Mailinglist Archive: opensuse-updates (64 mails)

< Previous Next >
openSUSE-SU-2013:1619-1: moderate: kernel: security and bugfix update to 3.4.63
openSUSE Security Update: kernel: security and bugfix update to 3.4.63
______________________________________________________________________________

Announcement ID: openSUSE-SU-2013:1619-1
Rating: moderate
References: #783858 #785542 #787649 #789598 #794988 #801178
#806976 #807153 #807471 #814336 #815320 #817377
#818053 #821560 #821612 #822575 #823342 #823517
#824171 #824295 #827749 #827750 #828119 #828714
#831055 #831058 #833321 #835414 #838346
Cross-References: CVE-2013-0231 CVE-2013-1774 CVE-2013-1819
CVE-2013-2148 CVE-2013-2164 CVE-2013-2232
CVE-2013-2234 CVE-2013-2237 CVE-2013-2850
CVE-2013-2851 CVE-2013-4162 CVE-2013-4163

Affected Products:
openSUSE 12.2
______________________________________________________________________________

An update that solves 12 vulnerabilities and has 17 fixes
is now available.

Description:


The Linux kernel was updated to 3.4.63, fixing various bugs
and security issues.

- Linux 3.4.59 (CVE-2013-2237 bnc#828119).
- Linux 3.4.57 (CVE-2013-2148 bnc#823517).
- Linux 3.4.55 (CVE-2013-2232 CVE-2013-2234 CVE-2013-4162
CVE-2013-4163 bnc#827749 bnc#827750 bnc#831055
bnc#831058).

- Drivers: hv: util: Fix a bug in util version negotiation
code (bnc#838346).
- vmxnet3: prevent div-by-zero panic when ring resizing
uninitialized dev (bnc#833321).

- bnx2x: protect different statistics flows (bnc#814336).
- bnx2x: Avoid sending multiple statistics queries
(bnc#814336).

- Drivers: hv: util: Fix a bug in version negotiation code
for util services (bnc#828714).

- Update Xen patches to 3.4.53.
- netfront: fix kABI after "reduce gso_max_size to account
for max TCP header".
- netback: don't disconnect frontend when seeing oversize
packet (bnc#823342).
- netfront: reduce gso_max_size to account for max TCP
header.
- backends: Check for insane amounts of requests on the
ring.

- reiserfs: Fixed double unlock in reiserfs_setattr failure
path.

- reiserfs: locking, release lock around quota operations
(bnc#815320).
- reiserfs: locking, handle nested locks properly
(bnc#815320).
- reiserfs: locking, push write lock out of xattr code
(bnc#815320).

- ipv6: ip6_append_data_mtu did not care about pmtudisc and
frag_size (bnc#831055, CVE-2013-4163).

- af_key: fix info leaks in notify messages (bnc#827749
CVE-2013-2234).
- af_key: initialize satype in key_notify_policy_flush()
(bnc#828119 CVE-2013-2237).

- ipv6: call udp_push_pending_frames when uncorking a
socket with (bnc#831058, CVE-2013-4162).

- ipv6: ip6_sk_dst_check() must not assume ipv6 dst.

- xfs: fix _xfs_buf_find oops on blocks beyond the
filesystem end (CVE-2013-1819 bnc#807471).

- brcmsmac: don't start device when RfKill is engaged
(bnc#787649).

- CIFS: Protect i_nlink from being negative (bnc#785542
bnc#789598).

- cifs: don't compare uniqueids in cifs_prime_dcache unless
server inode numbers are in use (bnc#794988).

- xfs: xfs: fallback to vmalloc for large buffers in
xfs_compat_attrlist_by_handle (bnc#818053 bnc#807153).
- xfs: fallback to vmalloc for large buffers in
xfs_attrlist_by_handle (bnc#818053 bnc#807153).

- Linux 3.4.53 (CVE-2013-2164 CVE-2013-2851 bnc#822575
bnc#824295).

- drivers/cdrom/cdrom.c: use kzalloc() for failing hardware
(bnc#824295, CVE-2013-2164).

- fanotify: info leak in copy_event_to_user()
(CVE-2013-2148 bnc#823517).

- block: do not pass disk names as format strings
(bnc#822575 CVE-2013-2851).

- ext4: avoid hang when mounting non-journal filesystems
with orphan list (bnc#817377).

- Linux 3.4.49 (CVE-2013-0231 XSA-43 bnc#801178).

- Linux 3.4.48 (CVE-2013-1774 CVE-2013-2850 bnc#806976
bnc#821560).

- Always include the git commit in KOTD builds This allows
us not to set it explicitly in builds submitted to the
official distribution (bnc#821612, bnc#824171).

- Bluetooth: Really fix registering hci with duplicate name
(bnc#783858).
- Bluetooth: Fix registering hci with duplicate name
(bnc#783858).


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 12.2:

zypper in -t patch openSUSE-2013-813

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 12.2 (i586 x86_64):

kernel-default-3.4.63-2.44.1
kernel-default-base-3.4.63-2.44.1
kernel-default-base-debuginfo-3.4.63-2.44.1
kernel-default-debuginfo-3.4.63-2.44.1
kernel-default-debugsource-3.4.63-2.44.1
kernel-default-devel-3.4.63-2.44.1
kernel-default-devel-debuginfo-3.4.63-2.44.1
kernel-syms-3.4.63-2.44.1

- openSUSE 12.2 (i686 x86_64):

kernel-debug-3.4.63-2.44.1
kernel-debug-base-3.4.63-2.44.1
kernel-debug-base-debuginfo-3.4.63-2.44.1
kernel-debug-debuginfo-3.4.63-2.44.1
kernel-debug-debugsource-3.4.63-2.44.1
kernel-debug-devel-3.4.63-2.44.1
kernel-debug-devel-debuginfo-3.4.63-2.44.1
kernel-desktop-3.4.63-2.44.1
kernel-desktop-base-3.4.63-2.44.1
kernel-desktop-base-debuginfo-3.4.63-2.44.1
kernel-desktop-debuginfo-3.4.63-2.44.1
kernel-desktop-debugsource-3.4.63-2.44.1
kernel-desktop-devel-3.4.63-2.44.1
kernel-desktop-devel-debuginfo-3.4.63-2.44.1
kernel-ec2-3.4.63-2.44.1
kernel-ec2-base-3.4.63-2.44.1
kernel-ec2-base-debuginfo-3.4.63-2.44.1
kernel-ec2-debuginfo-3.4.63-2.44.1
kernel-ec2-debugsource-3.4.63-2.44.1
kernel-ec2-devel-3.4.63-2.44.1
kernel-ec2-devel-debuginfo-3.4.63-2.44.1
kernel-ec2-extra-3.4.63-2.44.1
kernel-ec2-extra-debuginfo-3.4.63-2.44.1
kernel-trace-3.4.63-2.44.1
kernel-trace-base-3.4.63-2.44.1
kernel-trace-base-debuginfo-3.4.63-2.44.1
kernel-trace-debuginfo-3.4.63-2.44.1
kernel-trace-debugsource-3.4.63-2.44.1
kernel-trace-devel-3.4.63-2.44.1
kernel-trace-devel-debuginfo-3.4.63-2.44.1
kernel-vanilla-3.4.63-2.44.1
kernel-vanilla-debuginfo-3.4.63-2.44.1
kernel-vanilla-debugsource-3.4.63-2.44.1
kernel-vanilla-devel-3.4.63-2.44.1
kernel-vanilla-devel-debuginfo-3.4.63-2.44.1
kernel-xen-3.4.63-2.44.1
kernel-xen-base-3.4.63-2.44.1
kernel-xen-base-debuginfo-3.4.63-2.44.1
kernel-xen-debuginfo-3.4.63-2.44.1
kernel-xen-debugsource-3.4.63-2.44.1
kernel-xen-devel-3.4.63-2.44.1
kernel-xen-devel-debuginfo-3.4.63-2.44.1

- openSUSE 12.2 (noarch):

kernel-devel-3.4.63-2.44.1
kernel-docs-3.4.63-2.44.2
kernel-source-3.4.63-2.44.1
kernel-source-vanilla-3.4.63-2.44.1

- openSUSE 12.2 (i686):

kernel-pae-3.4.63-2.44.1
kernel-pae-base-3.4.63-2.44.1
kernel-pae-base-debuginfo-3.4.63-2.44.1
kernel-pae-debuginfo-3.4.63-2.44.1
kernel-pae-debugsource-3.4.63-2.44.1
kernel-pae-devel-3.4.63-2.44.1
kernel-pae-devel-debuginfo-3.4.63-2.44.1


References:

http://support.novell.com/security/cve/CVE-2013-0231.html
http://support.novell.com/security/cve/CVE-2013-1774.html
http://support.novell.com/security/cve/CVE-2013-1819.html
http://support.novell.com/security/cve/CVE-2013-2148.html
http://support.novell.com/security/cve/CVE-2013-2164.html
http://support.novell.com/security/cve/CVE-2013-2232.html
http://support.novell.com/security/cve/CVE-2013-2234.html
http://support.novell.com/security/cve/CVE-2013-2237.html
http://support.novell.com/security/cve/CVE-2013-2850.html
http://support.novell.com/security/cve/CVE-2013-2851.html
http://support.novell.com/security/cve/CVE-2013-4162.html
http://support.novell.com/security/cve/CVE-2013-4163.html
https://bugzilla.novell.com/783858
https://bugzilla.novell.com/785542
https://bugzilla.novell.com/787649
https://bugzilla.novell.com/789598
https://bugzilla.novell.com/794988
https://bugzilla.novell.com/801178
https://bugzilla.novell.com/806976
https://bugzilla.novell.com/807153
https://bugzilla.novell.com/807471
https://bugzilla.novell.com/814336
https://bugzilla.novell.com/815320
https://bugzilla.novell.com/817377
https://bugzilla.novell.com/818053
https://bugzilla.novell.com/821560
https://bugzilla.novell.com/821612
https://bugzilla.novell.com/822575
https://bugzilla.novell.com/823342
https://bugzilla.novell.com/823517
https://bugzilla.novell.com/824171
https://bugzilla.novell.com/824295
https://bugzilla.novell.com/827749
https://bugzilla.novell.com/827750
https://bugzilla.novell.com/828119
https://bugzilla.novell.com/828714
https://bugzilla.novell.com/831055
https://bugzilla.novell.com/831058
https://bugzilla.novell.com/833321
https://bugzilla.novell.com/835414
https://bugzilla.novell.com/838346


< Previous Next >
List Navigation
This Thread
  • No further messages