cloop-kmp-default-2.639_k3.11.10_29-11.19.1
cloop-kmp-default-debuginfo-2.639_k3.11.10_29-11.19.1
cloop-kmp-desktop-2.639_k3.11.10_29-11.19.1
cloop-kmp-desktop-debuginfo-2.639_k3.11.10_29-11.19.1
cloop-kmp-xen-2.639_k3.11.10_29-11.19.1
cloop-kmp-xen-debuginfo-2.639_k3.11.10_29-11.19.1
crash-7.0.2-2.19.1
crash-debuginfo-7.0.2-2.19.1
crash-debugsource-7.0.2-2.19.1
crash-devel-7.0.2-2.19.1
crash-doc-7.0.2-2.19.1
crash-eppic-7.0.2-2.19.1
crash-eppic-debuginfo-7.0.2-2.19.1
crash-gcore-7.0.2-2.19.1
crash-gcore-debuginfo-7.0.2-2.19.1
crash-kmp-default-7.0.2_k3.11.10_29-2.19.1
crash-kmp-default-debuginfo-7.0.2_k3.11.10_29-2.19.1
crash-kmp-desktop-7.0.2_k3.11.10_29-2.19.1
crash-kmp-desktop-debuginfo-7.0.2_k3.11.10_29-2.19.1
crash-kmp-xen-7.0.2_k3.11.10_29-2.19.1
crash-kmp-xen-debuginfo-7.0.2_k3.11.10_29-2.19.1
hdjmod-debugsource-1.28-16.19.1
hdjmod-kmp-default-1.28_k3.11.10_29-16.19.1
hdjmod-kmp-default-debuginfo-1.28_k3.11.10_29-16.19.1
hdjmod-kmp-desktop-1.28_k3.11.10_29-16.19.1
hdjmod-kmp-desktop-debuginfo-1.28_k3.11.10_29-16.19.1
hdjmod-kmp-xen-1.28_k3.11.10_29-16.19.1
hdjmod-kmp-xen-debuginfo-1.28_k3.11.10_29-16.19.1
ipset-6.21.1-2.23.1
ipset-debuginfo-6.21.1-2.23.1
ipset-debugsource-6.21.1-2.23.1
ipset-devel-6.21.1-2.23.1
ipset-kmp-default-6.21.1_k3.11.10_29-2.23.1
ipset-kmp-default-debuginfo-6.21.1_k3.11.10_29-2.23.1
ipset-kmp-desktop-6.21.1_k3.11.10_29-2.23.1
ipset-kmp-desktop-debuginfo-6.21.1_k3.11.10_29-2.23.1
ipset-kmp-xen-6.21.1_k3.11.10_29-2.23.1
ipset-kmp-xen-debuginfo-6.21.1_k3.11.10_29-2.23.1
iscsitarget-1.4.20.3-13.19.1
iscsitarget-debuginfo-1.4.20.3-13.19.1
iscsitarget-debugsource-1.4.20.3-13.19.1
iscsitarget-kmp-default-1.4.20.3_k3.11.10_29-13.19.1
iscsitarget-kmp-default-debuginfo-1.4.20.3_k3.11.10_29-13.19.1
iscsitarget-kmp-desktop-1.4.20.3_k3.11.10_29-13.19.1
iscsitarget-kmp-desktop-debuginfo-1.4.20.3_k3.11.10_29-13.19.1
iscsitarget-kmp-xen-1.4.20.3_k3.11.10_29-13.19.1
iscsitarget-kmp-xen-debuginfo-1.4.20.3_k3.11.10_29-13.19.1
kernel-default-3.11.10-29.1
kernel-default-base-3.11.10-29.1
kernel-default-base-debuginfo-3.11.10-29.1
kernel-default-debuginfo-3.11.10-29.1
kernel-default-debugsource-3.11.10-29.1
kernel-default-devel-3.11.10-29.1
kernel-default-devel-debuginfo-3.11.10-29.1
kernel-syms-3.11.10-29.1
libipset3-6.21.1-2.23.1
libipset3-debuginfo-6.21.1-2.23.1
ndiswrapper-1.58-19.1
ndiswrapper-debuginfo-1.58-19.1
ndiswrapper-debugsource-1.58-19.1
ndiswrapper-kmp-default-1.58_k3.11.10_29-19.1
ndiswrapper-kmp-default-debuginfo-1.58_k3.11.10_29-19.1
ndiswrapper-kmp-desktop-1.58_k3.11.10_29-19.1
ndiswrapper-kmp-desktop-debuginfo-1.58_k3.11.10_29-19.1
pcfclock-0.44-258.19.1
pcfclock-debuginfo-0.44-258.19.1
pcfclock-debugsource-0.44-258.19.1
pcfclock-kmp-default-0.44_k3.11.10_29-258.19.1
pcfclock-kmp-default-debuginfo-0.44_k3.11.10_29-258.19.1
pcfclock-kmp-desktop-0.44_k3.11.10_29-258.19.1
pcfclock-kmp-desktop-debuginfo-0.44_k3.11.10_29-258.19.1
python-virtualbox-4.2.28-2.28.1
python-virtualbox-debuginfo-4.2.28-2.28.1
vhba-kmp-debugsource-20130607-2.20.1
vhba-kmp-default-20130607_k3.11.10_29-2.20.1
vhba-kmp-default-debuginfo-20130607_k3.11.10_29-2.20.1
vhba-kmp-desktop-20130607_k3.11.10_29-2.20.1
vhba-kmp-desktop-debuginfo-20130607_k3.11.10_29-2.20.1
vhba-kmp-xen-20130607_k3.11.10_29-2.20.1
vhba-kmp-xen-debuginfo-20130607_k3.11.10_29-2.20.1
virtualbox-4.2.28-2.28.1
virtualbox-debuginfo-4.2.28-2.28.1
virtualbox-debugsource-4.2.28-2.28.1
virtualbox-devel-4.2.28-2.28.1
virtualbox-guest-kmp-default-4.2.28_k3.11.10_29-2.28.1
virtualbox-guest-kmp-default-debuginfo-4.2.28_k3.11.10_29-2.28.1
virtualbox-guest-kmp-desktop-4.2.28_k3.11.10_29-2.28.1
virtualbox-guest-kmp-desktop-debuginfo-4.2.28_k3.11.10_29-2.28.1
virtualbox-guest-tools-4.2.28-2.28.1
virtualbox-guest-tools-debuginfo-4.2.28-2.28.1
virtualbox-guest-x11-4.2.28-2.28.1
virtualbox-guest-x11-debuginfo-4.2.28-2.28.1
virtualbox-host-kmp-default-4.2.28_k3.11.10_29-2.28.1
virtualbox-host-kmp-default-debuginfo-4.2.28_k3.11.10_29-2.28.1
virtualbox-host-kmp-desktop-4.2.28_k3.11.10_29-2.28.1
virtualbox-host-kmp-desktop-debuginfo-4.2.28_k3.11.10_29-2.28.1
virtualbox-qt-4.2.28-2.28.1
virtualbox-qt-debuginfo-4.2.28-2.28.1
virtualbox-websrv-4.2.28-2.28.1
virtualbox-websrv-debuginfo-4.2.28-2.28.1
xen-debugsource-4.3.3_04-37.1
xen-devel-4.3.3_04-37.1
xen-kmp-default-4.3.3_04_k3.11.10_29-37.1
xen-kmp-default-debuginfo-4.3.3_04_k3.11.10_29-37.1
xen-kmp-desktop-4.3.3_04_k3.11.10_29-37.1
xen-kmp-desktop-debuginfo-4.3.3_04_k3.11.10_29-37.1
xen-libs-4.3.3_04-37.1
xen-libs-debuginfo-4.3.3_04-37.1
xen-tools-domU-4.3.3_04-37.1
xen-tools-domU-debuginfo-4.3.3_04-37.1
xtables-addons-2.3-2.19.1
xtables-addons-debuginfo-2.3-2.19.1
xtables-addons-debugsource-2.3-2.19.1
xtables-addons-kmp-default-2.3_k3.11.10_29-2.19.1
xtables-addons-kmp-default-debuginfo-2.3_k3.11.10_29-2.19.1
xtables-addons-kmp-desktop-2.3_k3.11.10_29-2.19.1
xtables-addons-kmp-desktop-debuginfo-2.3_k3.11.10_29-2.19.1
xtables-addons-kmp-xen-2.3_k3.11.10_29-2.19.1
xtables-addons-kmp-xen-debuginfo-2.3_k3.11.10_29-2.19.1
- openSUSE 13.1 (noarch):
kernel-devel-3.11.10-29.1
kernel-docs-3.11.10-29.2
kernel-source-3.11.10-29.1
kernel-source-vanilla-3.11.10-29.1
- openSUSE 13.1 (x86_64):
xen-4.3.3_04-37.1
xen-doc-html-4.3.3_04-37.1
xen-libs-32bit-4.3.3_04-37.1
xen-libs-debuginfo-32bit-4.3.3_04-37.1
xen-tools-4.3.3_04-37.1
xen-tools-debuginfo-4.3.3_04-37.1
xen-xend-tools-4.3.3_04-37.1
xen-xend-tools-debuginfo-4.3.3_04-37.1
- openSUSE 13.1 (i686):
kernel-pae-3.11.10-29.1
kernel-pae-base-3.11.10-29.1
kernel-pae-base-debuginfo-3.11.10-29.1
kernel-pae-debuginfo-3.11.10-29.1
kernel-pae-debugsource-3.11.10-29.1
kernel-pae-devel-3.11.10-29.1
kernel-pae-devel-debuginfo-3.11.10-29.1
- openSUSE 13.1 (i586):
cloop-kmp-pae-2.639_k3.11.10_29-11.19.1
cloop-kmp-pae-debuginfo-2.639_k3.11.10_29-11.19.1
crash-kmp-pae-7.0.2_k3.11.10_29-2.19.1
crash-kmp-pae-debuginfo-7.0.2_k3.11.10_29-2.19.1
hdjmod-kmp-pae-1.28_k3.11.10_29-16.19.1
hdjmod-kmp-pae-debuginfo-1.28_k3.11.10_29-16.19.1
ipset-kmp-pae-6.21.1_k3.11.10_29-2.23.1
ipset-kmp-pae-debuginfo-6.21.1_k3.11.10_29-2.23.1
iscsitarget-kmp-pae-1.4.20.3_k3.11.10_29-13.19.1
iscsitarget-kmp-pae-debuginfo-1.4.20.3_k3.11.10_29-13.19.1
ndiswrapper-kmp-pae-1.58_k3.11.10_29-19.1
ndiswrapper-kmp-pae-debuginfo-1.58_k3.11.10_29-19.1
pcfclock-kmp-pae-0.44_k3.11.10_29-258.19.1
pcfclock-kmp-pae-debuginfo-0.44_k3.11.10_29-258.19.1
vhba-kmp-pae-20130607_k3.11.10_29-2.20.1
vhba-kmp-pae-debuginfo-20130607_k3.11.10_29-2.20.1
virtualbox-guest-kmp-pae-4.2.28_k3.11.10_29-2.28.1
virtualbox-guest-kmp-pae-debuginfo-4.2.28_k3.11.10_29-2.28.1
virtualbox-host-kmp-pae-4.2.28_k3.11.10_29-2.28.1
virtualbox-host-kmp-pae-debuginfo-4.2.28_k3.11.10_29-2.28.1
xen-kmp-pae-4.3.3_04_k3.11.10_29-37.1
xen-kmp-pae-debuginfo-4.3.3_04_k3.11.10_29-37.1
xtables-addons-kmp-pae-2.3_k3.11.10_29-2.19.1
xtables-addons-kmp-pae-debuginfo-2.3_k3.11.10_29-2.19.1
References:
https://www.suse.com/security/cve/CVE-2014-7822.html
https://www.suse.com/security/cve/CVE-2014-8134.html
https://www.suse.com/security/cve/CVE-2014-8160.html
https://www.suse.com/security/cve/CVE-2014-8173.html
https://www.suse.com/security/cve/CVE-2014-8559.html
https://www.suse.com/security/cve/CVE-2014-9419.html
https://www.suse.com/security/cve/CVE-2014-9420.html
https://www.suse.com/security/cve/CVE-2014-9529.html
https://www.suse.com/security/cve/CVE-2014-9584.html
https://www.suse.com/security/cve/CVE-2014-9585.html
https://www.suse.com/security/cve/CVE-2015-1593.html
https://bugzilla.suse.com/903640
https://bugzilla.suse.com/904899
https://bugzilla.suse.com/907988
https://bugzilla.suse.com/909078
https://bugzilla.suse.com/910150
https://bugzilla.suse.com/911325
https://bugzilla.suse.com/911326
https://bugzilla.suse.com/912202
https://bugzilla.suse.com/912654
https://bugzilla.suse.com/912705
https://bugzilla.suse.com/913059
https://bugzilla.suse.com/913695
https://bugzilla.suse.com/914175
https://bugzilla.suse.com/915322
https://bugzilla.suse.com/917839
https://bugzilla.suse.com/920901
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0

[security-announce] openSUSE-SU-2015:0713-1: important: Security update for Linux Kernel
by opensuse-security@opensuse.org 13 Apr '15
by opensuse-security@opensuse.org 13 Apr '15
13 Apr '15
openSUSE Security Update: Security update for Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:0713-1
Rating: important
References: #867199 #893428 #895797 #900811 #901925 #903589
#903640 #904899 #905681 #907039 #907818 #907988
#908582 #908588 #908589 #908592 #908593 #908594
#908596 #908598 #908603 #908604 #908605 #908606
…
[View More] #908608 #908610 #908612 #909077 #909078 #909477
#909634 #910150 #910322 #910440 #911311 #911325
#911326 #911356 #911438 #911578 #911835 #912061
#912202 #912429 #912705 #913059 #913466 #913695
#914175 #915425 #915454 #915456 #915577 #915858
#916608 #917830 #917839 #918954 #918970 #919463
#920581 #920604 #921313 #922542 #922944
Cross-References: CVE-2014-8134 CVE-2014-8160 CVE-2014-8559
CVE-2014-9419 CVE-2014-9420 CVE-2014-9428
CVE-2014-9529 CVE-2014-9584 CVE-2014-9585
CVE-2015-0777 CVE-2015-1421 CVE-2015-1593
CVE-2015-2150
Affected Products:
openSUSE 13.2
______________________________________________________________________________
An update that solves 13 vulnerabilities and has 52 fixes
is now available.
Description:
The Linux kernel was updated to fix bugs and security issues:
Following security issues were fixed:
- CVE-2015-1421: Use-after-free vulnerability in the sctp_assoc_update
function in net/sctp/associola.c in the Linux kernel allowed remote
attackers to cause a denial of service (slab corruption and panic) or
possibly have unspecified other impact by triggering an INIT collision
that leads to improper handling of shared-key data.
- CVE-2015-2150: XSA-120: Guests were permitted to modify all bits of the
PCI command register of passed through cards, which could lead to Host
system crashes.
- CVE-2015-0777: The XEN usb backend could leak information to the guest
system due to copying uninitialized memory.
- CVE-2015-1593: A integer overflow reduced the effectiveness of the stack
randomization on 64-bit systems.
- CVE-2014-9419: The __switch_to function in arch/x86/kernel/process_64.c
in the Linux kernel did not ensure that Thread Local Storage (TLS)
descriptors are loaded before proceeding with other steps, which made it
easier for local users to bypass the ASLR protection mechanism via a
crafted application that reads a TLS base address.
- CVE-2014-9428: The batadv_frag_merge_packets function in
net/batman-adv/fragmentation.c in the B.A.T.M.A.N. implementation in the
Linux kernel used an incorrect length field during a calculation of an
amount of memory, which allowed remote attackers to cause a denial of
service (mesh-node system crash) via fragmented packets.
- CVE-2014-8160: net/netfilter/nf_conntrack_proto_generic.c in the Linux
kernel generated incorrect conntrack entries during handling of certain
iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols,
which allowed remote attackers to bypass intended access restrictions
via packets with disallowed port numbers.
- CVE-2014-9529: Race condition in the key_gc_unused_keys function in
security/keys/gc.c in the Linux kernel allowed local users to cause a
denial of service (memory corruption or panic) or possibly have
unspecified other impact via keyctl commands that trigger access to a
key structure member during garbage collection of a key.
- CVE-2014-9420: The rock_continue function in fs/isofs/rock.c in the
Linux kernel did not restrict the number of Rock Ridge continuation
entries, which allowed local users to cause a denial of service
(infinite loop, and system crash or hang) via a crafted iso9660 image.
- CVE-2014-9584: The parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel did not validate a length value in
the Extensions Reference (ER) System Use Field, which allowed local
users to obtain sensitive information from kernel memory via a crafted
iso9660 image.
- CVE-2014-9585: The vdso_addr function in arch/x86/vdso/vma.c in the
Linux kernel did not properly choose memory locations for the vDSO area,
which made it easier for local users to bypass the ASLR protection
mechanism by guessing a location at the end of a PMD.
- CVE-2014-8559: The d_walk function in fs/dcache.c in the Linux kernel
through did not properly maintain the semantics of rename_lock, which
allowed local users to cause a denial of service (deadlock and system
hang) via a crafted application.
- CVE-2014-8134: The paravirt_ops_setup function in arch/x86/kernel/kvm.c
in the Linux kernel used an improper paravirt_enabled setting for KVM
guest kernels, which made it easier for guest OS users to bypass the
ASLR protection mechanism via a crafted application that reads a 16-bit
value.
Following bugs were fixed:
- powerpc/pci: Fix IO space breakage after of_pci_range_to_resource()
change (bnc#922542).
- cifs: fix use-after-free bug in find_writable_file (bnc#909477).
- usb: Do not allow usb_alloc_streams on unconfigured devices (bsc#920581).
- fuse: honour max_read and max_write in direct_io mode (bnc#918954).
- switch iov_iter_get_pages() to passing maximal number of pages
(bnc#918954).
- bcache: fix a livelock in btree lock v2 (bnc#910440) (bnc#910440).
Updated because another version went upstream
- drm/i915: Initialise userptr mmu_notifier serial to 1 (bnc#918970).
- NFS: Don't try to reclaim delegation open state if recovery failed
(boo#909634).
- NFSv4: Ensure that we call FREE_STATEID when NFSv4.x stateids are
revoked (boo#909634).
- NFSv4: Fix races between nfs_remove_bad_delegation() and delegation
return (boo#909634).
- NFSv4: Ensure that we remove NFSv4.0 delegations when state has expired
(boo#909634).
- Fixing lease renewal (boo#909634).
- bcache: Fix a bug when detaching (bsc#908582).
- fix a leak in bch_cached_dev_run() (bnc#910440).
- bcache: unregister reboot notifier when bcache fails to register a block
device (bnc#910440).
- bcache: fix a livelock in btree lock (bnc#910440).
- bcache: [BUG] clear BCACHE_DEV_UNLINK_DONE flag when attaching a backing
device (bnc#910440).
- bcache: Add a cond_resched() call to gc (bnc#910440).
- storvsc: ring buffer failures may result in I/O freeze (bnc#914175).
- ALSA: seq-dummy: remove deadlock-causing events on close (boo#916608).
- ALSA: pcm: Zero-clear reserved fields of PCM status ioctl in compat mode
(boo#916608).
- ALSA: bebob: Uninitialized id returned by saffirepro_both_clk_src_get
(boo#916608).
- ALSA: hda - Fix built-in mic on Compaq Presario CQ60 (bnc#920604).
- ALSA: hda - Fix regression of HD-audio controller fallback modes
(bsc#921313).
- [media] sound: Update au0828 quirks table (boo#916608).
- [media] sound: simplify au0828 quirk table (boo#916608).
- ALSA: usb-audio: Add mic volume fix quirk for Logitech Webcam C210
(boo#916608).
- ALSA: usb-audio: extend KEF X300A FU 10 tweak to Arcam rPAC (boo#916608).
- ALSA: usb-audio: Add ctrl message delay quirk for Marantz/Denon devices
(boo#916608).
- ALSA: usb-audio: Fix memory leak in FTU quirk (boo#916608).
- ALSA: usb-audio: Fix device_del() sysfs warnings at disconnect
(boo#916608).
- ALSA: hda - Add new GPU codec ID 0x10de0072 to snd-hda (boo#916608).
- ALSA: hda - Fix wrong gpio_dir & gpio_mask hint setups for IDT/STAC
codecs (boo#916608).
- ALSA: hda/realtek - New codec support for ALC298 (boo#916608).
- ALSA: hda/realtek - New codec support for ALC256 (boo#916608).
- ALSA: hda/realtek - Add new Dell desktop for ALC3234 headset mode
(boo#916608).
- ALSA: hda - Add EAPD fixup for ASUS Z99He laptop (boo#916608).
- ALSA: hda - Fix built-in mic at resume on Lenovo Ideapad S210
(boo#916608).
- ALSA: hda/realtek - Add headset Mic support for new Dell machine
(boo#916608).
- ALSA: hda_intel: Add DeviceIDs for Sunrise Point-LP (boo#916608).
- ALSA: hda_intel: Add Device IDs for Intel Sunrise Point PCH (boo#916608).
- ALSA: hda - add codec ID for Braswell display audio codec (boo#916608).
- ALSA: hda - add PCI IDs for Intel Braswell (boo#916608).
- ALSA: hda - Add dock support for Thinkpad T440 (17aa:2212) (boo#916608).
- ALSA: hda - Set up GPIO for Toshiba Satellite S50D (bnc#915858).
- rpm/kernel-binary.spec.in: Fix build if there is no *.crt file
- mm, vmscan: prevent kswapd livelock due to pfmemalloc-throttled process
being killed (VM Functionality bnc#910150).
- Input: evdev - fix EVIOCG{type} ioctl (bnc#904899).
- mnt: Implicitly add MNT_NODEV on remount when it was implicitly added by
mount (bsc#907988).
- Btrfs: fix scrub race leading to use-after-free (bnc#915456).
- Btrfs: fix setup_leaf_for_split() to avoid leaf corruption (bnc#915454).
- Btrfs: fix fsync log replay for inodes with a mix of regular refs and
extrefs (bnc#915425).
- Btrfs: fix fsync when extend references are added to an inode
(bnc#915425).
- Btrfs: fix directory inconsistency after fsync log replay (bnc#915425).
- Btrfs: make xattr replace operations atomic (bnc#913466).
- Btrfs: fix directory recovery from fsync log (bnc#895797).
- bcache: add mutex lock for bch_is_open (bnc#908612).
- bcache: Correct printing of btree_gc_max_duration_ms (bnc#908610).
- bcache: fix crash with incomplete cache set (bnc#908608).
- bcache: fix memory corruption in init error path (bnc#908606).
- bcache: Fix more early shutdown bugs (bnc#908605).
- bcache: fix use-after-free in btree_gc_coalesce() (bnc#908604).
- bcache: Fix an infinite loop in journal replay (bnc#908603).
- bcache: fix typo in bch_bkey_equal_header (bnc#908598).
- bcache: Make sure to pass GFP_WAIT to mempool_alloc() (bnc#908596).
- bcache: fix crash on shutdown in passthrough mode (bnc#908594).
- bcache: fix lockdep warnings on shutdown (bnc#908593).
- bcache allocator: send discards with correct size (bnc#908592).
- bcache: Fix to remove the rcu_sched stalls (bnc#908589).
- bcache: Fix a journal replay bug (bnc#908588).
- Update x86_64 config files: CONFIG_SENSORS_NCT6683=m The nct6683 driver
is already enabled on i386 and history suggests that it not being
enabled on x86_64 is by mistake.
- rpm/kernel-binary.spec.in: Own the modules directory in the devel
package (bnc#910322)
- Revert "iwlwifi: mvm: treat EAPOLs like mgmt frames wrt rate"
(bnc#900811).
- mm: free compound page with correct order (bnc#913695).
- drm/i915: More cautious with pch fifo underruns (boo#907039).
- Refresh patches.arch/arm64-0039-generic-pci.patch (fix PCI bridge
support)
- x86/microcode/intel: Fish out the stashed microcode for the BSP
(bsc#903589).
- x86, microcode: Reload microcode on resume (bsc#903589).
- x86, microcode: Don't initialize microcode code on paravirt (bsc#903589).
- x86, microcode, intel: Drop unused parameter (bsc#903589).
- x86, microcode, AMD: Do not use smp_processor_id() in preemtible context
(bsc#903589).
- x86, microcode: Update BSPs microcode on resume (bsc#903589).
- x86, microcode, AMD: Fix ucode patch stashing on 32-bit (bsc#903589).
- x86, microcode: Fix accessing dis_ucode_ldr on 32-bit (bsc#903589).
- x86, microcode, AMD: Fix early ucode loading on 32-bit (bsc#903589).
- Bluetooth: Add support for Broadcom BCM20702A0 variants firmware
download (bnc#911311).
- drm/radeon: fix sad_count check for dce3 (bnc#911356).
- drm/i915: Don't call intel_prepare_page_flip() multiple times
on gen2-4 (bnc#911835).
- udf: Check component length before reading it.
- udf: Check path length when reading symlink.
- udf: Verify symlink size before loading it.
- udf: Verify i_size when loading inode.
- arm64: Enable DRM
- arm64: Enable generic PHB driver (bnc#912061).
- ACPI / video: Add some Samsung models to disable_native_backlight list
(boo#905681).
- asus-nb-wmi: Add another wapf=4 quirk (boo#911438).
- asus-nb-wmi: Add wapf4 quirk for the X550VB (boo#911438).
- asus-nb-wmi: Add wapf4 quirk for the U32U (boo#911438).
- asus-nb-wmi: Add wapf4 quirk for the X550CC (boo#911438).
- asus-nb-wmi: Constify asus_quirks DMI table (boo#911438).
- asus-nb-wmi: Add wapf4 quirk for the X550CL (boo#911438).
- asus-nb-wmi.c: Rename x401u quirk to wapf4 (boo#911438).
- asus-nb-wmi: Add ASUSTeK COMPUTER INC. X200CA (boo#911438).
- WAPF 4 for ASUSTeK COMPUTER INC. X75VBP WLAN ON (boo#911438).
- Input: synaptics - gate forcepad support by DMI check (bnc#911578).
- ext4: introduce aging to extent status tree (bnc#893428).
- ext4: cleanup flag definitions for extent status tree (bnc#893428).
- ext4: limit number of scanned extents in status tree shrinker
(bnc#893428).
- ext4: move handling of list of shrinkable inodes into extent status code
(bnc#893428).
- ext4: change LRU to round-robin in extent status tree shrinker
(bnc#893428).
- ext4: cache extent hole in extent status tree for ext4_da_map_blocks()
(bnc#893428).
- ext4: fix block reservation for bigalloc filesystems (bnc#893428).
- ext4: track extent status tree shrinker delay statictics (bnc#893428).
- ext4: improve extents status tree trace point (bnc#893428).
- rpm/kernel-binary.spec.in: Provide name-version-release for kgraft
packages (bnc#901925)
- rpm/kernel-binary.spec.in: Fix including the secure boot cert in
/etc/uefi/certs
- doc/README.SUSE: update Solid Driver team contacts
- rpm/kernel-binary.spec.in: Do not sign firmware files (bnc#867199)
- Port module signing changes from SLE11-SP3 (fate#314508)
- doc/README.PATCH-POLICY.SUSE: add patch policy / best practices document
after installation.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2015-302=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i686 x86_64):
kernel-debug-3.16.7-13.2
kernel-debug-base-3.16.7-13.2
kernel-debug-base-debuginfo-3.16.7-13.2
kernel-debug-debuginfo-3.16.7-13.2
kernel-debug-debugsource-3.16.7-13.2
kernel-debug-devel-3.16.7-13.2
kernel-debug-devel-debuginfo-3.16.7-13.2
kernel-desktop-3.16.7-13.2
kernel-desktop-base-3.16.7-13.2
kernel-desktop-base-debuginfo-3.16.7-13.2
kernel-desktop-debuginfo-3.16.7-13.2
kernel-desktop-debugsource-3.16.7-13.2
kernel-desktop-devel-3.16.7-13.2
kernel-ec2-3.16.7-13.2
kernel-ec2-base-3.16.7-13.2
kernel-ec2-base-debuginfo-3.16.7-13.2
kernel-ec2-debuginfo-3.16.7-13.2
kernel-ec2-debugsource-3.16.7-13.2
kernel-ec2-devel-3.16.7-13.2
kernel-vanilla-3.16.7-13.2
kernel-vanilla-debuginfo-3.16.7-13.2
kernel-vanilla-debugsource-3.16.7-13.2
kernel-vanilla-devel-3.16.7-13.2
kernel-xen-3.16.7-13.2
kernel-xen-base-3.16.7-13.2
kernel-xen-base-debuginfo-3.16.7-13.2
kernel-xen-debuginfo-3.16.7-13.2
kernel-xen-debugsource-3.16.7-13.2
kernel-xen-devel-3.16.7-13.2
- openSUSE 13.2 (i586 x86_64):
bbswitch-0.8-3.6.6
bbswitch-debugsource-0.8-3.6.6
bbswitch-kmp-default-0.8_k3.16.7_13-3.6.6
bbswitch-kmp-default-debuginfo-0.8_k3.16.7_13-3.6.6
bbswitch-kmp-desktop-0.8_k3.16.7_13-3.6.6
bbswitch-kmp-desktop-debuginfo-0.8_k3.16.7_13-3.6.6
bbswitch-kmp-xen-0.8_k3.16.7_13-3.6.6
bbswitch-kmp-xen-debuginfo-0.8_k3.16.7_13-3.6.6
cloop-2.639-14.6.6
cloop-debuginfo-2.639-14.6.6
cloop-debugsource-2.639-14.6.6
cloop-kmp-default-2.639_k3.16.7_13-14.6.6
cloop-kmp-default-debuginfo-2.639_k3.16.7_13-14.6.6
cloop-kmp-desktop-2.639_k3.16.7_13-14.6.6
cloop-kmp-desktop-debuginfo-2.639_k3.16.7_13-14.6.6
cloop-kmp-xen-2.639_k3.16.7_13-14.6.6
cloop-kmp-xen-debuginfo-2.639_k3.16.7_13-14.6.6
crash-7.0.8-6.6
crash-debuginfo-7.0.8-6.6
crash-debugsource-7.0.8-6.6
crash-devel-7.0.8-6.6
crash-doc-7.0.8-6.6
crash-eppic-7.0.8-6.6
crash-eppic-debuginfo-7.0.8-6.6
crash-gcore-7.0.8-6.6
crash-gcore-debuginfo-7.0.8-6.6
crash-kmp-default-7.0.8_k3.16.7_13-6.6
crash-kmp-default-debuginfo-7.0.8_k3.16.7_13-6.6
crash-kmp-desktop-7.0.8_k3.16.7_13-6.6
crash-kmp-desktop-debuginfo-7.0.8_k3.16.7_13-6.6
crash-kmp-xen-7.0.8_k3.16.7_13-6.6
crash-kmp-xen-debuginfo-7.0.8_k3.16.7_13-6.6
hdjmod-debugsource-1.28-18.7.6
hdjmod-kmp-default-1.28_k3.16.7_13-18.7.6
hdjmod-kmp-default-debuginfo-1.28_k3.16.7_13-18.7.6
hdjmod-kmp-desktop-1.28_k3.16.7_13-18.7.6
hdjmod-kmp-desktop-debuginfo-1.28_k3.16.7_13-18.7.6
hdjmod-kmp-xen-1.28_k3.16.7_13-18.7.6
hdjmod-kmp-xen-debuginfo-1.28_k3.16.7_13-18.7.6
ipset-6.23-6.6
ipset-debuginfo-6.23-6.6
ipset-debugsource-6.23-6.6
ipset-devel-6.23-6.6
ipset-kmp-default-6.23_k3.16.7_13-6.6
ipset-kmp-default-debuginfo-6.23_k3.16.7_13-6.6
ipset-kmp-desktop-6.23_k3.16.7_13-6.6
ipset-kmp-desktop-debuginfo-6.23_k3.16.7_13-6.6
ipset-kmp-xen-6.23_k3.16.7_13-6.6
ipset-kmp-xen-debuginfo-6.23_k3.16.7_13-6.6
kernel-default-3.16.7-13.3
kernel-default-base-3.16.7-13.3
kernel-default-base-debuginfo-3.16.7-13.3
kernel-default-debuginfo-3.16.7-13.3
kernel-default-debugsource-3.16.7-13.3
kernel-default-devel-3.16.7-13.3
kernel-obs-build-3.16.7-13.7
kernel-obs-build-debugsource-3.16.7-13.7
kernel-obs-qa-3.16.7-13.1
kernel-obs-qa-xen-3.16.7-13.1
kernel-syms-3.16.7-13.1
libipset3-6.23-6.6
libipset3-debuginfo-6.23-6.6
pcfclock-0.44-260.6.2
pcfclock-debuginfo-0.44-260.6.2
pcfclock-debugsource-0.44-260.6.2
pcfclock-kmp-default-0.44_k3.16.7_13-260.6.2
pcfclock-kmp-default-debuginfo-0.44_k3.16.7_13-260.6.2
pcfclock-kmp-desktop-0.44_k3.16.7_13-260.6.2
pcfclock-kmp-desktop-debuginfo-0.44_k3.16.7_13-260.6.2
python-virtualbox-4.3.20-10.2
python-virtualbox-debuginfo-4.3.20-10.2
vhba-kmp-debugsource-20140629-2.6.2
vhba-kmp-default-20140629_k3.16.7_13-2.6.2
vhba-kmp-default-debuginfo-20140629_k3.16.7_13-2.6.2
vhba-kmp-desktop-20140629_k3.16.7_13-2.6.2
vhba-kmp-desktop-debuginfo-20140629_k3.16.7_13-2.6.2
vhba-kmp-xen-20140629_k3.16.7_13-2.6.2
vhba-kmp-xen-debuginfo-20140629_k3.16.7_13-2.6.2
virtualbox-4.3.20-10.2
virtualbox-debuginfo-4.3.20-10.2
virtualbox-debugsource-4.3.20-10.2
virtualbox-devel-4.3.20-10.2
virtualbox-guest-kmp-default-4.3.20_k3.16.7_13-10.2
virtualbox-guest-kmp-default-debuginfo-4.3.20_k3.16.7_13-10.2
virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_13-10.2
virtualbox-guest-kmp-desktop-debuginfo-4.3.20_k3.16.7_13-10.2
virtualbox-guest-tools-4.3.20-10.2
virtualbox-guest-tools-debuginfo-4.3.20-10.2
virtualbox-guest-x11-4.3.20-10.2
virtualbox-guest-x11-debuginfo-4.3.20-10.2
virtualbox-host-kmp-default-4.3.20_k3.16.7_13-10.2
virtualbox-host-kmp-default-debuginfo-4.3.20_k3.16.7_13-10.2
virtualbox-host-kmp-desktop-4.3.20_k3.16.7_13-10.2
virtualbox-host-kmp-desktop-debuginfo-4.3.20_k3.16.7_13-10.2
virtualbox-qt-4.3.20-10.2
virtualbox-qt-debuginfo-4.3.20-10.2
virtualbox-websrv-4.3.20-10.2
virtualbox-websrv-debuginfo-4.3.20-10.2
xen-debugsource-4.4.1_08-12.2
xen-devel-4.4.1_08-12.2
xen-libs-4.4.1_08-12.2
xen-libs-debuginfo-4.4.1_08-12.2
xen-tools-domU-4.4.1_08-12.2
xen-tools-domU-debuginfo-4.4.1_08-12.2
xtables-addons-2.6-6.2
xtables-addons-debuginfo-2.6-6.2
xtables-addons-debugsource-2.6-6.2
xtables-addons-kmp-default-2.6_k3.16.7_13-6.2
xtables-addons-kmp-default-debuginfo-2.6_k3.16.7_13-6.2
xtables-addons-kmp-desktop-2.6_k3.16.7_13-6.2
xtables-addons-kmp-desktop-debuginfo-2.6_k3.16.7_13-6.2
xtables-addons-kmp-xen-2.6_k3.16.7_13-6.2
xtables-addons-kmp-xen-debuginfo-2.6_k3.16.7_13-6.2
- openSUSE 13.2 (noarch):
kernel-devel-3.16.7-13.1
kernel-docs-3.16.7-13.2
kernel-macros-3.16.7-13.1
kernel-source-3.16.7-13.1
kernel-source-vanilla-3.16.7-13.1
virtualbox-guest-desktop-icons-4.3.20-10.2
- openSUSE 13.2 (x86_64):
xen-4.4.1_08-12.2
xen-doc-html-4.4.1_08-12.2
xen-kmp-default-4.4.1_08_k3.16.7_13-12.2
xen-kmp-default-debuginfo-4.4.1_08_k3.16.7_13-12.2
xen-kmp-desktop-4.4.1_08_k3.16.7_13-12.2
xen-kmp-desktop-debuginfo-4.4.1_08_k3.16.7_13-12.2
xen-libs-32bit-4.4.1_08-12.2
xen-libs-debuginfo-32bit-4.4.1_08-12.2
xen-tools-4.4.1_08-12.2
xen-tools-debuginfo-4.4.1_08-12.2
- openSUSE 13.2 (i686):
kernel-pae-3.16.7-13.2
kernel-pae-base-3.16.7-13.2
kernel-pae-base-debuginfo-3.16.7-13.2
kernel-pae-debuginfo-3.16.7-13.2
kernel-pae-debugsource-3.16.7-13.2
kernel-pae-devel-3.16.7-13.2
- openSUSE 13.2 (i586):
bbswitch-kmp-pae-0.8_k3.16.7_13-3.6.6
bbswitch-kmp-pae-debuginfo-0.8_k3.16.7_13-3.6.6
cloop-kmp-pae-2.639_k3.16.7_13-14.6.6
cloop-kmp-pae-debuginfo-2.639_k3.16.7_13-14.6.6
crash-kmp-pae-7.0.8_k3.16.7_13-6.6
crash-kmp-pae-debuginfo-7.0.8_k3.16.7_13-6.6
hdjmod-kmp-pae-1.28_k3.16.7_13-18.7.6
hdjmod-kmp-pae-debuginfo-1.28_k3.16.7_13-18.7.6
ipset-kmp-pae-6.23_k3.16.7_13-6.6
ipset-kmp-pae-debuginfo-6.23_k3.16.7_13-6.6
pcfclock-kmp-pae-0.44_k3.16.7_13-260.6.2
pcfclock-kmp-pae-debuginfo-0.44_k3.16.7_13-260.6.2
vhba-kmp-pae-20140629_k3.16.7_13-2.6.2
vhba-kmp-pae-debuginfo-20140629_k3.16.7_13-2.6.2
virtualbox-guest-kmp-pae-4.3.20_k3.16.7_13-10.2
virtualbox-guest-kmp-pae-debuginfo-4.3.20_k3.16.7_13-10.2
virtualbox-host-kmp-pae-4.3.20_k3.16.7_13-10.2
virtualbox-host-kmp-pae-debuginfo-4.3.20_k3.16.7_13-10.2
xtables-addons-kmp-pae-2.6_k3.16.7_13-6.2
xtables-addons-kmp-pae-debuginfo-2.6_k3.16.7_13-6.2
References:
https://www.suse.com/security/cve/CVE-2014-8134.html
https://www.suse.com/security/cve/CVE-2014-8160.html
https://www.suse.com/security/cve/CVE-2014-8559.html
https://www.suse.com/security/cve/CVE-2014-9419.html
https://www.suse.com/security/cve/CVE-2014-9420.html
https://www.suse.com/security/cve/CVE-2014-9428.html
https://www.suse.com/security/cve/CVE-2014-9529.html
https://www.suse.com/security/cve/CVE-2014-9584.html
https://www.suse.com/security/cve/CVE-2014-9585.html
https://www.suse.com/security/cve/CVE-2015-0777.html
https://www.suse.com/security/cve/CVE-2015-1421.html
https://www.suse.com/security/cve/CVE-2015-1593.html
https://www.suse.com/security/cve/CVE-2015-2150.html
https://bugzilla.suse.com/867199
https://bugzilla.suse.com/893428
https://bugzilla.suse.com/895797
https://bugzilla.suse.com/900811
https://bugzilla.suse.com/901925
https://bugzilla.suse.com/903589
https://bugzilla.suse.com/903640
https://bugzilla.suse.com/904899
https://bugzilla.suse.com/905681
https://bugzilla.suse.com/907039
https://bugzilla.suse.com/907818
https://bugzilla.suse.com/907988
https://bugzilla.suse.com/908582
https://bugzilla.suse.com/908588
https://bugzilla.suse.com/908589
https://bugzilla.suse.com/908592
https://bugzilla.suse.com/908593
https://bugzilla.suse.com/908594
https://bugzilla.suse.com/908596
https://bugzilla.suse.com/908598
https://bugzilla.suse.com/908603
https://bugzilla.suse.com/908604
https://bugzilla.suse.com/908605
https://bugzilla.suse.com/908606
https://bugzilla.suse.com/908608
https://bugzilla.suse.com/908610
https://bugzilla.suse.com/908612
https://bugzilla.suse.com/909077
https://bugzilla.suse.com/909078
https://bugzilla.suse.com/909477
https://bugzilla.suse.com/909634
https://bugzilla.suse.com/910150
https://bugzilla.suse.com/910322
https://bugzilla.suse.com/910440
https://bugzilla.suse.com/911311
https://bugzilla.suse.com/911325
https://bugzilla.suse.com/911326
https://bugzilla.suse.com/911356
https://bugzilla.suse.com/911438
https://bugzilla.suse.com/911578
https://bugzilla.suse.com/911835
https://bugzilla.suse.com/912061
https://bugzilla.suse.com/912202
https://bugzilla.suse.com/912429
https://bugzilla.suse.com/912705
https://bugzilla.suse.com/913059
https://bugzilla.suse.com/913466
https://bugzilla.suse.com/913695
https://bugzilla.suse.com/914175
https://bugzilla.suse.com/915425
https://bugzilla.suse.com/915454
https://bugzilla.suse.com/915456
https://bugzilla.suse.com/915577
https://bugzilla.suse.com/915858
https://bugzilla.suse.com/916608
https://bugzilla.suse.com/917830
https://bugzilla.suse.com/917839
https://bugzilla.suse.com/918954
https://bugzilla.suse.com/918970
https://bugzilla.suse.com/919463
https://bugzilla.suse.com/920581
https://bugzilla.suse.com/920604
https://bugzilla.suse.com/921313
https://bugzilla.suse.com/922542
https://bugzilla.suse.com/922944
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0

[security-announce] SUSE-SU-2015:0704-2: important: Security update for MozillaFirefox
by opensuse-security@opensuse.org 10 Apr '15
by opensuse-security@opensuse.org 10 Apr '15
10 Apr '15
SUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0704-2
Rating: important
References: #925368
Cross-References: CVE-2015-0801 CVE-2015-0807 CVE-2015-0813
CVE-2015-0814 CVE-2015-0815 CVE-2015-0816
Affected Products:
SUSE Linux Enterprise Desktop 12
…
[View More]______________________________________________________________________________
An update that fixes 6 vulnerabilities is now available.
Description:
Mozilla Firefox was updated to 31.6.0 ESR to fix five security issues.
The following vulnerabilities were fixed:
* Miscellaneous memory safety hazards (MFSA
2015-30/CVE-2015-0814/CVE-2015-0815)
* Use-after-free when using the Fluendo MP3 GStreamer plugin (MFSA
2015-31/CVE-2015-0813)
* resource:// documents can load privileged pages (MFSA
2015-33/CVE-2015-0816)
* CORS requests should not follow 30x redirections after preflight (MFSA
2015-37/CVE-2015-0807)
* Same-origin bypass through anchor navigation (MFSA 2015-40/CVE-2015-0801)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2015-165=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Desktop 12 (x86_64):
MozillaFirefox-31.6.0esr-30.1
MozillaFirefox-debuginfo-31.6.0esr-30.1
MozillaFirefox-debugsource-31.6.0esr-30.1
MozillaFirefox-translations-31.6.0esr-30.1
References:
https://www.suse.com/security/cve/CVE-2015-0801.html
https://www.suse.com/security/cve/CVE-2015-0807.html
https://www.suse.com/security/cve/CVE-2015-0813.html
https://www.suse.com/security/cve/CVE-2015-0814.html
https://www.suse.com/security/cve/CVE-2015-0815.html
https://www.suse.com/security/cve/CVE-2015-0816.html
https://bugzilla.suse.com/925368
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0

[security-announce] SUSE-SU-2015:0704-1: important: Security update for MozillaFirefox
by opensuse-security@opensuse.org 10 Apr '15
by opensuse-security@opensuse.org 10 Apr '15
10 Apr '15
SUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0704-1
Rating: important
References: #925368
Cross-References: CVE-2015-0801 CVE-2015-0807 CVE-2015-0813
CVE-2015-0814 CVE-2015-0815 CVE-2015-0816
Affected Products:
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux …
[View More]Enterprise Server 12
______________________________________________________________________________
An update that fixes 6 vulnerabilities is now available.
Description:
Mozilla Firefox was updated to 31.6.0 ESR to fix five security issues.
The following vulnerabilities were fixed:
* Miscellaneous memory safety hazards (MFSA
2015-30/CVE-2015-0814/CVE-2015-0815)
* Use-after-free when using the Fluendo MP3 GStreamer plugin (MFSA
2015-31/CVE-2015-0813)
* resource:// documents can load privileged pages (MFSA
2015-33/CVE-2015-0816)
* CORS requests should not follow 30x redirections after preflight (MFSA
2015-37/CVE-2015-0807)
* Same-origin bypass through anchor navigation (MFSA 2015-40/CVE-2015-0801)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12:
zypper in -t patch SUSE-SLE-SDK-12-2015-165=1
- SUSE Linux Enterprise Server 12:
zypper in -t patch SUSE-SLE-SERVER-12-2015-165=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):
MozillaFirefox-debuginfo-31.6.0esr-30.1
MozillaFirefox-debugsource-31.6.0esr-30.1
MozillaFirefox-devel-31.6.0esr-30.1
- SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
MozillaFirefox-31.6.0esr-30.1
MozillaFirefox-debuginfo-31.6.0esr-30.1
MozillaFirefox-debugsource-31.6.0esr-30.1
MozillaFirefox-translations-31.6.0esr-30.1
References:
https://www.suse.com/security/cve/CVE-2015-0801.html
https://www.suse.com/security/cve/CVE-2015-0807.html
https://www.suse.com/security/cve/CVE-2015-0813.html
https://www.suse.com/security/cve/CVE-2015-0814.html
https://www.suse.com/security/cve/CVE-2015-0815.html
https://www.suse.com/security/cve/CVE-2015-0816.html
https://bugzilla.suse.com/925368
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0

[security-announce] SUSE-SU-2015:0702-1: important: Security update for libXfont
by opensuse-security@opensuse.org 10 Apr '15
by opensuse-security@opensuse.org 10 Apr '15
10 Apr '15
SUSE Security Update: Security update for libXfont
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0702-1
Rating: important
References: #921978
Cross-References: CVE-2015-1802 CVE-2015-1803 CVE-2015-1804
Affected Products:
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise …
[View More]Desktop 12
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
LibXFont was updated to fix security problems.
Following security issues were fixed:
- CVE-2015-1802: The bdf parser reads a count for the number of properties
defined in a font from the font file, and allocates arrays with entries
for each property based on that count. It never checked to see if that
count was negative, or large enough to overflow when multiplied by the
size
of the structures being allocated, and could thus allocate the wrong
buffer size, leading to out of bounds writes.
- CVE-2015-1803: If the bdf parser failed to parse the data for the bitmap
for any character, it would proceed with an invalid pointer to the
bitmap data and later crash when trying to read the bitmap from that
pointer.
- CVE-2015-1804: The bdf parser read metrics values as 32-bit integers,
but stored them into 16-bit integers. Overflows could occur in various
operations leading to out-of-bounds memory access.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12:
zypper in -t patch SUSE-SLE-SDK-12-2015-161=1
- SUSE Linux Enterprise Server 12:
zypper in -t patch SUSE-SLE-SERVER-12-2015-161=1
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2015-161=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):
libXfont-debugsource-1.4.7-4.1
libXfont-devel-1.4.7-4.1
- SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
libXfont-debugsource-1.4.7-4.1
libXfont1-1.4.7-4.1
libXfont1-debuginfo-1.4.7-4.1
- SUSE Linux Enterprise Desktop 12 (x86_64):
libXfont-debugsource-1.4.7-4.1
libXfont1-1.4.7-4.1
libXfont1-debuginfo-1.4.7-4.1
References:
https://www.suse.com/security/cve/CVE-2015-1802.html
https://www.suse.com/security/cve/CVE-2015-1803.html
https://www.suse.com/security/cve/CVE-2015-1804.html
https://bugzilla.suse.com/921978
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0

[security-announce] openSUSE-SU-2015:0682-1: important: Security update for Chromium
by opensuse-security@opensuse.org 08 Apr '15
by opensuse-security@opensuse.org 08 Apr '15
08 Apr '15
openSUSE Security Update: Security update for Chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:0682-1
Rating: important
References: #925713 #925714
Cross-References: CVE-2015-1233 CVE-2015-1234
Affected Products:
openSUSE 13.2
openSUSE 13.1
______________________________________________________________________________
An update that fixes two …
[View More]vulnerabilities is now available.
Description:
Chromium was updated to 41.0.2272.118 to fix two security issues.
The following vulnerabilities were fixed:
* A combination of V8, Gamepad and IPC bugs could lead to remote code
execution outside of the sandbox (CVE-2015-1233, boo#925713)
* Buffer overflow via race condition in GPU (CVE-2015-1234, boo#925714)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2015-298=1
- openSUSE 13.1:
zypper in -t patch openSUSE-2015-298=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
chromedriver-41.0.2272.118-20.1
chromedriver-debuginfo-41.0.2272.118-20.1
chromium-41.0.2272.118-20.1
chromium-debuginfo-41.0.2272.118-20.1
chromium-debugsource-41.0.2272.118-20.1
chromium-desktop-gnome-41.0.2272.118-20.1
chromium-desktop-kde-41.0.2272.118-20.1
chromium-ffmpegsumo-41.0.2272.118-20.1
chromium-ffmpegsumo-debuginfo-41.0.2272.118-20.1
- openSUSE 13.1 (i586 x86_64):
chromedriver-41.0.2272.118-75.1
chromedriver-debuginfo-41.0.2272.118-75.1
chromium-41.0.2272.118-75.1
chromium-debuginfo-41.0.2272.118-75.1
chromium-debugsource-41.0.2272.118-75.1
chromium-desktop-gnome-41.0.2272.118-75.1
chromium-desktop-kde-41.0.2272.118-75.1
chromium-ffmpegsumo-41.0.2272.118-75.1
chromium-ffmpegsumo-debuginfo-41.0.2272.118-75.1
References:
https://www.suse.com/security/cve/CVE-2015-1233.html
https://www.suse.com/security/cve/CVE-2015-1234.html
https://bugzilla.suse.com/925713
https://bugzilla.suse.com/925714
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0

[security-announce] openSUSE-SU-2015:0677-1: important: Security update for MozillaFirefox, MozillaThunderbird, mozilla-nspr
by opensuse-security@opensuse.org 08 Apr '15
by opensuse-security@opensuse.org 08 Apr '15
08 Apr '15
openSUSE Security Update: Security update for MozillaFirefox, MozillaThunderbird, mozilla-nspr
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:0677-1
Rating: important
References: #925368 #925392 #925393 #925394 #925395 #925396
#925397 #925398 #925399 #925400 #925401 #925402
#926166
Cross-References: CVE-2015-0799 CVE-2015-0801 CVE-2015-0802
…
[View More]CVE-2015-0803 CVE-2015-0804 CVE-2015-0805
CVE-2015-0806 CVE-2015-0807 CVE-2015-0808
CVE-2015-0811 CVE-2015-0812 CVE-2015-0813
CVE-2015-0814 CVE-2015-0815 CVE-2015-0816
Affected Products:
openSUSE 13.2
openSUSE 13.1
______________________________________________________________________________
An update that fixes 15 vulnerabilities is now available.
Description:
Mozilla Firefox and Thunderbird were updated to fix several important
vulnerabilities.
Mozilla Firefox was updated to 37.0.1. Mozilla Thunderbird was updated to
31.6.0. mozilla-nspr was updated to 4.10.8 as a dependency.
The following vulnerabilities were fixed in Mozilla Firefox:
* Miscellaneous memory safety hazards (MFSA
2015-30/CVE-2015-0814/CVE-2015-0815 boo#925392)
* Use-after-free when using the Fluendo MP3 GStreamer plugin (MFSA
2015-31/CVE-2015-0813 bmo#1106596 boo#925393)
* Add-on lightweight theme installation approval bypassed through MITM
attack (MFSA 2015-32/CVE-2015-0812 bmo#1128126 boo#925394)
* resource:// documents can load privileged pages (MFSA
2015-33/CVE-2015-0816 bmo#1144991 boo#925395)
* Out of bounds read in QCMS library (MFSA-2015-34/CVE-2015-0811
bmo#1132468 boo#925396)
* Incorrect memory management for simple-type arrays in WebRTC
(MFSA-2015-36/CVE-2015-0808 bmo#1109552 boo#925397)
* CORS requests should not follow 30x redirections after preflight
(MFSA-2015-37/CVE-2015-0807 bmo#1111834 boo#925398)
* Memory corruption crashes in Off Main Thread Compositing
(MFSA-2015-38/CVE-2015-0805/CVE-2015-0806 bmo#1135511 bmo#1099437
boo#925399)
* Use-after-free due to type confusion flaws
(MFSA-2015-39/CVE-2015-0803/CVE-2015-0804 (mo#1134560 boo#925400)
* Same-origin bypass through anchor navigation (MFSA-2015-40/CVE-2015-0801
bmo#1146339 boo#925401)
* Windows can retain access to privileged content on navigation to
unprivileged pages (MFSA-2015-42/CVE-2015-0802 bmo#1124898 boo#925402)
The following vulnerability was fixed in functionality that was not
released as an update to openSUSE:
* Certificate verification could be bypassed through the HTTP/2 Alt-Svc
header (MFSA 2015-44/CVE-2015-0799 bmo#1148328 bnc#926166)
The functionality added in 37.0 and thus removed in 37.0.1 was:
* Opportunistically encrypt HTTP traffic where the server supports HTTP/2
AltSvc
The following functionality was added or updated in Mozilla Firefox:
* Heartbeat user rating system
* Yandex set as default search provider for the Turkish locale
* Bing search now uses HTTPS for secure searching
* Improved protection against site impersonation via OneCRL centralized
certificate revocation
* some more behaviour changes for TLS
The following vulnerabilities were fixed in Mozilla Thunderbird:
* Miscellaneous memory safety hazards (MFSA
2015-30/CVE-2015-0814/CVE-2015-0815 boo#925392)
* Use-after-free when using the Fluendo MP3 GStreamer plugin (MFSA
2015-31/CVE-2015-0813 bmo#1106596 boo#925393)
* resource:// documents can load privileged pages (MFSA
2015-33/CVE-2015-0816 bmo#1144991 boo#925395)
* CORS requests should not follow 30x redirections after preflight
(MFSA-2015-37/CVE-2015-0807 bmo#1111834 boo#925398)
* Same-origin bypass through anchor navigation (MFSA-2015-40/CVE-2015-0801
bmo#1146339 boo#925401)
mozilla-nspr was updated to 4.10.8 as a dependency and received the
following changes:
* bmo#573192: remove the stack-based PRFileDesc cache.
* bmo#756047: check for _POSIX_THREAD_PRIORITY_SCHEDULING > 0 instead of
only checking if the identifier is defined.
* bmo#1089908: Fix variable shadowing in _PR_MD_LOCKFILE. Use
PR_ARRAY_SIZE to get the array size of _PR_RUNQ(t->cpu).
* bmo#1106600: Replace PR_ASSERT(!"foo") with PR_NOT_REACHED("foo") to
fix clang -Wstring-conversion warnings.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2015-290=1
- openSUSE 13.1:
zypper in -t patch openSUSE-2015-290=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
MozillaFirefox-37.0.1-23.1
MozillaFirefox-branding-upstream-37.0.1-23.1
MozillaFirefox-buildsymbols-37.0.1-23.1
MozillaFirefox-debuginfo-37.0.1-23.1
MozillaFirefox-debugsource-37.0.1-23.1
MozillaFirefox-devel-37.0.1-23.1
MozillaFirefox-translations-common-37.0.1-23.1
MozillaFirefox-translations-other-37.0.1-23.1
MozillaThunderbird-31.6.0-15.3
MozillaThunderbird-buildsymbols-31.6.0-15.3
MozillaThunderbird-debuginfo-31.6.0-15.3
MozillaThunderbird-debugsource-31.6.0-15.3
MozillaThunderbird-devel-31.6.0-15.3
MozillaThunderbird-translations-common-31.6.0-15.3
MozillaThunderbird-translations-other-31.6.0-15.3
mozilla-nspr-4.10.8-6.1
mozilla-nspr-debuginfo-4.10.8-6.1
mozilla-nspr-debugsource-4.10.8-6.1
mozilla-nspr-devel-4.10.8-6.1
- openSUSE 13.2 (x86_64):
mozilla-nspr-32bit-4.10.8-6.1
mozilla-nspr-debuginfo-32bit-4.10.8-6.1
- openSUSE 13.1 (i586 x86_64):
MozillaFirefox-37.0.1-68.1
MozillaFirefox-branding-upstream-37.0.1-68.1
MozillaFirefox-buildsymbols-37.0.1-68.1
MozillaFirefox-debuginfo-37.0.1-68.1
MozillaFirefox-debugsource-37.0.1-68.1
MozillaFirefox-devel-37.0.1-68.1
MozillaFirefox-translations-common-37.0.1-68.1
MozillaFirefox-translations-other-37.0.1-68.1
MozillaThunderbird-31.6.0-70.50.2
MozillaThunderbird-buildsymbols-31.6.0-70.50.2
MozillaThunderbird-debuginfo-31.6.0-70.50.2
MozillaThunderbird-debugsource-31.6.0-70.50.2
MozillaThunderbird-devel-31.6.0-70.50.2
MozillaThunderbird-translations-common-31.6.0-70.50.2
MozillaThunderbird-translations-other-31.6.0-70.50.2
mozilla-nspr-4.10.8-22.1
mozilla-nspr-debuginfo-4.10.8-22.1
mozilla-nspr-debugsource-4.10.8-22.1
mozilla-nspr-devel-4.10.8-22.1
- openSUSE 13.1 (x86_64):
mozilla-nspr-32bit-4.10.8-22.1
mozilla-nspr-debuginfo-32bit-4.10.8-22.1
References:
https://www.suse.com/security/cve/CVE-2015-0799.html
https://www.suse.com/security/cve/CVE-2015-0801.html
https://www.suse.com/security/cve/CVE-2015-0802.html
https://www.suse.com/security/cve/CVE-2015-0803.html
https://www.suse.com/security/cve/CVE-2015-0804.html
https://www.suse.com/security/cve/CVE-2015-0805.html
https://www.suse.com/security/cve/CVE-2015-0806.html
https://www.suse.com/security/cve/CVE-2015-0807.html
https://www.suse.com/security/cve/CVE-2015-0808.html
https://www.suse.com/security/cve/CVE-2015-0811.html
https://www.suse.com/security/cve/CVE-2015-0812.html
https://www.suse.com/security/cve/CVE-2015-0813.html
https://www.suse.com/security/cve/CVE-2015-0814.html
https://www.suse.com/security/cve/CVE-2015-0815.html
https://www.suse.com/security/cve/CVE-2015-0816.html
https://bugzilla.suse.com/925368
https://bugzilla.suse.com/925392
https://bugzilla.suse.com/925393
https://bugzilla.suse.com/925394
https://bugzilla.suse.com/925395
https://bugzilla.suse.com/925396
https://bugzilla.suse.com/925397
https://bugzilla.suse.com/925398
https://bugzilla.suse.com/925399
https://bugzilla.suse.com/925400
https://bugzilla.suse.com/925401
https://bugzilla.suse.com/925402
https://bugzilla.suse.com/926166
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0

[security-announce] SUSE-SU-2015:0674-1: important: Security update for xorg-x11-libs
by opensuse-security@opensuse.org 07 Apr '15
by opensuse-security@opensuse.org 07 Apr '15
07 Apr '15
SUSE Security Update: Security update for xorg-x11-libs
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0674-1
Rating: important
References: #921978
Cross-References: CVE-2015-1802 CVE-2015-1803 CVE-2015-1804
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Server 11 SP3 for VMware
…
[View More]SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
LibXFont was updated to fix security problems that could be used by local
attackers to gain X server privileges (root).
The following security issues have been fixed:
*
CVE-2015-1802: The bdf parser reads a count for the number of
properties defined in a font from the font file, and allocates arrays with
entries for each property based on that count. It never checked to see if
that count was negative, or large enough to overflow when multiplied by
the size of the structures being allocated, and could thus allocate the
wrong buffer size, leading to out of bounds writes.
*
CVE-2015-1803: If the bdf parser failed to parse the data for the
bitmap for any character, it would proceed with an invalid pointer to the
bitmap data and later crash when trying to read the bitmap from that
pointer.
*
CVE-2015-1804: The bdf parser read metrics values as 32-bit
integers, but stored them into 16-bit integers. Overflows could occur in
various operations leading to out-of-bounds memory access.
Security Issues:
* CVE-2015-1802
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802>
* CVE-2015-1803
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803>
* CVE-2015-1804
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP3:
zypper in -t patch sdksp3-xorg-x11-devel=10487
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-xorg-x11-devel=10487
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-xorg-x11-devel=10487
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-xorg-x11-devel=10487
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):
xorg-x11-devel-7.4-8.26.44.1
- SUSE Linux Enterprise Software Development Kit 11 SP3 (ppc64 s390x x86_64):
xorg-x11-devel-32bit-7.4-8.26.44.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
xorg-x11-libs-7.4-8.26.44.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):
xorg-x11-libs-32bit-7.4-8.26.44.1
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
xorg-x11-libs-7.4-8.26.44.1
- SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64):
xorg-x11-libs-32bit-7.4-8.26.44.1
- SUSE Linux Enterprise Server 11 SP3 (ia64):
xorg-x11-libs-x86-7.4-8.26.44.1
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):
xorg-x11-libs-7.4-8.26.44.1
- SUSE Linux Enterprise Desktop 11 SP3 (x86_64):
xorg-x11-libs-32bit-7.4-8.26.44.1
References:
https://www.suse.com/security/cve/CVE-2015-1802.html
https://www.suse.com/security/cve/CVE-2015-1803.html
https://www.suse.com/security/cve/CVE-2015-1804.html
https://bugzilla.suse.com/921978
https://download.suse.com/patch/finder/?keywords=9bf31baa0e7f2f9f6297b4bbb4…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0

[security-announce] SUSE-SU-2015:0658-1: important: Security Update for Linux Kernel
by opensuse-security@opensuse.org 02 Apr '15
by opensuse-security@opensuse.org 02 Apr '15
02 Apr '15
SUSE Security Update: Security Update for Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0658-1
Rating: important
References: #898675 #903997 #904242 #909309 #909477 #909684
#910517 #913080 #914818 #915200 #915660 #917830
#918584 #918615 #918620 #918644 #919463 #919719
#919939 #920615 #920805 #920839 #921313 #921527
…
[View More] #921990 #922272 #922275 #922278 #922284 #924460
Cross-References: CVE-2015-0777 CVE-2015-2150
Affected Products:
SUSE Linux Enterprise Workstation Extension 12
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Module for Public Cloud 12
SUSE Linux Enterprise Live Patching 12
SUSE Linux Enterprise Desktop 12
______________________________________________________________________________
An update that solves two vulnerabilities and has 28 fixes
is now available.
Description:
The SUSE Linux Enterprise Server 12 kernel was updated to 3.12.39 to
receive various security and bugfixes.
Following security bugs were fixed:
- CVE-2015-0777: The XEN usb backend could leak information to the guest
system due to copying uninitialized memory.
- CVE-2015-2150: Xen and the Linux kernel did not properly restrict access
to PCI command registers, which might have allowed local guest users to
cause a denial of service (non-maskable interrupt and host crash) by
disabling the (1) memory or (2) I/O decoding for a PCI Express device
and then accessing the device, which triggers an Unsupported Request
(UR) response.
The following non-security bugs were fixed:
- Added Little Endian support to vtpm module (bsc#918620).
- Add support for pnfs block layout. Patches not included by default yet
- ALSA: hda - Fix regression of HD-audio controller fallback modes
(bsc#921313).
- btrfs: add missing blk_finish_plug in btrfs_sync_log() (bnc#922284).
- btrfs: cleanup orphans while looking up default subvolume (bsc#914818).
- btrfs: do not ignore errors from btrfs_lookup_xattr in do_setxattr
(bnc#922272).
- btrfs: fix BUG_ON in btrfs_orphan_add() when delete unused block group
(bnc#922278).
- btrfs: fix data loss in the fast fsync path (bnc#922275).
- btrfs: fix fsync data loss after adding hard link to inode (bnc#922275).
- cgroup: revert cgroup_mutex removal from idr_remove (bnc#918644).
- cifs: fix use-after-free bug in find_writable_file (bnc#909477).
- crypto: rng - RNGs must return 0 in success case (bsc#920805).
- crypto: testmgr - fix RNG return code enforcement (bsc#920805).
- exit: Always reap resource stats in __exit_signal() (Time scalability).
- fork: report pid reservation failure properly (bnc#909684).
- fsnotify: Fix handling of renames in audit (bnc#915200).
- HID: hyperv: match wait_for_completion_timeout return type.
- hv: address compiler warnings for hv_fcopy_daemon.c.
- hv: address compiler warnings for hv_kvp_daemon.c.
- hv: check vmbus_device_create() return value in vmbus_process_offer().
- hv: do not add redundant / in hv_start_fcopy().
- hv: hv_balloon: Do not post pressure status from interrupt context.
- hv: hv_balloon: Fix a locking bug in the balloon driver.
- hv: hv_balloon: Make adjustments in computing the floor.
- hv: hv_fcopy: drop the obsolete message on transfer failure.
- hv: kvp_daemon: make IPv6-only-injection work.
- hv: remove unused bytes_written from kvp_update_file().
- hv: rename sc_lock to the more generic lock.
- hv: vmbus: Fix a bug in vmbus_establish_gpadl().
- hv: vmbus: hv_process_timer_expiration() can be static.
- hv: vmbus: Implement a clockevent device.
- hv: vmbus: serialize Offer and Rescind offer.
- hv: vmbus: Support a vmbus API for efficiently sending page arrays.
- hv: vmbus: Use get_cpu() to get the current CPU.
- hyperv: fix sparse warnings.
- hyperv: Fix the error processing in netvsc_send().
- hyperv: match wait_for_completion_timeout return type.
- hyperv: netvsc.c: match wait_for_completion_timeout return type.
- iommu/vt-d: Fix dmar_domain leak in iommu_attach_device (bsc#924460).
- kabi, mm: prevent endless growth of anon_vma hierarchy (bnc#904242).
- kABI: protect linux/namei.h include in procfs.
- kABI: protect struct hif_scatter_req.
- kabi/severities: Stop maintaining the kgraft kabi
- kernel/sched/clock.c: add another clock for use with the soft lockup
watchdog (bsc#919939).
- kgr: Allow patches to require an exact kernel version (bnc#920615).
- KVM: PPC: Book3S HV: ptes are big endian (bsc#920839).
- mm: convert the rest to new page table lock api (the suse-only cases)
(fate#315482).
- mm: fix anon_vma->degree underflow in anon_vma endless growing
prevention (bnc#904242).
- mm: fix corner case in anon_vma endless growing prevention (bnc#904242).
- mm: prevent endless growth of anon_vma hierarchy (bnc#904242).
- mm: prevent endless growth of anon_vma hierarchy mm: prevent endless
growth of anon_vma hierarchy (bnc#904242).
- mm: vmscan: count only dirty pages as congested (VM Performance,
bnc#910517).
- module: Clean up ro/nx after early module load failures (bsc#921990).
- module: set nx before marking module MODULE_STATE_COMING (bsc#921990).
- net: add sysfs helpers for netdev_adjacent logic (bnc#915660).
- net: correct error path in rtnl_newlink() (bnc#915660).
- net: fix creation adjacent device symlinks (bnc#915660).
- net: prevent of emerging cross-namespace symlinks (bnc#915660).
- net: rename sysfs symlinks on device name change (bnc#915660).
- nfs: cap request size to fit a kmalloced page array (bnc#898675).
- nfs: commit layouts in fdatasync (bnc#898675).
- NFSv4.1: Do not trust attributes if a pNFS LAYOUTCOMMIT is outstanding
(bnc#898675).
- NFSv4.1: Ensure that the layout recall callback matches layout stateids
(bnc#898675).
- NFSv4.1: Ensure that we free existing layout segments if we get a new
layout (bnc#898675).
- NFSv4.1: Fix a race in nfs4_write_inode (bnc#898675).
- NFSv4.1: Fix wraparound issues in pnfs_seqid_is_newer() (bnc#898675).
- NFSv4.1: Minor optimisation in get_layout_by_fh_locked() (bnc#898675).
- NFSv4: Do not update the open stateid unless it is newer than the old
one (bnc#898675).
- pnfs: add a common GETDEVICELIST implementation (bnc#898675).
- pnfs: add a nfs4_get_deviceid helper (bnc#898675).
- pnfs: add flag to force read-modify-write in ->write_begin
(bnc#898675).
- pnfs: add return_range method (bnc#898675).
- pnfs: allow splicing pre-encoded pages into the layoutcommit args
(bnc#898675).
- pnfs: avoid using stale stateids after layoutreturn (bnc#898675).
- pnfs/blocklayout: allocate separate pages for the layoutcommit payload
(bnc#898675).
- pnfs/blocklayout: correctly decrement extent length (bnc#898675).
- pnfs/blocklayout: do not set pages uptodate (bnc#898675).
- pnfs/blocklayout: Fix a 64-bit division/remainder issue in bl_map_stripe
(bnc#898675).
- pnfs/blocklayout: implement the return_range method (bnc#898675).
- pnfs/blocklayout: improve GETDEVICEINFO error reporting (bnc#898675).
- pnfs/blocklayout: include vmalloc.h for __vmalloc (bnc#898675).
- pnfs/blocklayout: in-kernel GETDEVICEINFO XDR parsing (bnc#898675).
- pnfs/blocklayout: move all rpc_pipefs related code into a single file
(bnc#898675).
- pnfs/blocklayout: move extent processing to blocklayout.c (bnc#898675).
- pnfs/blocklayout: plug block queues (bnc#898675).
- pnfs/blocklayout: refactor extent processing (bnc#898675).
- pnfs/blocklayout: reject pnfs blocksize larger than page size
(bnc#898675).
- pNFS/blocklayout: Remove a couple of unused variables (bnc#898675).
- pnfs/blocklayout: remove read-modify-write handling in bl_write_pagelist
(bnc#898675).
- pnfs/blocklayout: remove some debugging (bnc#898675).
- pnfs/blocklayout: return layouts on setattr (bnc#898675).
- pnfs/blocklayout: rewrite extent tracking (bnc#898675).
- pnfs/blocklayout: use the device id cache (bnc#898675).
- pnfs: do not check sequence on new stateids in layoutget (bnc#898675).
- pnfs: do not pass uninitialized lsegs to ->free_lseg (bnc#898675).
- pnfs: enable CB_NOTIFY_DEVICEID support (bnc#898675).
- pnfs: factor GETDEVICEINFO implementations (bnc#898675).
- pnfs: force a layout commit when encountering busy segments during
recall (bnc#898675).
- pnfs: remove GETDEVICELIST implementation (bnc#898675).
- pnfs: retry after a bad stateid error from layoutget (bnc#898675).
- powerpc: add running_clock for powerpc to prevent spurious softlockup
warnings (bsc#919939).
- powerpc/pseries: Fix endian problems with LE migration (bsc#918584).
- remove cgroup_mutex around deactivate_super because it might be
dangerous.
- rtmutex: Document pi chain walk (mutex scalability).
- rtmutex: No need to keep task ref for lock owner check (mutex
scalability).
- rtmutex: Simplify rtmutex_slowtrylock() (mutex scalability).
- rtnetlink: fix a memory leak when ->newlink fails (bnc#915660).
- sched: Change thread_group_cputime() to use for_each_thread() (Time
scalability).
- sched: replace INIT_COMPLETION with reinit_completion.
- sched, time: Atomically increment stime & utime (Time scalability).
- scsi: storvsc: Always send on the selected outgoing channel.
- scsi: storvsc: Do not assume that the scatterlist is not chained.
- scsi: storvsc: Enable clustering.
- scsi: storvsc: Fix a bug in copy_from_bounce_buffer().
- scsi: storvsc: Increase the ring buffer size.
- scsi: storvsc: Retrieve information about the capability of the target.
- scsi: storvsc: Set the tablesize based on the information given by the
host.
- scsi: storvsc: Size the queue depth based on the ringbuffer size.
- storvsc: fix a bug in storvsc limits.
- storvsc: force discovery of LUNs that may have been removed.
- storvsc: force SPC-3 compliance on win8 and win8 r2 hosts.
- storvsc: in responce to a scan event, scan the host.
- take read_seqbegin_or_lock() and friends to seqlock.h (Time scalability).
- tcp: prevent fetching dst twice in early demux code (bnc#903997
bnc#919719).
- time, signal: Protect resource use statistics with seqlock -kabi (Time
scalability).
- time, signal: Protect resource use statistics with seqlock (Time
scalability).
- udp: only allow UFO for packets from SOCK_DGRAM sockets (bnc#909309).
- Update Xen patches to 3.12.39.
- virtio: rng: add derating factor for use by hwrng core (bsc#918615).
- x86, AVX-512: AVX-512 Feature Detection (bsc#921527).
- x86, AVX-512: Enable AVX-512 States Context Switch (bsc#921527).
- xenbus: add proper handling of XS_ERROR from Xenbus for transactions.
- xfs: xfs_alloc_fix_minleft can underflow near ENOSPC (bnc#913080).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12:
zypper in -t patch SUSE-SLE-WE-12-2015-152=1
- SUSE Linux Enterprise Software Development Kit 12:
zypper in -t patch SUSE-SLE-SDK-12-2015-152=1
- SUSE Linux Enterprise Server 12:
zypper in -t patch SUSE-SLE-SERVER-12-2015-152=1
- SUSE Linux Enterprise Module for Public Cloud 12:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2015-152=1
- SUSE Linux Enterprise Live Patching 12:
zypper in -t patch SUSE-SLE-Live-Patching-12-2015-152=1
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2015-152=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12 (x86_64):
kernel-default-debuginfo-3.12.39-47.1
kernel-default-debugsource-3.12.39-47.1
kernel-default-extra-3.12.39-47.1
kernel-default-extra-debuginfo-3.12.39-47.1
- SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):
kernel-obs-build-3.12.39-47.2
kernel-obs-build-debugsource-3.12.39-47.2
- SUSE Linux Enterprise Software Development Kit 12 (noarch):
kernel-docs-3.12.39-47.3
- SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
kernel-default-3.12.39-47.1
kernel-default-base-3.12.39-47.1
kernel-default-base-debuginfo-3.12.39-47.1
kernel-default-debuginfo-3.12.39-47.1
kernel-default-debugsource-3.12.39-47.1
kernel-default-devel-3.12.39-47.1
kernel-syms-3.12.39-47.1
- SUSE Linux Enterprise Server 12 (x86_64):
kernel-xen-3.12.39-47.1
kernel-xen-base-3.12.39-47.1
kernel-xen-base-debuginfo-3.12.39-47.1
kernel-xen-debuginfo-3.12.39-47.1
kernel-xen-debugsource-3.12.39-47.1
kernel-xen-devel-3.12.39-47.1
- SUSE Linux Enterprise Server 12 (noarch):
kernel-devel-3.12.39-47.1
kernel-macros-3.12.39-47.1
kernel-source-3.12.39-47.1
- SUSE Linux Enterprise Server 12 (s390x):
kernel-default-man-3.12.39-47.1
- SUSE Linux Enterprise Module for Public Cloud 12 (x86_64):
kernel-ec2-3.12.39-47.1
kernel-ec2-debuginfo-3.12.39-47.1
kernel-ec2-debugsource-3.12.39-47.1
kernel-ec2-devel-3.12.39-47.1
kernel-ec2-extra-3.12.39-47.1
kernel-ec2-extra-debuginfo-3.12.39-47.1
- SUSE Linux Enterprise Live Patching 12 (x86_64):
kgraft-patch-3_12_39-47-default-1-2.1
kgraft-patch-3_12_39-47-xen-1-2.1
- SUSE Linux Enterprise Desktop 12 (x86_64):
kernel-default-3.12.39-47.1
kernel-default-debuginfo-3.12.39-47.1
kernel-default-debugsource-3.12.39-47.1
kernel-default-devel-3.12.39-47.1
kernel-default-extra-3.12.39-47.1
kernel-default-extra-debuginfo-3.12.39-47.1
kernel-syms-3.12.39-47.1
kernel-xen-3.12.39-47.1
kernel-xen-debuginfo-3.12.39-47.1
kernel-xen-debugsource-3.12.39-47.1
kernel-xen-devel-3.12.39-47.1
- SUSE Linux Enterprise Desktop 12 (noarch):
kernel-devel-3.12.39-47.1
kernel-macros-3.12.39-47.1
kernel-source-3.12.39-47.1
References:
https://www.suse.com/security/cve/CVE-2015-0777.html
https://www.suse.com/security/cve/CVE-2015-2150.html
https://bugzilla.suse.com/898675
https://bugzilla.suse.com/903997
https://bugzilla.suse.com/904242
https://bugzilla.suse.com/909309
https://bugzilla.suse.com/909477
https://bugzilla.suse.com/909684
https://bugzilla.suse.com/910517
https://bugzilla.suse.com/913080
https://bugzilla.suse.com/914818
https://bugzilla.suse.com/915200
https://bugzilla.suse.com/915660
https://bugzilla.suse.com/917830
https://bugzilla.suse.com/918584
https://bugzilla.suse.com/918615
https://bugzilla.suse.com/918620
https://bugzilla.suse.com/918644
https://bugzilla.suse.com/919463
https://bugzilla.suse.com/919719
https://bugzilla.suse.com/919939
https://bugzilla.suse.com/920615
https://bugzilla.suse.com/920805
https://bugzilla.suse.com/920839
https://bugzilla.suse.com/921313
https://bugzilla.suse.com/921527
https://bugzilla.suse.com/921990
https://bugzilla.suse.com/922272
https://bugzilla.suse.com/922275
https://bugzilla.suse.com/922278
https://bugzilla.suse.com/922284
https://bugzilla.suse.com/924460
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0

[security-announce] SUSE-SU-2015:0652-1: important: Security update for Linux kernel
by opensuse-security@opensuse.org 02 Apr '15
by opensuse-security@opensuse.org 02 Apr '15
02 Apr '15
SUSE Security Update: Security update for Linux kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0652-1
Rating: important
References: #771619 #833820 #846404 #857643 #875051 #885077
#891211 #892235 #896390 #896391 #896779 #899338
#902346 #902349 #902351 #904700 #905100 #905312
#907822 #908870 #911325 #912654 #912705 #912916
…
[View More] #913059 #915335 #915826
Cross-References: CVE-2010-5313 CVE-2012-6657 CVE-2013-4299
CVE-2013-7263 CVE-2014-0181 CVE-2014-3184
CVE-2014-3185 CVE-2014-3673 CVE-2014-3687
CVE-2014-3688 CVE-2014-7841 CVE-2014-7842
CVE-2014-8160 CVE-2014-8709 CVE-2014-9420
CVE-2014-9584 CVE-2014-9585
Affected Products:
SUSE Linux Enterprise Server 11 SP1 LTSS
SLE 11 SERVER Unsupported Extras
______________________________________________________________________________
An update that solves 17 vulnerabilities and has 10 fixes
is now available. It includes one version update.
Description:
The SUSE Linux Enterprise 11 Service Pack 1 LTSS kernel was updated to fix
security issues on kernels on the x86_64 architecture.
The following security bugs have been fixed:
* CVE-2013-4299: Interpretation conflict in
drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6
allowed remote authenticated users to obtain sensitive information
or modify data via a crafted mapping to a snapshot block device
(bnc#846404).
* CVE-2014-8160: SCTP firewalling failed until the SCTP module was
loaded (bnc#913059).
* CVE-2014-9584: The parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel before 3.18.2 did not validate a
length value in the Extensions Reference (ER) System Use Field,
which allowed local users to obtain sensitive information from
kernel memory via a crafted iso9660 image (bnc#912654).
* CVE-2014-9585: The vdso_addr function in arch/x86/vdso/vma.c in the
Linux kernel through 3.18.2 did not properly choose memory locations
for the vDSO area, which made it easier for local users to bypass
the ASLR protection mechanism by guessing a location at the end of a
PMD (bnc#912705).
* CVE-2014-9420: The rock_continue function in fs/isofs/rock.c in the
Linux kernel through 3.18.1 did not restrict the number of Rock
Ridge continuation entries, which allowed local users to cause a
denial of service (infinite loop, and system crash or hang) via a
crafted iso9660 image (bnc#911325).
* CVE-2014-0181: The Netlink implementation in the Linux kernel
through 3.14.1 did not provide a mechanism for authorizing socket
operations based on the opener of a socket, which allowed local
users to bypass intended access restrictions and modify network
configurations by using a Netlink socket for the (1) stdout or (2)
stderr of a setuid program (bnc#875051).
* CVE-2010-5313: Race condition in arch/x86/kvm/x86.c in the Linux
kernel before 2.6.38 allowed L2 guest OS users to cause a denial of
service (L1 guest OS crash) via a crafted instruction that triggers
an L2 emulation failure report, a similar issue to CVE-2014-7842
(bnc#907822).
* CVE-2014-7842: Race condition in arch/x86/kvm/x86.c in the Linux
kernel before 3.17.4 allowed guest OS users to cause a denial of
service (guest OS crash) via a crafted application that performs an
MMIO transaction or a PIO transaction to trigger a guest userspace
emulation error report, a similar issue to CVE-2010-5313
(bnc#905312).
* CVE-2014-3688: The SCTP implementation in the Linux kernel before
3.17.4 allowed remote attackers to cause a denial of service (memory
consumption) by triggering a large number of chunks in an
associations output queue, as demonstrated by ASCONF probes, related
to net/sctp/inqueue.c and net/sctp/sm_statefuns.c (bnc#902351).
* CVE-2014-3687: The sctp_assoc_lookup_asconf_ack function in
net/sctp/associola.c in the SCTP implementation in the Linux kernel
through 3.17.2 allowed remote attackers to cause a denial of service
(panic) via duplicate ASCONF chunks that trigger an incorrect uncork
within the side-effect interpreter (bnc#902349).
* CVE-2014-3673: The SCTP implementation in the Linux kernel through
3.17.2 allowed remote attackers to cause a denial of service (system
crash) via a malformed ASCONF chunk, related to
net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c (bnc#902346).
* CVE-2014-7841: The sctp_process_param function in
net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux
kernel before 3.17.4, when ASCONF is used, allowed remote attackers
to cause a denial of service (NULL pointer dereference and system
crash) via a malformed INIT chunk (bnc#905100).
* CVE-2014-8709: The ieee80211_fragment function in net/mac80211/tx.c
in the Linux kernel before 3.13.5 did not properly maintain a
certain tail pointer, which allowed remote attackers to obtain
sensitive cleartext information by reading packets (bnc#904700).
* CVE-2013-7263: The Linux kernel before 3.12.4 updated certain length
values before ensuring that associated data structures have been
initialized, which allowed local users to obtain sensitive
information from kernel stack memory via a (1) recvfrom, (2)
recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c,
net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c
(bnc#857643).
* CVE-2012-6657: The sock_setsockopt function in net/core/sock.c in
the Linux kernel before 3.5.7 did not ensure that a keepalive action
is associated with a stream socket, which allowed local users to
cause a denial of service (system crash) by leveraging the ability
to create a raw socket (bnc#896779).
* CVE-2014-3185: Multiple buffer overflows in the
command_port_read_callback function in
drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in
the Linux kernel before 3.16.2 allowed physically proximate
attackers to execute arbitrary code or cause a denial of service
(memory corruption and system crash) via a crafted device that
provides a large amount of (1) EHCI or (2) XHCI data associated with
a bulk response (bnc#896391).
* CVE-2014-3184: The report_fixup functions in the HID subsystem in
the Linux kernel before 3.16.2 might allow physically proximate
attackers to cause a denial of service (out-of-bounds write) via a
crafted device that provides a small report descriptor, related to
(1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3)
drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5)
drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c
(bnc#896390).
The following non-security bugs have been fixed:
* KVM: SVM: Make Use of the generic guest-mode functions (bnc#907822).
* KVM: inject #UD if instruction emulation fails and exit to userspace
(bnc#907822).
* block: Fix bogus partition statistics reports (bnc#885077
bnc#891211).
* block: skip request queue cleanup if no elevator is assigned
(bnc#899338).
* isofs: Fix unchecked printing of ER records.
* Re-enable nested-spinlocks-backport patch for xen (bnc#908870).
* time, ntp: Do not update time_state in middle of leap second
(bnc#912916).
* timekeeping: Avoid possible deadlock from clock_was_set_delayed
(bnc#771619, bnc#915335).
* udf: Check component length before reading it.
* udf: Check path length when reading symlink.
* udf: Verify i_size when loading inode.
* udf: Verify symlink size before loading it.
* vt: prevent race between modifying and reading unicode map
(bnc#915826).
* writeback: Do not sync data dirtied after sync start (bnc#833820).
* xfs: Avoid blocking on inode flush in background inode reclaim
(bnc#892235).
Security Issues:
* CVE-2010-5313
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5313>
* CVE-2012-6657
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6657>
* CVE-2013-4299
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4299>
* CVE-2013-7263
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7263>
* CVE-2014-0181
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0181>
* CVE-2014-3184
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3184>
* CVE-2014-3185
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3185>
* CVE-2014-3673
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3673>
* CVE-2014-3687
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3687>
* CVE-2014-3688
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3688>
* CVE-2014-7841
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7841>
* CVE-2014-7842
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7842>
* CVE-2014-8160
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8160>
* CVE-2014-8709
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8709>
* CVE-2014-9420
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9420>
* CVE-2014-9584
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9584>
* CVE-2014-9585
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9585>
Indications:
Everyone using the Linux Kernel on x86_64 architecture should update.
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP1 LTSS:
zypper in -t patch slessp1-kernel=10315 slessp1-kernel=10316 slessp1-kernel=10317
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64) [New Version: 2.6.32.59]:
kernel-default-2.6.32.59-0.19.1
kernel-default-base-2.6.32.59-0.19.1
kernel-default-devel-2.6.32.59-0.19.1
kernel-source-2.6.32.59-0.19.1
kernel-syms-2.6.32.59-0.19.1
kernel-trace-2.6.32.59-0.19.1
kernel-trace-base-2.6.32.59-0.19.1
kernel-trace-devel-2.6.32.59-0.19.1
- SUSE Linux Enterprise Server 11 SP1 LTSS (i586 x86_64) [New Version: 2.6.32.59]:
kernel-ec2-2.6.32.59-0.19.1
kernel-ec2-base-2.6.32.59-0.19.1
kernel-ec2-devel-2.6.32.59-0.19.1
kernel-xen-2.6.32.59-0.19.1
kernel-xen-base-2.6.32.59-0.19.1
kernel-xen-devel-2.6.32.59-0.19.1
xen-kmp-default-4.0.3_21548_18_2.6.32.59_0.19-0.9.17
xen-kmp-trace-4.0.3_21548_18_2.6.32.59_0.19-0.9.17
- SUSE Linux Enterprise Server 11 SP1 LTSS (s390x) [New Version: 2.6.32.59]:
kernel-default-man-2.6.32.59-0.19.1
- SUSE Linux Enterprise Server 11 SP1 LTSS (i586) [New Version: 2.6.32.59]:
kernel-pae-2.6.32.59-0.19.1
kernel-pae-base-2.6.32.59-0.19.1
kernel-pae-devel-2.6.32.59-0.19.1
xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.9.17
- SLE 11 SERVER Unsupported Extras (i586 s390x x86_64):
kernel-default-extra-2.6.32.59-0.19.1
- SLE 11 SERVER Unsupported Extras (i586 x86_64):
kernel-xen-extra-2.6.32.59-0.19.1
- SLE 11 SERVER Unsupported Extras (i586):
kernel-pae-extra-2.6.32.59-0.19.1
References:
https://www.suse.com/security/cve/CVE-2010-5313.html
https://www.suse.com/security/cve/CVE-2012-6657.html
https://www.suse.com/security/cve/CVE-2013-4299.html
https://www.suse.com/security/cve/CVE-2013-7263.html
https://www.suse.com/security/cve/CVE-2014-0181.html
https://www.suse.com/security/cve/CVE-2014-3184.html
https://www.suse.com/security/cve/CVE-2014-3185.html
https://www.suse.com/security/cve/CVE-2014-3673.html
https://www.suse.com/security/cve/CVE-2014-3687.html
https://www.suse.com/security/cve/CVE-2014-3688.html
https://www.suse.com/security/cve/CVE-2014-7841.html
https://www.suse.com/security/cve/CVE-2014-7842.html
https://www.suse.com/security/cve/CVE-2014-8160.html
https://www.suse.com/security/cve/CVE-2014-8709.html
https://www.suse.com/security/cve/CVE-2014-9420.html
https://www.suse.com/security/cve/CVE-2014-9584.html
https://www.suse.com/security/cve/CVE-2014-9585.html
https://bugzilla.suse.com/771619
https://bugzilla.suse.com/833820
https://bugzilla.suse.com/846404
https://bugzilla.suse.com/857643
https://bugzilla.suse.com/875051
https://bugzilla.suse.com/885077
https://bugzilla.suse.com/891211
https://bugzilla.suse.com/892235
https://bugzilla.suse.com/896390
https://bugzilla.suse.com/896391
https://bugzilla.suse.com/896779
https://bugzilla.suse.com/899338
https://bugzilla.suse.com/902346
https://bugzilla.suse.com/902349
https://bugzilla.suse.com/902351
https://bugzilla.suse.com/904700
https://bugzilla.suse.com/905100
https://bugzilla.suse.com/905312
https://bugzilla.suse.com/907822
https://bugzilla.suse.com/908870
https://bugzilla.suse.com/911325
https://bugzilla.suse.com/912654
https://bugzilla.suse.com/912705
https://bugzilla.suse.com/912916
https://bugzilla.suse.com/913059
https://bugzilla.suse.com/915335
https://bugzilla.suse.com/915826
https://download.suse.com/patch/finder/?keywords=01007b3b761286f24a9cd5a719…
https://download.suse.com/patch/finder/?keywords=8944e139fcc8a84a52412d23cc…
https://download.suse.com/patch/finder/?keywords=a5e2892de750f2c5d2fba65db2…
https://download.suse.com/patch/finder/?keywords=afe31f60701fa39738b0574722…
https://download.suse.com/patch/finder/?keywords=cfbfe04e5c8b61b50f91d849de…
https://download.suse.com/patch/finder/?keywords=ef5762f62e2e26eab3ef31d6b5…
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
[View Less]
1
0