[security-announce] openSUSE-SU-2014:0840-1: important: kernel: security and bugfix update
openSUSE Security Update: kernel: security and bugfix update ______________________________________________________________________________ Announcement ID: openSUSE-SU-2014:0840-1 Rating: important References: #851338 #858067 #868315 #869563 #870173 #870576 #871561 #872715 #873374 #876102 #876981 #877257 #877713 #877721 #878115 #878274 #879258 #879792 #880599 #880613 #880892 #881697 #881727 #882648 Cross-References: CVE-2013-7339 CVE-2014-0055 CVE-2014-0077 CVE-2014-2678 CVE-2014-2851 CVE-2014-3122 CVE-2014-3144 CVE-2014-3145 CVE-2014-3153 Affected Products: openSUSE 13.1 ______________________________________________________________________________ An update that solves 9 vulnerabilities and has 15 fixes is now available. Description: The Linux kernel was updated to fix security issues and bugs. Security issues fixed: CVE-2014-3153: The futex_requeue function in kernel/futex.c in the Linux kernel did not ensure that calls have two different futex addresses, which allowed local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification. CVE-2014-3144: The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel did not check whether a certain length value is sufficiently large, which allowed local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced. CVE-2014-3145: The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel used the reverse order in a certain subtraction, which allowed local users to cause a denial of service (over-read and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced. CVE-2014-0077: drivers/vhost/net.c in the Linux kernel, when mergeable buffers are disabled, did not properly validate packet lengths, which allowed guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions. CVE-2014-0055: The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package did not properly handle vhost_get_vq_desc errors, which allowed guest OS users to cause a denial of service (host OS crash) via unspecified vectors. CVE-2014-2678: The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports. CVE-2013-7339: The rds_ib_laddr_check function in net/rds/ib.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports. CVE-2014-2851: Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter. - ext4: Fix buffer double free in ext4_alloc_branch() (bnc#880599 bnc#876981). - patches.fixes/firewire-01-net-fix-use-after-free.patch, patches.fixes/firewire-02-ohci-fix-probe-failure-with-agere-lsi-controllers .patch, patches.fixes/firewire-03-dont-use-prepare_delayed_work.patch: Add missing bug reference (bnc#881697). - firewire: don't use PREPARE_DELAYED_WORK. - firewire: ohci: fix probe failure with Agere/LSI controllers. - firewire: net: fix use after free. - USB: OHCI: fix problem with global suspend on ATI controllers (bnc#868315). - mm: revert "page-writeback.c: subtract min_free_kbytes from dirtyable memory" (bnc#879792). - usb: musb: tusb6010: Use musb->tusb_revision instead of tusb_get_revision call (bnc#872715). - usb: musb: tusb6010: Add tusb_revision to struct musb to store the revision (bnc#872715). - ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets (bnc#880613). - floppy: do not corrupt bio.bi_flags when reading block 0 (bnc#879258). - reiserfs: call truncate_setsize under tailpack mutex (bnc#878115). - Update Xen config files: Set compatibility level back to 4.1 (bnc#851338). - Update config files. Guillaume GARDET reported a broken build due to CONFIG_USB_SERIAL_GENERIC being modular - memcg: deprecate memory.force_empty knob (bnc#878274). - nfsd: when reusing an existing repcache entry, unhash it first (bnc#877721). - Enable Socketcan again for i386 and x86_64 (bnc#858067) - xhci: extend quirk for Renesas cards (bnc#877713). - xhci: Fix resume issues on Renesas chips in Samsung laptops (bnc#877713). - mm: try_to_unmap_cluster() should lock_page() before mlocking (bnc#876102, CVE-2014-3122). - drm/i915, HD-audio: Don't continue probing when nomodeset is given (bnc#882648). - x86/mm/numa: Fix 32-bit kernel NUMA boot (bnc#881727). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.1: zypper in -t patch openSUSE-2014-441 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.1 (i686 x86_64): kernel-debug-3.11.10-17.2 kernel-debug-base-3.11.10-17.2 kernel-debug-base-debuginfo-3.11.10-17.2 kernel-debug-debuginfo-3.11.10-17.2 kernel-debug-debugsource-3.11.10-17.2 kernel-debug-devel-3.11.10-17.2 kernel-debug-devel-debuginfo-3.11.10-17.2 kernel-desktop-3.11.10-17.2 kernel-desktop-base-3.11.10-17.2 kernel-desktop-base-debuginfo-3.11.10-17.2 kernel-desktop-debuginfo-3.11.10-17.2 kernel-desktop-debugsource-3.11.10-17.2 kernel-desktop-devel-3.11.10-17.2 kernel-desktop-devel-debuginfo-3.11.10-17.2 kernel-ec2-3.11.10-17.1 kernel-ec2-base-3.11.10-17.1 kernel-ec2-base-debuginfo-3.11.10-17.1 kernel-ec2-debuginfo-3.11.10-17.1 kernel-ec2-debugsource-3.11.10-17.1 kernel-ec2-devel-3.11.10-17.1 kernel-ec2-devel-debuginfo-3.11.10-17.1 kernel-trace-3.11.10-17.2 kernel-trace-base-3.11.10-17.2 kernel-trace-base-debuginfo-3.11.10-17.2 kernel-trace-debuginfo-3.11.10-17.2 kernel-trace-debugsource-3.11.10-17.2 kernel-trace-devel-3.11.10-17.2 kernel-trace-devel-debuginfo-3.11.10-17.2 kernel-vanilla-3.11.10-17.2 kernel-vanilla-debuginfo-3.11.10-17.2 kernel-vanilla-debugsource-3.11.10-17.2 kernel-vanilla-devel-3.11.10-17.2 kernel-vanilla-devel-debuginfo-3.11.10-17.2 kernel-xen-3.11.10-17.2 kernel-xen-base-3.11.10-17.2 kernel-xen-base-debuginfo-3.11.10-17.2 kernel-xen-debuginfo-3.11.10-17.2 kernel-xen-debugsource-3.11.10-17.2 kernel-xen-devel-3.11.10-17.2 kernel-xen-devel-debuginfo-3.11.10-17.2 - openSUSE 13.1 (i586 x86_64): cloop-2.639-11.10.1 cloop-debuginfo-2.639-11.10.1 cloop-debugsource-2.639-11.10.1 cloop-kmp-default-2.639_k3.11.10_17-11.10.1 cloop-kmp-default-debuginfo-2.639_k3.11.10_17-11.10.1 cloop-kmp-desktop-2.639_k3.11.10_17-11.10.1 cloop-kmp-desktop-debuginfo-2.639_k3.11.10_17-11.10.1 cloop-kmp-xen-2.639_k3.11.10_17-11.10.1 cloop-kmp-xen-debuginfo-2.639_k3.11.10_17-11.10.1 crash-7.0.2-2.10.9 crash-debuginfo-7.0.2-2.10.9 crash-debugsource-7.0.2-2.10.9 crash-devel-7.0.2-2.10.9 crash-doc-7.0.2-2.10.9 crash-eppic-7.0.2-2.10.9 crash-eppic-debuginfo-7.0.2-2.10.9 crash-gcore-7.0.2-2.10.9 crash-gcore-debuginfo-7.0.2-2.10.9 crash-kmp-default-7.0.2_k3.11.10_17-2.10.9 crash-kmp-default-debuginfo-7.0.2_k3.11.10_17-2.10.9 crash-kmp-desktop-7.0.2_k3.11.10_17-2.10.9 crash-kmp-desktop-debuginfo-7.0.2_k3.11.10_17-2.10.9 crash-kmp-xen-7.0.2_k3.11.10_17-2.10.9 crash-kmp-xen-debuginfo-7.0.2_k3.11.10_17-2.10.9 hdjmod-debugsource-1.28-16.10.1 hdjmod-kmp-default-1.28_k3.11.10_17-16.10.1 hdjmod-kmp-default-debuginfo-1.28_k3.11.10_17-16.10.1 hdjmod-kmp-desktop-1.28_k3.11.10_17-16.10.1 hdjmod-kmp-desktop-debuginfo-1.28_k3.11.10_17-16.10.1 hdjmod-kmp-xen-1.28_k3.11.10_17-16.10.1 hdjmod-kmp-xen-debuginfo-1.28_k3.11.10_17-16.10.1 ipset-6.21.1-2.14.1 ipset-debuginfo-6.21.1-2.14.1 ipset-debugsource-6.21.1-2.14.1 ipset-devel-6.21.1-2.14.1 ipset-kmp-default-6.21.1_k3.11.10_17-2.14.1 ipset-kmp-default-debuginfo-6.21.1_k3.11.10_17-2.14.1 ipset-kmp-desktop-6.21.1_k3.11.10_17-2.14.1 ipset-kmp-desktop-debuginfo-6.21.1_k3.11.10_17-2.14.1 ipset-kmp-xen-6.21.1_k3.11.10_17-2.14.1 ipset-kmp-xen-debuginfo-6.21.1_k3.11.10_17-2.14.1 iscsitarget-1.4.20.3-13.10.1 iscsitarget-debuginfo-1.4.20.3-13.10.1 iscsitarget-debugsource-1.4.20.3-13.10.1 iscsitarget-kmp-default-1.4.20.3_k3.11.10_17-13.10.1 iscsitarget-kmp-default-debuginfo-1.4.20.3_k3.11.10_17-13.10.1 iscsitarget-kmp-desktop-1.4.20.3_k3.11.10_17-13.10.1 iscsitarget-kmp-desktop-debuginfo-1.4.20.3_k3.11.10_17-13.10.1 iscsitarget-kmp-xen-1.4.20.3_k3.11.10_17-13.10.1 iscsitarget-kmp-xen-debuginfo-1.4.20.3_k3.11.10_17-13.10.1 kernel-default-3.11.10-17.2 kernel-default-base-3.11.10-17.2 kernel-default-base-debuginfo-3.11.10-17.2 kernel-default-debuginfo-3.11.10-17.2 kernel-default-debugsource-3.11.10-17.2 kernel-default-devel-3.11.10-17.2 kernel-default-devel-debuginfo-3.11.10-17.2 kernel-syms-3.11.10-17.1 libipset3-6.21.1-2.14.1 libipset3-debuginfo-6.21.1-2.14.1 ndiswrapper-1.58-10.1 ndiswrapper-debuginfo-1.58-10.1 ndiswrapper-debugsource-1.58-10.1 ndiswrapper-kmp-default-1.58_k3.11.10_17-10.1 ndiswrapper-kmp-default-debuginfo-1.58_k3.11.10_17-10.1 ndiswrapper-kmp-desktop-1.58_k3.11.10_17-10.1 ndiswrapper-kmp-desktop-debuginfo-1.58_k3.11.10_17-10.1 pcfclock-0.44-258.10.1 pcfclock-debuginfo-0.44-258.10.1 pcfclock-debugsource-0.44-258.10.1 pcfclock-kmp-default-0.44_k3.11.10_17-258.10.1 pcfclock-kmp-default-debuginfo-0.44_k3.11.10_17-258.10.1 pcfclock-kmp-desktop-0.44_k3.11.10_17-258.10.1 pcfclock-kmp-desktop-debuginfo-0.44_k3.11.10_17-258.10.1 python-virtualbox-4.2.18-2.15.2 python-virtualbox-debuginfo-4.2.18-2.15.2 vhba-kmp-debugsource-20130607-2.11.1 vhba-kmp-default-20130607_k3.11.10_17-2.11.1 vhba-kmp-default-debuginfo-20130607_k3.11.10_17-2.11.1 vhba-kmp-desktop-20130607_k3.11.10_17-2.11.1 vhba-kmp-desktop-debuginfo-20130607_k3.11.10_17-2.11.1 vhba-kmp-xen-20130607_k3.11.10_17-2.11.1 vhba-kmp-xen-debuginfo-20130607_k3.11.10_17-2.11.1 virtualbox-4.2.18-2.15.2 virtualbox-debuginfo-4.2.18-2.15.2 virtualbox-debugsource-4.2.18-2.15.2 virtualbox-devel-4.2.18-2.15.2 virtualbox-guest-kmp-default-4.2.18_k3.11.10_17-2.15.2 virtualbox-guest-kmp-default-debuginfo-4.2.18_k3.11.10_17-2.15.2 virtualbox-guest-kmp-desktop-4.2.18_k3.11.10_17-2.15.2 virtualbox-guest-kmp-desktop-debuginfo-4.2.18_k3.11.10_17-2.15.2 virtualbox-guest-tools-4.2.18-2.15.2 virtualbox-guest-tools-debuginfo-4.2.18-2.15.2 virtualbox-guest-x11-4.2.18-2.15.2 virtualbox-guest-x11-debuginfo-4.2.18-2.15.2 virtualbox-host-kmp-default-4.2.18_k3.11.10_17-2.15.2 virtualbox-host-kmp-default-debuginfo-4.2.18_k3.11.10_17-2.15.2 virtualbox-host-kmp-desktop-4.2.18_k3.11.10_17-2.15.2 virtualbox-host-kmp-desktop-debuginfo-4.2.18_k3.11.10_17-2.15.2 virtualbox-qt-4.2.18-2.15.2 virtualbox-qt-debuginfo-4.2.18-2.15.2 virtualbox-websrv-4.2.18-2.15.2 virtualbox-websrv-debuginfo-4.2.18-2.15.2 xen-debugsource-4.3.2_01-18.2 xen-devel-4.3.2_01-18.2 xen-kmp-default-4.3.2_01_k3.11.10_17-18.2 xen-kmp-default-debuginfo-4.3.2_01_k3.11.10_17-18.2 xen-kmp-desktop-4.3.2_01_k3.11.10_17-18.2 xen-kmp-desktop-debuginfo-4.3.2_01_k3.11.10_17-18.2 xen-libs-4.3.2_01-18.2 xen-libs-debuginfo-4.3.2_01-18.2 xen-tools-domU-4.3.2_01-18.2 xen-tools-domU-debuginfo-4.3.2_01-18.2 xtables-addons-2.3-2.10.1 xtables-addons-debuginfo-2.3-2.10.1 xtables-addons-debugsource-2.3-2.10.1 xtables-addons-kmp-default-2.3_k3.11.10_17-2.10.1 xtables-addons-kmp-default-debuginfo-2.3_k3.11.10_17-2.10.1 xtables-addons-kmp-desktop-2.3_k3.11.10_17-2.10.1 xtables-addons-kmp-desktop-debuginfo-2.3_k3.11.10_17-2.10.1 xtables-addons-kmp-xen-2.3_k3.11.10_17-2.10.1 xtables-addons-kmp-xen-debuginfo-2.3_k3.11.10_17-2.10.1 - openSUSE 13.1 (noarch): kernel-devel-3.11.10-17.2 kernel-docs-3.11.10-17.6 kernel-source-3.11.10-17.2 kernel-source-vanilla-3.11.10-17.2 - openSUSE 13.1 (x86_64): xen-4.3.2_01-18.2 xen-doc-html-4.3.2_01-18.2 xen-libs-32bit-4.3.2_01-18.2 xen-libs-debuginfo-32bit-4.3.2_01-18.2 xen-tools-4.3.2_01-18.2 xen-tools-debuginfo-4.3.2_01-18.2 xen-xend-tools-4.3.2_01-18.2 xen-xend-tools-debuginfo-4.3.2_01-18.2 - openSUSE 13.1 (i686): kernel-pae-3.11.10-17.2 kernel-pae-base-3.11.10-17.2 kernel-pae-base-debuginfo-3.11.10-17.2 kernel-pae-debuginfo-3.11.10-17.2 kernel-pae-debugsource-3.11.10-17.2 kernel-pae-devel-3.11.10-17.2 kernel-pae-devel-debuginfo-3.11.10-17.2 - openSUSE 13.1 (i586): cloop-kmp-pae-2.639_k3.11.10_17-11.10.1 cloop-kmp-pae-debuginfo-2.639_k3.11.10_17-11.10.1 crash-kmp-pae-7.0.2_k3.11.10_17-2.10.9 crash-kmp-pae-debuginfo-7.0.2_k3.11.10_17-2.10.9 hdjmod-kmp-pae-1.28_k3.11.10_17-16.10.1 hdjmod-kmp-pae-debuginfo-1.28_k3.11.10_17-16.10.1 ipset-kmp-pae-6.21.1_k3.11.10_17-2.14.1 ipset-kmp-pae-debuginfo-6.21.1_k3.11.10_17-2.14.1 iscsitarget-kmp-pae-1.4.20.3_k3.11.10_17-13.10.1 iscsitarget-kmp-pae-debuginfo-1.4.20.3_k3.11.10_17-13.10.1 ndiswrapper-kmp-pae-1.58_k3.11.10_17-10.1 ndiswrapper-kmp-pae-debuginfo-1.58_k3.11.10_17-10.1 pcfclock-kmp-pae-0.44_k3.11.10_17-258.10.1 pcfclock-kmp-pae-debuginfo-0.44_k3.11.10_17-258.10.1 vhba-kmp-pae-20130607_k3.11.10_17-2.11.1 vhba-kmp-pae-debuginfo-20130607_k3.11.10_17-2.11.1 virtualbox-guest-kmp-pae-4.2.18_k3.11.10_17-2.15.2 virtualbox-guest-kmp-pae-debuginfo-4.2.18_k3.11.10_17-2.15.2 virtualbox-host-kmp-pae-4.2.18_k3.11.10_17-2.15.2 virtualbox-host-kmp-pae-debuginfo-4.2.18_k3.11.10_17-2.15.2 xen-kmp-pae-4.3.2_01_k3.11.10_17-18.2 xen-kmp-pae-debuginfo-4.3.2_01_k3.11.10_17-18.2 xtables-addons-kmp-pae-2.3_k3.11.10_17-2.10.1 xtables-addons-kmp-pae-debuginfo-2.3_k3.11.10_17-2.10.1 References: http://support.novell.com/security/cve/CVE-2013-7339.html http://support.novell.com/security/cve/CVE-2014-0055.html http://support.novell.com/security/cve/CVE-2014-0077.html http://support.novell.com/security/cve/CVE-2014-2678.html http://support.novell.com/security/cve/CVE-2014-2851.html http://support.novell.com/security/cve/CVE-2014-3122.html http://support.novell.com/security/cve/CVE-2014-3144.html http://support.novell.com/security/cve/CVE-2014-3145.html http://support.novell.com/security/cve/CVE-2014-3153.html https://bugzilla.novell.com/851338 https://bugzilla.novell.com/858067 https://bugzilla.novell.com/868315 https://bugzilla.novell.com/869563 https://bugzilla.novell.com/870173 https://bugzilla.novell.com/870576 https://bugzilla.novell.com/871561 https://bugzilla.novell.com/872715 https://bugzilla.novell.com/873374 https://bugzilla.novell.com/876102 https://bugzilla.novell.com/876981 https://bugzilla.novell.com/877257 https://bugzilla.novell.com/877713 https://bugzilla.novell.com/877721 https://bugzilla.novell.com/878115 https://bugzilla.novell.com/878274 https://bugzilla.novell.com/879258 https://bugzilla.novell.com/879792 https://bugzilla.novell.com/880599 https://bugzilla.novell.com/880613 https://bugzilla.novell.com/880892 https://bugzilla.novell.com/881697 https://bugzilla.novell.com/881727 https://bugzilla.novell.com/882648 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
participants (1)
-
opensuse-security@opensuse.org