Mailinglist Archive: opensuse-updates (42 mails)

< Previous Next >
openSUSE-SU-2013:0824-1: moderate: kernel: Security and Bugfix update for 3.4.42
openSUSE Security Update: kernel: Security and Bugfix update for 3.4.42
______________________________________________________________________________

Announcement ID: openSUSE-SU-2013:0824-1
Rating: moderate
References: #792500 #802153 #805633 #806138 #806976 #806980
#808829 #809155 #809330 #809748 #813963
Cross-References: CVE-2013-0913 CVE-2013-1763 CVE-2013-1767
CVE-2013-1774 CVE-2013-1796 CVE-2013-1797
CVE-2013-1798 CVE-2013-1848
Affected Products:
openSUSE 12.2
______________________________________________________________________________

An update that solves 8 vulnerabilities and has three fixes
is now available.

Description:


Linux kernel was updated to kernel 3.4.42 fixing various
bugs and security issues.

- Refresh patches.suse/SUSE-bootsplash. Fix bootsplash
breakage due to stable fix (bnc#813963)

- Linux 3.4.39.
- kABI: protect struct tracer.

- Linux 3.4.38 (bnc#808829,CVE-2013-0913).
- patches.kabi/kabi-protect-struct-sk_buff.patch: kABI:
protect struct sk_buff.
- patches.kabi/kabi-ipv4-remove-inclusion.patch: kABI:
ipv4, remove inclusion.

- USB: io_ti: Fix NULL dereference in chase_port()
(bnc#806976, CVE-2013-1774).

- Linux 3.4.37 (bnc#809155 bnc#809330 bnc#809748
CVE-2013-1848).
- Linux 3.4.36.

- KVM: Convert MSR_KVM_SYSTEM_TIME to use
gfn_to_hva_cache_init (bnc#806980 CVE-2013-1797).
- KVM: Fix bounds checking in ioapic indirect register read
(bnc#806980 CVE-2013-1798).
- KVM: Fix for buffer overflow in handling of
MSR_KVM_SYSTEM_TIME (bnc#806980 CVE-2013-1796).
- kabi/severities: Allow kvm abi changes - kvm modules are
self consistent

- loopdev: fix a deadlock (bnc#809748).
- block: use i_size_write() in bd_set_size() (bnc#809748).

- drm/i915: bounds check execbuffer relocation count
(bnc#808829,CVE-2013-0913).

- TTY: do not reset master's packet mode (bnc#809330).

- Update patches.fixes/ext3-Fix-format-string-issues.patch
(bnc#809155 CVE-2013-1848).

- ext3: Fix format string issues (bnc#809155).

- Linux 3.4.35 (bnc#802153).

- Linux 3.4.34 (CVE-2013-1763 CVE-2013-1767 bnc#792500
bnc#806138 bnc#805633).

- tmpfs: fix use-after-free of mempolicy object
(bnc#806138, CVE-2013-1767).


Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 12.2:

zypper in -t patch openSUSE-2013-440

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 12.2 (i586 x86_64):

kernel-default-3.4.42-2.28.1
kernel-default-base-3.4.42-2.28.1
kernel-default-base-debuginfo-3.4.42-2.28.1
kernel-default-debuginfo-3.4.42-2.28.1
kernel-default-debugsource-3.4.42-2.28.1
kernel-default-devel-3.4.42-2.28.1
kernel-default-devel-debuginfo-3.4.42-2.28.1
kernel-syms-3.4.42-2.28.1

- openSUSE 12.2 (i686 x86_64):

kernel-debug-3.4.42-2.28.1
kernel-debug-base-3.4.42-2.28.1
kernel-debug-base-debuginfo-3.4.42-2.28.1
kernel-debug-debuginfo-3.4.42-2.28.1
kernel-debug-debugsource-3.4.42-2.28.1
kernel-debug-devel-3.4.42-2.28.1
kernel-debug-devel-debuginfo-3.4.42-2.28.1
kernel-desktop-3.4.42-2.28.1
kernel-desktop-base-3.4.42-2.28.1
kernel-desktop-base-debuginfo-3.4.42-2.28.1
kernel-desktop-debuginfo-3.4.42-2.28.1
kernel-desktop-debugsource-3.4.42-2.28.1
kernel-desktop-devel-3.4.42-2.28.1
kernel-desktop-devel-debuginfo-3.4.42-2.28.1
kernel-ec2-3.4.42-2.28.1
kernel-ec2-base-3.4.42-2.28.1
kernel-ec2-base-debuginfo-3.4.42-2.28.1
kernel-ec2-debuginfo-3.4.42-2.28.1
kernel-ec2-debugsource-3.4.42-2.28.1
kernel-ec2-devel-3.4.42-2.28.1
kernel-ec2-devel-debuginfo-3.4.42-2.28.1
kernel-ec2-extra-3.4.42-2.28.1
kernel-ec2-extra-debuginfo-3.4.42-2.28.1
kernel-trace-3.4.42-2.28.1
kernel-trace-base-3.4.42-2.28.1
kernel-trace-base-debuginfo-3.4.42-2.28.1
kernel-trace-debuginfo-3.4.42-2.28.1
kernel-trace-debugsource-3.4.42-2.28.1
kernel-trace-devel-3.4.42-2.28.1
kernel-trace-devel-debuginfo-3.4.42-2.28.1
kernel-vanilla-3.4.42-2.28.1
kernel-vanilla-debuginfo-3.4.42-2.28.1
kernel-vanilla-debugsource-3.4.42-2.28.1
kernel-vanilla-devel-3.4.42-2.28.1
kernel-vanilla-devel-debuginfo-3.4.42-2.28.1
kernel-xen-3.4.42-2.28.1
kernel-xen-base-3.4.42-2.28.1
kernel-xen-base-debuginfo-3.4.42-2.28.1
kernel-xen-debuginfo-3.4.42-2.28.1
kernel-xen-debugsource-3.4.42-2.28.1
kernel-xen-devel-3.4.42-2.28.1
kernel-xen-devel-debuginfo-3.4.42-2.28.1

- openSUSE 12.2 (noarch):

kernel-devel-3.4.42-2.28.1
kernel-docs-3.4.42-2.28.2
kernel-source-3.4.42-2.28.1
kernel-source-vanilla-3.4.42-2.28.1

- openSUSE 12.2 (i686):

kernel-pae-3.4.42-2.28.1
kernel-pae-base-3.4.42-2.28.1
kernel-pae-base-debuginfo-3.4.42-2.28.1
kernel-pae-debuginfo-3.4.42-2.28.1
kernel-pae-debugsource-3.4.42-2.28.1
kernel-pae-devel-3.4.42-2.28.1
kernel-pae-devel-debuginfo-3.4.42-2.28.1


References:

http://support.novell.com/security/cve/CVE-2013-0913.html
http://support.novell.com/security/cve/CVE-2013-1763.html
http://support.novell.com/security/cve/CVE-2013-1767.html
http://support.novell.com/security/cve/CVE-2013-1774.html
http://support.novell.com/security/cve/CVE-2013-1796.html
http://support.novell.com/security/cve/CVE-2013-1797.html
http://support.novell.com/security/cve/CVE-2013-1798.html
http://support.novell.com/security/cve/CVE-2013-1848.html
https://bugzilla.novell.com/792500
https://bugzilla.novell.com/802153
https://bugzilla.novell.com/805633
https://bugzilla.novell.com/806138
https://bugzilla.novell.com/806976
https://bugzilla.novell.com/806980
https://bugzilla.novell.com/808829
https://bugzilla.novell.com/809155
https://bugzilla.novell.com/809330
https://bugzilla.novell.com/809748
https://bugzilla.novell.com/813963


< Previous Next >
This Thread
  • No further messages