[security-announce] openSUSE-SU-2014:0678-1: important: kernel: security and bugfix update
openSUSE Security Update: kernel: security and bugfix update ______________________________________________________________________________ Announcement ID: openSUSE-SU-2014:0678-1 Rating: important References: #639379 #812592 #81660 #821619 #833968 #842553 #849334 #851244 #851426 #852656 #852967 #853350 #856760 #857643 #858638 #858872 #859342 #860502 #860835 #861750 #862746 #863235 #863335 #864025 #864867 #865075 #866075 #866102 #867718 #868653 #869414 #871148 #871160 #871252 #871325 #875440 #875690 #875798 #876531 #876699 Cross-References: CVE-2013-4579 CVE-2013-6885 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265 CVE-2013-7281 CVE-2014-0069 CVE-2014-0101 CVE-2014-0196 CVE-2014-1438 CVE-2014-1446 CVE-2014-1690 CVE-2014-1737 CVE-2014-1738 CVE-2014-1874 CVE-2014-2523 CVE-2014-2672 Affected Products: openSUSE 13.1 ______________________________________________________________________________ An update that solves 17 vulnerabilities and has 23 fixes is now available. Description: This Linux kernel security update fixes various security issues and bugs. The Linux Kernel was updated to fix various security issues and bugs. Main security issues fixed: A security issue in the tty layer that was fixed that could be used by local attackers for code execution (CVE-2014-0196). Two security issues in the floppy driver were fixed that could be used by local attackers on machines with the floppy to crash the kernel or potentially execute code in the kernel (CVE-2014-1737 CVE-2014-1738). Other security issues and bugfixes: - netfilter: nf_nat: fix access to uninitialized buffer in IRC NAT helper (bnc#860835 CVE-2014-1690). - net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH (bnc#866102, CVE-2014-0101). - [media] ivtv: Fix Oops when no firmware is loaded (bnc#875440). - ALSA: hda - Add dock pin setups for Thinkpad T440 (bnc#876699). - ip6tnl: fix double free of fb_tnl_dev on exit (bnc#876531). - Update arm config files: Enable all USB-to-serial drivers Specifically, enable USB_SERIAL_WISHBONE and USB_SERIAL_QT2 on all arm flavors. - mei: limit the number of consecutive resets (bnc#821619,bnc#852656). - mei: revamp mei reset state machine (bnc#821619,bnc#852656). - mei: use hbm idle state to prevent spurious resets (bnc#821619). - mei: do not run reset flow from the interrupt thread (bnc#821619,bnc#852656). - mei: don't get stuck in select during reset (bnc#821619). - mei: wake also writers on reset (bnc#821619). - mei: remove flash_work_queue (bnc#821619,bnc#852656). - mei: me: do not load the driver if the FW doesn't support MEI interface (bnc#821619). - Update ec2 config files: Disable CONFIG_CAN CAN support is disabled everywhere else, so disable it in ec2 too. - Refresh Xen patches (bnc#851244). - Update arm/exynos config file: disable AHCI_IMX This driver is only used on Freescale i.MX systems so it isn't needed on Exynos. - drm: Prefer noninterlace cmdline mode unless explicitly specified (bnc#853350). - kabi/severities: add exception for irda. The changes resulted in a 4x performance increase. Any external users of this API will also want to rebuild their modules. - i7core_edac: Fix PCI device reference count. - KABI: revert tcp: TSO packets automatic sizing. - KABI: revert tcp: TSQ can use a dynamic limit. - kabi: add exceptions for kvm and l2tp - patches.fixes/sunrpc-add-an-info-file-for-the-dummy-gssd-pipe.patch: Move include of utsname.h to where it's needed to avoid kABI breakage due to utsname becoming defined. - Update kabi files. The kABI references were never establishd at release. - Refresh patches.rpmify/chipidea-clean-up-dependencies Replace OF_DEVICE by OF (OF_DEVICE does not exist anymore.) - inet: fix addr_len/msg->msg_namelen assignment in recv_error and rxpmtu functions (bnc#857643 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265). - inet: prevent leakage of uninitialized memory to user in recv syscalls (bnc#857643 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265 CVE-2013-7281). - Update config files: re-enable twofish crypto support Software twofish crypto support was disabled in several architectures since openSUSE 10.3. For i386 and x86_64 it was on purpose, because hardware-accelerated alternatives exist. However for all other architectures it was by accident. Re-enable software twofish crypto support in arm, ia64 and ppc configuration files, to guarantee that at least one implementation is always available (bnc#871325). - kvm: optimize away THP checks in kvm_is_mmio_pfn() (bnc#871160). - Update patches.fixes/mm-close-PageTail-race.patch (bnc#871160). - Update patches.fixes/mm-hugetlbfs-fix-hugetlbfs-optimization.patch (bnc#871160). - mm: close PageTail race (bnc#81660). - mm: hugetlbfs: fix hugetlbfs optimization (bnc#81660). - Update config files: disable CONFIG_TOUCHSCREEN_W90X900 The w90p910_ts driver only makes sense on the W90x900 architecture, which we do not support. - ath9k: protect tid->sched check (bnc#871148,CVE-2014-2672). - Update ec2 config files: disable CONFIG_INPUT_FF_MEMLESS This helper module is useless on EC2. - SELinux: Fix kernel BUG on empty security contexts (bnc#863335,CVE-2014-1874). - hamradio/yam: fix info leak in ioctl (bnc#858872,CVE-2014-1446). - netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages (bnc#868653 CVE-2014-2523). - ath9k_htc: properly set MAC address and BSSID mask (bnc#851426,CVE-2013-4579). - drm/ttm: don't oops if no invalidate_caches() (bnc#869414). - Btrfs: do not bug_on if we try to cow a free space cache inode (bnc#863235). - Update vanilla config files: enable console rotation It's enabled in all other kernel flavors so it should be enabled in vanilla too. - Update config files. (CONFIG_EFIVAR_FS=m) Due to systemd can auto-load efivarfs.ko, so wet CONFIG_EFIVAR_FS to module on x86_64. - libata, freezer: avoid block device removal while system is frozen (bnc#849334). - Enable CONFIG_IRDA_FAST_RR=y (bnc#860502) - [media] bttv: don't setup the controls if there are no video devices (bnc#861750). - drm/i915/dp: add native aux defer retry limit (bnc#867718). - drm/i915/dp: increase native aux defer retry timeout (bnc#867718). - rpc_pipe: fix cleanup of dummy gssd directory when notification fails (bnc#862746). - sunrpc: add an "info" file for the dummy gssd pipe (bnc#862746). - rpc_pipe: remove the clntXX dir if creating the pipe fails (bnc#862746). - Delete rpm/_constraints after mismerge Sat Mar 8 00:41:07 CET 2014 - jbohac@suse.cz - Refresh patches.fixes/tcp-syncookies-reduce-cookie-lifetime-to-128-seconds.patch. - tcp: syncookies: reduce cookie lifetime to 128 seconds (bnc#833968). - tcp: syncookies: reduce mss table to four values (bnc#833968). - rpm/mkspec: Generate a per-architecture per-package _constraints file - rpm/mkspec: Remove dead code - Refresh patches.fixes/rtc-cmos-add-an-alarm-disable-quirk.patch. - rtc-cmos: Add an alarm disable quirk (bnc#812592). - Refresh patches.xen/xen-x86-EFI. - Refresh patches.apparmor/apparmor-compatibility-patch-for-v5-network-control. patches.drivers/pstore_disable_efi_backend_by_default.patch. patches.fixes/dm-table-switch-to-readonly. patches.fixes/kvm-ioapic.patch. patches.fixes/kvm-macos.patch. patches.fixes/remount-no-shrink-dcache. patches.fixes/scsi-dh-queuedata-accessors. patches.suse/0001-vfs-Hooks-for-more-fine-grained-directory-permission.patc h. patches.suse/ovl01-vfs-add-i_op-dentry_open.patch. patches.suse/sd_init.mark_majors_busy.patch. - rpm/mkspec: Fix whitespace in NoSource lines - rpm/kernel-binary.spec.in: Do not zero modules.dep before using it (bnc#866075) - rpm/kernel-obs-build.spec: Drop useless ExclusiveArch statement - Update config files. Set CONFIG_EFIVAR_FS to build-in for MOK support Update config files. Set CONFIG_EFIVAR_FS to build-in for MOK support - nfs: always make sure page is up-to-date before extending a write to cover the entire page (bnc#864867 bnc#865075). - x86, cpu, amd: Add workaround for family 16h, erratum 793 (bnc#852967 CVE-2013-6885). - Refresh patches.xen/xen3-patch-3.10. - cifs: ensure that uncached writes handle unmapped areas correctly (bnc#864025 CVE-2014-0069). - x86, fpu, amd: Clear exceptions in AMD FXSAVE workaround (bnc#858638 CVE-2014-1438). - rpm/kernel-obs-build.spec: Do not mount /sys, the build script does it - Update config files: Disable TS5500-specific drivers These drivers are useless without TS5500 board support: mtd-ts5500, gpio-ts5500 and max197. - balloon: don't crash in HVM-with-PoD guests. - usbback: fix after c/s 1232:8806dfb939d4 (bnc#842553). - hwmon: (coretemp) Fix truncated name of alarm attributes. - rpm/kernel-obs-build.spec: Fix for ppc64le - Scripts: .nosrc.rpm should contain only the specfile (bnc #639379) - config: update arm7hl/exynos - Enhances exynos support: * Add USB support * Add sound support * Add devices (accelerometer, etc.) on arndale board - drm/cirrus: Fix cirrus drm driver for fbdev + qemu (bnc#856760). - Spec: zeroing modules.dep to get identical builds among different machines - doc/README.SUSE: Update to match the current package layout - Add the README.SUSE file to the packaging branch - lockd: send correct lock when granting a delayed lock (bnc#859342). - mm/page-writeback.c: do not count anon pages as dirtyable memory (reclaim stalls). - mm/page-writeback.c: fix dirty_balance_reserve subtraction from dirtyable memory (reclaim stalls). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.1: zypper in -t patch openSUSE-2014-375 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.1 (i586 x86_64): cloop-2.639-11.7.1 cloop-debuginfo-2.639-11.7.1 cloop-debugsource-2.639-11.7.1 cloop-kmp-default-2.639_k3.11.10_11-11.7.1 cloop-kmp-default-debuginfo-2.639_k3.11.10_11-11.7.1 cloop-kmp-desktop-2.639_k3.11.10_11-11.7.1 cloop-kmp-desktop-debuginfo-2.639_k3.11.10_11-11.7.1 cloop-kmp-xen-2.639_k3.11.10_11-11.7.1 cloop-kmp-xen-debuginfo-2.639_k3.11.10_11-11.7.1 crash-7.0.2-2.7.1 crash-debuginfo-7.0.2-2.7.1 crash-debugsource-7.0.2-2.7.1 crash-devel-7.0.2-2.7.1 crash-doc-7.0.2-2.7.1 crash-eppic-7.0.2-2.7.1 crash-eppic-debuginfo-7.0.2-2.7.1 crash-gcore-7.0.2-2.7.1 crash-gcore-debuginfo-7.0.2-2.7.1 crash-kmp-default-7.0.2_k3.11.10_11-2.7.1 crash-kmp-default-debuginfo-7.0.2_k3.11.10_11-2.7.1 crash-kmp-desktop-7.0.2_k3.11.10_11-2.7.1 crash-kmp-desktop-debuginfo-7.0.2_k3.11.10_11-2.7.1 crash-kmp-xen-7.0.2_k3.11.10_11-2.7.1 crash-kmp-xen-debuginfo-7.0.2_k3.11.10_11-2.7.1 hdjmod-debugsource-1.28-16.7.1 hdjmod-kmp-default-1.28_k3.11.10_11-16.7.1 hdjmod-kmp-default-debuginfo-1.28_k3.11.10_11-16.7.1 hdjmod-kmp-desktop-1.28_k3.11.10_11-16.7.1 hdjmod-kmp-desktop-debuginfo-1.28_k3.11.10_11-16.7.1 hdjmod-kmp-xen-1.28_k3.11.10_11-16.7.1 hdjmod-kmp-xen-debuginfo-1.28_k3.11.10_11-16.7.1 ipset-6.19-2.7.1 ipset-debuginfo-6.19-2.7.1 ipset-debugsource-6.19-2.7.1 ipset-devel-6.19-2.7.1 ipset-kmp-default-6.19_k3.11.10_11-2.7.1 ipset-kmp-default-debuginfo-6.19_k3.11.10_11-2.7.1 ipset-kmp-desktop-6.19_k3.11.10_11-2.7.1 ipset-kmp-desktop-debuginfo-6.19_k3.11.10_11-2.7.1 ipset-kmp-xen-6.19_k3.11.10_11-2.7.1 ipset-kmp-xen-debuginfo-6.19_k3.11.10_11-2.7.1 iscsitarget-1.4.20.3-13.7.1 iscsitarget-debuginfo-1.4.20.3-13.7.1 iscsitarget-debugsource-1.4.20.3-13.7.1 iscsitarget-kmp-default-1.4.20.3_k3.11.10_11-13.7.1 iscsitarget-kmp-default-debuginfo-1.4.20.3_k3.11.10_11-13.7.1 iscsitarget-kmp-desktop-1.4.20.3_k3.11.10_11-13.7.1 iscsitarget-kmp-desktop-debuginfo-1.4.20.3_k3.11.10_11-13.7.1 iscsitarget-kmp-xen-1.4.20.3_k3.11.10_11-13.7.1 iscsitarget-kmp-xen-debuginfo-1.4.20.3_k3.11.10_11-13.7.1 kernel-default-3.11.10-11.1 kernel-default-base-3.11.10-11.1 kernel-default-base-debuginfo-3.11.10-11.1 kernel-default-debuginfo-3.11.10-11.1 kernel-default-debugsource-3.11.10-11.1 kernel-default-devel-3.11.10-11.1 kernel-default-devel-debuginfo-3.11.10-11.1 kernel-syms-3.11.10-11.1 libipset3-6.19-2.7.1 libipset3-debuginfo-6.19-2.7.1 ndiswrapper-1.58-7.1 ndiswrapper-debuginfo-1.58-7.1 ndiswrapper-debugsource-1.58-7.1 ndiswrapper-kmp-default-1.58_k3.11.10_11-7.1 ndiswrapper-kmp-default-debuginfo-1.58_k3.11.10_11-7.1 ndiswrapper-kmp-desktop-1.58_k3.11.10_11-7.1 ndiswrapper-kmp-desktop-debuginfo-1.58_k3.11.10_11-7.1 openvswitch-1.11.0-0.25.1 openvswitch-controller-1.11.0-0.25.1 openvswitch-controller-debuginfo-1.11.0-0.25.1 openvswitch-debuginfo-1.11.0-0.25.1 openvswitch-debugsource-1.11.0-0.25.1 openvswitch-kmp-default-1.11.0_k3.11.10_11-0.25.1 openvswitch-kmp-default-debuginfo-1.11.0_k3.11.10_11-0.25.1 openvswitch-kmp-desktop-1.11.0_k3.11.10_11-0.25.1 openvswitch-kmp-desktop-debuginfo-1.11.0_k3.11.10_11-0.25.1 openvswitch-kmp-xen-1.11.0_k3.11.10_11-0.25.1 openvswitch-kmp-xen-debuginfo-1.11.0_k3.11.10_11-0.25.1 openvswitch-pki-1.11.0-0.25.1 openvswitch-switch-1.11.0-0.25.1 openvswitch-switch-debuginfo-1.11.0-0.25.1 openvswitch-test-1.11.0-0.25.1 pcfclock-0.44-258.7.1 pcfclock-debuginfo-0.44-258.7.1 pcfclock-debugsource-0.44-258.7.1 pcfclock-kmp-default-0.44_k3.11.10_11-258.7.1 pcfclock-kmp-default-debuginfo-0.44_k3.11.10_11-258.7.1 pcfclock-kmp-desktop-0.44_k3.11.10_11-258.7.1 pcfclock-kmp-desktop-debuginfo-0.44_k3.11.10_11-258.7.1 python-openvswitch-1.11.0-0.25.1 python-openvswitch-test-1.11.0-0.25.1 python-virtualbox-4.2.18-2.12.1 python-virtualbox-debuginfo-4.2.18-2.12.1 virtualbox-4.2.18-2.12.1 virtualbox-debuginfo-4.2.18-2.12.1 virtualbox-debugsource-4.2.18-2.12.1 virtualbox-devel-4.2.18-2.12.1 virtualbox-guest-kmp-default-4.2.18_k3.11.10_11-2.12.1 virtualbox-guest-kmp-default-debuginfo-4.2.18_k3.11.10_11-2.12.1 virtualbox-guest-kmp-desktop-4.2.18_k3.11.10_11-2.12.1 virtualbox-guest-kmp-desktop-debuginfo-4.2.18_k3.11.10_11-2.12.1 virtualbox-guest-tools-4.2.18-2.12.1 virtualbox-guest-tools-debuginfo-4.2.18-2.12.1 virtualbox-guest-x11-4.2.18-2.12.1 virtualbox-guest-x11-debuginfo-4.2.18-2.12.1 virtualbox-host-kmp-default-4.2.18_k3.11.10_11-2.12.1 virtualbox-host-kmp-default-debuginfo-4.2.18_k3.11.10_11-2.12.1 virtualbox-host-kmp-desktop-4.2.18_k3.11.10_11-2.12.1 virtualbox-host-kmp-desktop-debuginfo-4.2.18_k3.11.10_11-2.12.1 virtualbox-qt-4.2.18-2.12.1 virtualbox-qt-debuginfo-4.2.18-2.12.1 virtualbox-websrv-4.2.18-2.12.1 virtualbox-websrv-debuginfo-4.2.18-2.12.1 xen-debugsource-4.3.2_01-15.1 xen-devel-4.3.2_01-15.1 xen-kmp-default-4.3.2_01_k3.11.10_11-15.1 xen-kmp-default-debuginfo-4.3.2_01_k3.11.10_11-15.1 xen-kmp-desktop-4.3.2_01_k3.11.10_11-15.1 xen-kmp-desktop-debuginfo-4.3.2_01_k3.11.10_11-15.1 xen-libs-4.3.2_01-15.1 xen-libs-debuginfo-4.3.2_01-15.1 xen-tools-domU-4.3.2_01-15.1 xen-tools-domU-debuginfo-4.3.2_01-15.1 xtables-addons-2.3-2.7.1 xtables-addons-debuginfo-2.3-2.7.1 xtables-addons-debugsource-2.3-2.7.1 xtables-addons-kmp-default-2.3_k3.11.10_11-2.7.1 xtables-addons-kmp-default-debuginfo-2.3_k3.11.10_11-2.7.1 xtables-addons-kmp-desktop-2.3_k3.11.10_11-2.7.1 xtables-addons-kmp-desktop-debuginfo-2.3_k3.11.10_11-2.7.1 xtables-addons-kmp-xen-2.3_k3.11.10_11-2.7.1 xtables-addons-kmp-xen-debuginfo-2.3_k3.11.10_11-2.7.1 - openSUSE 13.1 (i686 x86_64): kernel-debug-3.11.10-11.1 kernel-debug-base-3.11.10-11.1 kernel-debug-base-debuginfo-3.11.10-11.1 kernel-debug-debuginfo-3.11.10-11.1 kernel-debug-debugsource-3.11.10-11.1 kernel-debug-devel-3.11.10-11.1 kernel-debug-devel-debuginfo-3.11.10-11.1 kernel-desktop-3.11.10-11.1 kernel-desktop-base-3.11.10-11.1 kernel-desktop-base-debuginfo-3.11.10-11.1 kernel-desktop-debuginfo-3.11.10-11.1 kernel-desktop-debugsource-3.11.10-11.1 kernel-desktop-devel-3.11.10-11.1 kernel-desktop-devel-debuginfo-3.11.10-11.1 kernel-ec2-3.11.10-11.1 kernel-ec2-base-3.11.10-11.1 kernel-ec2-base-debuginfo-3.11.10-11.1 kernel-ec2-debuginfo-3.11.10-11.1 kernel-ec2-debugsource-3.11.10-11.1 kernel-ec2-devel-3.11.10-11.1 kernel-ec2-devel-debuginfo-3.11.10-11.1 kernel-trace-3.11.10-11.1 kernel-trace-base-3.11.10-11.1 kernel-trace-base-debuginfo-3.11.10-11.1 kernel-trace-debuginfo-3.11.10-11.1 kernel-trace-debugsource-3.11.10-11.1 kernel-trace-devel-3.11.10-11.1 kernel-trace-devel-debuginfo-3.11.10-11.1 kernel-vanilla-3.11.10-11.1 kernel-vanilla-debuginfo-3.11.10-11.1 kernel-vanilla-debugsource-3.11.10-11.1 kernel-vanilla-devel-3.11.10-11.1 kernel-vanilla-devel-debuginfo-3.11.10-11.1 kernel-xen-3.11.10-11.1 kernel-xen-base-3.11.10-11.1 kernel-xen-base-debuginfo-3.11.10-11.1 kernel-xen-debuginfo-3.11.10-11.1 kernel-xen-debugsource-3.11.10-11.1 kernel-xen-devel-3.11.10-11.1 kernel-xen-devel-debuginfo-3.11.10-11.1 - openSUSE 13.1 (x86_64): xen-4.3.2_01-15.1 xen-doc-html-4.3.2_01-15.1 xen-libs-32bit-4.3.2_01-15.1 xen-libs-debuginfo-32bit-4.3.2_01-15.1 xen-tools-4.3.2_01-15.1 xen-tools-debuginfo-4.3.2_01-15.1 xen-xend-tools-4.3.2_01-15.1 xen-xend-tools-debuginfo-4.3.2_01-15.1 - openSUSE 13.1 (noarch): kernel-devel-3.11.10-11.1 kernel-docs-3.11.10-11.3 kernel-source-3.11.10-11.1 kernel-source-vanilla-3.11.10-11.1 - openSUSE 13.1 (i686): kernel-pae-3.11.10-11.1 kernel-pae-base-3.11.10-11.1 kernel-pae-base-debuginfo-3.11.10-11.1 kernel-pae-debuginfo-3.11.10-11.1 kernel-pae-debugsource-3.11.10-11.1 kernel-pae-devel-3.11.10-11.1 kernel-pae-devel-debuginfo-3.11.10-11.1 - openSUSE 13.1 (i586): cloop-kmp-pae-2.639_k3.11.10_11-11.7.1 cloop-kmp-pae-debuginfo-2.639_k3.11.10_11-11.7.1 crash-kmp-pae-7.0.2_k3.11.10_11-2.7.1 crash-kmp-pae-debuginfo-7.0.2_k3.11.10_11-2.7.1 hdjmod-kmp-pae-1.28_k3.11.10_11-16.7.1 hdjmod-kmp-pae-debuginfo-1.28_k3.11.10_11-16.7.1 ipset-kmp-pae-6.19_k3.11.10_11-2.7.1 ipset-kmp-pae-debuginfo-6.19_k3.11.10_11-2.7.1 iscsitarget-kmp-pae-1.4.20.3_k3.11.10_11-13.7.1 iscsitarget-kmp-pae-debuginfo-1.4.20.3_k3.11.10_11-13.7.1 ndiswrapper-kmp-pae-1.58_k3.11.10_11-7.1 ndiswrapper-kmp-pae-debuginfo-1.58_k3.11.10_11-7.1 openvswitch-kmp-pae-1.11.0_k3.11.10_11-0.25.1 openvswitch-kmp-pae-debuginfo-1.11.0_k3.11.10_11-0.25.1 pcfclock-kmp-pae-0.44_k3.11.10_11-258.7.1 pcfclock-kmp-pae-debuginfo-0.44_k3.11.10_11-258.7.1 virtualbox-guest-kmp-pae-4.2.18_k3.11.10_11-2.12.1 virtualbox-guest-kmp-pae-debuginfo-4.2.18_k3.11.10_11-2.12.1 virtualbox-host-kmp-pae-4.2.18_k3.11.10_11-2.12.1 virtualbox-host-kmp-pae-debuginfo-4.2.18_k3.11.10_11-2.12.1 xen-kmp-pae-4.3.2_01_k3.11.10_11-15.1 xen-kmp-pae-debuginfo-4.3.2_01_k3.11.10_11-15.1 xtables-addons-kmp-pae-2.3_k3.11.10_11-2.7.1 xtables-addons-kmp-pae-debuginfo-2.3_k3.11.10_11-2.7.1 References: http://support.novell.com/security/cve/CVE-2013-4579.html http://support.novell.com/security/cve/CVE-2013-6885.html http://support.novell.com/security/cve/CVE-2013-7263.html http://support.novell.com/security/cve/CVE-2013-7264.html http://support.novell.com/security/cve/CVE-2013-7265.html http://support.novell.com/security/cve/CVE-2013-7281.html http://support.novell.com/security/cve/CVE-2014-0069.html http://support.novell.com/security/cve/CVE-2014-0101.html http://support.novell.com/security/cve/CVE-2014-0196.html http://support.novell.com/security/cve/CVE-2014-1438.html http://support.novell.com/security/cve/CVE-2014-1446.html http://support.novell.com/security/cve/CVE-2014-1690.html http://support.novell.com/security/cve/CVE-2014-1737.html http://support.novell.com/security/cve/CVE-2014-1738.html http://support.novell.com/security/cve/CVE-2014-1874.html http://support.novell.com/security/cve/CVE-2014-2523.html http://support.novell.com/security/cve/CVE-2014-2672.html https://bugzilla.novell.com/639379 https://bugzilla.novell.com/812592 https://bugzilla.novell.com/81660 https://bugzilla.novell.com/821619 https://bugzilla.novell.com/833968 https://bugzilla.novell.com/842553 https://bugzilla.novell.com/849334 https://bugzilla.novell.com/851244 https://bugzilla.novell.com/851426 https://bugzilla.novell.com/852656 https://bugzilla.novell.com/852967 https://bugzilla.novell.com/853350 https://bugzilla.novell.com/856760 https://bugzilla.novell.com/857643 https://bugzilla.novell.com/858638 https://bugzilla.novell.com/858872 https://bugzilla.novell.com/859342 https://bugzilla.novell.com/860502 https://bugzilla.novell.com/860835 https://bugzilla.novell.com/861750 https://bugzilla.novell.com/862746 https://bugzilla.novell.com/863235 https://bugzilla.novell.com/863335 https://bugzilla.novell.com/864025 https://bugzilla.novell.com/864867 https://bugzilla.novell.com/865075 https://bugzilla.novell.com/866075 https://bugzilla.novell.com/866102 https://bugzilla.novell.com/867718 https://bugzilla.novell.com/868653 https://bugzilla.novell.com/869414 https://bugzilla.novell.com/871148 https://bugzilla.novell.com/871160 https://bugzilla.novell.com/871252 https://bugzilla.novell.com/871325 https://bugzilla.novell.com/875440 https://bugzilla.novell.com/875690 https://bugzilla.novell.com/875798 https://bugzilla.novell.com/876531 https://bugzilla.novell.com/876699 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
participants (1)
-
opensuse-security@opensuse.org