Mailinglist Archive: opensuse-updates (53 mails)

< Previous Next >
openSUSE-SU-2014:0840-1: important: kernel: security and bugfix update
openSUSE Security Update: kernel: security and bugfix update
______________________________________________________________________________

Announcement ID: openSUSE-SU-2014:0840-1
Rating: important
References: #851338 #858067 #868315 #869563 #870173 #870576
#871561 #872715 #873374 #876102 #876981 #877257
#877713 #877721 #878115 #878274 #879258 #879792
#880599 #880613 #880892 #881697 #881727 #882648

Cross-References: CVE-2013-7339 CVE-2014-0055 CVE-2014-0077
CVE-2014-2678 CVE-2014-2851 CVE-2014-3122
CVE-2014-3144 CVE-2014-3145 CVE-2014-3153

Affected Products:
openSUSE 13.1
______________________________________________________________________________

An update that solves 9 vulnerabilities and has 15 fixes is
now available.

Description:


The Linux kernel was updated to fix security issues and bugs.

Security issues fixed: CVE-2014-3153: The futex_requeue function in
kernel/futex.c in the Linux kernel did not ensure that calls have two
different futex addresses, which allowed local users to gain privileges
via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter
modification.

CVE-2014-3144: The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST
extension implementations in the sk_run_filter function in
net/core/filter.c in the Linux kernel did not check whether a certain
length value is sufficiently large, which allowed local users to cause a
denial of service (integer underflow and system crash) via crafted BPF
instructions. NOTE: the affected code was moved to the __skb_get_nlattr
and __skb_get_nlattr_nest functions before the vulnerability was announced.

CVE-2014-3145: The BPF_S_ANC_NLATTR_NEST extension implementation in the
sk_run_filter function in net/core/filter.c in the Linux kernel used the
reverse order in a certain subtraction, which allowed local users to cause
a denial of service (over-read and system crash) via crafted BPF
instructions. NOTE: the affected code was moved to the
__skb_get_nlattr_nest function before the vulnerability was announced.

CVE-2014-0077: drivers/vhost/net.c in the Linux kernel, when mergeable
buffers are disabled, did not properly validate packet lengths, which
allowed guest OS users to cause a denial of service (memory corruption and
host OS crash) or possibly gain privileges on the host OS via crafted
packets, related to the handle_rx and get_rx_bufs functions.

CVE-2014-0055: The get_rx_bufs function in drivers/vhost/net.c in the
vhost-net subsystem in the Linux kernel package did not properly handle
vhost_get_vq_desc errors, which allowed guest OS users to cause a denial
of service (host OS crash) via unspecified vectors.

CVE-2014-2678: The rds_iw_laddr_check function in net/rds/iw.c in the
Linux kernel allowed local users to cause a denial of service (NULL
pointer dereference and system crash) or possibly have unspecified other
impact via a bind system call for an RDS socket on a system that lacks RDS
transports.

CVE-2013-7339: The rds_ib_laddr_check function in net/rds/ib.c in the
Linux kernel allowed local users to cause a denial of service (NULL
pointer dereference and system crash) or possibly have unspecified other
impact via a bind system call for an RDS socket on a system that lacks RDS
transports.

CVE-2014-2851: Integer overflow in the ping_init_sock function in
net/ipv4/ping.c in the Linux kernel allowed local users to cause a denial
of service (use-after-free and system crash) or possibly gain privileges
via a crafted application that leverages an improperly managed reference
counter.

- ext4: Fix buffer double free in ext4_alloc_branch() (bnc#880599
bnc#876981).

- patches.fixes/firewire-01-net-fix-use-after-free.patch,
patches.fixes/firewire-02-ohci-fix-probe-failure-with-agere-lsi-controllers
.patch, patches.fixes/firewire-03-dont-use-prepare_delayed_work.patch:
Add missing bug reference (bnc#881697).

- firewire: don't use PREPARE_DELAYED_WORK.
- firewire: ohci: fix probe failure with Agere/LSI controllers.
- firewire: net: fix use after free.

- USB: OHCI: fix problem with global suspend on ATI controllers
(bnc#868315).

- mm: revert "page-writeback.c: subtract min_free_kbytes from dirtyable
memory" (bnc#879792).

- usb: musb: tusb6010: Use musb->tusb_revision instead of
tusb_get_revision call (bnc#872715).
- usb: musb: tusb6010: Add tusb_revision to struct musb to store the
revision (bnc#872715).

- ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets (bnc#880613).

- floppy: do not corrupt bio.bi_flags when reading block 0 (bnc#879258).

- reiserfs: call truncate_setsize under tailpack mutex (bnc#878115).

- Update Xen config files: Set compatibility level back to 4.1
(bnc#851338).

- Update config files. Guillaume GARDET reported a broken build due to
CONFIG_USB_SERIAL_GENERIC being modular

- memcg: deprecate memory.force_empty knob (bnc#878274).

- nfsd: when reusing an existing repcache entry, unhash it first
(bnc#877721).

- Enable Socketcan again for i386 and x86_64 (bnc#858067)

- xhci: extend quirk for Renesas cards (bnc#877713).
- xhci: Fix resume issues on Renesas chips in Samsung laptops (bnc#877713).

- mm: try_to_unmap_cluster() should lock_page() before mlocking
(bnc#876102, CVE-2014-3122).

- drm/i915, HD-audio: Don't continue probing when nomodeset is given
(bnc#882648).

- x86/mm/numa: Fix 32-bit kernel NUMA boot (bnc#881727).


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.1:

zypper in -t patch openSUSE-2014-441

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.1 (i686 x86_64):

kernel-debug-3.11.10-17.2
kernel-debug-base-3.11.10-17.2
kernel-debug-base-debuginfo-3.11.10-17.2
kernel-debug-debuginfo-3.11.10-17.2
kernel-debug-debugsource-3.11.10-17.2
kernel-debug-devel-3.11.10-17.2
kernel-debug-devel-debuginfo-3.11.10-17.2
kernel-desktop-3.11.10-17.2
kernel-desktop-base-3.11.10-17.2
kernel-desktop-base-debuginfo-3.11.10-17.2
kernel-desktop-debuginfo-3.11.10-17.2
kernel-desktop-debugsource-3.11.10-17.2
kernel-desktop-devel-3.11.10-17.2
kernel-desktop-devel-debuginfo-3.11.10-17.2
kernel-ec2-3.11.10-17.1
kernel-ec2-base-3.11.10-17.1
kernel-ec2-base-debuginfo-3.11.10-17.1
kernel-ec2-debuginfo-3.11.10-17.1
kernel-ec2-debugsource-3.11.10-17.1
kernel-ec2-devel-3.11.10-17.1
kernel-ec2-devel-debuginfo-3.11.10-17.1
kernel-trace-3.11.10-17.2
kernel-trace-base-3.11.10-17.2
kernel-trace-base-debuginfo-3.11.10-17.2
kernel-trace-debuginfo-3.11.10-17.2
kernel-trace-debugsource-3.11.10-17.2
kernel-trace-devel-3.11.10-17.2
kernel-trace-devel-debuginfo-3.11.10-17.2
kernel-vanilla-3.11.10-17.2
kernel-vanilla-debuginfo-3.11.10-17.2
kernel-vanilla-debugsource-3.11.10-17.2
kernel-vanilla-devel-3.11.10-17.2
kernel-vanilla-devel-debuginfo-3.11.10-17.2
kernel-xen-3.11.10-17.2
kernel-xen-base-3.11.10-17.2
kernel-xen-base-debuginfo-3.11.10-17.2
kernel-xen-debuginfo-3.11.10-17.2
kernel-xen-debugsource-3.11.10-17.2
kernel-xen-devel-3.11.10-17.2
kernel-xen-devel-debuginfo-3.11.10-17.2

- openSUSE 13.1 (i586 x86_64):

cloop-2.639-11.10.1
cloop-debuginfo-2.639-11.10.1
cloop-debugsource-2.639-11.10.1
cloop-kmp-default-2.639_k3.11.10_17-11.10.1
cloop-kmp-default-debuginfo-2.639_k3.11.10_17-11.10.1
cloop-kmp-desktop-2.639_k3.11.10_17-11.10.1
cloop-kmp-desktop-debuginfo-2.639_k3.11.10_17-11.10.1
cloop-kmp-xen-2.639_k3.11.10_17-11.10.1
cloop-kmp-xen-debuginfo-2.639_k3.11.10_17-11.10.1
crash-7.0.2-2.10.9
crash-debuginfo-7.0.2-2.10.9
crash-debugsource-7.0.2-2.10.9
crash-devel-7.0.2-2.10.9
crash-doc-7.0.2-2.10.9
crash-eppic-7.0.2-2.10.9
crash-eppic-debuginfo-7.0.2-2.10.9
crash-gcore-7.0.2-2.10.9
crash-gcore-debuginfo-7.0.2-2.10.9
crash-kmp-default-7.0.2_k3.11.10_17-2.10.9
crash-kmp-default-debuginfo-7.0.2_k3.11.10_17-2.10.9
crash-kmp-desktop-7.0.2_k3.11.10_17-2.10.9
crash-kmp-desktop-debuginfo-7.0.2_k3.11.10_17-2.10.9
crash-kmp-xen-7.0.2_k3.11.10_17-2.10.9
crash-kmp-xen-debuginfo-7.0.2_k3.11.10_17-2.10.9
hdjmod-debugsource-1.28-16.10.1
hdjmod-kmp-default-1.28_k3.11.10_17-16.10.1
hdjmod-kmp-default-debuginfo-1.28_k3.11.10_17-16.10.1
hdjmod-kmp-desktop-1.28_k3.11.10_17-16.10.1
hdjmod-kmp-desktop-debuginfo-1.28_k3.11.10_17-16.10.1
hdjmod-kmp-xen-1.28_k3.11.10_17-16.10.1
hdjmod-kmp-xen-debuginfo-1.28_k3.11.10_17-16.10.1
ipset-6.21.1-2.14.1
ipset-debuginfo-6.21.1-2.14.1
ipset-debugsource-6.21.1-2.14.1
ipset-devel-6.21.1-2.14.1
ipset-kmp-default-6.21.1_k3.11.10_17-2.14.1
ipset-kmp-default-debuginfo-6.21.1_k3.11.10_17-2.14.1
ipset-kmp-desktop-6.21.1_k3.11.10_17-2.14.1
ipset-kmp-desktop-debuginfo-6.21.1_k3.11.10_17-2.14.1
ipset-kmp-xen-6.21.1_k3.11.10_17-2.14.1
ipset-kmp-xen-debuginfo-6.21.1_k3.11.10_17-2.14.1
iscsitarget-1.4.20.3-13.10.1
iscsitarget-debuginfo-1.4.20.3-13.10.1
iscsitarget-debugsource-1.4.20.3-13.10.1
iscsitarget-kmp-default-1.4.20.3_k3.11.10_17-13.10.1
iscsitarget-kmp-default-debuginfo-1.4.20.3_k3.11.10_17-13.10.1
iscsitarget-kmp-desktop-1.4.20.3_k3.11.10_17-13.10.1
iscsitarget-kmp-desktop-debuginfo-1.4.20.3_k3.11.10_17-13.10.1
iscsitarget-kmp-xen-1.4.20.3_k3.11.10_17-13.10.1
iscsitarget-kmp-xen-debuginfo-1.4.20.3_k3.11.10_17-13.10.1
kernel-default-3.11.10-17.2
kernel-default-base-3.11.10-17.2
kernel-default-base-debuginfo-3.11.10-17.2
kernel-default-debuginfo-3.11.10-17.2
kernel-default-debugsource-3.11.10-17.2
kernel-default-devel-3.11.10-17.2
kernel-default-devel-debuginfo-3.11.10-17.2
kernel-syms-3.11.10-17.1
libipset3-6.21.1-2.14.1
libipset3-debuginfo-6.21.1-2.14.1
ndiswrapper-1.58-10.1
ndiswrapper-debuginfo-1.58-10.1
ndiswrapper-debugsource-1.58-10.1
ndiswrapper-kmp-default-1.58_k3.11.10_17-10.1
ndiswrapper-kmp-default-debuginfo-1.58_k3.11.10_17-10.1
ndiswrapper-kmp-desktop-1.58_k3.11.10_17-10.1
ndiswrapper-kmp-desktop-debuginfo-1.58_k3.11.10_17-10.1
pcfclock-0.44-258.10.1
pcfclock-debuginfo-0.44-258.10.1
pcfclock-debugsource-0.44-258.10.1
pcfclock-kmp-default-0.44_k3.11.10_17-258.10.1
pcfclock-kmp-default-debuginfo-0.44_k3.11.10_17-258.10.1
pcfclock-kmp-desktop-0.44_k3.11.10_17-258.10.1
pcfclock-kmp-desktop-debuginfo-0.44_k3.11.10_17-258.10.1
python-virtualbox-4.2.18-2.15.2
python-virtualbox-debuginfo-4.2.18-2.15.2
vhba-kmp-debugsource-20130607-2.11.1
vhba-kmp-default-20130607_k3.11.10_17-2.11.1
vhba-kmp-default-debuginfo-20130607_k3.11.10_17-2.11.1
vhba-kmp-desktop-20130607_k3.11.10_17-2.11.1
vhba-kmp-desktop-debuginfo-20130607_k3.11.10_17-2.11.1
vhba-kmp-xen-20130607_k3.11.10_17-2.11.1
vhba-kmp-xen-debuginfo-20130607_k3.11.10_17-2.11.1
virtualbox-4.2.18-2.15.2
virtualbox-debuginfo-4.2.18-2.15.2
virtualbox-debugsource-4.2.18-2.15.2
virtualbox-devel-4.2.18-2.15.2
virtualbox-guest-kmp-default-4.2.18_k3.11.10_17-2.15.2
virtualbox-guest-kmp-default-debuginfo-4.2.18_k3.11.10_17-2.15.2
virtualbox-guest-kmp-desktop-4.2.18_k3.11.10_17-2.15.2
virtualbox-guest-kmp-desktop-debuginfo-4.2.18_k3.11.10_17-2.15.2
virtualbox-guest-tools-4.2.18-2.15.2
virtualbox-guest-tools-debuginfo-4.2.18-2.15.2
virtualbox-guest-x11-4.2.18-2.15.2
virtualbox-guest-x11-debuginfo-4.2.18-2.15.2
virtualbox-host-kmp-default-4.2.18_k3.11.10_17-2.15.2
virtualbox-host-kmp-default-debuginfo-4.2.18_k3.11.10_17-2.15.2
virtualbox-host-kmp-desktop-4.2.18_k3.11.10_17-2.15.2
virtualbox-host-kmp-desktop-debuginfo-4.2.18_k3.11.10_17-2.15.2
virtualbox-qt-4.2.18-2.15.2
virtualbox-qt-debuginfo-4.2.18-2.15.2
virtualbox-websrv-4.2.18-2.15.2
virtualbox-websrv-debuginfo-4.2.18-2.15.2
xen-debugsource-4.3.2_01-18.2
xen-devel-4.3.2_01-18.2
xen-kmp-default-4.3.2_01_k3.11.10_17-18.2
xen-kmp-default-debuginfo-4.3.2_01_k3.11.10_17-18.2
xen-kmp-desktop-4.3.2_01_k3.11.10_17-18.2
xen-kmp-desktop-debuginfo-4.3.2_01_k3.11.10_17-18.2
xen-libs-4.3.2_01-18.2
xen-libs-debuginfo-4.3.2_01-18.2
xen-tools-domU-4.3.2_01-18.2
xen-tools-domU-debuginfo-4.3.2_01-18.2
xtables-addons-2.3-2.10.1
xtables-addons-debuginfo-2.3-2.10.1
xtables-addons-debugsource-2.3-2.10.1
xtables-addons-kmp-default-2.3_k3.11.10_17-2.10.1
xtables-addons-kmp-default-debuginfo-2.3_k3.11.10_17-2.10.1
xtables-addons-kmp-desktop-2.3_k3.11.10_17-2.10.1
xtables-addons-kmp-desktop-debuginfo-2.3_k3.11.10_17-2.10.1
xtables-addons-kmp-xen-2.3_k3.11.10_17-2.10.1
xtables-addons-kmp-xen-debuginfo-2.3_k3.11.10_17-2.10.1

- openSUSE 13.1 (noarch):

kernel-devel-3.11.10-17.2
kernel-docs-3.11.10-17.6
kernel-source-3.11.10-17.2
kernel-source-vanilla-3.11.10-17.2

- openSUSE 13.1 (x86_64):

xen-4.3.2_01-18.2
xen-doc-html-4.3.2_01-18.2
xen-libs-32bit-4.3.2_01-18.2
xen-libs-debuginfo-32bit-4.3.2_01-18.2
xen-tools-4.3.2_01-18.2
xen-tools-debuginfo-4.3.2_01-18.2
xen-xend-tools-4.3.2_01-18.2
xen-xend-tools-debuginfo-4.3.2_01-18.2

- openSUSE 13.1 (i686):

kernel-pae-3.11.10-17.2
kernel-pae-base-3.11.10-17.2
kernel-pae-base-debuginfo-3.11.10-17.2
kernel-pae-debuginfo-3.11.10-17.2
kernel-pae-debugsource-3.11.10-17.2
kernel-pae-devel-3.11.10-17.2
kernel-pae-devel-debuginfo-3.11.10-17.2

- openSUSE 13.1 (i586):

cloop-kmp-pae-2.639_k3.11.10_17-11.10.1
cloop-kmp-pae-debuginfo-2.639_k3.11.10_17-11.10.1
crash-kmp-pae-7.0.2_k3.11.10_17-2.10.9
crash-kmp-pae-debuginfo-7.0.2_k3.11.10_17-2.10.9
hdjmod-kmp-pae-1.28_k3.11.10_17-16.10.1
hdjmod-kmp-pae-debuginfo-1.28_k3.11.10_17-16.10.1
ipset-kmp-pae-6.21.1_k3.11.10_17-2.14.1
ipset-kmp-pae-debuginfo-6.21.1_k3.11.10_17-2.14.1
iscsitarget-kmp-pae-1.4.20.3_k3.11.10_17-13.10.1
iscsitarget-kmp-pae-debuginfo-1.4.20.3_k3.11.10_17-13.10.1
ndiswrapper-kmp-pae-1.58_k3.11.10_17-10.1
ndiswrapper-kmp-pae-debuginfo-1.58_k3.11.10_17-10.1
pcfclock-kmp-pae-0.44_k3.11.10_17-258.10.1
pcfclock-kmp-pae-debuginfo-0.44_k3.11.10_17-258.10.1
vhba-kmp-pae-20130607_k3.11.10_17-2.11.1
vhba-kmp-pae-debuginfo-20130607_k3.11.10_17-2.11.1
virtualbox-guest-kmp-pae-4.2.18_k3.11.10_17-2.15.2
virtualbox-guest-kmp-pae-debuginfo-4.2.18_k3.11.10_17-2.15.2
virtualbox-host-kmp-pae-4.2.18_k3.11.10_17-2.15.2
virtualbox-host-kmp-pae-debuginfo-4.2.18_k3.11.10_17-2.15.2
xen-kmp-pae-4.3.2_01_k3.11.10_17-18.2
xen-kmp-pae-debuginfo-4.3.2_01_k3.11.10_17-18.2
xtables-addons-kmp-pae-2.3_k3.11.10_17-2.10.1
xtables-addons-kmp-pae-debuginfo-2.3_k3.11.10_17-2.10.1


References:

http://support.novell.com/security/cve/CVE-2013-7339.html
http://support.novell.com/security/cve/CVE-2014-0055.html
http://support.novell.com/security/cve/CVE-2014-0077.html
http://support.novell.com/security/cve/CVE-2014-2678.html
http://support.novell.com/security/cve/CVE-2014-2851.html
http://support.novell.com/security/cve/CVE-2014-3122.html
http://support.novell.com/security/cve/CVE-2014-3144.html
http://support.novell.com/security/cve/CVE-2014-3145.html
http://support.novell.com/security/cve/CVE-2014-3153.html
https://bugzilla.novell.com/851338
https://bugzilla.novell.com/858067
https://bugzilla.novell.com/868315
https://bugzilla.novell.com/869563
https://bugzilla.novell.com/870173
https://bugzilla.novell.com/870576
https://bugzilla.novell.com/871561
https://bugzilla.novell.com/872715
https://bugzilla.novell.com/873374
https://bugzilla.novell.com/876102
https://bugzilla.novell.com/876981
https://bugzilla.novell.com/877257
https://bugzilla.novell.com/877713
https://bugzilla.novell.com/877721
https://bugzilla.novell.com/878115
https://bugzilla.novell.com/878274
https://bugzilla.novell.com/879258
https://bugzilla.novell.com/879792
https://bugzilla.novell.com/880599
https://bugzilla.novell.com/880613
https://bugzilla.novell.com/880892
https://bugzilla.novell.com/881697
https://bugzilla.novell.com/881727
https://bugzilla.novell.com/882648


< Previous Next >
This Thread
  • No further messages