Mailinglist Archive: opensuse-updates (33 mails)

< Previous Next >
openSUSE-SU-2012:0799-1: moderate: Kernel update
openSUSE Security Update: Kernel update
______________________________________________________________________________

Announcement ID: openSUSE-SU-2012:0799-1
Rating: moderate
References: #466279 #651219 #653260 #655696 #676204 #681186
#681639 #683671 #689860 #703410 #707332 #711941
#713430 #714455 #717209 #717749 #721366 #726045
#726600 #729247 #730118 #731673 #732908 #737624
#738644 #740448 #740703 #740745 #744658 #745832
#746980 #747038 #747660 #748859 #749569 #750079
#750959 #756203 #756840 #757278 #758243 #758260
#758813 #759545 #760902 #765102 #765320
Cross-References: CVE-2009-4020 CVE-2010-3873 CVE-2010-4164
CVE-2010-4249 CVE-2011-1083 CVE-2011-1173
CVE-2011-2517 CVE-2011-2700 CVE-2011-2909
CVE-2011-2928 CVE-2011-3619 CVE-2011-3638
CVE-2011-4077 CVE-2011-4086 CVE-2011-4330
CVE-2012-0038 CVE-2012-0044 CVE-2012-0207
CVE-2012-1090 CVE-2012-1097 CVE-2012-1146
CVE-2012-2119 CVE-2012-2123 CVE-2012-2136
CVE-2012-2663
Affected Products:
openSUSE 11.4
______________________________________________________________________________

An update that solves 25 vulnerabilities and has 22 fixes
is now available.

Description:

This kernel update of the openSUSE 12.1 kernel fixes lots
of bugs and security issues.

Following issues were fixed:

- tcp: drop SYN+FIN messages (bnc#765102).
- net: sock: validate data_len before allocating skb in
sock_alloc_send_pskb() (bnc#765320, CVE-2012-2136).

- fcaps: clear the same personality flags as suid when
fcaps are used (bnc#758260 CVE-2012-2123).

- macvtap: zerocopy: validate vectors before building skb
(bnc#758243 CVE-2012-2119).

- hfsplus: Fix potential buffer overflows (bnc#760902
CVE-2009-4020).

- xfrm: take net hdr len into account for esp payload size
calculation (bnc#759545).

- ext4: fix undefined behavior in ext4_fill_flex_info()
(bnc#757278).

- igb: fix rtnl race in PM resume path (bnc#748859).
- ixgbe: add missing rtnl_lock in PM resume path
(bnc#748859).

- b43: allocate receive buffers big enough for max frame
len + offset (bnc#717749).

- xenbus: Reject replies with payload >
XENSTORE_PAYLOAD_MAX.
- xenbus_dev: add missing error checks to watch handling.
- hwmon: (coretemp-xen) Fix TjMax detection for older CPUs.
- hwmon: (coretemp-xen) Relax target temperature range
check.
- Refresh other Xen patches.

- tlan: add cast needed for proper 64 bit operation
(bnc#756840).

- dl2k: Tighten ioctl permissions (bnc#758813).

- [media] cx22702: Fix signal strength.

- fs: cachefiles: Add support for large files in filesystem
caching (bnc#747038).

- bridge: correct IPv6 checksum after pull (bnc#738644).
- bridge: fix a possible use after free (bnc#738644).
- bridge: Pseudo-header required for the checksum of ICMPv6
(bnc#738644).
- bridge: mcast snooping, fix length check of snooped
MLDv1/2 (bnc#738644).

- PCI/ACPI: Report ASPM support to BIOS if not disabled
from command line (bnc#714455).

- ipc/sem.c: fix race with concurrent semtimedop() timeouts
and IPC_RMID (bnc#756203).

- drm/i915/crt: Remove 0xa0 probe for VGA.

- tty_audit: fix tty_audit_add_data live lock on audit
disabled (bnc#721366).

- drm/i915: suspend fbdev device around suspend/hibernate
(bnc#732908).

- dlm: Do not allocate a fd for peeloff (bnc#729247).
- sctp: Export sctp_do_peeloff (bnc#729247).

- i2c-algo-bit: Fix spurious SCL timeouts under heavy load.

- patches.fixes/epoll-dont-limit-non-nested.patch: Don't
limit non-nested epoll paths (bnc#676204).

- Update patches.suse/sd_init.mark_majors_busy.patch
(bnc#744658).

- igb: Fix for Alt MAC Address feature on 82580 and later
devices (bnc#746980).

- mark busy sd majors as allocated (bug#744658).

- regset: Return -EFAULT, not -EIO, on host-side memory
fault (bnc# 750079 CVE-2012-1097).
- regset: Prevent null pointer reference on readonly
regsets (bnc#750079 CVE-2012-1097).

- mm: memcg: Correct unregistring of events attached to the
same eventfd (CVE-2012-1146 bnc#750959).

- befs: Validate length of long symbolic links
(CVE-2011-2928 bnc#713430).

- si4713-i2c: avoid potential buffer overflow on si4713
(CVE-2011-2700 bnc#707332).

- staging: comedi: fix infoleak to userspace (CVE-2011-2909
bnc#711941).

- hfs: add sanity check for file name length (CVE-2011-4330
bnc#731673).

- cifs: fix dentry refcount leak when opening a FIFO on
lookup (CVE-2012-1090 bnc#749569).

- drm: integer overflow in drm_mode_dirtyfb_ioctl()
(CVE-2012-0044 bnc#740745).

- xfs: fix acl count validation in xfs_acl_from_disk()
(CVE-2012-0038 bnc#740703).
- xfs: validate acl count (CVE-2012-0038 bnc#740703).

-
patches.fixes/xfs-fix-possible-memory-corruption-in-xfs_read
link: Work around missing xfs_alert().

- xfs: Fix missing xfs_iunlock() on error recovery path in
xfs_readlink() (CVE-2011-4077 bnc#726600).
- xfs: Fix possible memory corruption in xfs_readlink
(CVE-2011-4077 bnc#726600).

- ext4: make ext4_split_extent() handle error correctly.
- ext4: ext4_ext_convert_to_initialized bug found in
extended FSX testing.
- ext4: add ext4_split_extent_at() and ext4_split_extent().

- ext4: reimplement convert and split_unwritten
(CVE-2011-3638 bnc#726045).

- patches.fixes/epoll-limit-paths.patch: epoll: limit paths
(bnc#676204 CVE-2011-1083).
- patches.kabi/epoll-kabi-fix.patch: epoll: hide kabi
change in struct file (bnc#676204 CVE-2011-1083).

- NAT/FTP: Fix broken conntrack (bnc#681639 bnc#466279
bnc#747660).

- igmp: Avoid zero delay when receiving odd mixture of IGMP
queries (bnc#740448 CVE-2012-0207).

- jbd2: clear BH_Delay & BH_Unwritten in
journal_unmap_buffer (bnc#745832 CVE-2011-4086).

- AppArmor: fix oops in apparmor_setprocattr (bnc#717209
CVE-2011-3619).

- Refresh patches.suse/SoN-22-netvm.patch. Clean and
*working* patches.

- Refresh patches.suse/SoN-22-netvm.patch. (bnc#683671) Fix
an rcu locking imbalance in the receive path triggered
when using vlans.

- Fix mangled patch (invalid date) Although accepted by
`patch`, this is rejected by `git apply`

- Fix mangled diff lines (leading space tab vs tab)
Although accepted by `patch`, these are rejected by `git
apply`

- jbd/jbd2: validate sb->s_first in
journal_get_superblock() (bnc#730118).

- fsnotify: don't BUG in fsnotify_destroy_mark()
(bnc#689860).

- Fix
patches.fixes/x25-Handle-undersized-fragmented-skbs.patch
(CVE-2010-3873 bnc#651219).
- Fix
patches.fixes/x25-Prevent-skb-overreads-when-checking-call-u
ser-da.patch (CVE-2010-3873 bnc#651219).
- Fix
patches.fixes/x25-Validate-incoming-call-user-data-lengths.p
atch (CVE-2010-3873 bnc#651219).
- Fix
patches.fixes/x25-possible-skb-leak-on-bad-facilities.patch
(CVE-2010-3873 bnc#651219 CVE-2010-4164 bnc#653260).

- Update
patches.fixes/econet-4-byte-infoleak-to-the-network.patch
(bnc#681186 CVE-2011-1173). Fix reference.

- hwmon: (w83627ehf) Properly report thermal diode sensors.

- nl80211: fix overflow in ssid_len (bnc#703410
CVE-2011-2517).
- nl80211: fix check for valid SSID size in scan operations
(bnc#703410 CVE-2011-2517).

- x25: Prevent skb overreads when checking call user data
(CVE-2010-3873 bnc#737624).
- x25: Handle undersized/fragmented skbs (CVE-2010-3873
bnc#737624).
- x25: Validate incoming call user data lengths
(CVE-2010-3873 bnc#737624).
- x25: possible skb leak on bad facilities (CVE-2010-3873
bnc#737624).

- net: Add a flow_cache_flush_deferred function
(bnc#737624).
- xfrm: avoid possible oopse in xfrm_alloc_dst (bnc#737624).

- scm: lower SCM_MAX_FD (bnc#655696 CVE-2010-4249).


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.4:

zypper in -t patch openSUSE-2012-342

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.4 (i586 x86_64):

kernel-debug-2.6.37.6-0.20.1
kernel-debug-base-2.6.37.6-0.20.1
kernel-debug-base-debuginfo-2.6.37.6-0.20.1
kernel-debug-debuginfo-2.6.37.6-0.20.1
kernel-debug-debugsource-2.6.37.6-0.20.1
kernel-debug-devel-2.6.37.6-0.20.1
kernel-debug-devel-debuginfo-2.6.37.6-0.20.1
kernel-default-2.6.37.6-0.20.1
kernel-default-base-2.6.37.6-0.20.1
kernel-default-base-debuginfo-2.6.37.6-0.20.1
kernel-default-debuginfo-2.6.37.6-0.20.1
kernel-default-debugsource-2.6.37.6-0.20.1
kernel-default-devel-2.6.37.6-0.20.1
kernel-default-devel-debuginfo-2.6.37.6-0.20.1
kernel-desktop-2.6.37.6-0.20.1
kernel-desktop-base-2.6.37.6-0.20.1
kernel-desktop-base-debuginfo-2.6.37.6-0.20.1
kernel-desktop-debuginfo-2.6.37.6-0.20.1
kernel-desktop-debugsource-2.6.37.6-0.20.1
kernel-desktop-devel-2.6.37.6-0.20.1
kernel-desktop-devel-debuginfo-2.6.37.6-0.20.1
kernel-ec2-2.6.37.6-0.20.1
kernel-ec2-base-2.6.37.6-0.20.1
kernel-ec2-base-debuginfo-2.6.37.6-0.20.1
kernel-ec2-debuginfo-2.6.37.6-0.20.1
kernel-ec2-debugsource-2.6.37.6-0.20.1
kernel-ec2-devel-2.6.37.6-0.20.1
kernel-ec2-devel-debuginfo-2.6.37.6-0.20.1
kernel-ec2-extra-2.6.37.6-0.20.1
kernel-ec2-extra-debuginfo-2.6.37.6-0.20.1
kernel-syms-2.6.37.6-0.20.1
kernel-trace-2.6.37.6-0.20.1
kernel-trace-base-2.6.37.6-0.20.1
kernel-trace-base-debuginfo-2.6.37.6-0.20.1
kernel-trace-debuginfo-2.6.37.6-0.20.1
kernel-trace-debugsource-2.6.37.6-0.20.1
kernel-trace-devel-2.6.37.6-0.20.1
kernel-trace-devel-debuginfo-2.6.37.6-0.20.1
kernel-vanilla-2.6.37.6-0.20.1
kernel-vanilla-base-2.6.37.6-0.20.1
kernel-vanilla-base-debuginfo-2.6.37.6-0.20.1
kernel-vanilla-debuginfo-2.6.37.6-0.20.1
kernel-vanilla-debugsource-2.6.37.6-0.20.1
kernel-vanilla-devel-2.6.37.6-0.20.1
kernel-vanilla-devel-debuginfo-2.6.37.6-0.20.1
kernel-xen-2.6.37.6-0.20.1
kernel-xen-base-2.6.37.6-0.20.1
kernel-xen-base-debuginfo-2.6.37.6-0.20.1
kernel-xen-debuginfo-2.6.37.6-0.20.1
kernel-xen-debugsource-2.6.37.6-0.20.1
kernel-xen-devel-2.6.37.6-0.20.1
kernel-xen-devel-debuginfo-2.6.37.6-0.20.1
preload-1.2-6.17.1
preload-debuginfo-1.2-6.17.1
preload-debugsource-1.2-6.17.1
preload-kmp-default-1.2_k2.6.37.6_0.20-6.17.1
preload-kmp-default-debuginfo-1.2_k2.6.37.6_0.20-6.17.1
preload-kmp-desktop-1.2_k2.6.37.6_0.20-6.17.1
preload-kmp-desktop-debuginfo-1.2_k2.6.37.6_0.20-6.17.1

- openSUSE 11.4 (noarch):

kernel-devel-2.6.37.6-0.20.1
kernel-docs-2.6.37.6-0.20.2
kernel-source-2.6.37.6-0.20.1
kernel-source-vanilla-2.6.37.6-0.20.1

- openSUSE 11.4 (i586):

kernel-pae-2.6.37.6-0.20.1
kernel-pae-base-2.6.37.6-0.20.1
kernel-pae-base-debuginfo-2.6.37.6-0.20.1
kernel-pae-debuginfo-2.6.37.6-0.20.1
kernel-pae-debugsource-2.6.37.6-0.20.1
kernel-pae-devel-2.6.37.6-0.20.1
kernel-pae-devel-debuginfo-2.6.37.6-0.20.1
kernel-vmi-2.6.37.6-0.20.1
kernel-vmi-base-2.6.37.6-0.20.1
kernel-vmi-base-debuginfo-2.6.37.6-0.20.1
kernel-vmi-debuginfo-2.6.37.6-0.20.1
kernel-vmi-debugsource-2.6.37.6-0.20.1
kernel-vmi-devel-2.6.37.6-0.20.1
kernel-vmi-devel-debuginfo-2.6.37.6-0.20.1


References:

http://support.novell.com/security/cve/CVE-2009-4020.html
http://support.novell.com/security/cve/CVE-2010-3873.html
http://support.novell.com/security/cve/CVE-2010-4164.html
http://support.novell.com/security/cve/CVE-2010-4249.html
http://support.novell.com/security/cve/CVE-2011-1083.html
http://support.novell.com/security/cve/CVE-2011-1173.html
http://support.novell.com/security/cve/CVE-2011-2517.html
http://support.novell.com/security/cve/CVE-2011-2700.html
http://support.novell.com/security/cve/CVE-2011-2909.html
http://support.novell.com/security/cve/CVE-2011-2928.html
http://support.novell.com/security/cve/CVE-2011-3619.html
http://support.novell.com/security/cve/CVE-2011-3638.html
http://support.novell.com/security/cve/CVE-2011-4077.html
http://support.novell.com/security/cve/CVE-2011-4086.html
http://support.novell.com/security/cve/CVE-2011-4330.html
http://support.novell.com/security/cve/CVE-2012-0038.html
http://support.novell.com/security/cve/CVE-2012-0044.html
http://support.novell.com/security/cve/CVE-2012-0207.html
http://support.novell.com/security/cve/CVE-2012-1090.html
http://support.novell.com/security/cve/CVE-2012-1097.html
http://support.novell.com/security/cve/CVE-2012-1146.html
http://support.novell.com/security/cve/CVE-2012-2119.html
http://support.novell.com/security/cve/CVE-2012-2123.html
http://support.novell.com/security/cve/CVE-2012-2136.html
http://support.novell.com/security/cve/CVE-2012-2663.html
https://bugzilla.novell.com/466279
https://bugzilla.novell.com/651219
https://bugzilla.novell.com/653260
https://bugzilla.novell.com/655696
https://bugzilla.novell.com/676204
https://bugzilla.novell.com/681186
https://bugzilla.novell.com/681639
https://bugzilla.novell.com/683671
https://bugzilla.novell.com/689860
https://bugzilla.novell.com/703410
https://bugzilla.novell.com/707332
https://bugzilla.novell.com/711941
https://bugzilla.novell.com/713430
https://bugzilla.novell.com/714455
https://bugzilla.novell.com/717209
https://bugzilla.novell.com/717749
https://bugzilla.novell.com/721366
https://bugzilla.novell.com/726045
https://bugzilla.novell.com/726600
https://bugzilla.novell.com/729247
https://bugzilla.novell.com/730118
https://bugzilla.novell.com/731673
https://bugzilla.novell.com/732908
https://bugzilla.novell.com/737624
https://bugzilla.novell.com/738644
https://bugzilla.novell.com/740448
https://bugzilla.novell.com/740703
https://bugzilla.novell.com/740745
https://bugzilla.novell.com/744658
https://bugzilla.novell.com/745832
https://bugzilla.novell.com/746980
https://bugzilla.novell.com/747038
https://bugzilla.novell.com/747660
https://bugzilla.novell.com/748859
https://bugzilla.novell.com/749569
https://bugzilla.novell.com/750079
https://bugzilla.novell.com/750959
https://bugzilla.novell.com/756203
https://bugzilla.novell.com/756840
https://bugzilla.novell.com/757278
https://bugzilla.novell.com/758243
https://bugzilla.novell.com/758260
https://bugzilla.novell.com/758813
https://bugzilla.novell.com/759545
https://bugzilla.novell.com/760902
https://bugzilla.novell.com/765102
https://bugzilla.novell.com/765320


< Previous Next >
This Thread
  • No further messages