openSUSE Security Update: kernel: security and bugfix update ______________________________________________________________________________ Announcement ID: openSUSE-SU-2012:1330-1 Rating: important References: #762693 #765230 #771392 #772566 #772831 #772923 #773406 #774523 #774859 #776925 #778630 #779432 #780624 #781134 Cross-References: CVE-2012-3412 CVE-2012-3520 Affected Products: openSUSE 12.2 ______________________________________________________________________________ An update that solves two vulnerabilities and has 12 fixes is now available. Description: This kernel update to 3.4.11 fixes various bugs and security issues. The changes up to 3.4.11 contain both security and bugfixes and are not explicitly listed here. Following security issues were fixed: CVE-2012-3520: Force passing credentials, otherwise local services could be fooled to assume requests coming from root. CVE-2012-3412: Do not allow extreme TSO parameters in the sfc driver and tcp stack. Following non-security bugs were fixed: - nbd: clear waiting_queue on shutdown (bnc#778630). - NFS: avoid warning from nfs_drop_nlink (bnc#780624). - net: do not disable sg for packets requiring no checksum (bnc#774859). - sfc: Fix maximum number of TSO segments and minimum TX queue size (bnc#774523 CVE-2012-3412). - net: Allow driver to limit number of GSO segments per skb (bnc#774523 CVE-2012-3412). - drm/nouveau: fix booting with plymouth + dumb support (bnc#771392). - memcg: warn on deeper hierarchies with use_hierarchy==0 (bnc#781134). - Linux 3.4.11. - Update config files. - Refresh patches.suse/scsi-error-test-unit-ready-timeout. - Btrfs: fix tree log remove space corner case (bnc#779432) - irq_remap: disable IRQ remapping if any IOAPIC lacks an IOMMU. - Linux 3.4.10. - Linux 3.4.9. - kABI: protect struct irq_desc. - Linux 3.4.8. - kABI: sdhci, remove inclusion. - reiserfs: fix deadlock with nfs racing on create/lookup (bnc#762693). - Properly update Xen patches to 3.4.7. - Refresh other Xen patches (bnc#772831). - config: enable various ARM errata workarounds to improve stability - Import kabi files for 12.2 - rpm/config.sh: Build the KOTD against 12.2 - ASoC: omap: Add missing modules aliases to get sound working on omap devices. - Update config files to fix build - rt2800: add chipset revision RT5390R support (bnc#772566). - reiserfs: fix deadlocks with quotas - ACPI, APEI: Fixup common access width firmware bug (bnc#765230). - i2c/busses: Fix build error if CONFIG_I2C_DESIGNWARE_PLATFORM=y and CONFIG_I2C_DESIGN. - Update ARM configs to match kernel 3.4.7 - Update ARM omap2plus config to match kernel 3.4.7 and add Smartreflex support (auto voltage) - ALSA: hda - Fix mute-LED GPIO initialization for IDT codecs (bnc#772923). - ALSA: hda - Fix polarity of mute LED on HP Mini 210 (bnc#772923). - Linux 3.4.7. - Refresh patches.suse/dm-raid45-26-Nov-2009.patch. - Enable RTL8150 for omap2plus Generic USB Network device that also works fine on ARM, so enable it - update RNDIS_OID_GEN_RNDIS_CONFIG_PARAMETER patch name - Drivers: hv: Cleanup the guest ID computation. - hyperv: Add a check for ring_size value. - hyperv: Add error handling to rndis_filter_device_add(). - Drivers: hv: Change the hex constant to a decimal constant. - hyperv: Add support for setting MAC from within guests. - net/hyperv: Use wait_event on outstanding sends during device removal. - hv: add RNDIS_OID_GEN_RNDIS_CONFIG_PARAMETER. - Refresh patches.suse/SUSE-bootsplash. Fix wrong vfree() (bnc#773406) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 12.2: zypper in -t patch openSUSE-2012-700 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 12.2 (i586 x86_64): kernel-default-3.4.11-2.16.1 kernel-default-base-3.4.11-2.16.1 kernel-default-base-debuginfo-3.4.11-2.16.1 kernel-default-debuginfo-3.4.11-2.16.1 kernel-default-debugsource-3.4.11-2.16.1 kernel-default-devel-3.4.11-2.16.1 kernel-default-devel-debuginfo-3.4.11-2.16.1 kernel-syms-3.4.11-2.16.1 - openSUSE 12.2 (i686 x86_64): kernel-debug-3.4.11-2.16.1 kernel-debug-base-3.4.11-2.16.1 kernel-debug-base-debuginfo-3.4.11-2.16.1 kernel-debug-debuginfo-3.4.11-2.16.1 kernel-debug-debugsource-3.4.11-2.16.1 kernel-debug-devel-3.4.11-2.16.1 kernel-debug-devel-debuginfo-3.4.11-2.16.1 kernel-desktop-3.4.11-2.16.1 kernel-desktop-base-3.4.11-2.16.1 kernel-desktop-base-debuginfo-3.4.11-2.16.1 kernel-desktop-debuginfo-3.4.11-2.16.1 kernel-desktop-debugsource-3.4.11-2.16.1 kernel-desktop-devel-3.4.11-2.16.1 kernel-desktop-devel-debuginfo-3.4.11-2.16.1 kernel-ec2-3.4.11-2.16.1 kernel-ec2-base-3.4.11-2.16.1 kernel-ec2-base-debuginfo-3.4.11-2.16.1 kernel-ec2-debuginfo-3.4.11-2.16.1 kernel-ec2-debugsource-3.4.11-2.16.1 kernel-ec2-devel-3.4.11-2.16.1 kernel-ec2-devel-debuginfo-3.4.11-2.16.1 kernel-ec2-extra-3.4.11-2.16.1 kernel-ec2-extra-debuginfo-3.4.11-2.16.1 kernel-trace-3.4.11-2.16.1 kernel-trace-base-3.4.11-2.16.1 kernel-trace-base-debuginfo-3.4.11-2.16.1 kernel-trace-debuginfo-3.4.11-2.16.1 kernel-trace-debugsource-3.4.11-2.16.1 kernel-trace-devel-3.4.11-2.16.1 kernel-trace-devel-debuginfo-3.4.11-2.16.1 kernel-vanilla-3.4.11-2.16.1 kernel-vanilla-debuginfo-3.4.11-2.16.1 kernel-vanilla-debugsource-3.4.11-2.16.1 kernel-vanilla-devel-3.4.11-2.16.1 kernel-vanilla-devel-debuginfo-3.4.11-2.16.1 kernel-xen-3.4.11-2.16.1 kernel-xen-base-3.4.11-2.16.1 kernel-xen-base-debuginfo-3.4.11-2.16.1 kernel-xen-debuginfo-3.4.11-2.16.1 kernel-xen-debugsource-3.4.11-2.16.1 kernel-xen-devel-3.4.11-2.16.1 kernel-xen-devel-debuginfo-3.4.11-2.16.1 - openSUSE 12.2 (noarch): kernel-devel-3.4.11-2.16.1 kernel-docs-3.4.11-2.16.2 kernel-source-3.4.11-2.16.1 kernel-source-vanilla-3.4.11-2.16.1 - openSUSE 12.2 (i686): kernel-pae-3.4.11-2.16.1 kernel-pae-base-3.4.11-2.16.1 kernel-pae-base-debuginfo-3.4.11-2.16.1 kernel-pae-debuginfo-3.4.11-2.16.1 kernel-pae-debugsource-3.4.11-2.16.1 kernel-pae-devel-3.4.11-2.16.1 kernel-pae-devel-debuginfo-3.4.11-2.16.1 References: http://support.novell.com/security/cve/CVE-2012-3412.html http://support.novell.com/security/cve/CVE-2012-3520.html https://bugzilla.novell.com/762693 https://bugzilla.novell.com/765230 https://bugzilla.novell.com/771392 https://bugzilla.novell.com/772566 https://bugzilla.novell.com/772831 https://bugzilla.novell.com/772923 https://bugzilla.novell.com/773406 https://bugzilla.novell.com/774523 https://bugzilla.novell.com/774859 https://bugzilla.novell.com/776925 https://bugzilla.novell.com/778630 https://bugzilla.novell.com/779432 https://bugzilla.novell.com/780624 https://bugzilla.novell.com/781134